text
stringlengths
14
5.77M
meta
dict
__index_level_0__
int64
0
9.97k
// // ButtonView.m // ClosingLock // // Created by nieyu on 15/7/16. // Copyright (c) 2015年 nieyu. All rights reserved. // #import "ButtonView.h" #import "UIControl+NYUIButton.h" #import "QuestionMarkImage.h" @interface ButtonView() @property (nonatomic, strong) NSString *title; @property (nonatomic, strong) UIImage *image; @property (nonatomic, assign) float radius; @property (nonatomic, strong) UIButton *button; @property (nonatomic, strong) UILabel *titleLabel; @property (nonatomic, strong) UIImageView *buttonImageView; @end @implementation ButtonView /** init button method */ -(id)initButtonViewWithFrame:(CGRect)frame withTitle:(NSString *)title withImage:(UIImage *)image withRadius:(CGFloat)radius { self = [super initWithFrame:frame]; if (self) { [self setBackgroundColor:[UIColor whiteColor]]; [self setTitle:title]; [self setImage:image]; [self setRadius:radius]; [self setButton:nil]; } return self; } -(void)setTitle:(NSString *)title { _title = title; } -(void)setImage:(UIImage *)image { _image = image; [self setButtonImageView:[[UIImageView alloc] initWithFrame:self.frame]]; QuestionMarkImage *view = [[QuestionMarkImage alloc] init]; [self addSubview:view]; } -(void)setRadius:(float)radius { _radius = radius; [self.layer setCornerRadius:_radius]; } -(void)setTitleLabel:(UILabel *)titleLabel { _titleLabel = titleLabel; if (_titleLabel == nil) { _titleLabel = [[UILabel alloc] initWithFrame:self.bounds]; } [_titleLabel setText:_title]; [self addSubview:_titleLabel]; } -(void)setButtonImageView:(UIImageView *)buttonImageView { _buttonImageView = buttonImageView; if (_buttonImageView == nil) { _buttonImageView = [[UIImageView alloc] initWithFrame:self.bounds]; } [_buttonImageView setImage:_image]; [self addSubview:_buttonImageView]; } -(void)setButton:(UIButton *)button { _button = button; if (!button) { _button = [[UIButton alloc] initWithFrame:self.bounds]; } [self addSubview:_button]; } -(void)setType:(NYButtonViewType)type { switch (type) { case NYNormal: break; case NYCircle: [self setRadius:self.frame.size.width / 2]; break; case NYClear: [self setRadius:self.frame.size.width / 2]; break; default: break; } } /** * method : add handle * * param : event * * param : sender is a block */ - (void)handlevControlWithUIControl:(UIControlEvents)event withBlock:(void(^)(id sender))block { WEAKSELF; [_button handleControlWithUIControl:event withBlock:^(id sender) { DLog(@"hehe"); if (sender) { block(weakSelf); } }]; } /** * method : remove target * * param : event */ - (void)removeHandleForEvent:(UIControlEvents)event { } @end
{ "redpajama_set_name": "RedPajamaGithub" }
7,090
MORE PRAISE FOR HADITH 'It is impossible to understand the Islamic tradition without getting some knowledge of the sciences of hadith. In this fascinating introduction, Jonathan A. C. Brown provides the reader with the necessary means to navigate between the traditional framework and contemporary issues. A brilliant essay written by a widely-acknowledged scholar in the field.' Tariq Ramadan, Professor of Contemporary Islamic Studies, University of Oxford 'A must read and a great read. The combination of impeccable, critical scholarship with a storyteller's style has produced an introductory volume that is both substantive and remarkably engaging.' John L. Esposito, Founding Director of the Center for Muslim-Christian Understanding, Georgetown University 'A comprehensive study of the scholarship throughout Islamic history dealing with the traditions of the Prophet. A combination of critical analysis and informed understanding that presents a significant new perspective on a much-debated subject.' John O. Voll, Professor Emeritus of Islamic History, Georgetown University FOUNDATIONS of ISLAM Series Editor: Omid Safi Other Titles in this Series Pilgrimage in Islam: Traditional and Modern Practices by Sophia Rose Arjana The Qur'an: An Introduction by Anna M. Gade Shar'iah Law: An Introduction by Mohammad Hashim Kamali ABOUT THE AUTHOR Jonathan A. C. Brown is Associate Professor and Alwaleed bin Talal Chair of Islamic Civilization at Georgetown University. He is the author of Misquoting Muhammad, which is also published by Oneworld. He lives in Washington, DC. Hadith Muhammad's Legacy in the Medieval and Modern World Jonathan A. C. Brown 'Whoever has preserved one life, it is as if he has saved all of humanity.' Quran 5:32 To Julia Taft My godmother and the noblest woman I have known... CONTENTS Preface to the Revised Edition Preface Conventions, Abbreviations, and Transliteration 1. The Prophet's Words Then and Now: Hadith and Its Terminology 2. The Transmission and Collection of Prophetic Traditions 3. The Methods and History of Hadith Criticism 4. Prophetic Traditions in Shiite Islam 5. The Function of Prophetic Traditions in Islamic Law and Legal Theory 6. The Function of Prophetic Traditions in Theology 7. The Function of Prophetic Traditions in Sufism 8. The Function of Prophetic Traditions in Politics 9. The Authenticity Question: Western Debates over the Historical Reliability of Prophetic Traditions 10. Debates over Prophetic Traditions in the Modern Muslim World 11. Conclusion Glossary Bibliography Illustrations Acknowledgments PREFACE The science of hadith is a noble one, and generations of scholars far, far more capable and devoted than I have dedicated their lives to transmitting, analyzing, and sorting through the legacy attributed to Muhammad. One could spend a lifetime reading the works of scholars like al-Bukhārī, al-Dhahabī, and Ibn Hajar, and two lifetimes trying to keep up with them. Matching their accomplishments is inconceivable to me. I can only hope that this book provides an adequate introduction to their work and the influence it has had on Islamic civilization. Students and colleagues always ask me whether the Sunni hadith tradition provides an accurate representation of Muhammad's teachings. In truth, I can only say that projects such as this book are part of my search for the answer to that question. As the Chinese art collector Lu Shih-hua (d. 1779 CE) once wrote, such matters 'came to us from the ancients. The ancients are gone, and we cannot raise them from the Nether World to question them. So how can we arrive at the truth without being vain and false in our wrangling noisily about it?'1 Jonathan A. C. Brown Khādim al-hadīth al-sharīf Sana, Yemen, 2007 ENDNOTE 1 Wen Fong, 'The Problem of Forgery in Chinese Painting: Part One,' p. 99. CONVENTIONS, ABBREVIATIONS, AND TRANSLITERATION Dates in this book will follow the Hijrī/Common Era format, where the first date (the Hijrī date) is that of the Islamic lunar calendar, which begins with Muhammad's emigration to Medina in 1/622. Obviously, pre-Islamic dates will follow the standard Before Common Era (BCE) and Common Era (CE) dating system. After the 1700s CE we no longer include Hijrī dates as they serve little use after that point. Abbreviations used in this book include 'b.' for the Arabic 'ibn,' or 'son of...', and (s) for the honorific Arabic phrase 'May the peace and blessings of God be upon him (sallā Allāh 'alayhi wa sallam),' which is commonly said and written after Muhammad's name. The transliteration characters in this book represent the long vowels in Arabic and Persian: ā, ī, and ū. The ' character represents a simple glottal stop, like the initial sounds of both syllables in 'uh oh.' The ' symbol indicates the Arabic letter 'ayn, a sound that resembles the 'Aaah' noise a person makes when getting their throat checked by the doctor. In Arabic and Persian words, 'q' represents a voiceless uvular sound produced at the back of the throat and is non-existent in English. One could most closely approximate this sound with the 'c' sound at the beginning of the crow noise 'caw! caw!' 'Gh' indicates a sound similar to the French 'r', and 'kh' represents a velar fricative like the sound of clearing one's throat. 'Dh' indicates the 'th' sound in words like 'that' or 'bother.' 'Th' represents the 'th' sound in words like 'bath.' PREFACE TO THE REVISED EDITION It has been almost ten years since I wrote the preface to the first edition of this book, sitting in an upper-floor room in a house in Sana, the red and orange light bathing the battered furniture through colored glass. How much the world has changed, how much people have suffered, and how many of the pillars of my own world have fallen. Sana is bombed and besieged. Its already impoverished people starve. Syria lies in ruins beyond tragedy. Egypt, the place I felt most at home, has mutated from the warm and open world of deep knowledge that drew me in, to a kitschy-dark caricature of mid-twentieth-century fascism. Those Egyptian scholars from whom I had benefited and learned so much have either died or become loyal servants of a dictatorship that only fools and the myopically vicious could embrace. So then either my teachers were fools, in which case, does the knowledge they imparted to so many have any value? Or they were vicious, in which case, can such a vessel truly carry 'this knowledge, which is religion,' without sullying it? How does one make sense of things when one's exemplars make choices that seem so profoundly wrong? I've long pondered this, and the answer I'm led to again and again is both comforting and supremely disturbing. The political sphere appears of supreme import. Men triumph or are humiliated or killed; innocent women and children suffer unspeakable abuse; war is fought, peace is made, prosperity nurtured or squandered. But in the vaulted chamber of ideas, of knowledge, this sphere occupies just a portion of one of many shelves. Some who have brought great misery in human history have aimed only at satisfying themselves, but far more have been pursuing the same abstract goods as their righteous, often martyred, opponents. Bond villains are often very well intentioned. Political trauma, as total as it is, is created less by ideas than by their interpretation and implementation. Like all those who have reflected on human polity, my teachers valued both justice and order. But order had priority for them. Others would put justice first. This is a question of priority, and it has consequences. But, phrased like this in the abstract, reasonable people can disagree. And in that small space of disagreement the dimensions of our world are warped in inversion, and endless wrongs and suffering are inflicted. All on part of one shelf in the great library of our human heritage and its divine inspiration. As impossible as it seems, as impossible as it is for me, we must keep our political disagreements in perspective. A report in Sahih al-Bukhārī describes how, as Islam's first, bloody civil war erupted, there was a diplomatic meeting. On one side was 'Ammār bin Yāsir, who would soon die in the war, and on the other Abū Mūsā and Abū Mas'ūd. The two men say to 'Ammār, 'In all the time since you've been Muslim, we haven't seen you undertake anything more distasteful to us than your haste in this matter.' 'Ammār replies, 'And I haven't seen from you two, since the time you became Muslims, anything more distasteful to me than your hesitation on this matter.' Then Abū Mas'ūd dresses each of the other two in robes, and they all head off to the mosque for prayer.1 Enough serious talk! What does this new edition have that the old one doesn't? First, I've fixed as many of the errors or oversights as possible. Second, it includes an entirely new chapter on the role of hadith in politics. Third, I've significantly expanded the section on the development of the Western Historical Critical Method in Chapter 9. I've also added a new case study on hadith authentication at the end of Chapter 3. Finally, I've replaced some of the examples and case studies throughout the book with new ones that are either more varied or more interesting. Jonathan A. C. Brown Khādim al-hadīth al-sharīf Istanbul, 2017 ENDNOTE 1 Sahīh al-Bukhārī: kitāb al-fitan, bāb 19. THE PROPHET'S WORDS THEN AND NOW: HADITH AND ITS TERMINOLOGY 'We have a question,' the man said, his rural accent betraying the long trip he must have made from his provincial hamlet to the metropolis of Cairo. 'We have built a school for boys and girls,' the man continued, sitting cross-legged on the carpet with his eyes angled reverently upward at the scholar seated in the sturdy wooden chair before him. 'But some members of our community say that we cannot allow the girls to attend because they will mix with the boys in the hallways. Are we allowed to open the school?' The man waited anxiously, as did the students seated deferentially around the scholar, I among them. The fall of 2003 was unusually hot, and the hesitant breezes that penetrated the wooden lattice walls were welcomed by all. The scholar, a middle-aged man who would soon be elevated to one of the most influential religious positions in the Sunni Muslim world, the chief jurisconsult (muftī) of Egypt, leaned down towards the tape recorder that the man had dragged with him on his long journey. 'Do you have the Nile down where you are?' the scholar asked. 'Yes,' the man replied. 'Listen, then, whoever you are who objects to opening this school to girls,' the scholar said into the recorder, 'go throw yourself in the Nile! For did the Messenger of God, may the peace and blessings of God be upon him, not say "Do not prevent the female servants of God from the mosques of God"?'1 For over a thousand years Muslim peasants, merchants, and princes have flocked to the vaulted rooms that line the great courtyard of Cairo's al-Azhar Mosque to seek the counsel of the ulema, those scholars who define Islamic faith and religious law. Seated in this courtyard on a fall day in 2003, the future 'Grand Mufti of the Egyptian Lands' could look back on over fourteen hundred years of the Islamic religious tradition, that corpus of scholarship that elucidated the message brought by Muhammad and is one of the world's most elaborate and rich intellectual edifices. In responding to the question of this simple man, the mufti could draw from the capacious tradition of Islamic legal discourse: the bodies of law of the four major Sunni legal schools, the obscure opinions of medieval scholars long eclipsed by time, or the general principles that governed Islamic law and its derivation. Although his mind was no doubt scanning this abundant legal heritage as he pondered the man's question, the scholar did not reply with any high legal language or dry legal ruling. Instead, he answered the man with the words of a figure whom Muslims are taught from childhood to love and venerate as a moral exemplar and object of devotion, a person 'dearer to them than their own child or parents.'i The scholar reached back through the centuries to the words of the Prophet Muhammad, words that he knew would resonate in this simple man's heart as clearly as the day they were first spoken and would lay all the concerns of his rural community to rest. Even amid the confusion of the modern world, today as before, 'the Prophet of God is most worthy of being followed.'2 Muhammad's precedent has been invoked in places and times far distant from the Nile Valley. His words speak with compelling power throughout the Muslim world, among Sunnis and Shiites alike. A year after I had heard the future 'Grand Mufti of the Egyptian Lands' issue his opinion, I sat in the lush courtyard of the Khan Madrasa in the ancient Persian city of Shiraz, discussing issues of Islamic thought with an Imami Shiite cleric. As the morning sun shone on the intricate floral tiles of the mosque's vaulted enclosure, we were debating whether or not 'Alī, the Prophet's son-in-law and well-spring of the Shiite tradition, possessed revealed knowledge of future events. 'The Commander of the Faithful, 'Alī, may God's blessings be upon him, knew that oil would be found in these lands and that "steel birds would fly",' the Shiite cleric expounded energetically. 'This knowledge he got from the Messenger of God, his teacher, for did the Messenger not say, "I am the city of knowledge and 'Alī is its gate. So whoever seeks knowledge let him approach it by its gate"?'3 Among Western readership, the question 'What does Islam say about' some issue is usually followed by reference to the Quran. A Western journalist writing about the dress habits of Egyptian women informs us that wearing the headscarf is not an injunction from the Quran,4 while pundits discussing jihad note that the Quran says 'slay the unbelievers wherever you find them' (Quran 9:5). Certainly, to Muslims the Quran is the literal word of God. It is a text revered to such an extent that many Muslims memorize it in its entirety as children, and many Muslims believe that a state of ritual purity is required to touch its pages. Yet the Quran is not the source to which a curious reader should refer in order to answer the question 'What does Islam say about' a particular issue. The Quran is not a book of law, and many tenets of Islamic theology are never mentioned in the holy book. To consult the Quran is only to get part of the picture. Large portions of the Islamic legal, theological, and popular religious traditions come not from the book that Muslims hold to be God's revelation, but rather from the legacy of Muhammad, whom they believe God chose to explain and elucidate His message through word and deed. It is in his teachings that we find Muslim dress codes as well as the rules and restrictions for holy war. The normative legacy of the Prophet is known as the Sunna, and, although it stands second to the Quran in terms of reverence, it is the lens through which the holy book is interpreted and understood. In this sense, in Islamic civilization the Sunna has ruled over the Quran, shaping, specifying, and adding to the revealed book. Understanding how the message of Islam spread outward from Arabia in the seventh century and how it nurtured the various legal, theological, mystical, and cultural dimensions of Islamic civilization must begin with the study of the heritage left by Muhammad. For much of Islamic history, the unit through which the Sunna was preserved, transmitted, and understood has been the hadīth (Arabic plural, ahādīth), or a report describing the words, actions, or habits of the Prophet. Unlike the Quran, the hadiths were not quickly and concisely compiled during and immediately after Muhammad's life. Because hadiths were recorded and transmitted over a period of decades and even centuries, they are not in and of themselves contemporary historical documentation of what Muhammad said and did. In the century after the Prophet's mission, the Muslim community passed through no less than three civil wars and numerous sectarian schisms. As a result, hadiths were forged by different parties trying to manipulate the authority of the Sunna. The question of the authenticity of hadiths and how one can distinguish true ones from forgeries has been a perennial concern to both the Muslim scholars who turned to the Sunna to elaborate the Islamic tradition and Western scholars who have studied it. The tool that Muslim scholars developed to help ensure the authenticity of hadiths was the isnād (Arabic, 'support'), or the chain of transmitters through which a scholar traced the matn, or text, of a hadith back to the Prophet. The isnād was an effort to document that a hadith had actually come from Muhammad, and Muslim scholars from the eighth century until today have never ceased repeating the mantra 'The isnād is part of the religion – if not for the isnād, whoever wanted could say whatever they wanted.' The Prophet's words, however, have always been more than just a type of proof used in discussions of Islamic law and dogma. The isnād and the hadith it transmits have been more than fodder for debates over authenticity and means of establishing it. For the Muslim scholarly class, the ulema, tracing the isnād of a hadith back to Muhammad is to follow one's genealogy of sacred knowledge back to its source. It is a medium of connection to the Prophet, 'the beloved of God,' and a link to the scholarly titans of the past. Even today, reciting one's isnād is to walk back in memory through the pantheon corridor of great scholars whose labors had built up Islamic tradition. The students who sat gathered around the future Mufti of Egypt on that hot fall day in Cairo had each folded gingerly a piece of paper listing the scholar's isnād back to the earliest hadith collection, the Muwatta' of Mālik b. Anas (d. 179/796), and from that eighth-century author through his isnāds back to the Prophet. Each paper stated that the Mufti had given these students permission to transmit the hadiths in the collection via his isnād. By hearing this book of hadiths through the Mufti's chain of transmission, these students had become part of the timeless tradition of passing knowledge from one generation to the next. For over a thousand years, Muslim students, 'the seekers of knowledge,' have traveled from city to city in the Muslim world to hear hadiths recited by master scholars, receive their permission to transmit them, and be incorporated into the living isnād tradition. In the summer of 2007 I traveled from Egypt across the Red Sea to the sweltering, sandy coastal plain of Tihama in Yemen. There I made my way inland to the ancient trading city of Zabid, its whitewashed brick walls and dust-blown winding alleys seemingly immune to the passage of time. Over the centuries, this city had more than any other place in the Muslim world preserved the tradition of narrating hadiths by full isnāds back to Muhammad. In an old madrasa I found the mufti of the city seated on one of the high wicker beds so common to the region, surrounded by his students. The mufti set down the book he was explaining, and the students stared inquisitively as he asked who I was and why I had come. 'To hear a hadith through your isnād, the isnād of the people of Zabid, O virtuous teacher,' I replied. After hearing my request, the mufti agreed to recite the hadith that a scholar must always give his students first. 'Write this down,' the mufti instructed, 'and do not forget us in your most sincere prayers': I, Muhammad 'Alī al-Battāh of the Ahdal clan, heard from my teacher Ahmad son of Dāwūd al-Battāh, who heard from his teacher the Mufti Sulaymān son of Muhammad al-Ahdal, from Muhammad son of 'Abd al-Bāqī al-Ahdal, from Muhammad son of 'Abd al-Rahmān al-Ahdal, from the Mufti 'Abd al-Rahmān son of Sulaymān al-Ahdal, from his father Sulaymān son of Yahyā al-Ahdal, from Abū Bakr al-Ahdal, from Ahmad al-Ahdal, from the Pillar of Islam, Yahyā son of Umar al-Ahdal, from Abū Bakr al-Battāh, from Yūsuf son of Muhammad al-Battāh, from Tāhir son of Husayn al-Ahdal, from the hadith master Ibn Dayba', from the sheik Zayn al-Dīn al-Sharijī of Zabid, from Nafīs al-Dīn Sulaymān al-'Alawī, from 'Alī son of Shaddād, from the imam Ahmad the Candlemaker, from his father Sharaf al-Dīn the Candlemaker, from Zāhir son of Rustum of Esfahan, from 'Abd al-Malik of Karūkh, from Abū Nasr son of Muhammad of Herat, from Abū Muhammad 'Abd al-Jabbār al-Jarrāh of Merv, from Abū al-'Abbās Muhammad son of Ahmad of Merv, from the definitive hadith master Muhammad son of 'Īsā of Tirmiz, from Ibn Abī 'Umar, from Ibn 'Uyayna, from 'Amr son of Dīnār, from Abū Qābūs, from 'Abdallāh son of 'Amr, from the Messenger of God, who said, 'The merciful, indeed the Most Merciful God has mercy upon them. Have mercy in this earthly world, and He that is in the heavens will have mercy on you.'5 THE CONTENTS OF THIS BOOK This book is an introduction to the hadith tradition, its collection, its criticism, its functions in Islamic civilization and the controversies surrounding it to this day. This present chapter will introduce you to some crucial terminology for the study of hadiths. In chapter 2, we will discuss the collection and transmission of hadiths in Sunni Islam, as well as the various genres of hadith literature that developed from the early Islamic period until modern times. Chapter 3 will explain the science of hadith criticism developed by Sunni scholars and the various debates and developments that affected it throughout Islamic history. Chapter 4 looks at the hadith traditions of Imami and Zaydi Shiism as well as their interaction with that of Sunni Islam. Chapter 5 explores the functions of hadiths in Islamic law and legal theory, and Chapter 6 investigates the role of hadiths in elaborating Islamic theology. Chapter 7 tackles the important functions of hadiths in the Islamic mystical tradition, commonly known as Sufism. Chapter 8 looks at the role of hadiths in Islamic political thought and contemporary controversies. Chapter 9 turns away from Muslim discourse on hadiths to trace the Western academic study of hadiths and Western debates over their historical reliability. Finally, Chapter 10 explores debates among modern Muslims over the reliability of hadiths and their proper role in understanding Islam today. WHAT IS A HADITH? CRUCIAL TERMINOLOGY AND EXAMPLES OF HADITHS The Prophet Muhammad's mission lasted twenty-three years, from 610 CE when he announced to his wife that he had received a reve-lation from God through the Angel Gabriel in a cave outside Mecca, to his death in 632 CE as the head of the powerful Islamic state in Medina. During his career as a prophet and leader, there was no courtroom stenographer assiduously recording his every word and furnishing an official transcript of his orders, religious edicts, or everyday speech. Instead, the generation of Muslims who lived with the Prophet, known as the Companions (Arabic: Sahāba), sought to preserve Muhammad's words and deeds either in their memories or through some means of writing, passing these recollections on to others. These reports were passed on from generation to generation, in oral and/or written form, until scholars compiled them in permanent collections. Each hadith, or report about the Prophet, consists of a text (matn) describing his words or actions, and a chain of transmission (isnād) by which this report was communicated. Clearly, more than one Companion could report the Prophet saying or doing something, or a Companion could recount this report to more than one person. This would result in more than one chain of transmission for the report. We must thus distinguish between an instance of the Prophet speaking or acting, which we will refer to either by its Arabic term 'hadith' or by the term 'tradition,' and the various chains of transmission of this tradition. As in a game of 'Telephone,' a report could mutate as it was passed from person to person. As we know from our own daily lives, reports could also be repeated in expanded or contracted form depending on context. Each of these varying transmissions of the tradition we will call a narration of the hadith. For example, it is transmitted from the Companion 'Abdallāh b. al-Zubayr that the Prophet said, 'Whoever misrepresents me, let him prepare for himself a seat in Hellfire.'6 But the mainstream narrations of this tradition, from many Companions such as Anas b. Mālik, Ibn Mas'ūd and Abū Hurayra, quote the Prophet as saying 'Whoever misrepresents me intentionally, let him prepare for himself a seat in Hellfire.' Here we see how two narrations of one Prophetic tradition differ in an important way. The following are some examples of hadiths addressing a range of legal, ritual, theological, and ethical topics from the major sects of Islam. From the most revered Sunni hadith collection, the Sahīh of al-Bukhārī (d. 256/870), we find a hadith that served as evidence in Islamic theological debates over whether believers will meet God on the Day of Judgment: Al-Bukhārī writes: it was narrated to us by Yūsuf b. Mūsā: it was narrated to us by Abū Usāma: it was narrated to me by al-A'mash, from Khaythama, from the Companion 'Adī b. Hātim, who said that: The Messenger of God, may God's peace and blessings be upon him, said, 'There is not one among you except that he will be spoken to directly by his Lord with no translator or any barrier separating them.'7 From the Sunan of the Sunni scholar Abū Dāwūd al-Sijistānī (d. 275/889), this hadith was used to help derive Islamic laws on taxation: Abū Dāwūd writes: it was narrated to us by Muhammad b. Dāwūd b. Sufyān: it was narrated to us by Yahyā b. Hassān: it was narrated to us by Sulaymān b. Mūsā: it was narrated to us by Ja'far b. Sa'd: it was narrated to me by Khubayb b. Sulaymān, from his father, from the Companion Samura b. Jundub, who said [in a speech]: Indeed the Messenger of God, may the peace and blessings of God be upon him, would order us to pay the charity tax on things that we were preparing for sale.8 From the Mu'jam al-saghīr of the Sunni scholar al-Tabarānī (d. 360/971) we find a hadith that indicates both Muhammad's character and the permissibility of lending items: Al-Tabarānī writes: it was narrated to us by Ahmad b. Mansūr al-Jundīsābūrī: it was narrated to us by 'Alī b. Harb: it was reported to us by Ash'ath b. 'Attāf, from 'Abdallāh b. Habīb, from al-Sha'bī, from the Companion Jābir b. 'Abdallāh, that: The Messenger of God bought a camel from me and then let me ride it back to the city.9 From the Amālī of the famous Imami Shiite scholar Ibn Bābawayh (d. 381/991) we find a hadith that emphasizes two important themes in Islamic legal and theological discourse: first, religion is not the purview of personal opinion, and, second, God is not to be compared to created beings: Ibn Bābawayh writes: it was narrated to us by Muhammad b. Mūsā b. al-Mutawakkil: it was narrated to us by 'Alī b. Ibrāhīm b. Hāshim: it was narrated by his father, from al-Rayyān b. al-Salt, from the Imam 'Alī b. Mūsā al-Ridā, from his father, from his forefathers, from the Commander of the Faithful 'Alī b. Abī Tālib, that: The Messenger of God, may God's peace and blessings be upon him, said, 'God said, "He does not believe in Me who interprets My speech [in the Quran] with merely his own opinion. He has not known Me who compares Me with My creation, and he is not in My religion who uses analogical reasoning [in questions of law] in My religion." '10 Finally, in the Amālī al-sughrā of the Zaydi Shiite scholar Ahmad b. al-Husayn al-Hārūnī (d. 421/1030) we find a hadith describing the way in which a pious Muslim should view death: Al-Hārūnī writes: It was reported to us by Abū al-Husayn al- Burūjirdī: it was narrated to us by Abū al-Qāsim al-Baghawī: it was narrated to us by Hudba: it was narrated to us by Hammām, from Qatāda, from the Companion Anas, from the Companion 'Ubāda b. al-Sāmit, that: The Messenger of God, may the peace and blessings of God be upon him, said: 'He who would love to encounter God, God loves encountering him. And he who would dislike encountering God, God dislikes encountering him.' So Aisha, or another one of the Prophet's wives, asked, 'O Messenger of God, but indeed we dislike death.' The Prophet replied, 'It is not like that, but rather the believer, when death comes to him, he receives the glad tidings of God's pleasure and His munificence. So that there is nothing dearer to the believer than what lies ahead of him. Thus he wants to encounter God, and God wants to encounter him. But the unbeliever, when death comes to him, he receives tidings of God's displeasure and His impending punishment. So there is nothing more hated to him than what lies ahead. Thus he despises meeting God, and God despises meeting him.' 11 THE NATURE OF MUHAMMAD'S AUTHORITY IN ISLAM The role of the Prophet Muhammad as a teacher, role model, and living example of the revelation he delivered is discussed in the Quran.ii The holy book repeatedly instructs Muslims to 'Obey God and His prophet' (Quran 8:1), adding that he was for the Muslims 'a most goodly example' (Quran 33:21). Although the Quran reiterates that Muhammad is nothing but a mortal who has merely been favored with direct communication from God, Muslims consider him above any ethical shortcomings. There has been disagreement among Shiite and Sunni Muslims as well as within the two sects as to the degree to which prophets in general are immune from sin, but Muslims agree that after the beginning of his prophetic mission Muhammad was incapable of any serious sin or moral failing. In fact, reports of rare errors or instances of forgetfulness on his part are treated as part of the Prophet's teachings. The Quran, for example, reprimands Muhammad for turning away in frustration from a blind Muslim who distracted him with a question when he was busy negotiating with his Meccan opponents. The Quran uses this as an opportunity to remind the Muslims that one should not prefer influential infidels over sincere, if tactless, believers (Quran 80:1–7). There is even a hadith in which the Prophet states, 'Indeed I forget or am made to forget so that I may furnish the Sunna.'12 Hadiths about mistakes that Muhammad made in prayers, for example, Muslims treat as instructions on how to act when they themselves make those errors.iii No traditional Muslim scholar would ever consider it possible that the Prophet had made a statement or acted out of anger or weakness. When opponents of the Muslims mocked the Companion 'Abdallāh b. 'Amr for recording everything the Prophet said, Muhammad comforted him by saying 'Write it down, for by Him whose hand holds my soul, nothing comes out of my mouth but the truth.'13 As the Quran states, Muhammad 'does not speak out of his own desires, it is but revelation revealed' (Quran 53:3–4). As a mere mortal, Muslims believe that Muhammad had no independent ability to prophesy. He was simply a medium for God's reve-lation. Hence, he is made to say in the Quran, 'I do not know what will be done with me or with you. I do but follow what is revealed to me' (Quran 46:9). But Muslims believe that Muhammad did have access to direct knowledge of the future from God in both the formal revelation of the Quran, which predicts events like Muslim victories over their Meccan opponents, and in private inspirations made known to him alone. Many hadiths therefore describe future events such as the moral decline of humanity or the events that will precede the Day of Judgment. In one famous hadith, the Prophet states that 'there will not come upon you a time except that the eras coming after it will be worse than it.'14 Hadiths could describe the Prophet's authoritative legacy in three possible ways: they could communicate Muhammad's words, or his actions, or describe things done in his presence to which he did not object. The above hadith examples describe Muhammad's edicts and normative behavior. But Muslim scholars also assumed that anything done during the Prophet's time that he did not forbid must have been acceptable. The Companion Jābir b. 'Abdallāh thus reported, 'We used to practice coitus interruptus during the time of the Prophet when the Quran was being revealed.'15 Muslim scholars thus interpreted this as a major proof for the permissibility of birth control in Islam. Although a hadith could refer to any aspect of the Prophet's life and legacy, not everything the Prophet did was authoritative. The Prophet was forty years old when he received his first revelation. Although Muhammad was admired for his upstanding character and integrity even before his mission, Muslims do not consider his teachings authoritative before he received God's sanction. In addition, revelation had not made the Prophet a master of all trades. In one famous hadith, the Prophet came across some farmers trying to graft small date palms. When he suggested that the farmers take a different course of action and that advice proved wrong, he replied, 'I am but a man, if I give you a command regarding religion then take it. But if I make a statement out of my own judgment, then I am but a man ... you are more knowledgeable about the matters of your world.'16 The scope of what concerns 'religion' in the Islamic tradition, however, is much wider than in the modern Western world. Although the Prophet consulted his Companions on affairs of state, governance, and military tactics (in fact, on several occasions the Quran validated his Companions' opinions rather than his own), his decisions as a statesman and military leader have been considered authoritative by Muslim jurists. Were his decisions, after all, not ultimately guided by God? Certainly, not all aspects of the Prophet's behavior required imitation or obedience. Since the Prophet did not state, for example, that wearing the long robes of an Arab was required dress for a Muslim, this has been viewed as a matter of choice. Injunctions by the Prophet encouraging Muslim men to grow beards, however, have led Muslim jurists to view this as either a requirement or laudable behavior. And while such factors limited the extent to which the Prophet's personal tastes and habits were legally compelling, there has been no limit to optional imitation of the Prophet done out of supererogatory piety. Some Muslims thus replicate even the mundane aspects of the Prophet's behavior, such as the position in which he slept and the food he ate. The famous jurist and hadith scholar of Baghdad, Ibn Hanbal (d. 241/855), once claimed that he had acted on every hadith he had heard about the Prophet at least once.17 THE NATURE OF PROPHETIC SPEECH: PREACHER VS. LAWYER In a 2012 study, a computer-run stylistic analysis of the Quran and a selection of hadiths demonstrated that the Quran and the hadiths come from two different speakers.18 That is not surprising. What is interesting is that the study shows a stylistic consistency in the language of the hadith corpus. There has always been disagreement over whether the orthodox collections of hadiths in Islam represent an intact record of the Prophet Muhammad's words. But whether they actually came from the Prophet's mouth or not, there is certainly a Prophetic style of Arabic expression, one that anyone who reads even a small selection of hadiths quickly notices. One of the most striking features of the Prophetic style in hadiths is the frequency of hyperbole. In one hadith the Prophet states, 'Cursing a Muslim is iniquity and fighting one is unbelief (kufr).' In another he says, 'No one will enter Heaven who has even a grain's weight of pride in his heart,' and in another hadith he declares, 'One who cheats is not from among us.' These are all dramatic statements, but the way in which Muslim scholars have understood them has differed dramatically from their evident meaning. By the time hadiths were being collected systematically in the eighth century, Muslim scholars had already developed filters for translating such hyperbole into legal or theological statements. These filters were needed because the Quran, other reliable hadiths, and overall Muslim practice made it clear that interpreting such hadiths literally was a grave error. 'Fighting a Muslim' was not unbelief (kufr) in the same way that renouncing Islam or atheism were. Rather, as early Muslims explained, it was a 'lesser form of unbelief (kufr dūn kufr)' or the type of act that an unbeliever would do. This was clear from explanations of the hadith by Companions and also from other hadiths in which the Prophet implied that a murderer remained Muslim. The ban on those 'with a grain's weight of pride in their hearts' from entering Heaven was only temporary, since sound hadiths explained that anyone 'with even a grain's weight of faith in their heart' will eventually be allowed to exit Hellfire and enter Paradise. Early Muslim scholars realized that the Prophet's phrase 'not from among us' did not mean that someone was not Muslim. Rather, it meant that a certain action or characteristic was 'not part of our Sunna' or not the conduct of a good Muslim.19 The sheer range and detail of material included in the hadith corpus makes it clear that it was meant to provide guidance for the details of daily life. But it also seems clear from how widespread hyperbole was in the corpus of Prophetic speech that its original function was also exhortation, preaching, and delivering unambiguous moral messages. As much as Muslim scholars have had to apply filters to the hadith corpus in order to mine it for clear rules of law or dogma, they also appreciated its exhortative dimension. Hadiths were and remain teaching tools. So, while many early Muslim scholars were careful to filter out the hyperbole when explaining hadiths to people, others, like the Meccan scholar Ibn 'Uyayna (d. 196/811), delivered them unfiltered to audiences so that the morals embedded in them would sink in. THE SCOPE OF THE BOOK: WHAT DEFINES HADITH LITERATURE? Stories and reports about the Prophet Muhammad permeate all genres of scholarship and expression in Islamic civilization. Hadiths appear in books of law, theology, Quranic commentary, mysticism, politics, Arabic grammar, history, and etiquette. If we are to be introduced to the hadith tradition, how do we define its scope? Early Islamic writing combined both pre-Islamic Arab sensitivities and new Islamic concerns. Muslim authors of the eighth and ninth centuries expressed the tribal nature of Arab and early Islamic society by writing books of genealogy (ansāb), such as the Kitāb al-ansāb of Ibn al-Kalbī (d. 204/819). Other early Muslims gathered and recorded religious folklore from Arab, Jewish, Persian, and Christian sources. The Yemeni Wahb b. Munabbih (d. 114/732) was one of the most famous authors in this genre, which became known as 'stories of the prophets (qasas al-anbiyā').' Other early authors collected information about the military campaigns of the early Muslim community and traced its historical course. This genre was known as 'campaigns (maghāzī)' and 'historical reports (tārīkh or akhbār),' including such works as the Maghāzī of Mūsā b. 'Uqba (d. 141/758). Another import-ant genre combined these fields: the study of the Prophet's biography, or sīra. The most famous biography of Muhammad is the Sīra of Ibn Ishāq (d. 150/767). Some early Muslim scholars concentrated on collecting reports about the meaning and contexts of Quranic verses, compiling exegetical books called 'tafsīr.' Finally, some scholars turned their attention to reports of the Prophet's legal, ritual, and theological statements. These were known as 'rulings (ahkām)' and formed the core of the hadith tradition. The defining characteristic of hadith literature as it emerged in the mid eighth century was that it consisted of reports attributed to Muhammad and transmitted by full isnāds from him. Books of Quranic exegesis, history, genealogy, and folklore often included reports from Muhammad or describing his actions. But these represented the minority of their contents. Quranic exegesis most often relied on the opinions of Companions or later Muslims for the meaning of Quranic words. History works frequently described events that occurred decades after Muhammad's death, such as the Muslim conquests of Syria and Iran. Stories of the prophets involved subjects as distant as Adam and Eve. These genres were distinct from ahkām and the nascent hadith tradition because they were not focused on the persona of Muhammad. But what about sīra, the biography of the Prophet? By definition, this was focused on Muhammad. Here, the second defining characteristic of hadith literature proves key: the isnād. The Sīra of Ibn Ishāq rarely includes full isnāds for the stories it tells about the Prophet or its quotations of his words. The isnāds that it does include are often incomplete, meaning that the sources that transmitted the report are often omitted or left unnamed. It was the presence of full isnāds leading back to the Prophet and transmitting his legacy that defined the core of hadith literature, what early hadith scholars called the genre of 'supported reports (al-musnadāt).' Of course, if we open up famous hadith collections such as the Sahīh of al-Bukhārī, we find chapters on Quranic exegesis (tafsīr) and the Prophet's campaigns (maghāzī). What distinguishes these chapters from separate books of tafsīr or maghāzī, however, is that the chapters of hadith books focus on reports with full isnāds that quote the Prophet instead of later Muslims. Regardless of their precise subject, any books in Islamic civil-ization that include hadiths with full isnāds back to the Prophet are subsumed under the genre of hadith literature. Of course, later books of hadiths written after the use of isnāds became obsolete or books specifically discussing or analyzing aspects of hadiths may not provide full isnāds, but their subject matter clearly places them in this genre as well. ENDNOTES 1 | J. Brown, field notes, Sept. 2003. ---|--- 2 | This quote is attributed to the famous ninth-century scholar al-Shāfi'ī. 3 | J. Brown, field notes, July 2004. 4 | See Max Rodenbeck's excellent book, Cairo: the City Victorious, p. 111. 5 | J. Brown, field notes July 2007. This hadith can be found in Muhammad b. 'Īsā al-Tirmidhī, Jāmi' al-Tirmidhī: kitāb al-birr wa al-sila, bāb mā jā'a fī rahmat al-muslimīn. 6 | Muhammad b. Ismā'īl al-Bukhārī, Sahīh al-Bukhārī: kitāb al-'ilm, bāb man kadhaba 'alā al-Nabī. 7 | Sahīh al-Bukhārī: kitāb al-tawhīd, bāb qawl Allāh 'wujūhuhum yawma'idhin nādira.' 8 | Abū Dāwūd al-Sijistānī, Sunan Abī Dāwūd: kitāb al-zakāt, bāb al-'urūd idhā kānat li'l-tijāra hal fīhā min zakāt. 9 | Abū al-Qāsim al-Tabarānī, al-Mu'jam al-saghīr, vol. 1, p. 76. 10 | Ibn Bābawayh, Amālī al-Sadūq, p. 6. 11 | Ahmad b. al-Husayn al-Hārūnī, al-Amālī al-sughrā, p. 8; Sahīh al-Bukhārī: kitāb al-riqāq, bāb man ahabba liqā' Allāh.... 12 | Muwatta': kitāb al-sahw. 13 | 'Abdallāh b. Abd al-Rahmān al-Dārimī, Sunan al-Dārimī: introductory chapters, bāb man rakhkhasa fī kitābat al-'ilm. 14 | Sahīh al-Bukhārī: kitāb al-fitan, bāb lā ya'tī zamān illā alladhī ba'dahu sharr minhu. 15 | Sahīh al-Bukhārī: kitāb al-nikāh, bāb al-'azl. 16 | Muslim b. al-Hajjāj, Sahīh Muslim: kitāb al-fadā'il, bāb wujūb imtithāl mā qālahu shar'an. See also Sunan Abī Dāwūd: kitāb al-qadā', bāb fī qadā' al-qādī idhā akhta'a. 17 | For the issue of beards, see Sahīh al-Bukhārī: kitāb al-libās, bāb taqlīm al-azfār. Al-Khatīb, al-Jāmi', vol. 1, p. 225. 18 | Halim Sayoud, 'Author discrimination between the Holy Quran and the Prophet's statements,' pp. 427–444. 19 | Jāmi' al-Tirmidhī: kitāb al-īmān, bāb mā jā'a fī sibāb al-muslim; kitāb al-birr wa'l-sila, bāb mā jā'a fī al-kibr, bāb mā jā'a fī rahmat al-sibyān; Sunan of Abū Dāwūd: kitāb al-ijāra, bāb al-nahy 'an al-ghishsh; Ibn Hajar, Fath al-Bārī, vol. 13, pp. 30, 33. i See the hadith 'None of you truly believes until I am dearer to him than his child, his parent and the people altogether': Ahmad b. Shu'ayb al-Nasā'ī, Sunan al-Nasā'ī: kitāb al-īmān, bāb 'alāmat al-īmān. ii We shall see that in both the classical Islamic and modern periods, this role has been debated; see Chapter 10. iii Some Muslim scholars even hold that the Prophet intentionally made these 'mistakes' to teach his followers; Qādī 'Iyād, Kitāb al-shifā, p. 342. THE TRANSMISSION AND COLLECTION OF PROPHETIC TRADITIONS INTRODUCTION Despite its seemingly arcane nature, the hadith tradition emerged in the early days of Islam as a practical solution to the needs of the Muslim community. In the wake of the Prophet's death, his teachings served as an obvious source of guidance for the nascent Islamic community as it struggled to determine how to live according to God's will now that he was gone. The study of hadiths began as a practical attempt to gather, organize, and sift through the authoritative statements and behavior attributed to the Prophet. In the subsequent centuries, the hadith tradition developed to meet new needs as they evolved. By the close of the tenth century, the transmission and collection of hadiths had acquired a new dimension – quite apart from the contents of any hadith, the report and its isnād became a medium of connection to the Prophet that created authority and precedence within the Muslim community. The development of hadith literature is thus best understood in light of the two general functions that hadiths fulfilled, that of an authoritative maxim used to elaborate Islamic law and dogma, and that of a form of connection to the Prophet's charismatic legacy. This chapter traces the origins and development of Sunni hadith transmission and collection from the beginning of Islam until the modern period. Any mention of the notion of 'authenticity' or 'authentic (sahīh)' hadiths in this chapter refers to the Sunni Muslim criteria for reliability and its system of hadith criticism, the mechanics of which will be discussed fully in the next chapter. 'Authentic' or 'forged' here thus has no necessary correlation to whether or not the Prophet Muhammad really said that statement or not. Debates over 'what really happened' in the history of hadith will occupy us in chapter 9. INHERITING THE PROPHET'S AUTHORITY In Islam, religious authority emanates from God through His Prophet. Whether by referring to the Prophet's teachings directly or through the methods of religious problem-solving inherited from him, only through a connection to God and His Prophet does a Muslim acquire the right to speak authoritatively about Islamic law and belief. In the formative period of Islam, Muslims thus turned back again and again to the authoritative legacy of the Prophet's teachings as it radiated outwards through the transmission and interpretation of pious members of the community. It was the form through which this authoritative legacy was transmitted – whether via Prophetic reports or methods of legal reasoning – that created different schools of thought in the early Islamic period and led to the emergence of the hadith tradition. In the Prophet's adopted home, the city of Medina, al-Qāsim b. Muhammad b. Abī Bakr (d. 108/726–7), the grandson of the first caliph of Islam, and Sa'īd b. al-Musayyab (d. 94/713), the son-in-law of the most prolific student of the Prophet's hadiths, Abū Hurayra, became two of the leading interpreters of the new faith after the death of the formative first generation of Muslims. Their interpretations of the Quran and the Prophet's legacy, as well as those of founding fathers such as the second caliph 'Umar b. al-Khattāb, were collected and synthesized by the famous Medinan jurist Mālik b. Anas (d. 179/796). In Kufa, the Prophet's friend and pillar of the early Muslim community, 'Abdallāh b. Mas'ūd (d. 32/652–3), instructed his newly established community on the tenets and practice of Islam as it adapted to the surroundings of Christian, Jewish, and Zoroastrian Iraq. His disciple 'Alqama b. Qays (d. 62/681) transmitted these teachings to a promising junior, Ibrāhīm al-Nakha'ī (d. 95/714), who in turn passed on his approaches and methods of legal reasoning to Hammād b. Abī Sulaymān (d. 120/738). His student of eighteen years, Abū Hanīfa (d. 150/767), would become a cornerstone of legal study in Iraq and the eponym of the Hanafī school of law. Unlike Medina, the cradle of the Muslim community where Muhammad's legacy thrived as living communal practice, the diverse environment of Kufa teemed with ancient doctrines and practices foreign to the early Muslim community. Many such ideas found legitimation in the form of spurious hadiths falsely attributed to the Prophet. Abū Hanīfa thus preferred relying cautiously on the Quran, well-established hadiths and the methods of legal reasoning learned from his teachers rather than risk acting on these fraudulent hadiths. By the mid eighth century, two general trends in interpreting and applying Islam had emerged in its newly conquered lands. For both these trends, the Quran and the Prophet's implementation of that message were the only constitutive sources of authority for Muslims. The practice and rulings of the early community, which participated in establishing the faith and inherited the Prophet's authority, were the lenses through which scholars like Abū Hanīfa and Mālik understood these two sources. Another early scholar, 'Abd al-Rahmān al-Awzā'ī of Beirut (d. 157/773–4), thus stated that 'religious knowledge ('ilm) is what has come to us from the Companions of the Prophet; what has not is not knowledge.'1 In Sunni Islam, a Companion is anyone who saw the Prophet while a Muslim and died as a Muslim. When presented with a situation for which the Quran and the well-known teachings of the Prophet and his Companions provided no clear answer, scholars like Abū Hanīfa relied on their own interpretations of these sources to respond. Such scholars were known as the ahl al-ra'y, or the Partisans of Legal Reasoning. Other pious members of the community preferred to limit themselves to the opinions of the earliest generations of Muslims and more dubious reports from the Prophet rather than speculate in a realm they felt was the exclusive purview of God and His Prophet. The great scholar of Baghdad, Ahmad b. Hanbal (d. 241/855), epitomized this transmission-based approach to understanding law and faith in his famous statement: 'You hardly see anyone applying reason (ra'y) [to some issue of religion or law] except that there lies, in his heart, some deep-seated resentment. An unreliable narration [from the Prophet] is thus dearer to me than the use of reason.'2 Such transmission-based scholars, referred to as 'the Partisans of Hadith (ahl al-hadīth),' preferred the interpretations of members of the early Islamic community to their own. For them the Muslim confrontation with the cosmopolitan atmosphere of the Near East threatened the unadulterated purity of Islam. A narcissistic indulgence of human reason would encourage heresy and the temptation to stray from God's revealed path. Only by clinging stubbornly to the ways of the Prophet and his righteous successors could they preserve the authenticity of their religion. For the ahl al-hadīth, reports traced back to the Prophet, bearing his name and conveying his authority, were prima facie compelling. Even if a scholar were not sure that a hadith was reliable, the powerful phrase 'the Messenger of God said...' possessed great authority. Many unreliable hadiths were used in efforts to understand the meaning of Quranic words, to reconstruct the campaigns of the Prophet, to document the virtues of the Companions or simply in preaching that exhorted Muslims towards piety. Even in legal issues, where as we shall see scholars like Ibn Hanbal were more rigorous about authenticating hadiths, ahl al-hadīth scholars sometimes depended on unreliable hadiths. It was amid this vying between the ahl al-hadīth and ahl al-ra'y schools that the Sunni hadith tradition emerged. EARLY HADITH COLLECTION AND WRITING From the beginning of Islam, Muhammad's words and deeds were of the utmost interest to his followers. He was the unquestioned exemplar of faith and piety in Islam and the bridge between God and the temporal world. Although, as we shall see, there was controversy over setting down the Prophet's daily teachings in writing, it is not surprising that those Companions who knew how to write tried to record the memorable statements or actions of their Prophet. As paper was unknown in the Middle East at the time (it was introduced from China in the late 700s), the small notebooks they compiled, called sahīfas, would have consisted of papyrus, parchment (scraped, limed and stretched animal skins), both very expensive, or cruder substances such as palm fronds. Although there is some evidence that the Prophet ordered the collection of his rulings on taxation, these sahīfas were not public documents; they were the private notes of individual Companions.3 Some of the Companions recorded as having sahīfas were Jābir b. 'Abdallāh, 'Alī b. Abī Tālib, Abū Hurayra and 'Abdallāh b. 'Amr b. al-'Ās. Figure 2.0 Leading Hadith Transmitters from the Companions Certain Companions were more active in amassing, memorizing, and writing down hadiths than others. Like grandchildren eager to collect stories and recollections about a grandparent they barely knew, we find that it is often the most junior Companions of the Prophet who became the most prolific collectors and transmitters of hadiths. Abū Hurayra (d. 58/678), who knew the Prophet for only three years, is the largest single source for hadiths, with approximately 5,300 narrations in later hadith collections.4 Although he did not write hadiths down in his early career, by his death Abū Hurayra had boxes full of the sahīfas he had compiled.5 'Abdallāh b. 'Umar, the son of 'Umar b. al-Khattāb, was twenty-three years old when the Prophet died and is the second largest source for hadiths, with approximately 2,600 narrations recorded in later collections. Ibn 'Abbās (d. 68/686–8), who was only fourteen years old (or nine according to some sources) when the Prophet died, is the fifth largest source, with around 1,700 hadiths.6 Since Companions like Ibn 'Abbās and Abū Hurayra only knew the Prophet for a short time, they apparently amassed their vast numbers of hadiths by seeking them out from more senior Companions. Abū Hurayra is thus rarely recorded as saying 'I heard the Prophet of God say...' – more often he simply states indirectly that 'the Prophet said...' Just as today we regularly quote people whom we did not hear directly, this would have been normal for the Companions. The obsession with specifying direct oral transmission with no intermediary, which characterized later hadith scholarship (see chapter 3), did not exist during the first generations of Islam. Ibn 'Abbās probably heard only forty hadiths directly from the Prophet. The rest he frequently narrates by saying 'the Prophet of God said...' or through a chain of transmission of one, two, or even three older Companions.7 Not surprisingly, those who spent a great deal of intimate time with the Prophet were also major sources of hadiths. Anas b. Mālik, who entered the Prophet's house as a servant at the age of ten, and the Prophet's favorite wife, Aisha, count as the third and fourth most prolific hadith sources, with approximately 2,300 and 2,200 narrations in later books respectively.8 Interestingly, those Companions who spent the most time with the Prophet during his public life rank among the least prolific hadith transmitters. The Prophet's close friend and successor, Abū Bakr, his cousin/son-in-law 'Alī b. Abī Tālib, and close advisor 'Umar are the sources for only 142, 536 and 537 hadiths respectively. These prominent early Muslims, who were looked to as leaders responsible for decisions and religious rulings after the Prophet's death, seem to have preserved the spirit of Muhammad's teachings in their actions and methods of reasoning rather than by citing his hadiths directly. When reading books of hadiths, at first it appears arbitrary which Companion narrates a hadith from the Prophet. Certain Companions, however, demonstrated particular interests and expertise in certain subjects. The Prophet's wives, especially Aisha, not surprisingly serve as the sources for hadiths about the Prophet's personal hygiene, domestic habits, and sexual life. Most of the hadiths in which the Prophet instructs his followers about the protocol for using dogs – animals whose saliva is considered ritually impure by most Muslims – for hunting come from the Companion 'Adī b. Hātim, who clearly was very curious about this topic. So dominant is the presence of Muhammad in the formative period of Islam that we forget that after his death it was his Companions who assumed both complete religious and political leadership in the community. It was Companions like Ibn 'Abbās in Mecca, Ibn Mas'ūd in Kufa and Salmān al-Fārisī in Isfahan who had the responsibility of teaching new generations of Muslims and new converts about the religion of a prophet they had never known. The generation who learned Islam from the Companions and in turn inherited from them the mantle of the Prophet's authority became known as the Successors (al-tābi'ūn). Like the Companions, they too recorded those recollections that their teachers recounted to them about the Prophet's words, deeds, and rulings. In addition to compiling their own sahīfas from the lessons of the Companions, these Successors also passed on the Companions' own sahīfas. Some of the early isnāds that appear most regularly in hadith collections seem to be a record of sahīfas being handed down from teacher to student or from father to son. We thus often find the sahīfa-isnād of Abū Hurayra to 'Abd al-Rahmān, to his son al-'Alā'. The Successor Abū al-Zubayr al-Makkī received the sahīfa of the Companion Jābir b. 'Abdallāh, and one of the most famous Successors, al-Hasan al-Basrī (d. 110/728), received the sahīfa of the Companion Samura b. Jundub. The sahīfa of 'Amr b. al-'Ās, passed down to his grandson, to his son Shu'ayb, became an essential resource for the Prophet's rulings on liability for injuries and compensation for homicide. An example of a sahīfa that has survived intact today, the sahīfa of the Successor Hammām b. Munabbih (d. circa 130/747), contains 138 hadiths from the Prophet via Abū Hurayra.9 The vast preponderance of the hadiths that the Successors heard from the Companions, however, were not in written form. Arabian society of the seventh and eighth centuries had a highly developed tradition of oral poetry, and the Companions more often recounted their memories of the Prophet in oral form only. Even to modern readers accustomed to writing everything down, this is understandable to an extent; to them the Prophet was a contemporary figure whose words and deeds lived on in their memories as freshly as we remember our own teachers or parents. Only rarely do we put down these memories on paper. Of course, the Prophet was no average person, and many of his Companions did seek to record his legacy even during his own lifetime. There are several hadiths, however, in which the Prophet warns his followers not to record his words out of fear that they might be confused with God's words as revealed in the Quran. As the Quran was still being set down in writing during the Prophet's lifetime by numerous scribes and in many private notebooks, collections of the Prophet's teachings might easily be conflated with the holy book. We thus find a famous hadith in which the Companion Abū Sa'īd al-Khudrī states, 'We used not to write down anything but the testimony of faith said in prayer (al-tashahhud) and the Quran.' In another hadith, the Companion Zayd b. Thābit states that the Prophet had forbidden his followers to write down any of his words.10 It was unrealistic, however, that a lawmaker and political leader like the Prophet could allow no written record keeping. It would simply have been impossible for Muslims to preserve accurately the teachings they heard from the Prophet without some recourse to writing. Alongside hadiths banning writing, we thus also find reports encouraging it. The Companion Anas b. Mālik is even quoted as saying, 'We did not consider the knowledge of those who did not write it down to be [real] knowledge.'11 We thus also find hadiths in which the Prophet allows new Muslims visiting from outside Medina to record lessons he gave in a sermon.12 This contradictory evidence concerning the writing down of hadiths has proven very problematic for both Muslim and Western scholars. Some Muslim scholars, such as the Damascene prodigy al-Nawawī (d. 676/1277), have reconciled the material by assuming that the reports condemning the writing of hadiths came from the earlier years of the Prophet's career, when he was concerned about his words being mistaken for the Quran. Permission to write down his teachings would have come later, when the Quran had become more established in the minds of Muslims, and the Prophet's role as the leader of a functioning state required some written records.13 Western scholars, on the other hand, have often understood the tension between the writing of hadiths and its prohibition to reflect competing values within the Islamic hadith tradition itself. In Islam, religious knowledge is primarily oral in nature – a written book only serves as a guide for the oral recitation of its contents. On a conceptual level, it is almost as if written pages are dead matter that only comes alive when read aloud. It is interesting that the importance of oral knowledge kept the debate over whether or not one should write down hadiths alive into the 1000s CE, over two hundred years after it had been rendered moot by the popularization of written hadith collections! In the early Islamic period, however, this focus on orality was very practical. The Arabic alphabet was still primitive, and many letters were written identically and could only be distinguished from one another by context. Even today, the Arabic script does not indicate short vowels. We can imagine an English sentence written with only consonants and a few vowels, such as 'I wnt t ht the bll.' Is it 'I want to hit the ball,' 'I want to hit the bell, ' 'I went to hit the ball,' et cetera? We could only know the correct reading of the sentence if we knew its context. With the Arabic script, then, knowing the context and even the intended meaning of a written text is essential for properly understanding it. The sahīfas of the Companions and Successors thus only served as memory-aids, written skeletons of hadiths that would jog the author's memory when he or she read them. These sahīfas could not thus simply be picked up and read. One had to hear the book read by its transmitter in order to avoid grave misunderstandings of the Prophet's words. If hadith transmitters had reason to believe that a certain narrator had transmitted hadiths without hearing them read by a teacher, in fact, they considered this a serious flaw in the authenticity of that material. Abū al-Zubayr al-Makkī had heard only part of the Companion Jābir b. 'Abdallāh's sahīfa read aloud by Jābir, and this undermined his reliability in transmission for some Muslim hadith critics. Some early hadith transmitters, like 'Atā' b. Muslim al-Khaffāf, were so concerned about their books of hadiths being read and misunderstood after their deaths that they burned or buried them.14 Of course, this practical and cultural emphasis on direct oral transmission did not mean that Muslims ignored the reliability of written records. Even when transmitting a hadith orally, it was best for a scholar to be reading it from his book. The famous hadith scholar Ibn Ma'īn (d. 233/848) thus announced that he preferred a transmitter with an accurate book to one with an accurate memory.15 By the early 700s CE, setting down hadiths in writing had become regular practice. The seminal hadith transmitter and Successor Muhammad b. Shihāb al-Zuhrī (d. 124/742) considered writing down hadiths to be absolutely necessary for accurate transmission. Collectors like al-Zuhrī were encouraged to collect and record hadiths by the Umayyad dynasty, which assumed control of the Islamic empire in 661 CE. The Umayyad governor 'Abd al-'Azīz b. Marwān requested that the Successor Kathīr b. Murra send him records of all the hadiths he had heard from the Companions.16 'Abd al-'Azīz's son, the Umayyad caliph 'Umar b. 'Abd al-'Azīz, ordered the governor of Medina to record all the hadiths concerning administrative and taxation matters.17 Another important question that arose during the early transmission and collection of hadiths was whether or not one had to repeat a hadith word for word or if one could just communicate its general meaning. Most early Muslim scholars understood that keeping track of the exact wording of hadiths was not feasible and that 'narration by the general meaning (al-riwāya bi'l-ma'nā)' was an inescapable reality. The Companion Wāthila b. Asqa' had admitted that sometimes the early Muslims even confused the exact wording of the Quran, which was universally well-known and well-preserved. So how, he asked, could one expect any less in the case of a report that the Prophet had said just once? Al-Hasan al-Basrī is reported to have said, 'If we only narrated to you what we could repeat word for word, we would only narrate two hadiths. But if what we narrate generally communicates what the hadith prohibits or allows then there is no problem.' Some early Muslim scholars insisted on repeating hadiths exactly as they had heard them. Ibn Sīrīn (d. 110/728) even repeated grammatical errors in hadiths that he had heard.18 Eventually, Muslim scholars arrived at the compromise that one could paraphrase a hadith provided that one was learned enough to understand its meaning properly.19 Figure 2.1 Transmission and Criticism of Hadiths from the Companions of the Prophet and Successors TRANSCRIPTS OF LEGAL DEBATES: THE EMERGENCE OF MUSANNAF COLLECTIONS If we imagine the world of Islam in the early and mid eighth century CE, the next stage of hadith literature appears as a direct reflection of Muslim scholarly discourse of the time. We can picture the prominent Successor al-Hasan al-Basrī, who had studied with Companions like Anas b. Mālik and who had been brought up in the house of one of the Prophet's wives, as a pillar of piety in Basra and recourse for the questions of the city's inhabitants. Seated under a reed awning, al-Hasan would answer questions concerning how to pray, how to divide inheritance and how to understand God's attributes by drawing on all the religious knowledge he had gained. He might reply by quoting the Quran or something that his mother had heard from the Prophet. On other occasions he might tell his audience how 'Alī b. Abī Tālib, whom he had met as a young man, had ruled on a particular case. Sometimes al-Hasan might use his own understanding of the principles put forth in the Quran or the Prophet's teachings to provide a new answer to a question. A few decades later in Medina, we can picture Mālik b. Anas seated against one of the pillars of the Prophet's mosque and answering questions in a similar way. The first organized works of Islamic scholarship, called musannafs, or 'books organized topically,' were basically transcripts of this discourse as it had developed during the first two centuries of Islam. Arranged into chapters dealing with different legal or ritual questions, they were topical records of pious Muslims' efforts to respond to questions about faith and practice. The earliest surviving musannaf, Mālik's Muwatta', is thus a mixture of Prophetic hadiths, the rulings of his Companions, the practice of the scholars of Medina, and the opinions of Mālik himself. The version of the Muwatta' that became famous in North Africa and Andalusia contains 1,720 reports. Of these, however, only 527 are Prophetic hadiths; 613 are statements of the Companions, 285 are from Successors, and the rest are Mālik's own opinions.20 Likewise, the earliest known musannaf, that of Ibn Jurayj (d. 150/767), was a collection of reports from the Prophet, Companions, and Successors such as 'Atā' b. Abī Rabāh (d. 114/732). Another famous scholar from this period who compiled a musannaf was the revered scholar of Kufa, Sufyān al-Thawrī (d. 161/778). A very large musannaf surviving from this earlier period was written by a student of Mālik and Ibn Jurayj, 'Abd al-Razzāq al-San'ānī (d. 211/827), but is much larger than the one-volume Muwatta'. The Musannaf of 'Abd al-Razzāq, an inhabitant of Yemen, is eleven printed volumes. As Figure 2.2 demonstrates, 'Abd al-Razzāq drew mostly from his teachers Ma'mar b. Rāshid and Ibn Jurayj.21 Another famous musannaf, written by a scholar from the generation of 'Abd al-Razzāq's students, comes from the hadith scholar of Baghdad, Abū Bakr b. Abī Shayba (d. 235/849). Figure 2.2 provides an example of the type of material and sources that a musannaf would draw upon. Figure 2.2 Subchapter from 'Abd al-Razzāq's Musannaf Concerning Ablutions In many ways, the musannaf genre predates the emergence of classical hadith literature rather than being part of it. If hadith collections are characterized by a predominant focus on reports from the Prophet that include isnāds as a means for critics to verify their authenticity, then books like the Muwatta' and the Musannaf of 'Abd al-Razzāq are not technically hadith collections. Both Mālik and 'Abd al-Razzāq cite rulings of Companions and Successors more frequently than they cite Prophetic hadiths. But even when quoting the Prophet directly, the obsession with complete, unbroken chains of transmission that would characterize the classical period of hadith collection is absent. Even when Mālik does cite Prophetic hadiths, on sixty-one occasions he completely omits the isnād and simply states, 'The Prophet said...' Rather, we should think of musannafs as early works of Islamic law that represent the diversity of sources from which legal and doctrinal answers could be sought during the first two centuries of Islam. In a musannaf, a scholar like Mālik was trying to answer questions with the resources he felt were reliable and was not concerned with proving their authenticity according to a rigid system of isnād authentication. Of course, musannafs would serve a very important function in law, hadith literature, and hadith criticism. Later scholars would turn to musannafs to know the legal opinions of Companions and Successors, and hadith critics would use them as evidence when investigating whether a hadith was really something said by the Prophet or a statement actually made by a Companion or Successor. But if Muhammad was the ultimate interpreter of God's will, why would a scholar like Mālik so infrequently rely on his words in a musannaf collection? This question has cast a shadow of doubt over the authenticity of the hadith corpus, a question addressed in chapter 9. Here, however, we can provide a few possible explanations. As Figure 2.1 demonstrates, during the time of Mālik and Ibn Jurayj hadith transmission was localized. When Mālik was asked by a student whether or not one should wash in between one's toes when performing ritual ablutions, he said that it was not required. Another student, 'Abdallāh b. Wahb, objected, saying that in his native Egypt they had a hadith through the Companion Mustawrid b. Shaddād telling how the Prophet did wash between his toes. Hearing the isnād, Mālik said, 'That hadith is good, and I had not heard it until this moment.' He acted on it from that point on.22 It is not surprising that Mālik had not heard the hadith, since he only left his home in Medina to perform pilgrimage to the nearby city Mecca. Many of the hadiths that were widespread in Syria, Egypt, or among the students of Abū Hanīfa in Iraq were unknown to him. It is thus very likely that Mālik did not cite a Prophetic hadith on an issue because he knew of none. As Figure 2.1 indicates, it was only among the generation of Mālik's students, and even more so among their students, that hadith scholars traveled widely in order to unify the corpus of hadiths. In addition, musannafs drew on such a wide variety of authoritative figures because they were all legitimate inheritors of the Prophet's authority. The Companions, who had lived with the Prophet for years and understood the principles upon which he acted, and the Successors, who learned from them, were seen as the carriers of the Prophet's message and were heeded accordingly. Even a scholar like Mālik, living in the generation after the Successors, was so esteemed as a pious interpreter of the Prophet's message that he could give his opinion without citing any sources at all. THE MUSNAD ERA AND THE EMERGENCE OF HADITH LITERATURE PROPER The shift from the variety of the musannaf to the focus on Prophetic hadiths that characterizes hadith literature occurred with the emergence of the musnad collections in the late eighth and early ninth centuries CE. While sahīfas had been mere ad hoc collections, and musannafs were arranged as topical references, musnad collections were organized according to isnād. All the hadiths narrated from a certain Companion would fall into one chapter, then all those transmitted from another into the next, et cetera. The appearance of musnad collections occurred due to impetuses from both the broader study of Islamic law and within the more narrow community of Muslim hadith critics. During the late eighth and early ninth centuries, the regional schools of Islamic law, each based on the teachings and interpretation of learned figures like Mālik and Abū Hanīfa, faced a new challenge. A young scholar named Muhammad b. Idrīs al-Shāfi'ī (d. 204/820), who had studied with Mālik in Medina and the students of Abū Hanīfa in Iraq, and had traveled widely in Egypt and Yemen, asserted that it should be the direct hadiths of the Prophet, and not his precedent as understood by local scholars, that supplemented the Quran as the second major source of law. In the face of a contrasting hadith that they had not previously known, al-Shāfi'ī argued, the followers of Mālik and Abū Hanīfa should take the Prophet's words over the stances of their local schools. Through his students and especially the study of his major legal work, the Umm (The Motherbook), al-Shāfi'ī had an immediate and powerful influence on ahl al-hadīth jurists. From this point on in the hadith tradition, the testimony of Muhammad would trump all other figures of authority and become the predominant focus of hadith collections. Musnads reflected this interest, as they focused almost entirely on Prophetic hadiths and included Companion or Successor opinions only as occasional commentaries. Figure 2.3 Musnad Organization Quite apart from broader questions of legal theory, the burgeoning class of Muslim hadith critics that emerged in the mid and late eighth century had good reason to start organizing their personal hadith collections along isnād lines. First, the growing number of reports erroneously attributed to the Prophet had made the isnād an indispensable tool. Limiting hadith collections to material that had an isnād was a solid first line of defense against hadith forgery – if you claimed that the Prophet had said something but could provide no isnād, your hadith had no place in a musnad. Second, as we will see in the next chapter, the single most important factor in judging the reliability of a hadith transmitter was determining if he or she was corroborated in the material he or she reported. In order to know if a hadith transmitter is corroborated in his transmissions, critics compared the hadiths he reported to those of others who studied with his teachers. Thus we find that many musnads, such as that of al-Rūyānī (d. 307/919–20), are organized into chapters as shown in Figure 2.3 above. In order to determine whether or not Transmitter A is generally corroborated in the material he or she transmits, we need only flip through the chapters of the musnad comparing the hadiths that Transmitter A related from each Successor with those of Transmitters B and C. The earliest known musnad, which has also survived intact, is that of Abū Dāwūd al-Tayālisī (d. 204/818). The most famous musnad is that of Ibn Hanbal, which consists of about 27,700 hadiths (anywhere from one fourth to one third of which are repetitions of hadiths via different narrations) and was actually assembled into final form by the scholar's son. Ibn Hanbal claimed he had sifted the contents of his Musnad from over 750,000 hadiths and intended it to be a reference for students of Islamic law. Although he acknowledged that the book contained unreliable hadiths, he supposedly claimed that all its hadiths were admissible in discussions about the Prophet's Sunna – if it was not in his Musnad, he claimed, it could not be a proof in law.23 Other well-known and widely read musnads from the ninth century include those of al-Humaydī (d. 219/834), of al-Hārith b. Abī Usāma (d. 282/896), of al-Musaddad (d. 228/843), of Abū Bakr al-Bazzār (d. 292/904–5), and of the Hanafī scholar Abū Ya'lā al-Mawsilī (d. 307/919). The largest musnad ever produced, which has tragically not survived, was that of Baqī b. Makhlad (d. 276/889). Instead of compiling large musnads that included the hadiths of numerous Companions, some scholars devoted books to only one Companion: Abū Bakr al-Marwazī (d. 292/904–5), for example, compiled a small musnad with all the hadiths he had come across transmitted from the Companion Abū Bakr. Although some musnads, like that of al-Bazzār, contained some discussion of the flaws ('ilal) found in the isnāds of a hadith, in general musnads were not limited to hadiths their compilers believed were authentic. Instead, they functioned as storehouses for all the reports that a certain hadith scholar had heard. As Figure 2.1 shows, by the time of Ibn Hanbal, hadith collectors were no longer constrained by regional boundaries. Hadith collectors like Muhammad b. Yahyā al-Dhuhlī or Qutayba b. Sa'īd were originally from Nishapur in Iran and Balkh in Afghanistan, but they traveled throughout the Muslim world on what was known as 'the voyage in the quest for know-ledge (al-rihla fī talab al-'ilm)' to collect hadiths from transmitters like 'Abd al-Razzāq in Yemen or Layth b. Sa'd in Egypt. Throughout their travels they recorded the hadiths they heard in their musnads regardless of their authenticity or their legal and doctrinal implications. The staunch Sunni Ibn Hanbal's Musnad thus contains a hadith – shocking to the sensibility of Sunni Muslims – that describes how an early copy of the Quran had been stored under Aisha's bed only to be found and partially eaten by a small animal leaving the record of God's revelation permanently truncated!24 THE SAHĪH AND SUNAN MOVEMENT Musannafs and musnads both had their advantages: musannafs were conveniently arranged by subject, and musnads focused on Prophetic hadiths with full isnāds. From the early ninth to the early tenth century, a large number of respected ahl al-hadīth jurists combined the two genres in the form of sunan / sahīh books. A sunan was organized topically, and thus easily used as a legal reference, but also focused on Prophetic reports with full isnāds. More importantly, the ahl al-hadīth jurists who compiled these sunans devoted great efforts to assuring or discussing the authenticity of the books' contents. In general, the authors of sunan books sought only to include hadiths that had been relied upon by Muslim scholars and were known to be authentic either because they had strong isnāds or because the community of scholars had agreed that they truly reflected the Prophet's teachings. This new focus on producing collections of hadiths with an emphasis on authenticity led many of the collections produced in the sunan movement to be dubbed sahīh (authentic) books by either their authors or later Muslim readers. Two of the earliest known sunans are those of Sa'īd b. Mansūr al-Khurāsānī (d. 227/842) and 'Abdallāh al-Dārimī (d. 255/869). Two participants in the sunan movement in particular, Muhammad b. Ismā'īl al-Bukhārī (d. 256/870) and his student Muslim b. al-Hajjāj al-Naysābūrī (d. 261/875), broke with the ahl al-hadīth's traditional willingness to use weak hadiths in law. Unlike their teacher Ibn Hanbal, al-Bukhārī and Muslim felt that there were enough authentic hadiths in circulation that the ahl al-hadīth jurists could dispense with less worthy narrations. Al-Bukhārī and Muslim were thus the first to produce hadith collections devoted only to hadiths whose isnāds they felt met the requirements of authenticity. Their books were the first wave of what some have termed 'the sahīh movement.'25 Known as the Sahīhayn (literally 'the two Sahīhs'), the collections of al-Bukhārī and Muslim would become the most famous books of hadith in Sunni Islam. It is therefore worth examining their contents and structure. It is reported that al-Bukhārī devoted sixteen years to sifting the hadiths he included in his Sahīh from a pool of six hundred thousand narrations.26 The finished work was not a mere hadith collection – it was a massive expression of al-Bukhārī's vision of Islamic law and dogma backed up with hadiths the author felt met the most rigorous standards of authenticity. The book covers the full range of legal and ritual topics, but also includes treatments of many other issues such as the implication of technical terms in hadith transmission. The book consists of ninety-eight chapters, each divided into subchapters (according to the standard printings; see endnote 27). The subchapter titles indicate the legal implication or ruling the reader should derive from the subsequent hadiths, and often include a short comment from the author or a report from a Companion or Successor elucidating the hadith. Al-Bukhārī often repeats a Prophetic tradition, but through different narrations and in separate chapters. Opinions have varied about the exact number of hadiths in the Sahīh, depending on whether one defines a 'hadith' as a Prophetic tradition or a narration of that tradition. Generally, experts have placed the number of full-isnād narrations at 7,397. Of these many are repetitions or different versions of the same report, with the number of Prophetic traditions at approximately 2,602.27 Muslim's Sahīh is much more a raw hadith collection than al-Bukhārī's work. It contains far fewer chapters (only fifty-four in the accepted Amīriyya edition) and lacks al-Bukhārī's legal commentary, but it contains a similar number of narrations (7,748). Unlike al-Bukhārī, Muslim keeps all the narrations of a certain hadith in the same section. Muslim also diverges significantly from al-Bukhārī in his near exclusion of commentary reports from Companions and later figures. There is considerable overlap between the Sahīhayn. Muslim scholars generally put the number of traditions found in both books at 2,326. Al-Bukhārī and Muslim drew on essentially the same pool of transmitters, sharing approximately 2,400 narrators. Al-Bukhārī narrated from only about 430 that Muslim did not, while Muslim used about 620 transmitters al-Bukhārī excluded. Al-Bukhārī's and Muslim's works had a great deal of influence on their students and contemporaries. Ibn Khuzayma (d. 311/923), a central figure in the Shāfi'ī school who studied with al-Bukhārī and Muslim, compiled a sahīh work that came to be known as Sahīh Ibn Khuzayma. Abū Hafs 'Umar al-Bujayrī of Samarqand (d. 311/924) produced a collection called al-Jāmi' al-sahīh, and even the famous historian and exegete Muhammad b. Jarīr al-Tabarī (d. 310/923) attempted a gigantic sahīh work but died before he finished it. Sa'īd b. al-Sakan (d. 353/964) of Egypt also collected a small sahīh book consisting of hadiths necessary for legal rulings and whose authenticity he claimed was agreed on by all. Ibn Khuzayma's student Ibn al-Jārūd (d. 307/919–20) compiled a similar work called al-Muntaqā (The Select). Ibn Hibbān al-Bustī's (d. 354/965) massive Sahīh is usually considered the last installment in the sahīh movement. Other participants in the sahīh movement also focused on hadiths with strong and reliable isnāds, but they nonetheless featured some reports that they acknowledged as being unreliable but included either because they were widely used among jurists or because the authors, like Ibn Hanbal, could find no reliable hadith addressing that topic. Four of these books in particular attained great renown. The Sunan of Abū Dāwūd al-Sijistānī (d. 275/889), a close student of Ibn Hanbal, contains about 5,276 hadiths and focuses on reports used in deriving law. The author alerts the reader to any narrations which have serious flaws in their isnāds. The Jāmi' of Muhammad b. 'Īsā al-Tirmidhī (d. 279/892), one of al-Bukhārī's disciples, contains about 4,330 narrations and also focuses on hadiths that different schools of law had used as legal proofs. It also includes detailed discussions of their authenticity. Although al-Tirmidhī's sunan does include numerous unreliable hadiths, the author notes their status. As such, later scholars often called the work Sahīh al-Tirmidhī. Ahmad b. Shu'ayb al-Nasā'ī (d. 303/916), another student of al-Bukhārī, compiled two sunans: the larger one contained many hadiths that the author acknowledged as unreliable. The smaller one, known as the Mujtabā (The Chosen), contains 5,770 narrations and focused on reliable hadiths. It has thus been known as Sahīh al-Nasā'ī. Finally, Muhammad b. Yazīd b. Mājah's (d. 273/887) Sunan is an interesting case. Although the author seems to have tried to include only reliable hadiths, some later Muslim scholars noted that as much as one fourth of the book's 4,485 narrations are actually unreliable.28 With the sahīh/sunan movement, the hadith tradition had reached a watershed. The works of scholars like al-Bukhārī, Muslim and al-Tirmidhī were possessed of a definitiveness that seemed both to reject many aspects of the culture of hadith transmission and to offer themselves as the ultimate hadith references for legal scholars. Muslim wrote his Sahīh as a response to what he saw as the laxity and misplaced priorities of hadith scholars and transmitters. He believed that those scholars who strove to collect as many hadiths as possible regardless of their quality were doing so only to impress others.29 Muslim expressed serious concern over would-be hadith scholars who transmitted material of dubious nature to the exclusion of well-known and well-authenticated hadiths. They provided this material to the common people when in fact it is hadith scholars' duty to leave the common folk with trustworthy reports only. Muslim composed his Sahīh to fulfill this function. Abū Dāwūd expressed a similar purpose for his Sunan. He states confidently that he knows of 'nothing after the Quran more essential for people to learn than this book [his Sunan], and a person would suffer no loss if he did not take in any more knowledge after it.'30 TOPICAL HADITH WORKS During the ninth and tenth centuries, Sunni hadith scholars were not merely writing comprehensive sunan works. They also compiled collections of hadiths dealing with individual topics. In fact, these specific treatises were often bound together to form a sunan or added on to the standard legal chapters of a sunan to add a new component to the work. The earliest genre of topical works was that of zuhd, or asceticism and pious excellence. These books included hadiths describing the Prophet's supreme piety and abstention from any religiously ambiguous behavior, as well as the superlative practice of early Muslim saints and even pre-Islamic prophets. The earliest known book of zuhd is that of Ibn al-Mubārak (d. 181/797). The great hadith transmitters and collectors Wakī' b. al-Jarrāh (d. 197/812) and Ibn Hanbal also compiled books of zuhd. Even as late as the eleventh century the Shāfi'ī scholar Abū Bakr al-Bayhaqī (d. 458/1066) wrote a hadith collection devoted to the zuhd theme. Other scholars wrote books similarly addressing the question of perfecting Muslim manners. Al-Bukhārī wrote his 'Book Devoted to Manners (al-Adab al-mufrad)', and a scholar named Ibn Abī al-Dunyā (d. 281/894) of Baghdad wrote dozens of such hadith works on topics such as the importance of giving thanks, understanding dreams, and coping with sadness and grief. The hadith scholar Humayd b. Zanjawayh (d. 251/855–6) composed a book of hadiths that warned Muslims about the punishments that awaited them in Hellfire for certain deeds as well as the heavenly rewards they could expect in Paradise for goodly acts. Known as the Kitāb al-targhīb wa al-tarhīb (The Book of Enjoining and Warning), Ibn Zanjawayh's book was very popular and was transmitted widely. In the 1200s CE, 'Abd al-'Azīm al-Mundhirī (d. 656/1258) wrote another famous book in this genre with the same title. Al-Nasā'ī and his student Ibn al-Sunnī (d. 364/975) both wrote hadith books entitled 'Deeds of the Day and Night ('Amal al-yawm wa al-layla)' on the pious invocations that the Prophet would say in various daily situations. The famous young scholar of Damascus, al-Nawawī (d. 676/1277), also wrote two very popular hadith books on manners and perfecting Muslim practice. His small Adhkār (Prayers) contains hadiths on the prayers one says before activities such as eating, drinking, and traveling with no isnāds but with the author's comments on their reliability. Al-Nawawī's Riyād al-sālihīn min kalām sayyid al-mursalīn (The Gardens of the Righteous from the Speech of the Master of Prophets) is a larger book of ethical, piety, and etiquette-related hadiths which has become extremely popular, serving as a main hadith text for the Tablīgh-i Jamā'at, one of the largest missionary institutions in the modern Muslim world. Similarly designed to frighten readers about the impending apocalypse and coming of 'the Days of God' was an early topical hadith book written by al-Bukhārī's teacher Nu'aym b. Hammād (d. 228/842) entitled Kitāb al-fitan (The Book of Tribulations). Sunan and sahīh books regularly contained chapters on these apocalyptical 'tribulations' as well. The most popular subject for topical hadith collections among Sunni scholars in the ninth and tenth centuries was the importance of adhering to the Sunna of the Prophet and the ways of the early Muslim community on issues of belief and practice. These books of 'sunna' contained Prophetic hadiths and reports from respected early Muslims that exhorted readers to derive their understanding of religion solely from the revealed texts of the Quran and Sunna while avoiding the heretical pitfalls of speculative reasoning about God, His attributes and the nature of the afterlife. Sunna books emphasized all the components of the Sunni Muslim identity as it was emerging in the eighth and ninth centuries: a reliance on transmitted knowledge instead of speculative reasoning, a rejection of the ahl al-ra'y legal school, an affirmation that all the Companions of the Prophet were upright (but that the best were Abū Bakr, 'Umar, 'Uthmān then 'Alī), and political quietism. The most famous books of sunna are those of Ibn Hanbal's son 'Abdallāh (d. 290/903), Ibn Abī 'Āsim (d. 287/900), Muhammad b. Nasr al-Marwazī (d. 294/906), and al-Barbahārī (d. 329/941). Some later sunna hadith collections went into more detail on issues of proper Sunni belief. The staunch Hanbali Sufi Khwāje 'Abdallāh al-Ansārī of Herat (d. 481/1089) wrote a multi-volume hadith work condemning speculative theology and theologians (Dhamm al-kalām wa ahlihi). Ibn al-Waddāh (d. 286/899) wrote a small book on heretical innovation (Kitāb al-bida'), while al-Dāraqutnī (d. 385/995) wrote one treatise collecting all the hadiths affirming that Muslims would actually see God on the Day of Judgment (Kitāb al-ru'ya) and another one bringing together all the hadiths telling that God descends during the night to answer the prayers of the believers. The collective affirmation that all the Companions of the Prophet were righteous and reliable transmitters of the Prophet's teachings, as opposed to the Shiite denigration of all the Companions who did not support 'Alī's claim to leadership, prompted another important topical genre in the ninth century. Books on the 'Virtues of the Companions (fadā'il al-sahāba)' became an important statement of Sunni belief. Ibn Hanbal thus collected all the hadiths he could find in which the Prophet described the excellence or special characteristics of each Companion in his Fadā'il al-sahāba. Al-Nasā'ī also wrote a shorter Fadā'il al-sahāba work as well as a hadith collection specifically devoted to 'Alī's virtues (Khasā'is 'Alī). Although only a few books were written in the genre, books of shamā'il, or the virtues and characteristics of the Prophet, were extremely popular in Islamic civilization. Such books discussed all aspects of the Prophet's personality, appearance, conduct, and miracles, and were often the only books through which the less educated segments of Muslim society from Mali to India would have had contact with high religious tradition. Al-Tirmidhī's Shamā'il was extremely widely read, as was al-Qādī 'Iyād's (d. 544/1149) Kitāb al-shifā. The Egyptian Jalāl al-Dīn al-Suyūtī (d. 911/1505) also wrote a later shamā'il work entitled al-Khasā'is al-kubrā. As al-Qādī 'Iyād explained, these books were not designed to convince non-Muslims of Muhammad's prophethood, but rather to reinforce Muslims' faith in the unique and unparalleled virtues of 'the last of God's messengers.'31 Another genre of topical collections focused on stories about Muhammad that proved or illustrated his standing as a prophet. The most famous works of Dalā'il al-nubuwwa (proofs of prophethood) come from the eleventh-century scholars al-Hākim al-Naysābūrī (d. 405/1014) and his students Abū Nu'aym al-Isbahānī (d. 430/1038) and Abū Bakr al-Bayhaqī. Like musnads, these various monographs were unconcerned with assuring the authenticity of the hadiths they contained. In fact, books on the virtues of Companions and sunna often contained reports that later Sunni scholars and sometimes the authors themselves found baseless or reprehensible. The Kitāb al-sunna of Ibn Abī 'Āsim, that of Ibn Hanbal's son 'Abdallāh and the Kitāb al-tawhīd (Book of God's Unity) of Ibn Khuzayma all included a hadith describing how when God sits on His throne it squeaks like a saddle mounted by its rider. But even Ibn Hanbal's son notes the hadith's isnād is weak, and later Sunni scholars were so shocked by this blatant anthropomorphism that some of them called Ibn Khuzayma's book 'The Book of Heresy.'32 In his Fadā'il al-sahāba, Ibn Hanbal includes a report stating that 'Alī's name is written on the doorway to Paradise, a hadith rejected by Sunni scholars as forged.33 The question of why hadith scholars would knowingly include unreliable or obviously forged reports in any of their books is a perpetual quandary in the study of the hadith tradition and will be discussed in depth in the next chapter. In the context of books exhorting Sunnis to the proper beliefs and worldview, however, it makes sense from the authors' standpoint. These books were often polemics aimed at other sects, such as Muslim rationalists (known as Mu'tazilites) or Shiites. Sunni compilers of these books were not trying to prove anything to other Sunnis, who shared their system of hadith evaluation. They 'knew' they were upholding the correct set of beliefs, so they packed their books with whatever evidence they could find to support them regardless of its reliability. Authors of books of sunna were arguing that, instead of relying on reason, Muslims should believe in material transmitted from the Prophet no matter what it said. A hadith about God's throne squeaking was as useful in this cause as more reliable hadiths. THE HADITH CANON It would be some time before the landmark contribution of the sahīh and sunan books was recognized. By the dawn of the eleventh century, however, a selection of these books had been recognized as authoritative. This canon of books would fulfill two important functions in Islamic civilization: providing a common language for discussing the Prophet's Sunna and providing a manageable representation of the vast hadith corpus. Surprisingly, al-Bukhārī's and Muslim's decision to compile books limited only to hadiths they deemed authentic was initially rejected by many ahl al-hadīth scholars. This seems counterintuitive from a modern standpoint; why would a tradition that prided itself on following the authentic legacy of the Prophet object to books of only authentic hadiths? In order to understand this we must remember that, for the ahl al-hadīth, authentic hadiths only represented the most reliable end of the hadith spectrum. Hadiths with less stellar isnāds were also used in law, and weak hadiths were used very commonly in preaching, Quranic exegesis, and books of zuhd and good manners. Many ahl al-hadīth scholars during al-Bukhārī's and Muslim's time therefore criticized the compilation of the Sahīhayn. A famous hadith scholar from Rayy in Iran, Abū Zur'a al-Rāzī (d. 264/878), said of the two authors, 'These are people who wanted prominence before their time, so they did something of which they could boast; they wrote books the likes of which none had written before to gain for themselves precedence.' The ahl al-hadīth also worried that if hadith scholars wrote books limited to authentic hadiths, their opponents from the ahl al-ra'y would use that as a weapon against them. Abū Zur'a described Muslim as 'making a path for the people of heresy against us, for they see that they can respond to a hadith that we use as proof against them by saying "That is not in the Sahīh!" ' Under fire from such critics, al-Bukhārī and Muslim defended themselves by saying that their books did not include all the sahīh hadiths in circulation. Al-Bukhārī had only selected sahīh hadiths useful for his legal discussions, and Muslim had limited his book to hadiths whose authenticity he believed was agreed on by all.34 By the mid tenth century, however, the contribution of the sahīh/sunan movement was beginning to be realized. Previously, it was the collectors of the great musnads, al-Bukhārī's and Muslim's teachers like Ibn Hanbal and al-Humaydī, who had been viewed as the pillars of hadith scholarship. In the late 900s, however, Ibn Manda of Isfahan (d. 395/1004–5) announced that the four masters of hadith were those who had produced the sahīh books: al-Bukhārī, Muslim, Abū Dāwūd, and al-Nasā'ī. Ibn Manda described these four as well as others of their generation as the group of hadith masters 'accepted by all by consensus, and their knowledge trumps all others.'35 The need for a selection of hadith collections acknowledged as superior by all the ahl al-hadīth was essential at that point in time. In light of all the musannafs, musnads, and sunans in circulation between the various cities that hadith scholars visited on their 'travels in search of knowledge,' which books should students focus on as the foundation for understanding the Prophet's legacy? When a group of intimidated hadith students asked the Egyptian scholar Ibn al-Sakan (d. 353/964) this question, he entered his house and reemerged with four books in his hands. 'These are the foundations of Islam,' he said, 'the books of Muslim, al-Bukhārī, Abū Dāwūd, and al-Nasā'ī.'36 Different scholars had different visions of which books best represented the Prophet's Sunna. These shifting canons are usually referred to as 'The Five Books,' 'The Six Books,' or 'the Authentic Books (al-Sihāh).' The foundation of the canon, however, is unchanging: the four works of al-Bukhārī, Muslim, Abū Dāwūd, and al-Nasā'ī. The Shāfi'ī scholar Abū Bakr al-Bayhaqī (d. 458/1066) adds that, together with these four, al-Tirmidhī's and Ibn Khuzayma's books had identified a substantial amount of the authentic hadiths in circulation. Muhammad b. Tāhir al-Maqdisī (d. 507/1113) described the Six Books as those of al-Bukhārī, Muslim, al-Tirmidhī, al-Nasā'ī, Abū Dāwūd, and Ibn Mājah. 'Abd al-Karīm al-Rāfi'ī of Qazvīn (d. 623/1226) also enumerates this six-book series, as does the Indian Hanafī scholar al-Saghānī (d. 650/1252), adding the Sunan of al-Dāraqutnī as well. The Andalusian hadith scholar, al-Saraqustī (d. 524/1129), on the other hand, counts the Six Books as those of al-Bukhārī, Muslim, al-Tirmidhī, Abū Dāwūd, al-Nasā'ī, and Mālik. Al-Silafī of Alexandria (d. 576/1180), Abū Bakr al-Hāzimī (d. 584/1188-9), and al-Nawawī mention only Five Books: the works of al-Bukhārī, Muslim, al-Tirmidhī, Abū Dāwūd, and al-Nasā'ī.37 Together, the Six Books contain approximately 19,600 hadiths (around 35,000 with repetitions). The flexible boundaries of the hadith canon make sense when we consider one of its two primary functions. Even as early as 800 CE, al-Shāfi'ī had said that it was impossible for one person to know all the hadiths in circulation.38 If the Prophet's Sunna was essentially boundless, the Muslim community needed a tangible and manageable selection of hadith books to represent its core. Whether the canon was five or six books, or exactly which books these were, did not affect this function. In the 1200s and 1300s the hadith canon's ability to represent the Prophet's blessings endowed the Sahīhayn in particular with a special ritual relevance. In cities from Damascus to Timbuktu the Sahīhayn would be read in mosques as part of celebrations culminating in the month of Ramadan. Al-Bukhārī's Sahīh in particular was read as a cure for illness from Egypt to India, and the great Moroccan conqueror Mawlā Ismā'īl (d. 1727) had a copy of the Sahīh carried in front of his army 'like the Ark of the Children of Israel.'39 The second, more important function of the hadith canon was limited to the Sahīhayn – the only two books of the canon which included exclusively authentic hadiths. These two books served as a common reference for determining hadith authenticity. In the early 1000s the two schools of law that had emerged from the ahl al-hadīth, the Hanbalī and the Shāfi'ī, agreed that the contents of the Sahīhayn were totally authentic and had been agreed upon as such by the whole Muslim community. Scholars of the Mālikī school soon agreed, and by the 1300s even the hadith-wary Hanafī school had found acknow-ledging this convention unavoidable. For all the Sunni schools of law and theology, the Sahīhayn would be the common language for evaluating the authenticity of hadith in interschool debates. The Sahīhayn canon was an ideal polemical weapon to use against one's opponents. But that did not mean that scholars felt they had to obey all the hadiths found in the two collections in their own work. If a scholar of the Shāfi'ī or Hanafī school of law found a hadith in al-Bukhārī's or Muslim's collections that he disagreed with, he had no compunction about criticizing its authenticity.40 The Sahīhayn were thus not immune to criticism. Only in the early modern and modern periods has it become controversial to criticize the Sahīhayn, but this is primarily due to Muslim scholars' eagerness to protect the status of two books that they see as symbols of an Islamic tradition under attack from modernity. It is import-ant to note here, as will be discussed further below, that Muslim scholars recognized that other sahīh hadiths existed outside the hadith canon. THE PINNACLE OF HADITH COLLECTION AND THE END OF HADITH TRANSMISSION As al-Bukhārī's and Muslim's critics had insisted, the sahīh movement did not mean the end of hadith transmission and collection. Nor did it mean that Muslims believed that all the sahīh hadiths in circulation had been recorded. In fact, from the standpoint of volume, the peak of hadith collection occurred in the tenth century – over one hundred years after the Six Books had been written. Indeed, the compilation of titanic personal musnads continued after and even despite the sahīh movement, with scholars in Iran continuing the tradition of collecting musnads with many weak and even forged hadiths. Abū al-Qāsim al-Tabarānī (d. 360/971) of Isfahan compiled a huge collection, his Mu'jam al-kabīr, which is today printed in twenty-eight volumes. 'Alī b. Hamshādh of Nishapur (d. 338/950) produced a personal musnad twice as large as al-Tabarānī's, and al-Hasan al-Māsarjisī of Nishapur (d. 365/976) compiled a musnad that if published today would occupy an astounding 182 volumes.41 Even as late as the mid 1100s Shahrudār b. Shīrawayh al-Daylamī (d. 558/1163) compiled a famous hadith collection entitled Musnad al-Firdaws (The Musnad of Paradise). Into the 1000s scholars with strong affiliations to certain schools of law produced massive sunans and musnads to bolster their schools' bodies of substantive law. The vast Sunan al-kubrā of the Shāfi'ī Abū Bakr al-Bayhaqī (d. 458/1066) is a landmark in the Shāfi'ī legal school, supporting every detail of its law code with a myriad of reports from the Prophet and his Companions. Abū al-'Abbās al-Asamm of Nishapur (d. 346/957) collected all the hadiths that al-Shāfi'ī had transmitted with full isnāds in his magnum opus, the Umm, and organized them into the Musnad al-Shāfi'ī.42 Even a non-Hanafī like Abū Nu'aym al-Isbahānī (d. 430/1038) participated in efforts to find chains going back to the Prophet for Abū Hanīfa's reports and composed a musnad collection of them.43 A much larger musnad of the famous jurist's narrations was compiled by al-Khwārazmī (d. 655/1257). The Mālikī scholar Ibn al-Jabbāb (d. 322/934) created a musnad of Mālik's hadiths.44 All these scholars continued to transmit hadiths in the great mosques of Iraq and Iran before audiences of hundreds and even thousands of students. These 'dictation sessions' were recorded by students in collections called amālī (dictations). The chief judge of Kufa, al-Husayn b. Ismā'īl al-Mahāmilī (d. 330/942), was described as the most knowledgeable person in hadith of his time and was famous for his amālī.45 Abū al-'Abbās al-Asamm was equally well known for his dictation sessions. Not only did hadith transmission and collection continue unabated after the sahīh movement, scholars continued to identify hadiths that they felt merited the title of sahīh and that al-Bukhārī and Muslim should have included in their works. The great hadith scholar of Baghdad, Abū al-Hasan al-Dāraqutnī (d. 385/995) and the Mālikī hadith master of the Hejaz, Abū Dharr al-Harawī (d. 430/1038), both wrote one-volume collections called ilzāmāt (addendums) of hadiths that they considered up to the standards of the Sahīhayn. Al-Dāraqutnī's student, al-Hākim al-Naysābūrī (d. 405/1014), compiled a voluminous ilzāmāt work entitled al-Mustadrak (with approximately 8,800 hadiths) in which he sought, once and for all, to demonstrate to those opponents of the ahl al-hadīth the multitude of authentic hadiths that remained outside the Sahīhayn.46 By the mid 1000s, however, it was clear that the process of recording the hadiths in circulation – regardless of whether they were authentic or forgeries – was coming to an end. In the mid eleventh century, al-Hākim's student al-Bayhaqī declared that all the hadiths that could reliably be attributed to the Prophet had been documented, and thus any previously unrecorded attributions to Muhammad should be considered de facto forgeries.47 In practice, in the 1100s we see that fewer and fewer hadith scholars were able to record hadiths with full isnāds (even highly unreliable hadiths) back to the Prophet that had not already been written down in some earlier collection. Ibn al-Jawzī of Baghdad (d. 597/1201), for example, is the only person to have transmitted the admittedly unreliable hadith 'Sweeping the mosque is the dowry for heavenly beauties (kans al-masājid muhūr al-hūr al-'īn).' The last hadiths that I have seen recorded with full isnāds are found in the Tadwīn fī akhbār Qazwīn (Recording the History of the City of Qazvin) of 'Abd al-Karīm al-Rāfi'ī (d. 623/1226): 'Civil strife (fitna) is sleeping, and God curses whomever wakes it,' and 'Sanjar will be the last of the Persian kings; he will live eighty years and then die of hunger.' (Sanjar was the Seljuq sultan of Persia; he died in 1157 CE at around seventy-five).48 Even this second report is undoubtedly forged. By the 1300s, not even the greatest hadith scholars of their day such as Shams al-Dīn al-Dhahabī (d. 748/1348) or Jamāl al-Dīn al-Mizzī (d. 742/1341) would dare to claim that they were in possession of a hadith reliably said by the Prophet that had gone unnoticed until their time. THE PRACTICE OF HADITH TRANSMISSION AND CONNECTION TO THE PROPHET AFTER THE HADITH CANON In the early period of the hadith tradition the importance of oral transmission, or 'audition (samā')', where the student either read the hadith to his teacher or vice versa, had been very practical. One had to hear hadiths through a chain of teachers (isnād) because the Arabic script was too ambiguous to assure the correct understanding of any written document. The practical emphasis on oral transmission – only accepting material if it came through a living isnād of transmitters – was equally applicable to whole books of hadiths. The transmission of a book required the same care and concern as the transmission of an individual hadith, and collections like Sahīh al-Bukhārī or Mālik's Muwatta' were transmitted from teacher to student in the same manner as hadiths. For hadith scholars, any referral to a hadith collection was contingent on hearing it from a chain of transmitters back to the author. A book could not simply be taken off the shelf and used. Like a single report, only a student copying a text in the presence of his teacher could protect against the vagaries and errors of transmission. Abū Bakr al-Qatī'ī (d. 368/979), who was the principal transmitter of Ibn Hanbal's Musnad, was severely criticized for transmitting one of Ibn Hanbal's books from a copy which he had not heard directly from his teacher, Ibn Hanbal's son. Although al-Qatī'ī had in fact heard this book from his teacher previously, the copy he had used was destroyed in a flood, leaving him with only the other non-samā' copy. This case demonstrates the sensitivity of hadith scholars to the question of oral transmission. Even a respected scholar who had actually heard a book from his teacher could be criticized for relying on another copy if he had not read that copy in the presence of his teacher (since he would not have been able to make any corrections to it). The scholar who transmitted the Musnad from al-Qatī'ī, Ibn al-Mudhhib (d. 444/1052–3), was also accused of lax transmission practices. Specifically, he did not have samā' for certain sections of the Musnad. Later scholars thus explained that, because of this, 'material with unreliable texts (matn) and isnāds entered into the Musnad.'49 In the ninth, tenth, and eleventh centuries the isnād to the book was thus as important as the isnāds contained within the book for authenticating its hadiths. Oral transmission was the key to maintaining these isnāds. In the 1000s, however, the fact that hadith collections such as the Six Books had become so well known and widely transmitted meant that scholars could relax the practical strictures of oral transmission. Sahīh al-Bukhārī was sufficiently widespread that if alterations were made to any one copy of the book there existed enough other transmissions of the book to identify this error. Although devout hadith scholars would maintain into the thirteenth century that one could not simply pick up a book of hadith and read it without having heard it from a transmitter via an isnād, Sunni scholars not specializing in hadith found this unnecessarily cumbersome. By the mid 1000s revered Sunni theologians and jurists like Abū Hāmid al-Ghazālī (d. 505/1111) and his teacher al-Juwaynī (d. 478/1085) had declared that if one found a well-copied text of al-Bukhārī's Sahīh one could read and use it without an isnād to the book.50 Even among scholars focused narrowly on the study of hadith, in the 1000s the practice of ijāza (permission for transmission) began to supersede samā' as the medium of the isnād. Ijāza for transmission meant that instead of reading an entire hadith collection in the presence of an authorized transmitter, a student might only read part of it and receive 'permission' from the teacher to transmit the rest. Although it was a less rigorous form of authentication, ijāza still provided scholars with isnāds for books. Although this practice had existed in some forms even in the ninth century, by the mid 1000s it had become very common. Al-Hākim al-Naysābūrī, author of the massive Mustadrak, thus gave a group of students an ijāza to transmit his works provided they could secure well-written copies of them.51 Of course, if you could get an ijāza for a book you had not actually read in the presence of a teacher, you could get ijāzas for any number of books that the teacher was able to transmit. This led to the practice of acquiring a 'general ijāza (ijāza 'āmma)' for all the books a teacher had. In the 1000s many scholars also accepted the practice of getting ijāzas from teachers one had not actually met at all through writing letters. This 'ijāza for the non-present person (ijāzat al-ma'dūm)' meant that scholars could acquire ijāzas for their infant children or even for children not yet born! This ijāza for transmission (ijāzat al-riwāya) should not be mistaken for another, much less easily attained form of ijāza in Islamic civilization, 'the ijāza of knowledge (ijāzat al-dirāya).' The ijāza of transmission served only to preserve the tradition of the isnād, while the ijāza of knowledge showed that a teacher acknowledged that a student had mastered a text and was able to teach its contents to others. It is evident from these developments that by the late eleventh century the transmission of hadiths and books via a living isnād possessed little practical value. Why then did it continue? Simply put, the foundational principle of the Islamic tradition, that authority comes through a connection to God and His Prophet, still dominated Muslim scholarly culture. The isnād was that chain that connected a scholar to the Prophet and allowed him to act as an authoritative interpreter of Islam. Hearing a hadith or a book of hadiths by an isnād, even if by ijāza, breathed a soul into otherwise lifeless pages and rendered the book legally compelling. One Arabic poem describes someone reading a book without receiving it from a teacher as 'someone trying to light a lamp with no oil.'52 The Andalusian scholar Ibn Khayr al-Ishbīlī (d. 575/1179) thus stated that no one could introduce a statement with the formula 'the Prophet said...' without possessing some personal chain of transmission, even if by ijāza, back to the Prophet for that report.53 The isnād conveyed authority in Muslim scholarly culture, and it is no coincidence that acquiring and possessing isnāds was one of the means by which the Muslim scholarly elite could distinguish themselves from the laity. One of the reasons that Ibn Khayr al-Ishbīlī gave for requiring some form of isnād for quoting the Prophet was the phenomenon of uneducated simpletons preaching in mosques instead of qualified scholars. Receiving isnāds for books and hadiths was the equivalent of being ordained into the priesthood, and it is no surprise that even today at the Islamic Institute in Kerala, India, the graduation ceremony for Muslim scholars involves the rector of the school reading them his isnād for a hadith that involves the transmitters, all the way back to the Prophet, investing the student to whom they recited the hadith with the turban of a scholar. Perhaps the last large hadith book to include full isnāds for every hadith it included was the Ahādīth al-mukhtāra (Selected Hadiths) of Diyā' al-Dīn al-Maqdisī (d. 643/1245). But even this book did not include previously unrecorded hadiths. The author's isnāds for his hadiths consist of his isnāds to earlier hadith collections, which then continue from the author of those collections back to the Prophet. After the 1200s, hadith scholars would cultivate their own full- length isnāds back to the Prophet in small booklets produced only for the pietistic purpose of linking themselves to his blessings and imitating the great hadith scholars of yore. As Muhyī al-Dīn al-Nawawī described it, collecting isnāds back to the Prophet is an act of 'preserving the isnād, which is one of the unique features of the Muslim community.'54 The famous hadith scholar of Cairo, Zayn al-Dīn al-'Irāqī (d. 806/1404), thus conducted occasional amālī sessions in an effort to imitate the practice of earlier hadith scholars. In the twentieth century, the Moroccan hadith scholar Ahmad al-Ghumārī (d. 1960) recited hadiths with full isnāds back to the Prophet in dictation sessions in Cairo's al-Husayn Mosque. Today, the practice of transmitting hadiths is carried out by hearing hadiths known as musalsalāt, or hadiths always transmitted in a certain context. The first hadith a student hears from his teacher is known as the hadīth al-musalsal bi'l-awwaliyya, 'the hadith always transmitted first': 'God the Most Merciful is merciful towards those who act with mercy – be merciful on the earth and He that is in the heavens will be merciful with you' (see chapter 1). Historically, transmitting hadiths via full isnāds back to the Prophet carried another advantage as well. Not only did the chain connect one to Muhammad himself, it also linked one to all the great scholars of the past through whom the isnād passed. The staunchly orthodox thirteenth-century Sufi 'Umar al-Suhrawardī (d. 632/1234) began most of the chapters of his popular manual on Sufism, 'Awārif al-ma'ārif, with hadiths that reached all the way back to the Prophet through major figures in the Sufi tradition, such as Abū al-Qāsim al-Qushayrī (d. 465/1072) and Abū Nu'aym al-Isbahānī.55 These scholars had recorded their hadiths in book-form, but the religious capital gained by providing living isnāds for hadiths transmitted through them proved more compelling to al-Suhrawardī than simply citing their books. Isnāds thus linked scholars to the great figures who had preceded them in Islamic civilization and allowed one to speak with their voices as well as that of the Prophet. As the great Sufi of the sixteenth century, al-Sha'rānī (d. 1565 CE) said, someone with an isnād 'is like a link in the chain, whenever he moves on any matter the whole chain, up to our master the Messenger of God, moves with him.'56 ELEVATION IN ISNĀDS, AUTHORITY, AND PRECEDENCE IN POST-CANONICAL HADITH TRANSMISSION After the late tenth and eleventh centuries CE the primary purpose of the isnād was to provide a connection to the Prophet's authority and establish a person as part of the Muslim scholarly class. As a result, one's proximity to the Prophet in the isnād and access to hadiths that other scholars lacked served as marks of precedence in the scholarly community. Like the importance of oral transmission (samā'), the notion of a short or 'elevated ('ālī)' isnād began as a very practical concern for hadith authenticity: the fewer the links in the isnād to the Prophet, the fewer opportunities for error in transmission to occur. Hence we find even an early collector like Ibn Abī Shayba (d. 235/849) exhorting scholars that 'seeking elevated isnāds is part of religion.'57 By the mid 900s CE, however, seeking elevated isnāds had become a goal in its own right. In a society where connection to the Prophet was the source of both authority and blessing, the proximity of that connection was very valuable. As one early hadith scholar phrased it, 'A close isnād is closeness to God.'58 As in any society, Muslim religious scholars and pious individuals established a system of honors and valuable items that individuals could earn or attain; like educational degrees, Muslim scholars sought out shorter and shorter isnāds, rarer and rarer hadiths, as a way to gain precedence, fame, and respect in their religious culture. Like coin collectors fretting over acquiring rarities, Muslims flocked to those scholars lucky enough to hear old hadith transmitters as young children, or who had heard a rare hadith from a certain transmitter from a faraway land. Such people could offer young Muslim scholars, eager to earn their place among the scholarly elite or merely to feel especially connected to their Prophet, a chance at excellence. Of course, in none of these cases did the authenticity of the hadith in question actually matter – hadith scholars could distinguish themselves by their short isnāds and their rare hadiths regardless of whether or not these isnāds were reliable or the rare hadiths were baseless. To return to the analogy of coin collecting, it is the rarity of the coin and its condition (analogous to the elevation of an isnād) not the original value of the coin (or the authenticity of the hadith) which matter to the collector. Perhaps the most prominent example of a hadith scholar who prioritized elevated isnāds and rare hadiths far above authenticity was al-Tabarānī (d. 360/971), who began hearing hadiths from teachers at the age of thirteen and died at the age of one hundred. Of his many hadith collections, his three mu'jams (see below), one large, one medium, and one small, are testimonies to his priorities in hadith study. In the small and medium collections, al-Tabarānī follows most narrations with a brief discussion of how rare that narration is. Al-Tabarānī's isnāds border on the impossibly short. While ninth-century scholars like al-Bukhārī generally narrated by isnāds of four, five, six, or seven transmitters to the Prophet (and in al-Bukhārī's case, twenty-eight instances where he narrated by only three), one hundred years later al-Tabarānī still regularly narrated hadiths with four-person isnāds. In one case we find him narrating a hadith via only three people: Ja'far b. Hamīd al-Ansārī his grandfather 'Umar b. Abān the Companion Anas b. Mālik, who showed him how to perform ablutions like the Prophet. Of course, later Muslim critics cast aside this isnād as inauthentic since Ja'far b. Hamīd was unknown to anyone but al-Tabarānī.59 But in a scholarly culture where proximity to the Prophet granted precedence regardless of authenticity, al-Tabarānī was the most sought after hadith transmitter of his time. The last of his students to die was one Ibn Rīdha (d. 440/1049), and the most long-lived person to hear al-Tabarānī's collections from him was a woman named Fātima al-Jūzdāniyya (d. 514/1120). If you were lucky enough to receive ijāza from Fātima as a child for al-Tabarānī's hadiths, you could be living in the late 1100s, some 550 years after the Prophet had died, with only six degrees of separation between you and him! Two other famous hadith collections that embody the desire for connection to the Prophet, whatever the authenticity, in this period are the Musnad al-Shihāb (The Meteor Musnad) of the Egyptian al-Qudā'ī (d. 454/1062) and the Musnad al-Firdaws of al-Daylamī (d. 558/1163). These books represent some of the last large hadith collections to feature full-length isnāds, but their contents are on the whole so unreliable that later scholars devoted whole books to the forged hadiths they contained and assumed any hadith cited from the books to be weak.60 Today, the shortest realistic isnāds include twenty intermediaries to the Prophet. As al-Tabarānī's impossibly short isnād suggests, however, a chain of transmission can be as short as one is willing to believe. A great cultivator of isnāds in the early modern period, Murtadā al-Zabīdī (d. 1791), claimed to have heard a hadith via an isnād of two jinn (supernatural beings living alongside humans, the origin of our word 'genie') from the Prophet.61 A modern hadith scholar from Morocco, 'Abdallāh al-Ghumārī (d. 1993), noted that while teaching in Fez he had met a man who claimed to have heard hadiths from his grandfather, who had heard hadiths from al-Zabīdī.62 If we combine this with the jinn's isnād, this would mean that in the 1990s al-Ghumārī had a hadith from the Prophet narrated by only five intermediaries! Of course, neither al-Zabīdī nor al-Ghumārī believed that such transmissions were reliable enough to be the basis for law or dogma (as we'll see, jinn could not be pinned down to be evaluated as transmitters). They believed that jinn existed, however, so these isnāds were worth collecting for the blessing (baraka) of having a close, albeit tenuous, connection to the Prophet. Women and hadith transmission The transmission of hadith collections and even the compilation of new ones with very elevated isnāds in the post-canonical era was an area in which women could excel. Because they often lived longer than men, women could become the most sought after transmitters of books. Major hadith scholars like al-Khatīb al-Baghdādī traveled to Mecca to read Sahīh al-Bukhārī in the presence of Karīma al-Marwaziyya (d. 463/1071), who had an especially elevated isnād to the book, and Fātima al-Jūzdāniyya was the main transmitter of al-Tabarānī's works. Until her death in 2008, Muslim students flocked to a small village in Yemen's Hadramawt Valley to receive a hadith ijāza from the 105-year-old woman Safiyya al-'Amdiyya. Independent collections of hadiths by women were very rare; in the early period of hadith they were non-existent. But we know of at least two selections of hadiths from the post-canonical period compiled by women. A twelfth-century woman named Shuhda al-Kātiba (d. 574/1178–9) put together a list of 115 hadiths that she picked from books she had been authorized to transmit, often with shorter isnāds than the hadiths in the actual books themselves.63 The Musnad of Amat Allāh Miryam al-Hanbaliyya of Nablus (d. 758/1357) has also survived until today. MU'JAMS, THABATS, AND THE CVS OF HADITH SCHOLARS With the transformation of hadith transmission and collection into a means of connection to the Prophet and status in the scholarly community, hadith collections emerged that were structured to display the breadth of a hadith scholar's learning. Mu'jams were books of hadiths in which the author chose a certain theme and then provided as many hadiths as possible to demonstrate the breadth of his hadith corpus within that theme. In a sense, the mu'jam functioned as curriculum vitae of the hadith scholar, displaying the range of teachers with whom he had studied, the rarity of his hadiths, and the elevation of his isnāds. Mu'jams had emerged in the ninth century, with Abū al-Qāsim al-Baghawī's (d. 317/929–30) Mu'jam al-sahāba, where the author provided one hadith from him all the way back to each Companion. The mu'jam came into its own as a genre, however, in the tenth to the twelfth centuries. A common theme for a mu'jam was a mu'jam al-shuyūkh (mu'jam of teachers), or a collection where the author provided one hadith with a full isnād through each of his teachers. An early example of this is the Mu'jam al-shuyūkh of Abū Bakr al-Ismā'īlī (d. 371/981–2) and the Mu'jam al-saghīr (small mu'jam) of al-Tabarānī. A mu'jam al-shuyūkh could be massive and contain far more than merely hadiths: the mu'jam composed by Abū Sa'd al-Sam'ānī (d. 562/1166) is published in four volumes and contains hadiths, information about his teachers' lives, and the books they studied and wrote, as well as about his own studies. Other mu'jams were designed to display the breadth of a scholar's travels in the search of hadiths. One scholar of the 1100s who was particularly well known for his elevated isnāds and wide travel (born in Iran, he eventually settled in Alexandria), Abū Tāhir al-Silafī (d. 576/1180) wrote three mu'jams, one for his teachers in his native Isfahan, one for those in Baghdad, and one for the teachers he had heard from on his travels (the Mu'jam al-safar). With the end of the general practice of writing hadith collections with full isnāds in the late twelfth and early thirteenth centuries, the hadith scholar's CV shifted away from using the isnāds of hadiths to demonstrate wide learning to using the isnāds of books. In the mid 1100s we thus see the emergence of thabats, or collections in which a scholar listed all his isnāds to the books he had received permission to transmit from his teachers, in the place of mu'jams. Early thabats include that of the famous Andalusian hadith scholars al-Qādī 'Iyād b. Mūsā (d. 544/1149) and Ibn Khayr al-Ishbīlī (d. 575/1179). Thabats would remain until modern times the premier medium through which scholars could demonstrate their connection to the great scholars of yesteryear, and through those books to the Prophet himself. In the twentieth century the Moroccan hadith scholar Muhammad 'Abd al-Hayy al-Kattānī (d. 1963) compiled the Fahris al-fahāris, a thabat collection with isnāds to over one thousand earlier thabat collections. CHANNELING THE CONNECTION TO THE PROPHET: MUSTAKHRAJS, COMMENTARIES, LOCAL HISTORIES, AND FORTY HADITH BOOKS The capacity of hadith to function as a connection to the Prophet has allowed Muslim scholars to channel and mold this charismatic medium to serve a variety of scholarly and non-scholarly purposes. Hadiths have provided the material through which other discourses are constructed. From the 900s to the present day, scholars have therefore used hadiths as a medium for discussing any number of legal, doctrinal, or spiritual issues. Mustakhrajs The genre of mustakhraj books flourished from the late 800s until the early 1000s, during the period in which the focus on elevated isnāds became pronounced. A mustakhraj involved a hadith scholar taking an existing hadith collection and using it as a template for his own hadith book; so for every hadith found in the template collection, the author of the mustakhraj would provide his own narration of that hadith. This seems counterintuitive – why would a scholar who had collected a large body of hadiths not write his own collection in order to express his own legal or doctrinal worldview? The reason for composing a mustakhraj becomes obvious when we consider the nature and objectives of the genre. First, mustakhrajs appeared during the period when the hadith canon was forming. As a result, collections such as the Sahīhayn and the Sunan of Abū Dāwūd were greatly sought after, and scholars would travel far and wide to hear the books from their authorized transmitters. If a scholar was unable to hear the books from a transmitter with an elevated isnād to its author, however, he would have to suffice with an unattractively long isnād to the book. Mustakhrajs provided a solution. By reconstituting the template collection with his own, often elevated isnāds, a scholar could effectively possess the book without compromising the quality of his isnād to it. Abū Nu'aym al-Isbahānī states that he composed his mustakhraj of Muslim's Sahīh for the benefit of those who had 'missed' hearing that book from authorized transmitters. A twelfth-century scholar who had heard al-Isbahānī's mustakhraj bragged to friends that some of the isnāds for hadiths in the book were so short that he was just as close to the Prophet as Muslim had been.64 Second, authors of mustakhrajs used the template collection to display the authenticity and elevation of their own isnāds. We thus find that the books used as template collections for mustakhrajs were all products of the sahīh movement; dozens of mustakhrajs were produced based on the Sahīhayn of al-Bukhārī and Muslim, with three on the Sunan of Abū Dāwūd, one on al-Tirmidhī's Jāmi' and one on the Sahīh of Ibn Khuzayma. The majority of mustakhrajs based on the Sahīhayn thus attempted to replicate the criteria used for authenticity by al-Bukhārī and Muslim. Finally, by selecting narrations of hadiths that varied slightly from the template collections or adjusting the chapter titles, the authors of mustakhrajs could introduce their own legal or doctrinal ideas into the text. In this sense, mustakhrajs were the first generation of commentaries on hadith collections. In the mustakhraj genre, the template collection served as a forum for the author to display the quality and elevation of his isnāds as well as to express his own doctrinal and legal vision. Commentaries A commentary on a hadith collection, or sharh, served two general functions. First, scholars composed such a work to assist students in the basic task of reading and understanding the difficult phrases, names, and obscure meanings embedded in the isnāds and matns of a hadith work. Second, commentaries provided scholars with an opportunity to elaborate in detail on any legal, dogmatic, ritual, or historical issue that they found relevant to the hadiths in the book they were discussing. The book commented on thus acted as a medium for a much more expanded discussion in which the author could express his own vision of the Islamic worldview. The majority of hadith commentaries were devoted to books in the hadith canon. The earliest known commentary was devoted to Mālik's Muwatta' by the Mālikī Abū Tāhir al-Umawī (d. 250/864). Two other very early examples are the Shāfi'ī scholar Hamd al-Khattābī's (d. 388/998) commentaries on the Sunan of Abū Dāwūd and on Sahīh al-Bukhārī. The first known commentary on Muslim's Sahīh was written by the North African scholar Muhammad b. 'Alī al-Māzarī (d. 536/1141), with one devoted to the Jāmi' al-Tirmidhī by another North African, Abū Bakr b. al-'Arabī (d. 543/1148). The first known commentary on Sunan Ibn Mājah came from the Cairene Hanafī scholar Mughaltāy (d. 762/1361). Sunan al-Nasā'ī would have to wait until al-Suyūtī (d. 911/1505) devoted a commentary to it. The most famous hadith commentaries overall are undoubtedly Ibn Hajar al-'Asqalānī's (d. 852/1449) Fath al-bārī, a huge commentary on Sahīh al-Bukhārī, and al-Nawawī's commentary on Sahīh Muslim. Both are so encyclopedic in their discussion of the hadith-science issues and broader questions raised in the Sahīhayn that Muslim scholars regularly cite them instead of specialized books of law or theology. Because commentaries provided such an excellent forum for legal discussion, the hadith collections tied to specific schools of law also attracted them. Early commentaries on Mālik's Muwatta' came from the Mālikī scholars Ibn 'Abd al-Barr (d. 463/1060) of Lisbon and Abū al-Walīd al-Bājī (d. 474/1081), both of whom wrote several commentaries of various sizes on the work. Ibn 'Abd al-Barr's Kitāb al-tamhīd and the later work of al-Zurqānī (d. 1122/1710) are the two best known commentaries on the Muwatta'. There have been occasional commentaries on the Musnad of Abū Hanīfa, such as that of the Meccan Mullā 'Alī Qārī (d. 1014/1606). Al-Suyūtī wrote a small commentary on the Musnad of al-Shāfi'ī, and even the massive Musnad of Ibn Hanbal has attracted occasional commentaries, such as that of the Medinan scholar Muhammad b. 'Abd al-Hādī (d. 1726) or the Yemeni Abū al-Hasan al-Sindī (d. 1728). Commentaries attained an important station in the late 1300s, when writing one on al-Bukhārī's or Muslim's Sahīh became the principal means for scholars throughout the Sunni Muslim world to interact with the hadith tradition. At the peak of intellectual activity in Mamluk Cairo in the fourteenth and fifteenth centuries, almost every hadith scholar of note wrote a commentary on Sahīh al-Bukhārī, and in India from the 1600s onward writing a commentary on one of the Sahīhayn was de rigueur for accomplished Muslim scholars.65 Hadith commentaries have continued to be written until modern times. The most famous commentary on al-Tirmidhī's Jāmi', the Tuhfat al-ahwadhī (The Gem of the Competant) of the Indian Muhammad 'Abd al-Rahmān al-Mubārakpūrī (d. 1935), is a regularly cited encyclopedic source for Sunni Muslim scholars worldwide. The twenty-nine-volume Awjaz al-masālik ilā Muwatta' Mālik (ironically titled, The Shortest of Paths to Mālik's Muwatta'), written by the Indian Muhammad Zakariyyā Kāndahlawī (d. 1982) is the largest commentary devoted to the one volume Muwatta' of Mālik. Sometimes scholars devoted commentaries to selections of hadiths they made themselves and not to any existing books. The leading Hanafī hadith scholar of his time, the Egyptian Abū Ja'far al-Tahāwī (d. 321/933), wrote one commentary on hadiths of legal consequence to the Hanafī school, the Sharh ma'ānī al-āthār, and one on hadiths he found legally or doctrinally problematic, the Sharh mushkil al-āthār. The Sufi Abū Bakr al-Kalābādhī (d. 384/994) wrote a commentary on a selection of hadiths he found morally and spiritually important, the Bahr al-fawā'id (Ocean of Benefits). Local histories From the late ninth century, scholars also began using hadiths as a medium for a less scholastic topic: narrating the history of their native city, its virtues, and the accomplishments of its inhabitants. These local histories formed part of the larger genre of biographical dictionaries that featured so prominently in Islamic civilization. In such works history is told through collective biography. Local histories generally set forth the history of a city, the people associated with it and its role in the Islamic world. The introductory chapters on the virtues of the city usually included outrageously patriotic forged hadiths. In the eleventh century, al-Hākim al-Naysābūrī and Abū Nu'aym al-Isbahānī wrote local histories on their respective cities of Nishapur and Isfahan, both in Iran and both featuring this hadith: 'The people with the greatest destiny in Islam are the people of Persia (a'zam al-nās nasīban fī al-islām ahl fāris).'66 Local histories then generally list the famous inhabitants or visitors to the city in either chronological or alphabetical order, providing biog-raphies for each entry. Many local histories fit squarely within the genre of hadith literature because they focused on the lives and accomplishments of hadith scholars, describing the teachers from whom they heard hadiths and the students to whom they transmitted, and rating their reliability. Local histories also included vast arrays of hadiths. The earliest known local history is the history of Wāsit in southern Iraq (Tārīkh Wāsit) written by Aslam b. Sahl Bahshal (d. 292/905). The work includes many hadiths, including the only known narration of the hadith through Ibn Abbas in which the Prophet condemns speaking during the Friday prayer sermon.67 The most famous local histories rank among the largest books written in Islamic civilization. The History of Baghdad (literally, The History of the City of Peace, Tārīkh madīnat al-salām) of al-Khatīb al-Baghdādī (d. 463/1071) is fourteen printed volumes, while the mammoth History of Damascus (Tārīkh madīnat Dimashq) of Ibn 'Asākir (d. 571/1176) fills eighty! Since the authors of these two books include at least one hadith for each entry, with a full isnād from the author through the subject in question back to the Prophet, the History of Baghdad and the History of Damascus are actually two of the largest and most important hadith collections. As with musnads and mu'jams, their authors were unconcerned with the authenticity of hadiths in the books, and the works are thus indispensable sources for some of the rarest and most bizarre hadiths in circulation. Forty hadith collections One the most common and enduring forms of using hadiths as a medium for scholarly or pious expression has been books of Arba'ūn hadīth, or 'Forty Hadith' books. Supposedly the first Forty Hadith book was composed by the early scholar Ibn al-Mubārak (d. 181/797) on the basis of a hadith that, although attributed to the Prophet through many narrations and permutations, Muslims have agreed is unreliable: 'Whoever memorizes for my community forty hadiths from my Sunna, I will be his intercessor on the Day of Judgment (man hafiza 'alā ummatī arba'īn hadīthan min al-sunna kuntu lahu shafī'an yawm al-qiyāma).' Despite its unreliability, this hadith has served consistently as a catalyst in Islamic scholarly culture, and even Muslim scholars not known for any special interest in hadith have composed forty hadith collections on its basis. Among the non-hadith specialists who did so are the famous Shāfi'ī legal theorist al-Juwaynī (d. 478/1085) and the seminal Sufi theosopher Ibn Arabi (d. 638/ 1240). Some of the earliest known forty books are those of Ahmad b. Harb al-Naysābūrī (d. 234/848) and Ibrāhīm b. 'Alī al-Dhuhlī (d. 294/905).68 Like mu'jams, forty hadith collections could be tailored to display the elevation or rarity of a scholar's hadiths or be devoted to specific topics. Ibn 'Asākir and al-Silafī had forty hadith collections with one hadith for each of the forty lands they had visited. Abū Nu'aym al-Isbahānī composed one with forty hadiths import-ant to Sufis and one with forty hadiths about the Messiah (Mahdī). Muhammad b. Abd al-Rahman al-Tujīnī of Morocco (d. 610/1213) wrote several forty hadith collections, including one on the topic of praying for the Prophet. The most exorbitant displays of the breadth of a scholar's hadith corpus are certainly the forty hadith collections of Ibn al-Abbār (d. 658/1259) and Muhammad b. 'Abd al-Wāhid al-Ghāfiqī (d. 619/1222), which were entitled 'Forty hadiths from forty different teachers from forty different books by forty different scholars via forty different isnāds to forty different Successors, from forty different Companions with forty different names from forty different tribes on forty different issues.'69 Convinced that all possible forty-hadith-book themes had been exhausted, al-Hasan b. Muhammad al-Naysābūrī (d. 656/1258) replicated this same topic but also drew his forty hadiths from forty different forty-hadith collections!70 One forty hadith book in particular, al-Nawawī's 'Forty Hadiths about the Principles of the Religion (Arba'ūn hadīth fī usūl al-dīn)' is one of the most widely read books after the Quran among Sunni Muslims. It has served as an important tool for scholars to instruct the masses and has been the subject of numerous commentaries, such as the frequently studied Jāmi' al-'ulūm wa al-hikam (Compendium of the Sciences and Wisdoms) of Ibn Rajab (d. 795/1392) and Ibn Hajar al-Haytamī's (d. 974/1566) Fath al-mubin bi-sharh al-arba'īn. CONSOLIDATION AND ANALYSIS IN THE LATE SUNNI TRADITION In the wake of the emergence of the hadith canon at the dawn of the eleventh century, a process of consolidation and analysis began in parallel with the continued transmission of hadith as a medium of connection to the Prophet. This consolidation and analysis entered a period of exceptional activity with the solidification of what we can refer to as the Late Sunni Tradition, or the version of Sunni orthodoxy that emerged in the 1300s and has characterized Islamic civilization in the Middle East and South Asia until the modern period. It consists of an institutional combination of the four Sunni schools of law, the Ash'arī or Māturīdī schools of speculative theology, and Sufi brotherhoods. A Muslim scholar in the Late Sunni Tradition would loyally follow one of the established schools of law, one of the established schools of speculative theology, and participate in one or more Sufi brotherhoods. Digest collections The emergence of the hadith canon resulted naturally in the composition of digest collections that combined and consolidated the canon's contents into a more manageable form. The first digests addressed the core of the hadith canon: the two Sahīhs of al-Bukhārī and Muslim. An Andalusian who moved to Baghdad, Muhammad b. Futūh al-Humaydī (d. 488/1095) combined the Sahīhayn into one book, noting any material that one of the two books featured apart from the other. Zayn al-Dīn al-Zabīdī (d. 893/1488) later wrote a small one-volume digest of all the hadiths of Sahīh al-Bukhārī, called Tajrīd al-Sahīh (Stripping Down the Sahīh), that removed isnāds and any repetitions. Ibn Razīn al-Saraqustī (d. 524/1129) of Saragossa produced a more thorough digest of what he perceived as the hadith canon: the Sahīhayn and the books of Abū Dāwūd, al-Nasā'ī, al-Tirmidhī and Mālik. The Syrian Ibn al-Athīr (d. 606/1210) replicated this work in his large and very popular Jāmi' al-usūl min ahādīth al-rasūl, a copy of which the great Mongol grand vizier Rashīd al-Dīn (d. 718/1318) ordered to be placed in the mosque he endowed as a counterpart to the Quran. The famous scholar of Baghdad, Ibn al-Jawzī (d. 597/1201), compiled a digest collection reflecting his loyalty to the Hanbali school; his Jāmi' al-masānīd combined the hadiths of the Sahīhayn, the sunan of al-Tirmidhī, and the Musnad of Ibn Hanbal.71 Ibn Athīr's Jāmi' al-usūl was a huge, multivolume work. Other digests were meant to be portable, easily thumbed-through personal handbooks. Al-Husayn al-Baghawī (d. 516/1122), known as 'the Reviver of the Sunna,' wrote his one-volume Masābīh al-sunna (Lamps of the Sunna) for this purpose. He digested the canon into 4,434 hadiths, half of them from the Sahīhayn.72 Organized topically, each chapter is divided into sahīh and the hasan (see next chapter for discussion of these terms) hadiths. The work is so small because the author omitted the isnāds, relying on the reputation of the books he drew on to vouch for the reliability of the hadiths.73 Muhammad al-Khatīb al-Tabrīzī (d. c. 737/1337) added 1,511 hadiths to al-Baghawī's work in his expanded digest, the Mishkāt al-masābīh (Niche of the Lamps). The Mishkāt became a standard hadith textbook for Muslim religious students, especially in India, and was the subject of several commentaries, including the famous Mirqāt al-mafātīh sharh Mishkāt al-masābīh of Mullā 'Alī Qārī. Supplemental collections The Six Books contained approximately 19,600 traditions altogether (around 35,000 with repetitions), but vast numbers remained in other works. While digest works sought to consolidate the material within the canon, supplemental collections (kutub al-zawā'id) brought material outside the canon within easy reach of scholars. In his Majma' al-zawā'id, the Cairene scholar Nūr al-Dīn al-Haythamī (d. 807/1405) listed all hadiths from the Musnads of Ibn Hanbal, Abū Ya'lā al-Mawsilī, and al-Bazzār as well as the Mu'jams of al-Tabarānī that are not found in the Six Books, organized topically and without isnāds. Al-Haythamī also evaluated the transmitters in the isnād of each supplemental hadith (but, note, not necessarily the authenticity of the hadith itself!).74 In his Ithāf al- khayyira al-mahara bi-zawā'id al-masānīd al-'ashara, Ahmad al-Būsīrī (d. 840/1436) performed the same service for the hadiths in the Muwatta', the Musnad of al-Shāfi'ī, Sunan al-Dārimī, Sunan al-Dāraqutnī, Sahīh Ibn Khuzayma, Sahīh Ibn Hibbān, the Muntaqā of Ibn al-Jārūd, Abū 'Awāna's Mustakhraj of Sahīh Muslim, the Mustadrak of al-Hākim, and the Sharh ma'ānī al-āthār of al-Tahāwī. In his Matālib al-'āliya bi-zawā'id al-masānīd al-thamāniya, the great Ibn Hajar al-'Asqalānī (d. 852/1449) added the hadiths from a wide selection of less well-known early musnads: those of al-Tayālisī, al-Humaydī, Ibn Abī 'Umar, al-Musaddad, Ahmad b. Manī', Ibn Abī Shayba, 'Abd b. Humayd, al-Hārith b. Abī Usāma, Ishāq b. Rāhawayh, and al-Rūyānī.75 With these supplemental collections at their disposal, Muslim scholars could easily reference hadiths outside the canonical collections as well as the rulings of major late hadith masters on their isnāds. Ibn Hajar attempted a comparable feat for sahīh hadiths. He compiled a work called Zawā'id al-sunan al-arba'a mimmā huwa sahīh (Supplements [to the Sahīhayn] from what is Sahīh from the Four Sunan), but it seems not to have survived (sadly).76 The modern Yemeni scholar Muqbil b. Hādī al-Wādi'ī (d. 2001) performed a similar service in the modern period; in his al-Jāmi' al-sahīh mimmā laysa fī al-Sahīhayn he collected all the hadiths he deemed authentic but that are not found in al-Bukhārī's and Muslim's collections. Mega-collections Rather than collecting extra-canonical hadiths in manageable form, several late Sunni scholars attempted the more ambitious task of encompassing the whole hadith corpus in one book. The encyclopedic Shāfi'ī scholar of Egypt, Jalāl al-Dīn al-Suyūtī (d. 911/1505), sought to accomplish this after he had a dream in which the Prophet appeared to him and ordered him to 'Bring forth the Sunna! Bring forth the hadiths!'77 Al-Suyūtī attempted this in his Jam' al-jawāmi' (Consolidation of Compendia), also known as his Jāmi' al-kabīr. Tragically, al-Suyūtī died before he completed this work, having collected some 100,000 hadiths in his draft. What survived has been published in thirty volumes. In this work, the author synthesized the contents of all the hadith collections available to him alphabetically according to the beginning of the hadith (taraf) along with its isnād. The book stops about nine tenths of the way through the alphabet, never reaching hadiths describing the Prophet's actions. While still working on this massive compendium, al-Suyūtī took all the hadiths (10,031 in total) documenting Prophetic sayings (as opposed to actions), rated their authenticity (or most of them), and combined them in a one-volume work called al-Jāmi' al-saghīr. This work has become one of the most relied upon references for Muslim scholars not specializing in hadiths. Realizing he had omitted some mater-ial, al-Suyūtī penned an addendum entitled al-Ziyāda 'alā al-Jāmi' al-saghīr. The Indian scholar 'Alī b. 'Abd al-Malik Muttaqī (d. 975/1567) took the Jāmi' al-saghīr, added hadiths that al-Suyūtī had missed as well as hadiths describing the Prophet's actions and rearranged them all topically in his massive Kanz al-'ummāl fī sunan al-aqwāl wa al-af'āl (The Laborers' Treasure from the Spoken and Acted Sunna). The Egyptian 'Abd al-Ra'ūf al-Munāwī (d. 1031/1622) estimated that al-Suyūtī had only succeeded in exhausting two thirds of the extant Prophetic sayings and objected to the widespread belief that if a hadith was not in the Jāmi' al-kabīr it did not exist. In his al-Jāmi' al-azhar min hadīth al-nabī al-anwar, al-Munāwī therefore added in Prophetic sayings that al-Suyūtī had missed and also completed the work from where al-Suyūtī had left off (at man taraka ...).78 Other late scholars also complained about al-Suyūtī's omissions; the Moroccan Abū 'Alā' al-Fāsī (d. 1770–1) wrote in the margins of his copy of the Jāmi' al-kabīr over five thousand hadiths that al-Suyūtī had missed. Indices/Atrāf collections One of the most practical genres of books produced in the consolidation movement was that of atrāf. The taraf (pl. atrāf) of a hadith was the first section of the matn or its most prominent section. If a scholar knew the text of the hadith and had no other information about it, an index of hadiths arranged according to atrāf would be the easiest way to find it. An atrāf work listed the matn of the hadith and then provided all its various chains of transmission and the books in which they appear. As with other genres, atrāf collections took the Sahīhayn as the first subject. Abū Mas'ūd al-Dimashqī (d. 401/1010–11) and Khalaf al-Wāsitī (d. 400/1010) of Baghdad each wrote an atrāf work for the hadiths included in al-Bukhārī's and Muslim's collections, although their books were clearly not meant for people to use as accessible indices, since the works are organized along musnad lines and not alphabetically. The Mālikī scholar of Andalusia, 'Uthmān b. Sa'īd al-Dānī (d. 444/1053) also wrote an early atrāf of the hadiths in the Muwatta'.79 Ibn 'Asākir composed a more useful and ultimately widely copied atrāf work of the Five Book canon. Abū al-Fadl al-Maqdisī (d. 507/1113) wrote an atrāf book of the Six Books, but it was not widely used. Jamāl al-Dīn al-Mizzī (d. 742/1341) wrote a much more comprehensive atrāf of the Six Books (and several smaller, minor works) entitled Tuhfat al-ashrāf bi-ma'rifat al-atrāf (The Gem of the Noble for Knowing the Atrāf), which quickly became a mainstay for scholars. It contains 19,626 hadiths. Al-Mizzī's son-in-law, the famous Ibn Kathīr (d. 774/1373) (no doubt attempting to impress his in-laws), compiled his Jāmi' al-masānīd wa al-sunan al-hādī li-aqwam al-sunan, which added the atrāf of hadiths from the musnads of Ibn Hanbal, al-Mawsilī, al-Bazzār, the Mu'jam al-kabīr of al-Tabarānī, and the Ma'rifat al-sahāba of Abū Nu'aym al-Isbahānī. Ibn Hajar al-'Asqalānī's Ithāf al-mahara bi-atrāf al-'ashara listed all the atrāf of the hadiths that al-Būsīrī had included in his Ithāf al-khayyira (see above section on Supplemental Collections). Ahkām al-hadīth works This genre included many fewer and less voluminous works than those composed in other genres discussed here but has exercised a significant influence on Islamic scholarship. Ahkām al-hadīth, or 'the laws derived from hadith' collections, were books that listed hadiths regularly used in deriving Islamic law along with their ratings and the collections in which they are found. Ahkām al-hadīth works also often included discussions of the hadiths' legal implications. This genre seems to have arisen in imitation of ahkām al-Qur'ān works, which addressed the legal implications of Quranic verses. The first ahkām al-hadīth books are Ahkām of the Andalusian scholar Ibn al-Tallā' (d. 497/1104) and the Ahkām al-sughrā (Small Ahkām), al-Ahkām al-wustā (Medium Ahkām) and al-Ahkām al-kubrā (Large Ahkām) of the Andalusian jurist and hadith scholar Ibn al-Kharrāt al-Ishbīlī (d. 581/1185). The famously conservative Hanbali scholar of Jerusalem, 'Abd al-Ghanī al-Maqdisī (d. 600/1203), wrote the very influential 'Umdat al-ahkām (The Foundation of Rulings), which was expanded and commented on by the Egyptian Ibn Daqīq al-'Īd (d. 702/1302) in his Ihkām al-ahkām (Bolstering the Rulings), which consisted of five hundred legal hadiths taken from the Sahīhayn. The leading Hanbali scholar Majd al-Dīn b. Taymiyya (d. 653/1255, the grandfather of the controversial reformer Taqī al-Dīn b. Taymiyya) wrote the three- volume Muntaqā al-akhbār (Choice Reports), but the most influential ahkām al-hadīth book has been the Bulūgh al-marām min adillat al-ahkām (Reaching the Aspiration for the Proofs of Legal Rulings) of Ibn Hajar al-'Asqalānī. Ahkām al-hadīth books were written as references and teaching tools for Muslim scholars of religious law, but they became highly influential with the rise of the Salafī movements of revival and reform in the eighteenth century until today (see chapter 10). These movements encourage a return to the original sources of Islam and highlight the importance of hadiths in Islamic law and dogma. As a result, in many cities of the Muslim world cheap pocket-copies of Bulūgh al-marām can be found in book stores as popular references for Muslims' daily lives. Two influential Yemeni scholars of the early modern period, Muhammad b. al-Amīr al-San'ānī (d. 1768) and Muhammad b. 'Alī al-Shawkānī (d. 1834) devoted their commentaries, Subul al-salām sharh Bulūgh al-marām and Nayl al-awtār sharh Muntaqā al-akhbār, to the Bulūgh al-marām and al-Muntaqā respectively. These commentaries have become frequently used references and textbooks for the study of Islamic law today. QUOTING GOD: HADĪTH QUDSĪ Hadiths in which the Prophet quotes God's speech constitute a species of hadiths known as 'holy hadiths (hadīth qudsī).' Famous ones include God saying 'Spend [in charity], O son of Adam, and I will spend on you... (anfiq yā ibn Ādam unfiq 'alayk....).' Qudsī hadiths are distinguished from the Quran in that they are not considered to be the literal word of God. Only their meaning issues from God, while their wording comes from Muhammad. Muslims believe that they were not revealed via the intermediacy of the angel Gabriel, as the Quran was. Instead, the Prophet may have heard them during his Ascension to heaven (Mi'rāj), in a dream or through inspiration (ilhām). Several scholars authored collections of hadīth qudsī: Ibn 'Arabī's (d. 638/1240) expanded Forty Hadith collection, the Mishkāt al-anwār, consisted of 101 hadīth qudsī, and the Yemeni Ibn al-Dayba' (d. 944/1537) also devoted a book to this type of report.80 'Abd al-Ra'ūf al-Munāwī wrote a collection entitled al-Ithāfāt al-saniyya bi'l-ahādīth al-qudsiyya with 272 qudsī hadiths in it. Muhammad al-Madanī (d. 1786) added to that book, compiling a work with the same title that included some 863 hadiths. SUGGESTIONS FOR FURTHER READING The best Arabic editions of major Sunni hadith collections come from Tradigital's Encyclopaedia of Hadith, which includes the Six Books, the Muwatta', and the Musnad of Ibn Hanbal (in particular, Tradigital has produced critical editions of the Musnad and the Sunan of Ibn Mājah), and from the Dār al-Ta'sīl publisher in Cairo. For Sahīh Muslim, however, the most critical edition has been published by Muhammad Zuhayr al-Nāsir through Dār al-Minhāj. There are several translations of major Sunni hadith collections. These include Mālik b. Anas's Al-Muwatta of Imam Malik ibn Anas, trans. Aisha Bewley (London: Kegan Paul Intl., 1989); an excellent translation of the first chapters of Sahīh al-Bukhārī entitled Sahih al-Bukhari, trans. Muhammad Asad (Lahore: Arafat Publications, 1938); a full translation can be found in The Translation of the Meanings of Sahīh Bukhārī, trans. Muhammad Muhsin Khan (Riyadh: Darussalam, 1997); an abridgement of Muslim's Sahīh entitled Sahih Muslim, trans. Aftab Shahryar (New Delhi: Islamic Book Service, 2004); Abū Dāwūd's Sunan, trans. Ahmad Hasan (Lahore: Sh. Muhammad Ashraf, 1984); and the Sunan of al-Nasā'ī, Sunan Nasā'ī, trans. Muhammad Iqbal Siddiqi (Lahore: Kazi Publications, 1994); a selection of hadiths from al-Bukhārī's al-Adab al-mufrad entitled Moral Teachings of Islam: Prophetic Traditions from al-Adab al-Mufrad (Walnut Creek, CA: Altamira Press, 2003); al-Nawawī's famous Forty Hadiths, trans. Ezzeddin Ibrahim and Denys Johnson-Davies (Cambridge, UK: Islamic Texts Society, 1997); al-Tabrīzī's Mishkāt al-masābīh in five volumes, trans. James Robson (Lahore: Sh. Muhammad Ashraf, 1963). A selection of shamā'il have been translated into English by Muhammad Zaynū as al-Shamā'il al-muhammadiyya (Fairfax, VA: Institute of Islamic and Arabic Studies, 1995). The Riyadh publisher Dar al-Salam has published passable translations of the entire Six Book Sunni hadith canon. Dar al-Salam has also translated Ibn Hajar's famous ahkām al-hadīth collection, Bulūgh al-marām (Riyadh, 1996). Al-Nawawī's Riyād al-sālihīn is translated as The Gardens of the Righteous, trans. Muhammad Zafrulla Khan (London: Curzon Press, 1975). An Indian hadith scholar, Shāh 'Abd al-'Azīz (d. 1824), wrote a history of hadith literature from a Muslim perspective; it is published as The Gardens of Hadith Scholars, trans. Aisha Bewley (Santa Barbara, CA: Turath Publishing, 2007). Although it is part of the sīra genre and not hadith proper, the famous biography of the Prophet edited by Ibn Hishām has been translated: The Life of Mohammad, trans. A. Guillaume (New York: Oxford University Press, 1978). For discussions of the debates over writing hadiths and the import-ance of orality in early Islamic history, see Michael Cook's, 'The Opponents of the Writing of Tradition in Early Islam,' Arabica 44 (1997): 437–530; and Gregor Schoeler's The Oral and the Written in Early Islam, trans. Uwe Vagelpohl (New York: Routledge, 2006). For an excellent discussion about the importance of the isnād in Islam as a paradigm of connection, see William Graham's 'Traditionalism in Islam: An Essay in Interpretation,' Journal of Interdisciplinary History 23, 3 (1993): 495–522 and Garrett Davidson's Carrying on the Tradition: An Intellectual and Social History of Post-Canonical Hadith Transmission (Brill, 2018). For a study of hadith qudsī, see William Graham, Divine Word and Prophetic Word in Early Islam (The Hague: Mouton, 1977). For a study of the early transmission of hadiths, see Scott Lucas, Constructive Critics: H.adīth Literature and the Articulation of Sunnī Islam (Leiden: Brill, 2004). For a new study on hadith commentary, see Joel Blecher's Said the Prophet of God (University of California Press, 2018). ENDNOTES 1 Ibn 'Abd al-Barr, Jāmi' bayān al-'ilm wa fadlihi, vol. 2, p.36. 2 Muhammad Abū Zahra, Ibn Hanbal, p. 239. For the original quote, see 'Abdallāh b. Ahmad, Masā'il al-imām Ahmad Ibn Hanbal riwāyat ibnihi, p. 438; al-Makkī, Qūt al-qulūb, vol. 1, p. 177. 3 'Abdallāh al-Ghumārī, Tawjīh al-'ināya li-ta'rīf 'ilm al-hadīth riwāya wa dirāya, p. 7. 4 Shams al-Dīn al-Sakhāwī, Fath al-mughīth, vol. 4, p. 103. 5 Yahyā Ibn Ma'īn, Kitāb al-'ilal wa ma'rifat al-rijāl, p. 19. 6 Al-Sakhāwī, Fath al-mughīth, vol. 4, p. 103. 7 Ibn Hajar al-'Asqalānī, Fath al-bārī sharh Sahīh al-Bukhārī, vol. 11, p. 466. The Egyptian scholar 'Abd al-Ghanī b. Sa'īd (d. 409/1019) found four hadiths with four Companions narrating from one another in the isnād; ibid., vol. 13, p. 15. 8 Al-Sakhāwī, Fath al-mughīth, vol. 4, p. 103. 9 Hammām b. Munabbih, Sahīfat Hammām b. Munabbih. Scholars like Juynboll have questioned the historicity of Hammām b. Munabbih, since he would have had to have lived eighty or ninety years to play his supposed part in transmitting this sahīfa. But that is not an outrageously long lifespan, considering that St. Antony of Egypt (d. 365) lived to ninety-four. 10 Sunan Abī Dāwūd: kitāb al-'ilm, bāb fī kitāb al-'ilm. 11 Al-Khatīb al-Baghdādī, Taqyīd al-'ilm, p. 96. 12 Sunan Abī Dāwūd: kitāb al-'ilm, bāb fī kitāb al-'ilm. 13 Muhyī al-Dīn al-Nawawī, Sharh Sahīh Muslim, vol. 1, p. 357, al-Dhahabī, Siyar, vol. 3, p. 81. 14 Ibn Abī Hātim al-Rāzī, al-Jarh wa al-ta'dīl, vol. 6, p. 336. 15 Al-Khatīb, al-Jāmi', vol. 2, p. 85. 16 Ibn Sa'd, al-Tabaqāt al-kubrā, vol. 7, p. 448. 17 Sahīh al-Bukhārī: kitāb al-'ilm, bāb kayfa yuqbad al-'ilm; Nabia Abbott, Studies in Arabic Literary Papyri II: Qur'ānic Commentary and Tradition, vol. 2, p. 26. 18 Abū Khaythama Zuhayr b. Harb, Kitāb al-'ilm, p. 32; al-Khatīb, al-Jāmi', vol. 2, pp. 71, 78–79. 19 Ibid., vol. 2. p. 81. 20 Muhammad Abd al-Rauf, 'H.adīth Literature – I: The Development of the Science of H.adīth,' p. 273; Abū al-Hasan 'Alī al-Qābisī, Muwatta' al-imām Mālik. 21 Harald Motzki, 'The Mus.annaf of 'Abd al-Razzāq al-S.an'ānī as a Source of Authentic Ah.ādīth of the First Century A.H,' pp. 3–4. 22 Ibn Abī Hātim al-Rāzī, al-Taqdima, pp. 31–32. 23 Ibn Nuqta, Kitab al-Taqyīd li-ma'rifat ruwāt al-sunan wa al-masānīd, p. 161. For details on the numbers of hadiths in the Musnad, see Christopher Melchert, 'The Musnad of Ah.mad Ibn H.anbal,' pp. 32–51. 24 Musnad Ibn Hanbal, vol. 6, p. 269. 25 See Muhammad Abd al-Rauf, 'H.adīth Literature – I: The Development of the Science of H.adīth.' 26 Tāj al-Dīn al-Subkī, Tabaqāt al-shāfi'iyya al-kubrā, vol. 2, p. 221. 27 Ibn Hajar al-'Asqalānī, Huda al-sārī, p. 661. The number of chapters (kitāb) in al-Bukhārī's Sahīh varies depending on recension (riwāyāt) of the book, though the content remains the same. The recension of Abū Dharr al-Harawī, for example, has numerous chapters that only appear as subchapters (bāb) in others. The valuable copy made by al-Buqā'ī in the fifteenth century has seventy-three chapters, while the authoritative Sultāniyya-Amīriyya edition, printed by the Ottoman sultan in 1895, has only forty three. Editions today are based on the Dutch scholar AJ Wensinck's formatting of ninety-eight chapters. 28 Shams al-Dīn al-Dhahabī, Siyar a'lām al-nubalā', vol. 13, p. 279. 29 Sahīh Muslim: muqaddima, introduction. 30 Abū Dāwūd al-Sijistānī, 'Risālat al-imām Abī Dāwūd al-Sijistānī ilā ahl Makka fī wasf Sunanihi,' p. 46. 31 Qādī 'Iyād, Kitāb al-shifā, p. 153. 32 'Abdallāh b. Ahmad b. Hanbal, Kitāb al-sunna, p. 301; Muhammad Zāhid al-Kawtharī, Maqālāt al-Kawtharī, p. 404. 33 Ibn Hanbal, Kitāb fadā'il al-sahāba, vol. 2, p. 665. 34 Abū Zur'a al-Rāzī, Abū Zur'a al-Rāzī wa juhūduhu fī al-sunna al-nabawiyya, p. 2:674–676; Jonathan A. C. Brown, The Canonization of al-Bukhārī and Muslim, pp. 92–94. 35 Ibn Manda, Shurūt al-a'imma, pp. 67–68. 36 Ibn 'Asākir, Tārīkh madīnat Dimashq, vol. 58, p. 93. 37 Brown, The Canonization of al-Bukhārī and Muslim, p. 9. See also Brown, 'The Canonization of Ibn Majah: Authenticity vs. Utility in the Formation of the Sunni Hadith Canon,' Revue des mondes musulmans et de la Méditerranée 129, July (2011): 169–81. 38 Muhammad b. Idrīs al-Shāfi'ī, al-Risāla, pp. 42–43. 39 Brown, The Canonization of al-Bukhārī and Muslim, pp. 340–345. 40 Ibid., pp. 255–260. 41 Al-Dhahabī, Tadhkirat al-huffāz, vol. 3, pp. 50, 111. 42 Ibn Nuqta, al-Taqyīd li-ma'rifat ruwāt al-sunan wa al-masānīd, p. 123. 43 See Fuat Sezgin, Geschichte des arabischen Schrifttums, vol. 1, pp. 414–416. 44 Al-Dhahabī, Tadhkirat al-huffāz, vol. 3, p. 25. 45 Ibn al-Nadīm, The Fihrist, p. 560. 46 I thank my colleague Scott Lucas for this number. 47 Ibn al-Salāh, Muqaddimat Ibn al-Salāh, p. 307. 48 Muhammad b. 'Abd al-Karīm al-Rāfi'ī, al-Tadwīn fī akhbār Qazwīn, vol. 1, pp. 291, 452. 49 Al-Khatīb, Tārīkh Baghdād, vol. 4, pp. 293–294; al-Dhahabī, Mīzān al-i'tidāl fī naqd al-rijāl, vol. 1, pp. 511–512. 50 Brown, The Canonization of al-Bukhārī and Muslim, pp. 63–64. 51 Al-Rāfi'ī, al-Tadwīn fī akhbār Qazwīn, vol. 3, p. 131. 52 'Abd al-Rahmān b. Sulaymān al-Ahdal, al-Nafas al-yamānī, p. 63. 53 Muhammad b. Khayr al-Ishbīlī, Fahrasat mā rawāhu 'an shuyūkhihi, pp. 17 ff. See also Zayn al-Dīn al-'Irāqī, Al-Bā'ith 'alā al-khalās min hawādith al-qussās, p. 97. 54 Al-Nawawī, Sharh Sahīh Muslim, vol. 1, p. 119. Abū Tālib al-Makkī, Qūt al-qulūb, vol. 1, p. 137. 55 Al-Suhrawardī, 'Awārif al-ma'ārif, vol. 1, pp. 49, 60. 56 Ahmad al-Ghumārī, Al-Burhān al-jalī fī tahqīq intisāb al-sūfiyya ilā 'Alī, p. 3. 57 Al-Khalīlī, Al-Irshād fī ma'rifat 'ulamā' al-hadīth, p. 6. 58 Al-Khatīb, Jāmi' akhlāq al-rāwī wa ādāb al-sāmi', vol. 1, p. 205. 59 Al-Tabaranī, Al-Mu'jam al-saghīr, p. 116. 60 Al-Suyūtī, Jam' al-jawāmi', vol. 1, pp. 3–4. 61 Stefan Reichmuth, 'Murtad.ā al-Zabīdī (d. 1791) in Biographical and Autobiographical Accounts,' p. 75. The famous Sufi of Cairo, Shams al-Dīn al-Hanafī (d. 847/1443–4), also claimed to have had an isnād of two beings, one person and one jinn, to the Prophet; al-Sha'rānī, al-Tabaqāt al-kubrā, p. 438. 62 'Abdallāh al-Ghumārī, Tawjīh al-'ināya, p. 42. 63 Asma Sayeed, 'Shifting Fortunes: Women and H.adīth Transmission in Islamic History,' p. 277. 64 Brown, The Canonization of al-Bukhārī and Muslim, pp. 107–108. 65 See Ishaq, India's Contribution to Hadith Literature. 66 Abū Nu'aym al-Isbahānī, Dhikr akhbār Isbahān, vol. 1, p. 23. 67 Al-Wāsitī, Tārīkh Wāsit, p. 125. 68 Al-'Awd, Al-Mu'īn 'alā ma'rifat kutub al-arba'īn, p. 29. 69 Ibid., pp. 63, 153. 70 Ibid., p. 151. 71 Ibn al-Jawzī, Kitāb al-qussās wa al-mudhakkirīn, p. 146. 72 J. Robson, trans., Miskhat al-Masabih, vol. 1, p. xiii. 73 Al-Baghawī, Masābīh al-sunna, vol. 1, p. 2. 74 Ahmad al-Ghumārī, Al-Mudāwī li-'ilal al-Jāmi' al-saghīr, vol. 1, p.95. 75 Ibn Hajar al-'Asqalānī, Al-Matālib al-'āliya fī zawā'id al-masānīd al-thamāniya, vol. 1, p. 4. 76 Al-Suyūtī, Nazm al-'iqyān, p. 50. 77 Muhammad Nāsir al-Dīn al-Albānī, Sahīh al-Jāmi' al-saghīr, vol. 1, pp. 42–43; Najm al-Dīn al-Ghazzī, al-Kawākib al-sā'ira, vol. 1, pp. 228–9. 78 Al-Munāwī, Al-Jāmi' al-azhar min hadīth al-nabī al-anwar, vol. 1, p. 3. 79 Al-Kawtharī, Maqālāt, p. 173. 80 'Abd al-Rahmān b. Sulaymān al-Ahdal, Al-Nafas al-yamānī, p. 43. THE METHODS AND HISTORY OF HADITH CRITICISM INTRODUCTION: REPORTERS THEN AND NOW Arabic and English textbooks introducing Islamic methods of hadith criticism begin with presenting the complex technical vocabulary (mustalahāt) of hadith critics as it was formalized after the thirteenth century. These books assume that by learning this set of terms students will understand how hadith criticism operated in the early Islamic period when scholars like al-Bukhārī and Muslim were compiling their Sahīhs. In reality, however, the critical methods of early Muslim hadith scholars were diametrically opposed to this later, rigid description. Theirs was an intuitive and commonsense way of trying to determine whether a report could be reliably attributed to a source or not – a method not unlike those employed by modern investigative reporters. To set the stage for our study of how Muslims tried to sift reliable from unreliable 'reports' from the Prophet, let us imagine a journalist working for a newspaper today. If our reporter tells her editor that she has a major story about a senior political figure, the editor will ask her two questions: who is your source, and is your source corroborated? How could our reporter reply? She knows that certain sources are reliable for certain information. If the president's spokesperson announces that the president will make a visit to England, there is no need to double-check this information. Imagine, however, that the reporter has found a source who gives her rare and valuable information about an important issue but whom she as yet has no reason to trust. Our reporter is not going to stake her journalistic reputation on this one tip, but how does she determine the accuracy of her source's information? Imagine that this source tells her that there has just been an earthquake in China. Our reporter would call her contacts in China to confirm. If these contacts tell her that indeed a quake had occurred, the source has been proven correct. If no one she spoke to had noticed anything, the source's story would be uncorroborated and our reporter would conclude that the source was unreliable. Suppose that next the source tells our reporter valuable information about the condition of the country's economy. Again, our reporter proceeds cautiously, so she conducts thorough research and finds that the source's information was correct. The source provides tips on a few more stories, and after checking out the information, our reporter finds that these stories are true as well. Eventually our reporter concludes that this source is reliable, and if the source provides a tip on a hot story in the future, the reporter will feel comfortable writing her story based on the source's testimony alone. Reporters understand that the reliability of a source is based upon the accuracy of the information they provide. The best way to confirm the accuracy of a source is to check with other sources that have access to the same information and see if they agree. Corroboration 'is what turns a tip into a story.'1 These two pillars of modern journalism, the reliability of a source and determining the reliability of a source or story through corrobor-ation, are familiar to us all in our daily lives. We all know people who pass on information reliably and others who tend to forget, lie, or exaggerate. We all instinctively seek out corroboration and know when it matters and when it does not. If a student is absent for a day of class in university and hears from a classmate that the professor has changed the date of the final exam, he or she will not be content to take the word of just one classmate; the student will ask other students who were also in that class. If no other students heard the professor make that announcement, he or she will have serious doubts about the information. Another fact is equally evident to us in our daily lives: the contents of reports we hear have a strong influence on our view of their reliability and our confidence in their transmitters. If our reporter met a source who swore that he had seen a herd of flying elephants downtown, she would probably both disbelieve him and consider him unreliable from that point on. There are generally accepted standards of what is possible and impossible. Furthermore, we all have a sense of what is important information and what is not, and we treat this information accordingly. If our reporter hears a rumor that the president is about to announce a major change in the government's economic policy, she will want to verify this information before writing her story. If she hears that the president has changed his favorite dessert from ice cream to angel-food cake, she will probably be content to cite this information as is. We must remember, however, that such notions of what is possible or impossible, important or unimportant, are culturally determined, and as such they may differ with time and place. If, in 1990, a student had come to class holding a small device they claimed contained any piece of music, information or published material one could think of, the professor would have called them delusional. Today professors compete daily for attention with such devices. If a professor in the US claimed to have eaten a great dog meat dinner at a specialized dog meat restaurant, students would think this was a disgusting joke. But if the professor had just flown in from China, where dog meat has long been 'a minor but regular part of the diet' and where an annual dog meat festival is held, he might be telling the truth.2 While modern reporters are charged with determining the veracity of stories about what is happening in the world today on the basis of contemporary sources, the architects of the Islamic hadith tradition were faced with a more daunting task: they had to establish a system of distinguishing between true and false stories about a man who had lived over a century earlier and whose revered status cast a commanding shadow over the entire Islamic tradition. In this chapter we will discuss the origins, mechanics, and development of Sunni hadith criticism. We will divide its history into two periods: early hadith criticism, roughly 720–1000 CE, and later hadith criticism, from roughly 1000 CE to today. As in the previous chapter, notions of 'authenticity' and 'forgery' mentioned here refer to the judgment of Muslim scholars of hadith and not necessarily to that of modern Western historians. THE PROBLEM OF HADITH FORGERY The Prophet Muhammad is the single most dominant figure in the Islamic religious and legal tradition. From the time of his emigration to Medina to debates over Islam today, to disobey directly his established teachings has been to place oneself outside the Muslim community. Because the Prophet possessed such eminent authority, early Muslims looked to his legacy to support or legitimize their different schools of thought, beliefs, or political agendas. It seems that even during the Prophet's own lifetime he understood that people could misrepresent him. In one report, a man claiming to be the Prophet's representative established himself as the mayor of a small town in Arabia until the Prophet uncovered his hoax and punished him.3 The first crisis to afflict the Muslim community after the Prophet's death – the question of who would succeed him as religious and political leader – revolved around competing claims about the Prophet's words. The supporters of 'Alī b. Abī Tālib argued that the Prophet had announced him as his successor, while those who affirmed the successive caliphates of Abū Bakr, 'Umar, and 'Uthmān did not. In this and many other Islamic sectarian and political disagreements, all sides agreed on what the Prophet had said but disagreed on its implications. Both Sunnis and Shiites, for example, agreed that the Prophet had said that 'Alī was to him what Aaron was to Moses, but they disagreed on whether that meant that 'Alī should succeed the Prophet politically. Actually forging reports about the Prophet also quickly became a problem. When civil war broke out openly between 'Alī, then the fourth caliph to succeed the Prophet, and the then governor of Syria and future founder of the Umayyad dynasty, Mu'āwiya b. Abī Sufyān, both sides waged a propaganda war using the Prophet's words as ammunition. 'Alī's supporters falsely claimed that Muhammad had said, 'If you see Mu'āwiya ascend my pulpit, then kill him,' while Mu'āwiya's side countered by forging hadiths such as 'It is as if Mu'āwiya were sent as a prophet because of his forbearance and his having been entrusted with God's word' (Mu'āwiya had served as one of the Prophet's scribes).4 There are even reports from the early historian al-Madā'inī (d. 228/843) that Mu'āwiya encouraged the systematic forging and circulation of hadiths affirming the virtues of the other caliphs and Companions at 'Alī's expense.5 In light of how quickly the Prophet's legacy became a tool to be manipulated by vying parties among Muslims, we should not be surprised at the veritable slogan of Muslim hadith criticism. It is the most widely transmitted hadith in all of Islam, with Muslim scholars counting between sixty and a hundred Companions transmitting it from the Prophet: 'Whoever mispresents me intentionally, let him prepare for himself a seat in Hellfire.' During the lifetime of leading Companions like 'Umar b. al-Khattāb, 'Abdallāh b. Mas'ūd, or Anas b. Mālik, many of whom had been with the Prophet since his early days in Mecca, it was difficult to attribute something untrue to the Prophet without a senior Companion noticing. In fact, there are many reports documenting the Companions' vigilance against misrepresentations of the Prophet's legacy. 'Alī is quoted as requiring an oath from any Companion who told him a hadith from the Prophet that he himself had not heard.6 When the Companion Abū Mūsā al-Ash'arī told 'Umar that the Prophet had said that if you knocked on someone's door three times and they did not answer you should depart, 'Umar demanded that he find another Companion to corroborate the report.7 On a number of occasions after the Prophet's death, his wife Aisha objected to hadiths that other Companions related. She rejected 'Abdallāh b. 'Umar's statement that the Prophet warned mourners that a dead relative would be punished for his family's excessive mourning over him because she believed that it violated the Quranic principle that 'No bearer of burdens bears the burdens of another' (Quran 53:38).8 Sometimes she corrected Companions who had misunderstood what the Prophet had said. Abū Hurayra quoted the Prophet as saying that women, beasts and houses could be bad omens. When Aisha heard this she 'split in half in anger,' exclaiming that the Prophet had mentioned this, but only to explain that it was a pre-Islamic superstition condemned by the Quran.9 Abū Hurayra's extensive efforts at hadith collection in particular drew the ire and concern of some leading Companions. There is one report that 'Umar b. al-Khattāb told him, 'Indeed, I say let the Prophet's words alone or indeed I'll send you back to the lands of [your tribe] Daws!'10* Hadith forgery emerged as a blatant problem when the generation of Muslims who had known the Prophet well died off. With the death of the last major Companion, Anas b. Mālik, in Basra in 93/711 (the last Companion to die was Abū al-Tufayl 'Āmir b. Wāthila, who died between 100/718 and 110/728) lies about the Prophet quickly multiplied. It is especially in the generation of the Successors that we begin seeing notebooks (sahīfas) of hadiths, many supposedly narrated from Anas b. Mālik, filled with forged hadiths of a highly partisan or controversial nature.11 From that point onward the forgery of hadiths would be a consistent problem in Islamic civilization. The heyday of hadith forgery was the first four hundred years of Islamic history, when major hadith collections were still being compiled. As we discussed in the last chapter, by the late 1100s any hadith that entered circulation that had not already been recorded in some existing book was automatically deemed a forgery. In the great urban centers of Mamluk Cairo or Ottoman Istanbul in the fourteenth and fifteenth centuries, the masses might mistakenly think that a popular saying such as 'The Muslim community is sinful but its Lord is most forgiving (umma mudhniba wa rabb ghafūr)' was said by the Prophet, but in general hadith forgery had run its course.12 Political and sectarian conflicts were a major engine for hadith forgery. All the major political conflicts in classical Islamic history were accompanied by hadiths forged for propagandistic purposes. The Prophet's access to knowledge of the future provided endless possibilities in this realm. In one hadith, the Prophet supposedly tells his uncle 'Abbās, progenitor of the Abbasid dynasty, to look at the stars. The Prophet foretells, 'From your descendents a number like the number of the Pleiades will rule the Muslim community.'13 In one forged pro-Shiite hadith, the Prophet predicts that 'al-Husayn will be killed sixty years after my emigration to Medina,' referring to the Umayyad caliph's massacre of the Prophet's grandson at Karbala in 61/680.14 We have seen already that even in the twelfth century, an opponent of the Seljuq Turkish sultan Sanjar forged a hadith in which the Prophet predicted that, 'Sanjar will be the last of the non-Arab kings; he will live eighty years and then die of hunger.'15 In fact, in the early 1990s one Arab scholar claimed that he had found an old manuscript with a hadith predicting that 'A leader whose name is derived from the word "tree" (Bush, perhaps?) will invade and liberate a small hill fort (in Arabic, 'Kuwait').'16 Many hadiths were also forged in legal and theological debates. Here the Sunni/Shiite schism once again has certainly produced the largest numbers of propagandistic hadiths. Less well-known conflicts have also yielded countless forgeries. In the first half of the ninth century, when the Abbasid caliphate was trying to impose its rationalist beliefs on Sunni scholars like Ibn Hanbal by torturing or imprisoning anyone who would not uphold the belief that the Quran was God's created word and not an eternal part of His essence, pro-Sunni hadiths conveniently appeared in which the Prophet said, 'Whoever dies believing the Quran is created will meet God on Judgment Day with his head up his ass.' In eighth-century debates over whether Muslims could wear pants as opposed to robes, a hadith appeared in which the Prophet said, 'O people, take pants as clothing, for indeed they are the most modest of clothes, especially for your women when they leave the house.'17 As legal schools solidified and competed with one another, forged hadiths appeared with statements such as 'There will be in my community a man named Abū Hanīfa, and he will be its lamp ... and there will be in my community a man named Muhammad b. Idrīs [al-Shāfi'ī] whose strife is more harmful than that of Satan.' 18 Hadiths were forged to give voice to all sorts of chauvinisms. Some were virulently racist, such as a forged hadith saying 'The black African, when he eats his fill he fornicates, and when he gets hungry he steals (al-zanjī idha shabi'a zanā wa idhā jā'a saraqa).'19 Others voiced civic pride, such as the hadith '[The city of] Askalon [near modern-day Gaza] is one of the two Brides, from there God will resurrect people on the Day of Judgment ('Asqalān ihdā al-'arūsayn ...)' or a whole Forty Hadith collection that one Ahmad b. Muhammad al-Marwazī (d. 323/934–5) forged about the virtues of the Iranian city of Qazvin.20 Another major source of forged hadiths was the popular storytellers (qāss, pl. qussās) who entertained crowds on the streets of metropolises like Baghdad. These storytellers would attribute Jewish, Christian, or ancient Persian lore to the Prophet. In one fantastic story, someone named Ishāq b. Bishr al-Kāhilī from Kufa told of the Prophet meeting an old man in the desert. The man claimed to be named Hāma, the great-grandson of Satan, and to have been alive since the days of Cain and Abel. In an account resembling a Rolling Stones song, he proceeds to tell Muhammad how he had met all the great prophets, from Noah to Jacob and Joseph. Moses had taught him the Torah, and Jesus had told him to convey his greetings to Muhammad, the messenger to come.21 A surprisingly large number of hadiths were forged and circulated by pious Muslims in an effort to motivate those around them both religiously and morally. One Abū 'Isma was asked by his contemporaries to explain how the hadiths he narrated from 'Ikrima, the disciple of the Companion Ibn 'Abbās, about the virtues of reading different chapters of the Quran, were not narrated by any of 'Ikrima's other students. He replied that he had seen the people becoming obsessed with the legal scholarship of Abū Hanīfa and the Sīra of Ibn Ishāq. He had forged these hadiths to try and steer people once again towards the Quran.22 Many of those who forged hadiths for these pious purposes were themselves revered saintly figures. The famous hadith critic Yahyā b. Sa'īd al-Qattān (d. 198/813) once said, 'I have not witnessed lying [about the Prophet] in anyone more than I have seen it in those known for asceticism and piety.'23 A venerated saint of Baghdad, Ghulām Khalīl, was so beloved that on the day he died in 275/888–9 the markets of the city shut down. Yet when he was questioned about some dubious hadiths he narrated concerning righteous behavior, Ghulām Khalīl replied, 'We forged these so that we could soften and improve the hearts of the populace.'24 Certainly pious figures such as Ghulām Khalīl or the scholars of religious law understood the enormity of the sin of lying about their Prophet. How could they have contradicted their own mission of preserving his authentic teachings by doing so? Pious figures sometimes replied that the Prophet had forbidden the Muslims to lie about him, whereas they were lying for him. In the case of those early jurists who forged legal hadiths to support their school of law, it seems that they saw no contradiction between their actions and their commitment to preserving the Prophet's teachings. After all, as one famous hadith put it, 'The scholars are the inheritors of the prophets (al-'ulamā' warathat al-anbiyā').' It was the scholars who interpreted the message of Islam as it faced new challenges and circumstances. Phrasing their conclusions about proper acts or beliefs in the formula of 'the Prophet said ...' was simply neatly packaging their authority as Muhammad's representatives. As one early jurist explained, 'When we arrived at an opinion through reasoning we made it into a hadith.'25 Hadith critics, of course, found such excuses reprehensible.26 Not all forgery of hadiths was a malicious act. Early transmitters sometimes confused the opinions or statements of Companions with Prophetic hadiths, such as a rule expounded by numerous Companions: 'Ward off capital punishment from the Muslims as much as possible, and if there is some way out of it then let the person go, for it is better for the judge to err in mercy than in severity,' which some casual transmitters attributed to the Prophet. Sometimes the comments of one of the hadith's transmitters could be accidentally written as part of the hadith, a phenomenon that Muslim critics called idrāj (interpolation). Often the words of scholars or saintly figures or simply popular sayings could be accidentally elevated to the status of Prophetic hadiths. The saying 'The love of the earthly life is the start of every sin (hubb al-dunyā ra's kull khatī'a)' was generally attributed to Jesus until it became confused with a Prophetic hadith.27 A legal principle used by Muslim jurists, 'Necessities render the forbidden permissible (al-darūriyyāt tubīhu al-mahzūrāt)' was also accidentally attributed to Muhammad.28 In the ninth century a hadith appeared saying 'Beware of flowers growing in manure, namely a beautiful woman from a bad family (iyyākum wa khadrā' al-diman ...).' In this period another supposed hadith surfaced that 'Whoever says something then sneezes, what he says is true (man haddatha hadīthan fa-'atasa 'indahu fa-huwa haqq).' Neither report had any basis in Prophetic hadiths.29 Forgery of Isnāds Hadith forgery was not limited to inventing Prophetic sayings or attributing existing maxims to Muhammad. In light of the importance of the isnād to accessing authority in the Islamic tradition, isnād for-gery was arguably more common than matn forgery. Equipping existing hadiths with one's own isnāds or constructing entirely new chains of transmission was known as 'stealing hadiths (sariqat al-hadīth)' or 'rigging isnāds (tarkīb al-asānīd).' Figure 3.0 Types of Errors and Forgery in Hadiths Today no one would look askance at someone who cited a hadith without mentioning its isnād. In the early Islamic period, however, ahl al-hadīth scholars or those who debated them could not cite a hadith without providing their own isnād for the report. A scholar who had heard about a hadith without a firm isnād or from a transmitter considered unreliable by the ahl al-hadīth critics could thus not credibly present his hadith in any discussion. Forging a new isnād offered a solution. 'Amr b. 'Ubayd (d. 144/761), who belonged to the Muslim rationalist camp known as the Mu'tazilites, whom the ahl al-hadīth considered their mortal enemies, was thus attacked for lying in his narration of the hadith 'He who carries weapons against us [Muslims] is not one of us (man hamala 'alaynā al-silāh fa-laysa minnā)' from his teacher al-Hasan al-Basrī, from the Prophet. This hadith was well known as authentic among the ahl al-hadīth. The problem was that al-Hasan had not actually transmitted this from the Prophet. 'Amr b. 'Ubayd had heard of the report somewhere else and then tried to use it to support the Mu'tazilite position that committing grave sins assured Muslims a place in hell. But he did not have his own isnād for it. So he manufactured one from his teacher al-Hasan so that he could use it in debates.30 The second major motivation to forge an isnād for an existing hadith was to bolster its reliability by increasing evidence of its transmission. According to the great hadith critic of Baghdad, al-Dāraqutnī (d. 385/995), a whole notebook of hadiths praising human reason ('aql) was forged by Maysara b. 'Abd Rabbihi. This book was then taken by Dāwūd al-Muhabbir, who equipped the reports with his own new isnāds. One 'Abd al-'Azīz b. Abī Rajā' then stole these hadiths and provided them a new set of isnāds. Sulaymān b. 'Īsā al-Sinjarī then did the same. A person who came across the hadiths in this book therefore could find four different sets of isnāds leading to four different scholars for hadiths that were in fact total forgeries.31 Especially in the tenth century and afterwards, when rare and elevated isnāds assumed a particular value among hadith collectors, disingenuous scholars could forge isnāds with these characteristics. We already saw the hadith that al-Tabarānī (d. 360/971) narrated via the impossibly short isnād of three people to the Prophet: Ja'far b. Hamīd al-Ansārī 'Umar b. Abān Anas b. Mālik the Prophet. The fact that al-Tabarānī was the only hadith scholar to narrate from the transmitter Ja'far b. Hamīd strongly suggests that this Ja'far might have been a purveyor of forged elevated isnāds, which a collector like al-Tabarānī would have found irresistible. THE DEVELOPMENT OF EARLY SUNNI HADITH CRITICISM – THE THREE-TIERED METHOD As false attributions to the Prophet multiplied in the late seventh century, how were those Muslims who sought to preserve Muhammad's authentic legacy to distinguish between true and forged hadiths? While the ahl al-ra'y scholars in Iraqi cities like Kufa attempted to rise above the flood of forged hadiths by depending on the Quran, well-established hadiths, and their own legal reasoning, the school that would give birth to the Sunni tradition, the ahl al-hadīth, evolved the three-tiered approach to determining the authenticity of a hadith. The first tier was demanding a source (isnād) for the report, the second evaluating the reliability of that source, and the third seeking corroboration for the hadith. The processes of this three-tiered critical method did not emerge fully until the mid eighth century with critics like Mālik b. Anas and Shu'ba b. al-Hajjāj. Certainly, Successors like al-Zuhrī and even Companions had examined critically material they heard attributed to the Prophet. Moreover, the critical opinions of Successors would inform later hadith critics. A formalized system of requiring isnāds and investigating them according to agreed conventions and through a set of technical terms, however, did not appear until the time of Mālik. STEP ONE: THE ISNĀD The isnād, or 'support,' was the essential building-block of the hadith critical method. So essential would the isnād be to the Sunni science of hadith criticism that it became the veritable symbol of the 'cult of authenticity' that is Sunni Islam. One of the most oft-repeated slogans among hadith critics comes from the famous scholar Ibn al-Mubārak (d. 181/797), who said, 'The isnād is part of religion, if not for the isnād, whoever wanted could say whatever they wanted. But if you ask them, "Who told you this?" they cannot reply.' The great jurist al-Shāfi'ī provided a similarly famous declaration, 'The person who seeks knowledge without an isnād, not asking "where is this from?" indeed, he is like a person gathering wood at night. He carries on his back a bundle of wood when there may be a viper in it that could bite him.' Sunnis thus understood the isnād as the prime means of defending the true teachings of the Prophet against heretics as well as protection from subtle deviations that might slip into Muslims' beliefs and practice.32 Figure 3.1 Generations of Sunni Hadith Critics The origins of the isnād were as commonsense as its function, beginning with the rise of hadith forgery. As the Successor Muhammad b. Sīrīn (d. 110/729), a leading student of the Companion Anas b. Mālik, explained: In the early period no one would ask about the isnād. But when the Strife [most probably the Second Civil War, 680–692CE] began they would say 'Name for us your sources' so that the People of the Sunna (ahl al-sunna) could be looked at and their hadiths accepted, and the People of Heresy (ahl al-bid'a) could be looked at and their hadiths ignored.33 In the milieu of the early Islamic period, simply demanding an isnād for reports attributed to the Prophet was an excellent first line of defense against inauthentic material entering Muslim discourse. We can imagine the newly Muslim inhabitants of Kufa, still clinging to Christian or Zoroastrian lore, or even Bedouins eager to insinuate tribal Arab values into Islam, ascribing a saying to the Prophet as evidence for their ideas. If they provided no isnād at all, the reports would not enter the musnad collections of scholars like Abū Dāwūd al-Tayālisī. The formative critic Shu'ba b. al-Hajjāj (d. 160/776) is quoted as saying, 'All religious knowledge ('ilm) which does not feature "he narrated to me" or "he reported to me"[the components of the isnād] is vinegar and sprouts.'34 STEP TWO: RATING TRANSMITTERS AND ESTABLISHING CONTIGUOUS TRANSMISSION On their own, however, isnāds could not deter a determined forger. As we saw with the hadiths on human reason, an isnād could be made up or inauthentic material simply equipped with one and then circulated. Moreover, merely requiring someone to provide a source for a hadith they cited did not tell you if that source was reliable. The second tier of criticism thus involved identifying the individuals who constituted isnāds, evaluating their reliability, and then determining if there were any risks that someone unreliable might also have played some part in transmitting the report. 1) Transmitter Evaluation A hadith transmitter was evaluated according to two criteria. First, his or her character, correct belief, and level of piety were scrutinized in order to determine if he or she was 'upright ('adl).' Second, and much more importantly, the transmitter's corpus of reports and narration practices were evaluated to decide if he or she was 'accurate (dābit).' Hadith transmitter criticism (known as al-jarh wa al-ta'dīl, 'impugning and approving') and isnād evaluation began in full with the first generation of renowned hadith critics, that of Shu'ba b. al-Hajjāj, Mālik b. Anas, Sufyān al-Thawrī, al-Layth b. Sa'd, and Sufyān b. 'Uyayna, who flourished in the mid to late eighth century in the cities of Basra, Kufa, Fustat (modern-day Cairo), Mecca, and Medina (see Figure 3.1). These scholars began the process of collecting people's hadith narrations and examining both their bodies of material and their characters to determine if the material they purveyed could be trusted. Mālik is the first scholar known to have used technical terms such as 'thiqa (reliable)' to describe these narrators, while Shu'ba's evaluations did not utilize any specialized vocabulary.35 The evaluations of this first great generation were studied and added to by their students, especially the two great Basran critics 'Abd al-Rahmān b. Mahdī (d. 198/814) and Yahyā b. Sa'īd al-Qattān (d. 198/813). The later analyst Shams al-Dīn al-Dhahabī notes that 'whoever they both criticize, by God, rarely do you find that criticism refuted [by others], and whoever they both agree on as trustworthy, he is accepted as proof.'36 The critical methods and opinions of Ibn Mahdī and al-Qattān passed on to their three most respected students, who can be seen as the beginning of the heyday of Sunni hadith criticism: Ibn Hanbal (d. 241/855) and his friend Yahyā b. Ma'īn (d. 233/848) in Baghdad and 'Alī b. al-Madīnī in Basra (d. 234/849). Their students refined hadith criticism into its most exact and lasting form: the 'Two Shaykhs' al-Bukhārī and Muslim, the two senior critics of Rayy (modern Tehran), Abū Zur'a al-Rāzī (d. 264/878) and his friend Abū Hātim al-Rāzī (d. 277/890), as well as influential younger critics of that generation such as al-Nasā'ī (d. 303/916). The 900s saw several generations of critics who reviewed and reassessed the judgments of these earlier scholars and also continued to evaluate those involved in the ongoing transmission of hadiths: Ibn Abī Hātim al-Rāzī (d. 327/938), Ibn 'Adī (d. 365/975–6), Ibn Hibbān al-Bustī (d. 354/965), Abū al-Hasan al-Dāraqutnī (d. 385/995), and al-Hākim al-Naysābūrī (d. 405/1014). Although the apex and most active period of hadith transmitter criticism is usually considered to be the eighth to tenth centuries, subsequent generations of critics contributed to this science as well. Hadiths were still transmitted with full isnāds into the early 1200s, so it was possible until that time for previously unrated hadiths to be in circulation among transmitters. Master hadith scholars like al-Khatīb al-Baghdādī (d. 463/1071) and Ibn 'Asākir (d. 571/1176) therefore continued to rate transmitters living in their times. Furthermore, they synthesized, reconciled, and reexamined existing opinions on earlier transmitters. This reconsideration of earlier transmitters' standing has, in fact, never really ended. If we look at al-Dhahabī's list of the expert critics whose opinions should be heeded, we find that it continues until al-Dhahabī's own time in the 1300s. One of the most commanding critics in the Sunni hadith tradition, 'the Hadith Master (al-hāfiz)' Ibn Hajar al-'Asqalānī, died in 852/1449. Hadith transmitter criticism has continued until the modern day. This is possible because, as we shall see, determining if someone was reliable or not had little to do with any personal experience with their character, its flaws, or fine qualities. Ultimately, it was the analysis of the body of their transmissions for corroboration that determined their accuracy (dabt) and thus their station. How would a hadith critic such as Shu'ba, al-Bukhārī, or Ibn 'Adī actually evaluate a transmitter? First, it was essential to know who this transmitter was. If one was presented with a hadith transmitted from 'someone,' 'Ahmad,' or 'a group of people in Medina,' how could one evaluate the strength of its isnād? By the mid 800s it had become accepted convention among hadith critics that a person needed two well-known transmitters to identify him sufficiently, prove that he existed and narrate hadiths from him in order to qualify for rating. Otherwise, the transmitter would be dismissed as 'unknown (majhūl)' and the report automatically considered unreliable. Second, the critic would collect all the reports that the transmitter had narrated from various teachers and then analyze them for corroboration, a process known as 'consideration (i'tibār).' As mentioned last chapter, musnads would be very useful for this task, but ultimately a critic would have to rely on a robust memory in order to recall all the different isnāds in which the transmitter in question played some part. For every hadith that the transmitter narrated from a certain teacher, the critic asks 'Did this teacher's other students narrate this report too?' If the critic finds that, for all the teachers that the transmitter narrates from, his fellow students corroborated him for a very high percentage of his hadiths, then he is considered to be reliable in his transmissions. When asked what kind of transmitters should be abandoned as unreliable, Shu'ba explained: Someone who narrates excessively from well-known transmitters what these well-known transmitters do not recognize, his hadiths are cast aside. And if he makes a lot of mistakes, his hadiths are cast aside. And if he is accused of forgery (kadhib), his hadiths are cast aside. And if he narrates a hadith that is agreed upon as an error, and he does not hold himself accountable for that and reject the report, his hadiths are cast aside.37 Muslim b. al-Hajjāj describes the telltale signs of a weak hadith transmitter as someone who, 'when his narrations are compared with those of people known for preservation [of hadith] and uprightness of character, his narrations do not concur with their narrations, or do so only rarely. If the majority of his hadiths are like that then he is rejected and not used in hadith.'38 Early hadith critics understood very well that no one transmitter was immune from error. Below the level of master transmitters, Ibn Mahdī described a lesser type of narrator 'who makes errors but most of his hadiths are sahīh. This kind of person's hadiths should not be abandoned, for if they were, all the people's hadiths would disappear.'39 Finally, the critic would examine the transmitter's character, religious beliefs, and piety in order to determine his 'uprightness ('adāla).' Although later legal theorists would establish very formal requirements for someone to be declared 'upright,' such as the requirement widely accepted by Sunnis after the 1200s that the transmitter be 'Muslim, of age, of sound mind, free of sinful behavior and defects in honor,' early hadith critics were actually very flexible with determining uprightness. This is most evident in the issue of transmitters who espoused beliefs that Sunnis considered heretical, such as Shiism, belonging to the Kharijite sect, or a belief in free will (qadar). Although al-Shāfi'ī had declared that one could accept hadiths from transmitters regardless of their sectarian affiliations as long as they did not belong to certain Shiite sects that allowed lying, by the mid 900s scholars like Ibn Hibbān had declared a consensus among Sunni hadith critics that one could accept hadiths from any heretical transmitter provided he was not an extremist and did not actively try to convert others to his beliefs. In theory, this meant that one could accept hadiths from Shiite transmitters as long as they did not engage in virulently anti-Sunni practices such as cursing Abū Bakr or 'Umar or transmit hadiths that seemed to preach the Shiite message. In truth, however, early hadith critics did not follow these strictures. As the eighteenth-century Yemeni hadith analyst Ibn al-Amīr al-San'ānī (d. 1768) observed, later theorists had set up principles that did not apply to the realities of early hadith criticism. Al-Bukhārī, the most revered of all hadith critics, narrated two hadiths in his famous Sahīh through the Kharijite 'Imrān b. Hittān, who was so extreme in his beliefs that he wrote a poem praising the Kharijite who murdered the fourth caliph 'Alī. In his Sahīh, Muslim narrated the hadith that 'Only a believer loves 'Alī, and only a hypocrite hates him' through the known Shiite transmitter 'Adī b. Thābit. As we can see, the two uncontested masters of Sunni hadith criticism could narrate hadiths that they considered authentic through extremists and heretics who proselytized for their cause! The explanation for this lies in the priorities of the early hadith critics. Simply put, if a transmitter consistently and accurately passed on hadiths he had heard from the previous generation, hadith critics had little interest in his beliefs or practice. Ibn Ma'īn described the Shiite transmitter 'Abd al-Rahmān b. Sālih as 'trustworthy, sincere, and Shiite, but who would rather fall from the sky than misrepresent half a word.'40 One major early hadith transmitter, Ismā'īl b. 'Ulayya (d. 193/809), became so shamefully intoxicated on one occasion that he had to be carried home on a donkey. Yet he was a reliable transmitter, so his hadiths were accepted.41 Although later theorists of the hadith tradition would talk of the two pillars of reliability as 'uprightness ('adāla) and accuracy (dabt),' al-San'ānī rightly pointed out that one should reorder them 'accuracy and uprightness,' since the former greatly outweighed the latter.42 Ultimately, Sunnis could not escape their dependency on the role of 'non-Sunnis' in hadith transmission. The early critic Ibn Sa'd (d. 230/845) notes how one Khālid al-Qatwānī was a staunch Shiite but that hadith scholars 'wrote down his hadiths out of necessity.'43 Without such 'heretics,' critics knew that few hadiths would ever have been transmitted. Guaranteeing the transmitter's 'uprightness ('adāla),' however, did have an important function. Regardless of a transmitter's accur-acy, if they were known to have intentionally misrepresented the Prophet or forged a hadith then they could not be trusted. Sulaymān b. Dāwūd al-Shādhakūnī (d. 234/848–9), for example, was considered to have the most prodigious memory of hadiths in his time and one of the biggest hadith corpora. Yet he was known to have lied about hadiths and altered them to fit certain situations, so he was excluded from transmission. Al-Shādhakūnī was so untrustworthy that when he awed a gathering by claiming that he knew a hadith from Rayy that Abū Zur'a al-Rāzī did not know, people believed that he had just made it up on the spot to impress them.44 Although in the eighth and ninth centuries each hadith critic used slightly different and sometimes shifting terms to describe a transmitter's level of reliability, by the early tenth century a conventional jargon had emerged. Ibn Abī Hātim al-Rāzī (d. 327/938) lists the levels as: 1. 'Reliable' (Thiqa, mutqin, thabt) transmitter's hadiths can be used as proof in legal scholarship with no hesitation 2. 'Sincere' (sadūq, lā ba's bihi) transmitter's hadiths are recorded and can be taken as proof if bolstered or corroborated 3. 'Venerable' (shaykh) 4. | 'Righteous' (sālih) | transmitter's hadiths are ---|---|--- 5. | 'Lenient on hadith' (layyin al-hadīth) | used for identifying 6. | 'Not strong' (laysa bi-qawī) | corroboration depending 7. | 'Weak' (da'īf) | on strength 8. 'Liar, abandoned' (matrūk al-hadīth, dhāhib al-hadīth, kadhdhāb) the transmitter's hadiths are not used at all.45 Books of transmitter criticism Hadith transmitter criticism often took place in discussion sessions among critics or with their students, but its results were set down by master critics in dictionaries of transmitter evaluation (kutub al-rijāl). Early works include the Tabaqāt al-kubrā (The Great Book of Generations) of Ibn Sa'd (d. 230/845), the Ahwāl al-rijāl (Conditions of the Transmitters) of al-Jūzajānī (d. 259/873), the massive 'Great History (al-Tārīkh al-kabīr)' of al-Bukhārī, and the Jarh wa al-ta'dīl of Ibn Abī Hātim al-Rāzī. Some books focused specifically on discussing transmitters whom the author felt were reliable; these included al-'Ijlī's (d. 261/875) Tārīkh al-thiqāt and Ibn Hibbān's Kitāb al-thiqāt. Voluminous books were devoted to listing and discussing weak transmitters as well. The most important are the Kitāb al-du'afā' al-kabīr of al-Bukhārī (now lost), the Kāmil fī du'afā' al-rijāl of Ibn 'Adī and Ibn Hibbān's Kitāb al-majrūhīn. Such works presented critics' opinions of a transmitter along with a selection of the unacceptable narrations that they transmitted. Because they consistently evaluated the reliability of personalities they mention, local histories like al-Khatīb's History of Baghdad are also works of transmitter criticism. In the period of consolidation and analysis from the 1300s to the 1600s, later critics amalgamated and digested these earlier works of hadith criticism. 'Abd al-Ghanī al-Maqdisī (d. 600/1203) wrote his al-Kamāl fī ma'rifat asmā' al-rijāl (The Perfection in Knowing the Names of Transmitters), presenting earlier descriptions and evaluations of all the transmitters in the Six Books. Jamāl al-Dīn al-Mizzī (d. 742/1341) added to this work and further analyzed the ratings of the transmitters within the Six Books in his Tahdhīb al-kamāl (The Refinement of Perfection), published today in thirty-five volumes. Ibn Hajar al-'Asqalānī produced an abridgement of this work with his own comments entitled Tahdhīb al-tahdhīb (The Refinement of the Refinement). Scholars like the Egyptian Ibn al-Mulaqqin (d. 804/1401) added the transmitters found in other hadith collections such as the Musnads of Ibn Hanbal and al-Shāfi'ī as well as the Sahīh of Ibn Khuzayma and the Mustadrak of al-Hākim to expanded versions of al-Mizzī's book. The Hanafī scholar of Cairo, Badr al-Dīn al-'Aynī (d. 855/1451), devoted a rijāl work to the transmitters in al-Tahāwī's collections. Other later analysts focused on the subject of weak transmitters. Shams al-Dīn al-Dhahabī wrote his masterful Mīzān al-i'tidāl fī naqd al-rijāl (The Fair Scale for Criticizing Transmitters), collecting all the information on any transmitter impugned by earlier figures. Ibn Hajar added his own comments in a revision of this work, Lisān al-mīzān (The Pointer of the Scale). As we saw in the last chapter, the isnāds to hadith books could affect the reliability of hadiths in them, especially during the ninth and tenth centuries. Scholars like Ibn Nuqta of Baghdad (d. 629/1231) therefore wrote books of transmitter criticism addressing the people who conveyed books from their authors. Ibn Nuqta's al-Taqyīd fī ma'rifat ruwāt al-sunan wa al-masānīd and Abū 'Alā' al-Fāsī's (d. 1770) addendum to that book are examples of this genre. Reconciling disagreements among critics With the plethora of transmitter critics from the eighth century on, how was a later critic or analyst supposed to know whose opinion to take on the reliability of a narrator or a hadith? Ibn Ishāq (d. 150/767), for example, the author of the famous biography of the Prophet, was a very controversial figure. Mālik, Ibn al-Qattān, Ibn Hanbal, and others considered him highly unreliable because he accepted hadiths from questionable narrators as well as Christians and Jews. But Shu'ba felt he was impeccably reliable, 'Alī b. al-Madīnī named him one of the pivots of hadith transmission in his age, and all the Six Books except Sahīh al-Bukhārī relied on him as a narrator. Certainly, this created a great potential for disagreement over the reliability of transmitters and, hence, of hadiths themselves. To a certain extent, such disagreement was the inevitable result of the complicated careers of transmitters and the contrasting critical thresholds of the many individual analysts examining them and their reports. One critic could change his mind about a transmitter, as al-Bukhārī did when he reduced Muhammad b. Humayd al-Rāzī's rating from 'good' to 'weak.' As the hadith scholar al-Ismā'īlī (d. 371/981) noted, critics often rated transmitters in relation to certain of their teachers. So a critic might describe a transmitter positively in one place and negatively in another.46 In general, however, later analysts erred on the side of caution and operated on the principle that 'criticism supersedes approval provided that the reason for the criticism is provided.' There were limits to this, however. Scholars who had personal vendettas against one another – Mālik's criticism of Ibn Ishāq was the result of a well-documented personal feud between them – were not accepted as fair critics of one another. Later analysts were often aware of such issues and took earlier critics' idiosyncrasies and personal leanings into consideration. Al-Jūzajānī was known to have a vehement dislike for Shiism, so any rejection by him of a transmitter as 'a heretical Shiite' was probably an overstatement. If he approved of a transmitter, however, it meant that he was certainly free of any Shiite tendencies. Abū Hātim al-Rāzī was well known as a very stringent critic – even the seminal legal and hadith scholar al-Shāfi'ī had only merited a 'sincere (sadūq)' rating with him. Ibn Ma'īn was very harsh – once calling a narrator who criticized a Companion a 'sucker of his mother's clitoris' – so his approval carried great weight.47 Ibn 'Adī was generally very objective. He would limit his evaluations to strict examinations of transmitters' hadiths for corroboration or its absence. As a result, he would often overturn the disapproval of an earlier critic with a comment such as 'I have not found uncorroborated reports among his hadiths.' The standing of the companions The Companions of the Prophet achieved a unique place in the worldview of Sunni hadith critics. Although some early historians and transmitters like al-Wāqidī (d. 207/822–3) only considered those who reached adulthood during the lifetime of the Prophet to be Companions, the definition that became accepted by Sunnis was much less strict.48 As al-Bukhārī notes in his Sahīh, a Companion is anyone who saw the Prophet, even for a moment, while a believer and who then died as a Muslim.49 This had tremendous consequences for hadith transmission, for by 900 CE Sunnis considered that all the Companions of the Prophet were automatically 'upright ('adl).' This belief was based on Quranic verses such as 'You are the best community brought out for humanity (kuntum khayr umma ukhrijat li'l-nās)' (Quran 3:110) and Prophetic hadiths such as 'The best of generations is the one in which I was sent, then that which follows, then that which follows.' In effect, then, the first generation of hadith transmitters was beyond criticism. In fact, the famous ninth-century hadith critic Abū Zur'a al-Rāzī stated that anyone who criticized a Companion was a heretic.50 Later analysts would refine this understanding of the Companions' uprightness. As Ibn Taymiyya (d. 728/1328) explained, the Companions were not perfect – Mughīra b. Shu'ba had lied, and Walīd b. 'Uqba was a known drunkard. But none had ever lied about the Prophet.51 Many Sunni scholars have thus understood uprightness as meaning that the Companions' exposure to the tremendous spirit-ual charisma of Muhammad prohibited them from lying about the Prophet but not other sins.52 It is no surprise, then, that Sunni hadith scholars strove to identify who was a Companion. 'Alī b. al-Madīnī (d. 234/838) wrote an early work (now lost) listing them, to be followed by Ibn Qāni' (d. 351/962), Abū Nu'aym al-Isbahānī, and others. Ibn Hajar al-'Asqalānī's Isāba fī ma'rifat al-sahāba is the most widely cited biographical dictionary of the Companions. There was great disagreement over the actual number of Companions: al-Shāfi'ī estimated their number at sixty thousand, Abū Zur'a al-Rāzī at over a hundred thousand. In his biographical dictionary of Companions, Ibn Hajar listed approximately twelve thousand three hundred. On a practical level, the Companions who actually played a noticeable role in hadith transmission were many fewer: the Six Books include hadiths from only 962 Companions.53 The Sunni critics' view of the Companions was both ideologically driven and practical. Sunni Islam was built on the idea that the Companions of the Prophet had inherited his authority and passed on his teachings reliably. In that sense, as a group they were above reproach. In terms of hadith criticism, however, the critics' reach did not extend far enough back to apply the rules of transmitter criticism to the Companions. The earliest critic, al-Zuhrī, had met only the youngest of the Companions, and his hadith criticism mostly addressed the reports he heard from other Successors. Al-Zuhrī, Mālik, and Shu'ba had direct experience with the Successors, but they had no real way to evaluate the uprightness or accuracy of Companions. In a sense, reports such as Aisha's aforementioned rejection of hadiths for content reasons represent vestiges of hadith criticism from the Companion generation. That the collective impunity of the Companions was a later construct of the Sunni worldview is evident when one finds occasional minor Companions listed in early books of weak hadith transmitters.54 The chicken and the egg – Who made the early experts experts? As you might have noticed, the names of the early generations of master hadith critics (Figure 3.1) overlap to a large extent with Figure 2.1 on major hadith transmitters. So did just transmitting a vast number of hadiths make a person a reliable hadith transmitter or an expert critic? The answer seems to be no – just because one was a major transmitter did not mean that one was reliable. Ibn Ishāq was an essential pivot of hadith transmission in Medina, but it became clear to many critics even in his own lifetime that he was not at all discriminating in what he transmitted. Mālik, on the other hand, only transmitted from two people ('Abd al-Karīm b. Abī al-Mukhāriq and 'Atā' al-Khurāsānī) that he (and later critics) did not feel were reliable (thiqa). Later critics also distinguished between an early critic/transmitter's own transmissions and his evaluations of others. Al-Zuhrī's opinions carried great influence, but later critics all agreed that his mursal hadiths (see below for a discussion of this term) were too unreliable to use. The great critic Sufyān al-Thawrī regularly narrated hadiths that others considered unreliable, whereas when Shu'ba transmitted a hadith it was understood that he believed it was authentic. In a similar vein, in the formative period of Sunni Islam in the ninth century, did hadith scholars such as Ibn Hanbal decide which early transmitters to accept based on their Sunni beliefs? Was Sunni hadith criticism just a tool for excluding non-Sunnis? The answers to these questions are certainly 'no,' since, as we have seen, Sunni critics regularly accepted the hadiths of people whose beliefs they considered anathema. Beyond merely accepting non-Sunnis as transmitters of hadiths, Sunnis even accepted one as a hadith critic. Despite his fervent Shiism, Ibn 'Uqda (d. 332/944) was listed by staunch Sunnis like al-Dhahabī as 'the oceanic hadith scholar,' whose criticisms of transmitters and narrations carried great weight.55 2) Contiguity of transmission (al-ittisāl) Evaluating the sources of a hadith was of little use, however, if a critic could not be sure who these sources were. If one transmitter had never actually met the person from whom they quoted the hadith or if it was known that he had not heard that hadith from his teacher, then who was the intermediary? With no way to guarantee that intermediary's reliability, there were endless possibilities for what sort of deviation or forgery could have occurred. Establishing that a hadith had been transmitted by a contiguous, unbroken isnād from the Prophet was thus as crucial as transmitter reliability for determining the authenticity of a hadith. If it could not be established that the people in the isnād had heard from one another, then hadith critics considered the chain of transmission broken (munqati') and thus unreliable. In order to determine if an isnād was 'contiguous (muttasil),' hadith critics attempted to identify all the people from whom a narrator had heard hadiths. If a transmitter was not a known liar, then one could infer this from his saying 'So-and-so narrated to me (haddathanī),' 'so-and-so reported to us (akhbaranā),' or 'I heard from so-and-so (sami'tu min ...).' Other phrases for transmission did not necessarily indicate direct transmission. 'According to ('an)' could mean that someone had heard a hadith directly from the person in question or not. In addition to looking at this terminology, a critic would compare the death date of the teacher with the age of the student and investigate the possibility that they were in the same place at the same time. Because establishing contiguous transmission was so important, by the mid 700s transmitters had become very serious about specifying exactly how hadith transmission occurred. The most accurate forms of direct transmission were either reading a teacher's hadiths back to him (often indicated by the phrase 'he reported to us, akhbaranā') or listening to the teacher read his hadiths (often indicated by 'he narrated to us, haddathanā'). If a teacher gave a student his books of hadiths to copy, this was termed 'handing over (munāwala).' We have already discussed 'permission to transmit (ijāza)' in the last chapter. Although there was debate over whether reading hadiths to a teacher or hearing them read was more accurate, all scholars acknowledged that 'handing over' and 'permission to transmit' were the most tenuous forms of transmission. Reading a book with no transmission from the teacher at all ('finding, wijāda') inspired no confidence at all. Transmitters fretted over these forms of narration and often debated the proper terminology. The Hanafī al-Tahāwī (d. 321/933) wrote a short treatise on how the technical terms 'akhbaranā' and 'haddathanā' actually meant the same thing (also the opinion of the majority of scholars). When al-Awzā'ī gave a book of hadiths to a student in an act of 'handing over,' the student asked, 'About this book, do I say "haddathanī"?' Al-Awzā'ī replied, 'If I narrated it directly to you, then say that.' The student inquired, 'So do I say "akhbaranī"?' Al-Awzā'ī replied that no, he should say 'al-Awzā'ī said' or 'according to al-Awzā'ī.'56 Not all critics agreed on the requirements for a contiguous isnād. There was disagreement over whether the phrase 'according to ('an)' should be interpreted as an indication of direct transmission or not. Muslim b. al-Hajjāj claimed that the great hadith critics had all accepted 'an as indicating direct transmission provided that the two people involved were contemporaries and that it was likely that they had met one another. Others, like Ibn 'Abd al-Barr (d. 463/1070) and al-Khatīb al-Baghdādī, claimed that hadith critics had agreed that one needed proof that the two transmitters had actually met at least once. Obfuscation in Transmission (Tadlīs) Critics of the eighth, ninth, and early tenth centuries often attempted to be more exact than just establishing if two transmitters had met. They sought to determine exactly which hadiths certain transmitters had heard from their teachers. Shu'ba thus studied the hadiths of his teacher Qatāda until he found that he had only heard three from his teacher Abū al-'Āliya.57 This was especially important in the case of tadlīs, or obfuscation in transmission. Tadlīs occurred when a transmitter cited an isnād in an ambiguous manner, such as saying 'so-and-so said,' implying that he had heard the hadith directly from the person when in fact he was omitting his immediate source for the hadith. Transmitters might hide their immediate source because he or she was considered unreliable or espoused beliefs unacceptable in Sunni Islam. Tadlīs did not always occur for insidious reasons. If a student had to leave a dictation session to answer nature's call, for example, he would hear the hadiths that he had missed from a classmate. When narrating those hadiths, however, he might leave out the classmate's name and simply say 'Teacher so-and-so said.' Because tadlīs was often innocuous, very few transmitters were totally innocent of it. Only Shu'ba b. al-Hajjāj was known to never lapse into it. Identifying tadlīs was a primary concern of critics in the eighth century and beyond. By interrogating a transmitter a critic could determine whom he omitted from isnāds in instances of tadlīs. Transmitters like Sufyān b. 'Uyayna, who only omitted the names of reliable figures, could be trusted even when doing tadlīs. Others who often omitted the names of weak narrators, like Ibn Ishāq, could not be relied upon unless they specified direct transmission.58 Al-Khatīb al-Baghdādī and Ibn Hajar both wrote books discussing tadlīs and those accused of it. Mursal Hadiths Similar to tadlīs was the phenomenon of mursal hadiths, or instances in which someone quoted the Prophet without ever having met him. If a Successor or an early scholar like Mālik said 'the Prophet said,' this was clearly an incomplete isnād since Mālik never met the Prophet. Mursal hadiths occurred because, especially in the first few generations of Muslims, scholars were not obsessive about providing detailed isnāds for every report all the time. Al-Zuhrī, Mālik, or Abū Hanīfa might quote the Prophet while discussing a legal issue informally without bothering to provide an isnād. When such mursal hadiths were recorded in musannaf works like the Muwatta' or the legal responses of Abū Hanīfa, however, they presented a problem for later hadith critics. How should they be treated? Because mursal hadiths had incomplete isnāds and one could not be sure from whom a Successor was narrating, mursals were almost always considered unreliable by hadith critics. After extensive research on the mursal reports of certain early transmitters, however, and attempts to find counterparts to them with full isnāds, critics approved of certain transmitters' mursal hadiths. Al-Shāfi'ī concluded that the mursals of the Successor Sa'īd b. al-Musayyab (d. 94/713) were reliable because the source he omitted, his father-in-law Abū Hurayra, was the most knowledgeable Companion about hadiths. Critics debated the reliability of al-Hasan al-Basrī's mursal hadiths – his contemporary Ibn Sīrīn said that al-Hasan was totally uncritical about his hadith sources, so his mursals were useless. Yahyā al-Qattān said that he had studied all of al-Hasan's mursals and found versions with full isnāds for all but two of them.59 Ibn Abī Hātim al-Rāzī composed a whole book entitled Kitāb al-marāsīl (The Book of Mursals) in an attempt to determine which Successors had heard hadiths from which Companions. STEP THREE: FINDING CORROBORATION FOR THE HADITH Corroboration had played a central role in determining the reliability of a transmitter – if he narrated hadiths that other students of his source did not, then his reliability was questioned. But a forger could still simply take an isnād of a respected transmitter and attach it to a freshly concocted hadith. The third and final step in hadith criticism thus involved looking for corroboration for the hadith itself. Corroboration took two general forms. Since a 'hadīth' was generally associated with the Companion who narrated it, another version of the same Prophetic tradition transmitted by a second Companion or an instance of the Prophet saying something similar on another occasion were both considered corroboration for a hadith. Such a report was termed a 'witness (shāhid).' When one transmitter corroborated the report related by another transmitter that they had both heard from a common source, this was termed a 'parallelism (mutāba'a).' Hadith scholars described these two forms of corroboration with the aphorism 'parallelism bolsters the narration, a witness bolsters the tradition.' A witness report need not be exactly the same tradition as the hadith it supports. Even a report with a different wording but the same meaning corroborated the fact that the Prophet had expressed a certain idea or sentiment. Parallelisms solidified the reliability of a particular narration of a hadith. Figure 3.2 Corroboration A famous tenth-century hadith critic, Ibn Hibbān, describes the process of searching for corroboration (called i'tibār, 'consideration') thus: Let us say we come across [the transmitter] Hammād b. Salama, and we see that he has narrated a report from Ayyūb [al-Sakhtiyānī] Ibn Sīrīn Abū Hurayra the Prophet (s), but we do not find that report from anyone else from the students of Ayyūb. What is required of us now is to refrain momentarily from criticizing Hammād, and to consider what his contemporaries narrated. So we must start by looking at this report: Did Hammād's students in general narrate it from him, or just one of them? If it is the case that his students narrated it from him, then it has been established that Hammād really did narrate that report, even if that comes through a weak narrator from him, because that narration is added to the first narration from Hammād. So if it has been established correctly that Hammād narrated a report from Ayyūb that is not corroborated by others, again we must pause. For it does not follow automatically that there is some weakness here, but rather we must ask: Did any of the reliable transmitters (thiqāt) narrate this report from Ibn Sīrīn other than Ayyūb? If we find one, then it has been established that the report has some basis (asl yarji'u ilayhi). If not, then we must ask: Did anyone from among the reliable transmitters narrate this report from Abū Hurayra other than Ibn Sīrīn? If such a narration is found, then it has been established that the report has a basis (asl). If not, we ask: Did anyone narrate this report from the Prophet (s) other than Abū Hurayra? If so, then it has been established correctly that the report has some basis. But when that is not the case, and the report contradicts the compilations of these three [people at three levels in the isnād], then it is established without a doubt that the report is forged, and that the lone person who narrated it forged it.60 As Ibn Hibbān describes, if a report is not corroborated at any one level of the isnād, then the reliability of that transmitter's narration from his source is dubious. If the report is uncorroborated at all levels of the isnād, then it is almost certainly totally baseless. If a report was not corroborated either at some level of the isnād or from the Prophet in general, early hadith critics deemed it 'unacceptable (munkar).' Here we see that Muslim critics worked backwards in time when authenticating hadiths. What probably first occurs to readers today (as is clear in the hadith charts in this book), is that an isnād 'starts' with the Prophet and 'ends' when the hadith is recorded in a book. But this assumes that the hadith actually existed in the time of the Prophet and that we are merely tracing how it came to us. For a Muslim hadith critic, a hadith was at first just an unverified claim; its isnād began with the person who told him the hadith. It only extended backward in time when the critic verified each link in the isnād, step by step, until it 'reached (wasl)' the Prophet. Of course, this process of demanding corroboration took context into consideration. As Muslim b. al-Hajjāj informs us, 'If it has been established that your hadith corpus agrees with those of the other reliable narrators, then narrating some uncorroborated material is acceptable.'61 If a transmitter studied with a certain teacher for ten years, then it is not surprising that he might narrate a selection of hadiths from his teacher that students who only studied with him for six months did not recount. The great critic Abū Hātim al-Rāzī was asked to criticize 'Abdallāh b. Sālih, the secretary of Layth b. Sa'd, for having narrated uncorroborated hadiths from Layth. Abū Hātim replied sarcastically, 'You ask me this about the closest person to Layth, who was with him on voyages and at home and spent much time alone with him?'62 But, Muslim continues, if some lesser known transmitter narrated a hadith from a prolific hadith scholar like al-Zuhrī whose numerous and respected students did not recognize that hadith, then that report would be automatically declared 'unacceptable (munkar).'63 Like our modern investigative reporter's source, however, a transmitter could earn such a level of confidence in the eyes of critics that he could narrate uncorroborated reports without arousing concern. Critics like al-Bukhārī and Ibn 'Adī had examined the hadiths of master transmitters like al-Zuhrī, Mālik, Ibn al-Mubārak or Qutayba b. Sa'īd and found that they were corroborated to such a great extent that they could be relied upon for a number of uncorroborated hadiths as well. These figures were so central to hadith transmission in general that if anyone were to have heard a rare hadith, it would be them. An uncorroborated hadith narrated by an isnād of such pillars was known as 'an authentic rare (sahīh gharīb)' hadith. The hadith of Mālik al-Zuhrī Anas that the Prophet entered Mecca upon its conquest with a mail helmet on his head and ordered the killing of Ibn Khatal, an infamous enemy of Islam, was known only by this isnād. Because this hadith was narrated by transmitters whose collections of hadiths were vaster than almost any other people of their time, this hadith was considered authentic even though it was uncorroborated.64 Conversely, less stellar figures inspired no such confidence. As al-Tirmidhī explained, 'Anyone from whom a hadith is narrated who is accused [of poor performance in hadith] or is criticized as weak in hadiths for his lack of carefulness and numerous mistakes, if that hadith is only known through that narration, it cannot be used as proof.' So the hadith narrated by the lone isnād of Nāsih al-'Ajamī Simāk b. Harb Jābir b. Samura the Prophet: 'For a man to teach his child proper manners is better than to give a whole bushel in charity (li'an yu'addiba al-rajul waladahu khayr min an yatasaddaqa bi-sa')' was considered unacceptable (munkar) because neither Nāsih nor Simāk were consistently reliable transmitters.65 Books of 'Ilal al-Hadīth Even when an isnād looked perfect, early hadith critics did not completely ignore the need for comparing it with other narrations of the report. As the eleventh-century critic al-Khalīlī (d. 446/1054) warned, 'Even if a hadith is provided to you with an isnād from al-Zuhrī or another one of the masters, do not declare it authentic merely because of that isnād, for even a reliable transmitter (thiqa) can err.'66 By comparing different versions of the same hadith, critics could uncover flaws, known as 'ilal, which might have evaded the best transmitter. Such flaws included one narration of a hadith adding additional words into the text of the report that are not found in more reliable versions. A very common flaw was that one narrator would confuse a Companion's or Successor's statement with a Prophetic hadith. The great 'ilal critic of Baghdad, al-Dāraqutnī, found such an error in Muslim's famous Sahīh. By examining all the narrations of a report describing how God will grant the believers a vision of Himself on the Day of Judgment, al-Dāraqutnī concluded that these were actually the words of the Successor 'Abd al-Rahmān Ibn Abī Laylā (d. 82/701–2) and not of the Prophet.67 To uncover these 'ilal, a critic would gather all the narrations of a hadith and attempt to determine which ones were the most reliable. If the majority of respected transmitters, for example, reported that a certain saying was the statement of a Companion, even one strong isnād tracing that report back to the Prophet would be considered a mistake. This advanced level of seeking out corroboration and comparing narrations was set down in books of 'ilal, a genre that flourished in the ninth and tenth centuries. The 'ilal works of 'Alī b. al-Madīnī, Ibn Hanbal, and Ibn Abī Hātim al-Rāzī were very famous, but the massive 'ilal book of al-Dāraqutnī, published in eleven volumes, dwarfs them all. After the 1000s, 'ilal books became rare, and only unusually competent later critics like the Moroccan Ibn al-Qattān al-Fāsī (d. 628/1231) or Ibn al-Jawzī (d. 597/1201) produced them. 'Ilal criticism was only possible for critics in the early period when hadiths were still narrated by full isnāds and critics had access to versions of reports that may not have survived into later times.68 As al-Suyūtī admitted, by the 1400s hadith critics did not have the vast array of musannafs, hadith notebooks, and dictation sessions available to a scholar like al-Dāraqutnī. Such later scholars could only judge hadiths based on material they received from earlier critics.69 CONTENT CRITICISM: THE HIDDEN COMPONENT OF EARLY HADITH CRITICISM When we think of how one should evaluate the reliability of things we hear, we focus on their content as much as their source. Even the most trustworthy source would arouse suspicion if he announced that aliens had landed in his backyard. Yet when we thumb through books of transmitter criticism or 'ilal, one of the most obvious characteristics of early hadith criticism is that early scholars almost never discussed the contents of hadith, let alone explicitly rejected a hadith because its meaning was unacceptable. Why is this? Certainly, the esteem in which Muslims held Muhammad and their belief that God spoke to him of the distant past and events to come affected their approach to criticizing hadiths. Unlike a modern person skeptically dismissing the sayings of a television psychic, a Muslim critic would not declare a report attributed to Muhammad to be a forgery simply because it described something that average men could not know. Nonetheless, we know that early critics like al-Bukhārī and Muslim were willing and able to reject a hadith because they found its contents inherently flawed. In his entry on the transmitter 'Awn b. 'Umāra al-Qaysī in his 'Great Book of Weak Transmitters,' al-Bukhārī noted that one of the unacceptable hadiths he narrated was 'The signs of the Day of Judgment are after the year 200/815.' Al-Bukhārī rejects the hadith because 'these two hundred years have passed, and none of these signs have appeared.'70 In another work on transmitters, al-Bukhārī criticizes Muhammad b. Fadā' because he narrated the hadith 'The Prophet forbade breaking apart Muslim coins in circulation.' Al-Bukhārī notes that Muslims did not mint coins until early Umayyad times, 'they did not exist at the time of the Prophet.'71 Muslim b. al-Hajjāj rejects a hadith saying that there are five chapters of the Quran that are the equivalent of one-fourth of the holy book – a total of five-fourths. He calls this logical contradiction 'reprehensible, and it is not conceivable that its meaning is correct.'72 But why were such instances of content criticism so rare? To answer this question, we have to remember that Sunni hadith criticism emerged in the context of intense ideological struggle between the ahl al-hadīth and the school of early Muslim rationalists, known as the Mu'tazila. For the Mu'tazila, the only sources on which one could rely to interpret properly Islamic law and dogma were the Quran, reports from the Prophet that were so well-known they could not possibly be forged, and human reason ('aql). In order to know if any hadith was authentically from the Prophet, Mu'tazilite scholars like Abū al-Qāsim al-Balkhī (d. 319/931) believed that it had to agree with the Quran and reason. For Mu'tazilites, the idea that one could examine the isnād of the hadith to know if it was reliable or not was preposterous. The Mu'tazilite master Abū 'Alī al-Jubbā'ī (d. 303/915–16) was once asked to evaluate two hadiths narrated through the same isnād. He declared the first hadith authentic but rejected the second as false. When a surprised student asked al-Jubbā'ī, 'Two hadiths with the same isnād, you authenticate one and reject the other?', al-Jubbā'ī replied that the second one could not be the words of the Prophet because 'the Quran demonstrates its falsity, as does the consensus of the Muslims and the evidence of reason.'73 The ahl al-hadīth's understanding of man's relationship to religion was the converse. Only by submitting oneself completely to the uncorrupted ways of the Prophet and early Muslim community as transmitted through the isnād could one truly obey God and His Messenger. Unlike the Mu'tazila, whom they saw as arrogantly glorifying human reason, or the ahl al-ra'y, whom they viewed as rejecting or accepting hadiths arbitrarily when it suited their legal opinion, the ahl al-hadīth perceived themselves as 'cultivating the ways of the Messenger, fending off heretical innovation and lies from revealed knowledge.'74 It was not man's right to question the revealed religion that the Prophet brought and that was preserved from him through the isnād. We thus find the Companion 'Imrān b. Husayn (d. 52/672) instructing new Muslims that the Prophet had said, 'Whoever is grieved for [by his family] will be punished [for that mourning] (man yunāhu 'alayhi yu'adhdhab).' When a person questioned the reasonableness of this notion, 'Imrān replied, 'The Messenger of God has spoken the truth, and you have disbelieved!'75 A defender of the ahl al-hadīth against the Mu'tazila, Ibn Qutayba (d. 276/889) states: We do not resort except to that to which the Messenger of God resorted. And we do not reject what has been transmitted authentically from him because it does not accord with our conjectures or seem correct to reason ... we hope that in this lies the path to salvation and escape from the baseless whims of heresy.76 But we know from the examples above that early Sunni hadith critics did note problems in the meanings of certain hadiths. In their context, however, it is clear why they could not do so openly. The whole purpose of the isnād was to guarantee that the Prophet said something without relying on man's flawed reason. If hadith critics admitted that a hadith could have an authentic isnād but still be a forgery because its meaning was unacceptable, then they would be admitting that their rationalist opponents were correct! If you could not have a strong isnād with a forged report, then any problem in the meaning of a hadith must mean that there was a problem in the isnād. When ahl al-hadīth critics like al-Bukhārī came across a hadith whose meaning they found unacceptable, they examined the isnād to find how the error occurred and listed the hadith in the biography of that transmitter as evidence of his weakness. Ibn 'Adī often states that the questionable hadiths that a certain transmitter narrates 'demonstrate that he is unreliable.' The Emergence of Mawdū'āt Books and Open Content Criticism after 1100 CE Because early hadith criticism was so openly focused on the isnād as the primary means of authentication, it was very often difficult to tell when a critic was rejecting a whole Prophetic tradition or just one narration of that hadith. The term 'unacceptable (munkar)' for a hadith could mean that this version of the hadith narrated through a certain isnād was unreliable but other authentic versions existed, or that the tradition was entirely forged. Another phrase used to reject a hadith, 'it has no basis (laysa lahu asl),' could mean that the hadith had no basis from that transmitter (but was well established from others) or that the Prophetic tradition was baseless in general. But even concluding that the terms munkar or lā asl lahu denoted 'forged' does not necessarily mean that the critic found the meaning of the hadith in question unacceptable. As Ibn 'Abd al-Barr (d. 463/1070) explained, 'How many hadiths are there with a weak isnād but a correct meaning?'77 Al-Tirmidhī notes that Yahyā al-Qattān had declared the following hadith narrated by Anas b. Mālik to be munkar: 'A man said, "O Messenger of God, should I tie up [the camel] and trust in God or leave it free and trust in God." The Prophet said, "Tie it up and trust in God." ' Al-Tirmidhī adds that this report was totally baseless from Anas, 'but its likes have been narrated from another Companion 'Amr b. Umayya al-Damrī, from the Prophet.'78 Starting in the late 1000s, however, as the Mu'tazilite rationalist threat faded from view and Sunni Islam emerged triumphant, hadith critics began writing books that rejected whole Prophetic traditions, often because their meanings were unacceptable. These books were known as works of mawdū'āt, which listed 'mawdū',' or 'forged' hadiths. The earliest known mawdū'āt book, unfortunately lost to us, was that of Abū Sa'īd al-Naqqāsh al-Isbahānī (d. 414/1023).79 The earliest surviving one is the Tadhkirat al-mawdū'āt of Muhammad b. Tāhir al-Maqdisī (d. 507/1113). Perhaps the most famous mawdū'āt work is the huge Kitāb al-mawdū'āt of Ibn al-Jawzī (d. 597/1201). Mawdū'āt books flourished in later Islamic times, with well-known works including the Ahādīth al-da'īfa of Ibn Taymiyya (d. 728/1328), the al-La'ālī al-masnū'a of al-Suyūtī, the Asrār al-marfū'a of Mullā 'Alī Qārī, the Fawā'id al-majmū'a of the Yemeni Muhammad al-Shawkānī (d. 1834), and the Kitāb al-āthār al-marfū'a of the Indian 'Abd al-Hayy al-Laknawī (d. 1886-7). Some of these scholars wrote books on forged hadiths designed to be useful references for non-experts. 'Umar b. Badr al-Mawsilī (d. 622/1225), for example, wrote the book Sufficing One from Memorization and Books on Issues on which there are No Reliable Hadīths (al-Mughnī 'an al-hifz wa al-kitāb fīmā lam yasihha shay' fī al-bāb). Early mawdū'āt books listed hadiths along with the isnād flaws that showed they were forged, relying on the criticisms of specific narrations made by the likes of al-Bukhārī and Ibn 'Adī. This was highly problematic, since these books implied that any hadith with that wording was forged, while there might be other, sound narrations. In the mid twelfth century the genre began shifting to openly rejecting hadiths because of their meaning. The mawdū'āt book of al-Jawzaqānī (d. 543/1148–9), for example, states 'Every hadith that contradicts the Sunna is cast away and the person who says it is rejected as a transmitter.'80 This process reached a plateau with the al-Manār al-munīf fī al-sahīh wa al-da'īf (The Lofty Lighthouse for Authentic and Weak Hadiths), the mawdū'āt book of Ibn Qayyim al-Jawziyya (d. 751/1350), who devoted a large section of the work to listing all the features of a hadith's contents that demonstrated it was forged. Of course, freely engaging in content criticism was opening a Pandora's box. A critic might fall into exactly that trap that the early ahl al-hadīth claimed they were avoiding: making man's flawed reason the arbiter of religious truth. Although later critics would maintain, as Ibn al-Jawzī states, 'any hadith that you see contradicting reason or fundamental principles [of Islam], know that it is forged,' they would also insist that one should not be too hasty in such judgments. After all, the critic might not have grasped the proper way of reconciling such contradictions.81 A few Sunni hadith critics in the later period, such as al-Dhahabī and 'Abdallāh al-Ghumārī, seemed at ease openly rejecting hadiths based on their contents, sometimes even when their isnāds seemed sound. But the mainstream Sunni tradition is much better exemplified by scholars like al-Suyūtī and Mullā 'Alī al-Qārī. The former warned that a hadith could be rejected due to its contents only after all efforts to reconcile its meaning with the Quran and established Sunna had failed. And 'the door of possible interpretation is definitely wide,' added al-Qārī. Prominent scholars declared a hadith in which the Prophet dreamt he saw God as a beardless youth to be a blatant forgery due to its anthropomorphism. Al-Qārī replied that dreams are merely symbolic, not reality. Thus, he argued, the hadith's meaning was sound.82 This tension between submitting one's reason to a transmitted text and using one's reason to evaluate the text's authenticity has furnished fertile ground for debate among Muslim scholars until today. LEVELS OF HADITH, THEIR USES AND THE PRIORITIES OF THE HADITH TRADITION From the time of Mālik (d. 179/796) to the late ninth century, hadith critics conceived of hadiths as falling between two poles in terms of the strength of their isnāds: sahīh ('sound,' 'authentic') and da'īf/saqīm ('weak' or 'unsound,' literally 'sick'). In terms of their level of corroboration, critics described hadiths as being 'well-known (mashhūr)' or 'unacceptable, unknown (munkar)' ones. A hadith that was declared sahīh or mashhūr represented the authenticated words of the Prophet, while weak or munkar hadiths were those not fully established as emanating from him. It is difficult to know exactly how early hadith critics defined sahīh hadiths, since they were very laconic in their works. Ibn Khuzayma defined the hadiths that he selected for his sahīh collection as those 'that an upright ('adl) transmitter narrates from another upstanding transmitter continuously to [the Prophet] without any break in the isnād or any impugning of the transmitters.'83 Later analysts such as Ibn al-Salāh (d. 643/1245) and Ibn Hajar al-'Asqalānī (d. 852/1449) examined the methodologies of the early masters and defined a sahīh hadith as one narrated by an unbroken isnād of reliable (thiqa) transmitters, namely those who combined upstandingness and accuracy, all the way back to Prophet without any concealed flaws ('ilal) or contradicting a more reliable source.84 For hadith scholars of the eighth and ninth centuries, any hadith that did not reach the standard of sahīh was declared 'weak.' The category of 'weak' hadiths was thus very broad, ranging from hadiths whose isnāds suggested they were forged to those with relatively minor flaws (see Figure 3.0). This helps explain why ahl al-hadīth jurists like Ibn Hanbal were willing to employ hadiths they themselves described as 'weak' for deriving laws when no other evidence was available. The later scholar of Ibn Hanbal's school of law, Ibn Taymiyya (d. 728/1328), explains that weak hadiths fell into two categories: 1) those that did not have a sahīh isnād but were still reliable enough that one could use them in law, 2) hadiths that were so unreliable that they had to be set aside.85 Beginning with the work of al-Bukhārī's student Abū 'Īsā al-Tirmidhī (d. 279/892), hadith scholars developed a new name to describe the hadiths that were not sahīh but still strong enough to use as proof in Islamic law: hasan, or 'fair.' Al-Tirmidhī describes a hasan hadith as one that 'does not have in its isnād someone who is accused of lying or forgery, is not anomalous (shādhdh), and is narrated via more than one chain of transmission.'86 For al-Tirmidhī, a hasan hadith was thus a report whose isnād was not seriously flawed and enjoyed corroboration through other narrations, which mitigated the chances of a serious error creeping into the text of the report. The later jurist and hadith scholar al-Khattābī (d. 388/998) described hasan hadiths as those 'with an established basis and whose transmitters were well-known.'87 All Sunni scholars have accepted both sahīh and hasan hadiths as compelling proof in matters of law. As we will discuss in chapter 6 on the role of hadith in theology, there was prolonged debate over whether hadiths narrated through a handful of isnāds were reliable enough to inform Islamic dogma. Just as we do today, Muslim critics felt that certain topics required more strenuous efforts at authentication than others. From the times of early critics and ahl al-hadīth jurists like Ibn al-Mubārak and Ibn Hanbal, it was accepted that hadiths that were not reliable enough to be admitted in discussions of law could still be used for other purposes. When Ibn al-Mubārak was asked what to do with the hadiths of one weak narrator, he replied that they should not be used as proof in legal discussions. 'It is still,' however, 'possible to narrate from him what he has on issues like good manners (adab), goodly preaching (maw'iza), pious abstemiousness (zuhd) and such things.'88 Ibn Hanbal stated: If we are told hadiths from the Messenger of God concerning what is permissible and forbidden, the sunan and laws, then we are strict with their isnāds. But if we are told hadiths from the Prophet about the virtues of certain acts (fadā'il al-a'māl), or what does not create a rule or remove one, then we are lax with the isnāds.89 In addition to moralizing or exhortatory preaching, the standards for hadith authenticity also dropped for genres outside what was considered the purview of musnad hadiths, or hadiths with full isnāds originating with the Prophet and generally addressing legal issues. These included stories about the Prophet's campaigns and the subsequent Islamic conquests (maghāzī), reports from Companions and Successors about the meanings of Quranic words or the contexts in which Quranic verses were revealed (tafsīr) and stories foretelling the end of days (malāhim). As Ibn Hanbal stated, these three genres 'had no basis (asl)' – namely, they often consisted of statements made by Companions or Successors. In other words, they were not Prophetic hadiths at all.90 Figure 3.3 Rating of Hadiths and Their Uses among the Early and Later Hadith Critics Even when such reports were attributed to the Prophet, the critics' standards were lax. Maghāzī, along with what emerged as the genre of 'history (tārīkh),' demanded less rigor because scholars did not feel that they impacted the core of the Islamic tradition: law, dogma, and ritual. Malāhim hadiths, like hadiths dealing with good manners or urging Muslims to do good deeds, were admitted for use in teaching even if their contents were not reliable, because they encouraged Muslims to fear God. Here we can note a remarkable feature of the way in which Sunni Muslims understood the boundaries of religion and prioritized the functions of scripture. Today we consider the stories that religious traditions tell about the apocalypse and the means by which they propagate a moral vision of the world to be essential dimensions of a faith. For Muslims in the classical period, however, they were merely tools by which scholars could purvey the true substance of Islam, which the hadith tradition was designed to preserve: law, ritual, and essential beliefs about God. ENTER LEGAL THEORY: MUSLIM LEGAL THEORISTS AND THEIR EFFECT ON HADITH CRITICISM Ahl al-hadīth jurists like al-Shāfi'ī, his student Ibn Hanbal and his student al-Bukhārī understood well that one could not simply take every hadith that one heard from the Prophet as the law. Even if a legal hadith was authentic, the Prophet could have said it in a specific circumstance, intended it for a specific person, or changed the ruling mentioned in the hadith later on. Senior scholars were thus venerated not only for their knowledge of hadiths, but also for their ability to understand how those hadiths related to one another, fit under, added to or modified Quranic rulings. Early expressions of the ahl al-hadīth legal theory appear in the chapter of al-Bukhārī's Sahīh on holding fast to the Quran and Sunna, and most eminently in al-Shāfi'ī's works the Umm and the Risāla. Another tradition of legal theory developed parallel to that of the ahl al-hadīth. Hanafī jurists of the ninth century, many of whom subscribed to the Mu'tazilite rationalist outlook, derived this system partially from the Hellenistic tradition of philosophy prevalent in the Near East before Islam. In addition to the ahl al-hadīth division of hadiths into sahīh/hasan/da'īf or mashhūr/munkar, the Hanafī/Mu'tazilite school of legal theory elaborated a gradated system based on the level of certainty that various forms of reports conveyed. Reports about the past, whether hadiths or simply historical accounts, that were so widespread that they could not have been forged by any one group were called mutawātir (massively transmitted) and yielded epis-temologically certain knowledge ('ilm yaqīn). One might not have ever actually gone to China, but the number of reports that one has heard about it convey utter certainty that the place actually exists. There was a wide range of opinions among Mu'tazilite scholars about how many transmissions of a report were required to make it mutawātir, with scholars asserting anywhere from four (the number of witnesses required in Islamic law to prove a case of adultery) to seventy (the number of people believed to have accompanied Moses up Mount Sinai to receive the Ten Commandments). This number was required at every stage of transmission. Any hadith that did not fulfill the requirements for a mutawātir hadith was known as āhād, or a hadith of individual narrators. Unlike mutawātir hadiths, āhād hadiths only yielded strong probability (zann) of what the report described. As we have seen, Mu'tazilites had no compunction about making content criticism the centerpiece of their method of hadith evaluation. The Hanafī judge 'Īsā b. Abān (d. 221/836) thus argued that the early Muslim community rejected āhād reports that contradicted the Quran or established Sunna, or described an event that would have been more widely reported had it really occurred. He also makes the verdict of reason the ultimate arbiter for judging the veracity of a report, not the isnād.91 Although Sunnis considered Mu'tazilism to be a heresy, Mu'tazilite legal theory and its perspective on hadiths had a major impact on Sunni legal theory. A seminal figure in Sunni legal theory and theology, Abū al-Hasan al-Ash'arī (d. 324/935–6), was a former Mu'tazilite who had embraced the Sunni theological worldview and then used Mu'tazilite rationalism to defend it. The major architects of what is known as the Jumhūr (Majority) school of Sunni legal theory followed in his footsteps, essentially tailoring Mu'tazilite thought to the contours of Sunni belief. In the early 1000s, two of the most influential Shāfi'ī legal theorists, al-Qādī 'Abd al-Jabbār (d. 415/1025) and his student Abū al-Husayn al-Basrī (d. 436/1044), were actually Mu'tazilites in their conception of knowledge and theology. Their works in this field greatly informed the scholars who defined Sunni legal theory after them, such as al-Juwaynī (d. 478/1085) and his student Abū Hāmid al-Ghazālī (d. 505/1111). With the work of the hadith master al-Khatīb al-Baghdādī (d. 463/1071), the Mu'tazilite-inspired thinking of Sunni legal theorists entered Sunni hadith criticism. Specifically, al-Khatīb and all the theorists of hadith criticism who followed him adopted the division of hadiths into mutawātir and āhād (which we will discuss in more depth in Chapter 6) along with the levels of certainty they yielded. Mutawātir hadiths yielded total certainty that the Prophet had in fact said the report, while āhād hadiths yielded only strong probability. This was, however, strong enough for them to be used in deriving law. Sunni legal theorists introduced a middle tier between āhād and mutawātir dubbed 'wide-spread (mashhūr or mustafīd).' These hadiths were reports that started out as āhād, being transmitted by only a few people in the first few generations, before spreading out and becoming mutawātir. But because these hadiths had been accepted as reliable by the community of scholars, they were known to be authentic. This was based on the Sunni belief, phrased in the Prophet's words, that 'God will not let my community agree on an error' (see Chapter 5). Hadith criticism also absorbed the principles of content criticism described by Ibn Abān. The result of this merging was a composite tradition that joined two perspectives on hadith criticism that were originally in opposition, if not antithetical, to one another. Since the eleventh century, Sunni hadith criticism has therefore produced many internal contradictions. The most prominent display of this schizophrenia has been theories of hadith criticism that do not correspond to the work of hadith critics. We have already seen how the Sunni legal theorist's definition of upstanding character ('adāla) did not apply at all to the criteria that early hadith critics like al-Bukhārī used to determine the reliability of a narrator. In terms of content criticism, al-Khatīb al-Baghdādī affirms the principles derived from Ibn Abān. Not once, however, in the course of his criticism of the thousands of hadiths in his vast History of Baghdad, does al-Khatīb openly reject a hadith because its contents were unacceptable! As mentioned earlier, it was not until the mawdū'āt work of al-Jawzaqānī (d. 543/1148–9) and those who followed him that Sunni hadith critics actually overtly applied rules of content criticism in the course of their hadith evaluations. Even then their use of content criticism was fraught with tension. Essentially every Sunni hadith scholar since al-Khatīb has upheld Ibn Abān's rules of content criticism. But few have ever applied them.92 The categories of mutawātir and āhād were similarly unsuitable for the hadith tradition, for essentially all hadiths were āhād. As Ibn al-Salāh (d. 643/1245), the most famous scholar of hadith criticism in the later period, explained, at most one hadith ('Whoever lies about me intentionally, let him prepare for himself a seat in Hellfire') would meet the requirements for mutawātir.93 No hadiths could actually be described as being narrated by a large number of narrators at every stage of their transmission. In fact, when Mu'tazilites had insisted that hadiths be transmitted by a mere two people at every stage, the Sunni Ibn Hibbān had accused them of trying to destroy the Sunna of the Prophet in its entirety.94 THE 'BIG TENT' OF THE LATE SUNNI TRADITION: INCREASED ACCEPTANCE AND USE OF WEAK HADITHS The absorption of Mu'tazilite legal theory into the Sunni hadith tradition in the 1000s is indicative of the major changes that occurred in the later period of hadith criticism. From the eleventh century onward, hadith criticism would be characterized by an increasing distance from the methods of early critics. Especially with the solidification of the Late Sunni Tradition in the 1300s, we can see a tendency towards authenticating more and more hadiths that had previously been considered outside the pale of usage. Partially explained by the broader perspective enjoyed by later critics and partially justified by manipulations of the methods of hadith critics, hadith criticism became an increasingly 'Big Tent' of inclusivity. We note the beginning of the critical laxity of the later period in the Mustadrak collection of al-Hākim al-Naysābūrī (d. 405/1014), in which the author claimed he had collected thousands of hadiths that met the authenticity requirements of al-Bukhārī and Muslim. In reality, however, al-Hākim's methods of authentication fell far short of his two predecessors. He declared a hadith authentic if its isnād consisted of transmitters used in the Sahīhayn or transmitters similar to them. The later analyst Jamāl al-Dīn al-Zayla'ī (d. 762/1361), however, uncovered the weakness at the heart of al-Hākim's strategy: he had relied on the same transmitters as al-Bukhārī and Muslim, but he did not examine the hadiths for corroboration or ensure contiguous transmission.95 According to al-Dhahabī, only half of the Mustadrak's contents were actually authentic. The other half was of dubious reliability.96 Neglecting the need for corroboration has been a hallmark of later hadith criticism. Whereas a critic like al-Bukhārī would accept a hadith narrated by only one chain of transmission as long as it consisted of master scholars like al-Zuhrī and Mālik, later critics often authenticated hadiths based on only one chain regardless of the infer-ior standing of some transmitters. Ibn Abī Hātim, Ibn 'Adī, and other early critics had declared the hadith saying that 'The most truthful speech is that said after sneezing' was weak or forged. In the thirteenth century, however, al-Nawawī (d. 676/1277) argued for its reliability based on a solitary narration from the Musnad of Abū Ya'lā al-Mawsilī (d. 307/919) even though one of its transmitters had been severely impugned.97 Later critics did have one tangible advantage over earlier critics. A later scholar like Ibn Hajar or al-Suyūtī had access to works that consolidated and synthesized the vast and diverse expanse of the hadith corpus as well as collections that might not have been within reach of an early critic. As the case studies at the end of this chapter demonstrate, where early critics like al-Bukhārī or al-Tirmidhī had access to only some narrations of a Prophetic tradition when they declared it weak, in the 1400s Ibn Hajar could take into consideration additional narrations that might raise that hadith to hasan or sahīh status. Ibn al-Salāh used the term 'hasan due to other narrations (hasan li-ghayrihi)' and 'authentic due to other narrations (sahīh li-ghayrihi)' to describe this procedure. The twentieth-century Moroccan hadith scholar Ahmad al-Ghumārī (d. 1960) exemplified later scholars' access to material out of the reach of an early critic by writing a book entitled (Laysa kadhālik)', (Not So), in which he rebuts a series of statements that early critics like Ibn Hanbal made about transmitters and hadiths based on new evidence. Of course, while later critics could authenticate a hadith that had previously been considered unreliable, the opposite was theoretically very difficult. When al-Bukhārī judged a hadith to be sahīh, his decision was based on information about the hadith that may have been lost to history. As Ibn Taymiyya explains, 'whatever hadiths reached [early scholars] and that they deemed authentic may only have come down to us through unknown transmitters, broken isnāds or not at all.'98 How, then, could a later scholar question the authentication of an earlier master? Not all the previously inaccessible evidence to which later hadith critics had access, however, was reliable according to the hadith critical method. Scholars of the Late Sunni Tradition made large numbers of hadiths admissible in religious discourse by exploiting the tremendous range of questionable hadiths found in the late musnad collections of the tenth to twelfth centuries as well as the principle that weak hadiths were acceptable as proof on non-legal issues. Basing their argument on the above-mentioned stance of early masters like Ibn Hanbal, leading late Sunni scholars like al-Nawawī and al-Suyūtī all agreed that as long as a hadith was not forged it could be used in any discussion not concerning the prohibition and permissibility of an act.99 In order to raise a hadith to the level of admissibility in such cases, all a scholar had to do was prove that it was not forged – proving that it was merely 'weak' sufficed. This was the course of action that al-Suyūtī admitted to taking when he presented hadiths supporting his argument that the Prophet's parents were destined for Heaven even though they had never known Islam during their lives. In order to rehabilitate a hadith that critics had earlier declared a forgery, one had to provide evidence that it had some 'basis (asl)' in the early Islamic tradition. For example, even though there might not be enough evidence to trace a hadith authentically to the Prophet, a weak hadith might be the result of a Companion's statement or an early legal ruling that had accidentally been attributed to Muhammad. It was still a legitimate indicator of proper Islamic values. The most frequently cited sources for finding such an 'asl' for a hadith were the Musnad al-Shihāb of al-Qudā'ī and the Musnad al-Firdaws of al-Daylamī, both late works infamous for the unreliability of their contents. When Mullā 'Alī Qārī argued for accepting the hadith 'Wiping one's neck [during ablutions] is protection against fetters [on the Day of Judgment] (mash al-raqaba amān min al-ghill),' which al-Nawawī had said was forged and which other critics had declared a Companion statement, he announced that a Prophetic version was found in the Musnad al-Firdaws and thus that the hadith was weak, not forged. 'And weak hadiths,' he added, 'are acted on by consensus for establishing the virtues of actions.'100 When attempting to raise a weak hadith to the status of 'hasan due to other narrations,' the evidence to which later critics often resorted were the narrations that earlier critics like Ibn 'Adī or al-Bukhārī had listed in their weak transmitter collections to show a certain person's flawed hadiths! (See Case Study Two in this chapter). Although the early masters Ibn Ma'īn, al-Bukhārī, Abū Zur'a al-Rāzī, al-Tirmidhī, Ibn 'Adī, al-Dāraqutnī, and al-Khatīb al-Baghdādī all declared that various versions of the hadith 'I am the city of knowledge and 'Alī is its gate' were baseless, later critics such as al-'Alā'ī (d. 761/1359), Ibn Hajar, and al-Suyūtī all agreed that, when taken together, these narrations made the hadith hasan.101 The final means by which hadiths achieved exaggerated authority in the Late Sunni Tradition was the exploitation of the concept of mutawātir reports. It was accepted by consensus among Sunni scholars that if a report had reached the level of mutawātir it was utterly certain that the Prophet had said it. Although scholars like Ibn al-Salāh had declared that no such hadith existed in actuality, al-Suyūtī composed a collection titled al-Azhār al-mutanāthira fī al-ahādīth al-mutawātira (The Scattered Flowers of Massively Transmitted Hadiths) in which he included 111 hadiths he declared mutawātir because ten or more Companions had narrated it from the Prophet. But a mutawātir hadith had to have such a number of isnāds at every level of transmission, and not all the chains of transmission that al-Suyūtī used as evidence were reliable to begin with. Because the concept of mutawātir was so ambiguous, later critics frequently abused the label to argue for the undeniable authenticity of a hadith they were citing. Although earlier scholars had agreed that the hadith 'My community will not agree on an error' lacked any fully sahīh isnāds, 'Abdallāh al-Ghumārī (d. 1993) claimed that it was mutawātir. How do we explain seemingly deceptive tactics like the exploit-ation of weak hadiths by late Sunni scholars? Were they not pious defenders of the hadith tradition, whose whole purpose was 'to ward off lies from the Prophet of God'? Although we might note that the Late Sunni Tradition was very permissive with hadiths, scholars like al-Suyūtī felt they were on firm ground. In the case of the Prophet's parents going to heaven, after all, al-Suyūtī did not just have hadiths in mind when attempting to prove his case. He had the whole heritage of Islamic thought at his disposal, such as Quranic verses saying that 'No bearer of burdens will bear the burdens of another' and theological principles such as the Sunni tenet that people born in a community before its prophet arrives will not be held accountable for ignorance of God's religion. As we shall see in chapter 5, in the early period of Islam, if the Muslim community's practice agreed with a hadith then that hadith was considered reliable even if its isnād was poor. This was the same approach taken by the Late Sunni Tradition; if centuries of Muslim scholars had agreed that the meaning of a hadith was accurate, then ascribing it to the Prophet was acceptable as well. As Ibn al-Qayyim said, such a hadith, 'even if it has not been established as reliable, the fact that it has been acted on in all regions and eras with no rejection is sufficient for us to act on it.'102 Of course, this assumes that those centuries of Muslim scholars were right. AUTHENTICATING HADITHS BY DREAMS OR INSPIRATION Islamic civilization has accorded great credence to dreams or inspired visions in which Muslims encounter the Prophet. This is based on two sahīh hadiths: 'Nothing of prophethood will remain after me except righteous nightly dreams,'103 and 'Whoever has seen me in a dream has seen me while awake, for indeed Satan does not assume my form.'104 Seeing the Prophet in a dream is thus a reliable experience with probative value. Muslim jurists and legal theorists, however, have agreed unanimously that, while a vision of the Prophet may reveal truths to someone concerning personal matters, it cannot have any effect on law or formal relationships. It cannot excuse you from work or school.105 In the first few centuries of the hadith tradition, dreams and visions therefore played a colorful but ultimately superficial role in hadith authentication. Al-Tabarānī had a dream in which he asked the Prophet about the status of the hadith, 'The believers in their mercy towards one another are like a man part of whose body is in pain – the rest of his body feels the pain.' The Prophet replied 'Sahīh, sahīh, sahīh!' This hadith, however, had already been authenticated by al-Bukhārī and Muslim, so al-Tabarānī's inspired vision effected no change in its standing.106 The Late Sunni Tradition was characterized by a more prominent and novel method of facilitating hadith authentication: illuminating inspiration, or 'kashf' (literally, 'unveiling'). This method was developed by the influential and highly controversial Sufi systematizer Ibn 'Arabī (d. 638/1240). For Ibn 'Arabī, receiving revelatory inspi-ration (kashf) from contact with God's ultimate truth as reflected in the 'Muhammadan reality' (see chapter 7), was one of the three means by which a human could acquire sound religious knowledge. Unlike the other two methods, rational investigation and prophetic revelation, however, kashf allowed the saint on whom God bestowed this power to place the knowledge attained by these other methods in their proper place.107 As Ibn 'Arabī explained, weak hadiths are not valid proofs because they lack a reliable isnād. But some of these reports might in fact be real sayings of the Prophet that have gone unrecognized because of poor transmitters. If one could find a reliable isnād for such a hadith, then it could be acted on. A saint who receives direct, unveiling knowledge from God is like a Companion hearing this hadith from the Prophet, except that he hears it from the eternal Prophetic light. His inspiration can inform him that the Prophet actually said that hadith since, like a Companion, the saint is actually in the Prophet's presence. Like other legal theorists, however, Ibn 'Arabī acknowledges that a hadith authenticated by kashf cannot be used in legal arguments. But he does contend that kashf can reveal to a saint that a certain hadith that had been authenticated by traditional hadith criticism was in fact forged.108 Hadith critics of the Late Sunni Tradition adopted Ibn 'Arabī's belief that inspiration provided proof that a hadith was authentic provided that it did not affect law, although the technique has found little use outside the work of a few scholars like the North African Sufi 'Abd al-'Azīz al-Dabbāgh (d. 1719) (who claimed to have heard hadiths from the Prophet via the sole intermediary of the enigmatic character of Muslim legend, Khidr).109 Almost no critics have accepted that kashf could overrule a sahīh ruling arrived at by the traditional methods of hadith criticism. Some scholars have squarely rejected any allowance for kashf in hadith – the Egyptian Mālikī scholar Muhammad 'Illaysh (d. 1882) stated, 'There is no room for such laxity in the religion of God, and sainthood and miracles have no role in this issue [of hadith authentication]. Rather, recourse is to the hadith masters knowledgeable about this matter.'110 APPLYING HADITH CRITICISM TO THE REST OF ISLAMICCIVILIZATION: TAKHRĪJ AND MUSHTAHIR BOOKS By the 1200s the collection of hadiths had come to an end, and hadith scholars devoted themselves to consolidation, commentary, and criticism. With the hadith canon firmly established, hadith critics turned their attention away from hadith collections and towards the manner in which other areas of Islamic scholarship used hadiths. In books of takhrīj, a rash of which appeared during the 1300s and 1400s, a hadith scholar took a book from another genre and discussed the status of the hadiths it contained. Since few books outside hadith collections featured isnāds when they quoted hadiths, takhrīj books first provided all the hadith collections that provided chains of transmission for a hadith and then discussed its reliability. The earliest known takhrīj book was the work that 'Abd al-'Azīm al-Mundhirī (d. 656/1258) devoted to the Muhadhdhab, a major work of Shāfi'ī law written by Abū Ishāq al-Shīrāzī (d. 476/1083). Many takhrīj books devoted to works of Islamic law followed. The Hanafī al-Zayla'ī produced his famous Nasb al-rāya (Erecting the Standard), a takhrīj of the hadiths in the Hidāya, a formative Hanafī law book by al-Marghīnānī (d. 593/1196–7). Ibn al-Mulaqqin (d. 804/1401) and Ibn Hajar wrote their Badr al-munīr and Talkhīs al-habīr respectively, both devoted to the hadiths included in the major Shāfi'ī legal text of al-Rāfi'ī. Several takhrīj books dealt with the hadiths cited in prominent books of legal theory, such as Ibn Kathīr's Tuhfat al-tālib, which addressed the contents of Ibn al-Hājib's abridged treatise on legal theory. Ibn Hajar also devoted a takhrīj work to the Kashhāf, the famous Quranic commentary by al-Zamakhsharī (d. 538/1144). Renowned Sufi texts also attracted takhrīj's. Ibn Hajar's teacher Zayn al-Dīn al-'Irāqī (d. 806/1404) wrote a very critical takhrīj of the hadiths that the great Sufi al-Ghazālī had used as proof in his famous but controversial opus, the Ihyā' 'ulūm al-dīn (Revival of the Religious Sciences). Ibn Hajar's student, Shams al-Dīn al-Sakhāwī (d. 902/1497), wrote a takhrīj of al-Sulamī's popular Forty Hadith collection on Sufism. Later hadith scholars also directed their hadith criticism towards Muslim society as a whole. A whole genre of books emerged that took takhrīj 'to the streets,' examining hadiths that were widespread in Muslim society. Ibn al-Jawzī, Ibn Taymiyya, and al-'Irāqī each wrote a book analyzing and criticizing the often baseless hadiths recited by popular storytellers (qussās). Books of 'mushtahir,' or 'well-known,' hadiths examined hadiths popular in everyday Muslim life in order to determine if they had any basis in the Prophet's speech and judge their reliability. Badr al-Dīn al-Zarkashī (d. 794/1392) wrote the first known book in this genre. Al-Sakhāwī's al-Maqāsid al-hasana and Ismā'īl al-'Ajlūnī's (d. 1748-9) Kashf al-khafā' are the most famous books on mushtahir hadiths. HADITH CRITICISM CASE STUDY ONE: CAN YOU PUT YOUR SHOES ON STANDING OR NOT? Having traced the origins and development of Sunni hadith criticism, let us take a look at their methods in action. Our first case study is the report 'The Prophet forbade people from putting on their shoes while standing (nahā Rasūl Allāh 'an yanta'ila al-rajul qā'iman),' which appears in the Sunans of Ibn Mājah, al-Tirmidhī, and Abū Dāwūd, as well as the Tārīkh al-kabīr of al-Bukhārī and the Musnad of Abū Ya'lā al-Mawsilī. Figure 3.4 Hadith Prohibiting Putting on one's Shoes while Standing: the Transmission of Abū Hurayra This was not seen as an extremely important legal issue. Even those who upheld the authenticity of the hadith maintained that the Prophet was suggesting that people put on their shoes while seated because this was easier. But the question was the subject of some disagreement: the Tabaqāt of Ibn Sa'd and the Musannafs of Ibn Abī Shayba and 'Abd al-Razzāq al-San'ānī include reports that Aisha and the prominent Successor scholars Ibn Sīrīn, Ibrāhīm al-Nakha'ī, and al-Hasan al-Basrī all saw no problem with putting on one's shoes while standing. The Companion Abū Hurayra and the early scholar Yahyā b. Abī Kathīr, however, are reported to have discouraged the practice. Figure 3.5 Hadith Prohibiting Putting on one's Shoes while Standing: the Transmission of Anas b. Mālik The Muslim hadith critic's first step in evaluating a Prophetic trad-ition would be to collect all the available narrations of the report. These could be scattered everywhere from hadith collections to books of law, history, or Quranic exegesis. Once this was done, the critic would organize all these narrations according to the Companions who narrated them, since the transmission of each Companion is technically a hadith distinct from those of other Companions, who might have heard the report from the Prophet at another time. The critic would then examine the hadith of each Companion one by one to establish its reliability. Figure 3.6 Hadith Prohibiting Putting on one's Shoes while Standing: the Transmission of Jābir b.'Abdallāh To accomplish this, the critic would trace the different narrations of the various Successors from the Companion in question, then the narrations from the next generation after the Successor, et cetera, starting with the latest person in the isnād and working towards the source to evaluate the quality of the isnād. The critic would ask: is each link reliable? Did each link hear hadiths from their supposed source? If any narration from the Companion has a fatal flaw, such as a seriously weak transmitter or a clear break in the isnād, then it would be inadmissible as evidence. If a narration had a transmitter who was criticized for a lesser failing such as occasional errors or a bad memory, the critic would keep this narration in mind for consideration in comparison with the other narrations from the Companion or the Successor. Figure 3.7 Hadith Prohibiting Putting on one's Shoes while Standing: the Transmission of Ibn 'Umar If there were some disagreement in wording or form between the different versions of the narration from the Companion, then the critic would use the various strengths and weaknesses of the competing narrations, along with any data gleaned from weaker versions maintained for consideration, to choose the most reliable version. This task would then be performed for the next Companion's transmission from the Prophet. Once one Companion's hadith has been verified, the hadith is considered sahīh or hasan depending on its strength. If, in addition to one Companion's hasan narration, another Companion's narration was acceptable as well, then this could raise the tradition as a whole to the level of sahīh. Let us first examine the narration of Abū Hurayra (see Figure 3.4). We see that three Successors supposedly narrated this hadith from Abū Hurayra: Abū Sālih, 'Ammār b. Abī 'Ammār and 'Urwa b. 'Alī al-Sahmī. We can immediately dismiss the narrations of 'Ammār b. Abī 'Ammār and 'Urwa b. 'Alī al-Sahmī, for al-Tirmidhī and al-Bukhārī agree that the former is weak because of the presence in its isnād of al-Hārith b. Nubhān, who critics agree was unreliable. The narration of 'Urwa b. 'Alī is similarly baseless, for al-Bukhārī says it enjoys no corroboration, and there are two unknown transmitters in the isnād. This leaves us with the narration of Abū Sālih from Abū Hurayra. Here, however, we find disagreement among the two narrations from Abū Sālih's isnād. The version that Ibn Abī Shayba recorded from Abū Mu'āwiya in his Musannaf is not a Prophetic hadith at all, but rather the opinion of Abū Hurayra. The version that Ibn Mājah recorded from his teacher 'Alī b. Muhammad, from Abū Mu'āwiya, however, is a Prophetic hadith. Which version is correct? Both Ibn Abī Shayba and 'Alī b. Muhammad are respected and reliable hadith scholars; is there any way to judge whose version should be taken? Ibn Abī Shayba was one of the most prominent hadith transmitters of his generation, while 'Alī b. Muhammad served only as a source for hadith collectors in the northern Iranian cities of Rayy and the Qazvin, where he became an important source for Ibn Mājah. Although the rigorous critic Abū Hātim al-Rāzī, who studied with both Ibn Abī Shayba and 'Alī b. Muhammad, felt that 'Alī was more reliable for hadiths concerning the virtues of actions and righteous behavior, Ibn Abī Shayba was in general in command of more hadiths and possessed of a better understanding of his craft. Because the hadith of putting on one's shoes is a legal issue, Abū Hātim's testimony would lead us to incline towards Ibn Abī Shayba's mawqūf (Companion) version of the report. More important, however, is the conclusion of the great critic al-Dāraqutnī, who introduces another Companion version of the report narrated from al-A'mash by Ibrāhīm al-Ru'āsī. Since it is the Companion version that enjoys corroboration and the preponderance of evidence, al-Dāraqutnī concludes that the hadith is really the opinion of Abū Hurayra and not a Prophetic hadith. Turning to the narration of the hadith from the Prophet by Anas b. Mālik (see Figure 3.5), found in al-Tirmidhī's Jāmi' and the Musnad of Abū Ya'lā al-Mawsilī, we see that al-Tirmidhī and al-Bukhārī categorically state that this narration by Ma'mar from Qatāda has no basis (asl). Al-Tirmidhī does not even think the narration is worthwhile enough to inform us of his immediate source for this particular version. In the case of Abū Ya'lā's narration, it seems probable that Sulaymān b. 'Ubaydallāh, deemed weak by many critics, erred in his narration from his father and turned a Successor opinion transmitted by Ma'mar into a Prophetic hadith. The transmission of the report from Jābir b. 'Abdallāh is also not admissible as proof of the hadith's reliability (see Figure 3.6). The hadith was transmitted from Jābir by Abū al-Zubayr al-Makkī, who did not hear all the sahīfa of Jābir from him through direct transmission. This means that, unless Abū al-Zubayr explicitly states that he heard this hadith aurally from Jābir, there is too much chance that Abū al-Zubayr could commit an error in his reception of the report for his testimony to be reliable. Of the three versions we have examined so far, one has turned out to be a Companion opinion in reality and two are unreliable. This is not the case, however, for the hadith narrated by the Companion Ibn 'Umar in Ibn Mājah's Sunan (see Figure 3.7). The isnād of this narration seems to be extremely strong – all its transmitters were highly respected, and there are no evident breaks in the isnād. So far the first two steps of the three-tiered hadith critical method (Is there an isnād? Who is in the isnād?) have proceeded successfully. But there seems to be no corroboration for this transmission. This seems very odd in light of how famous the scholars in the isnād were and how prolifically they transmitted hadiths. It seems very unlikely that only one person would transmit this from Sufyān al-Thawrī, who was the most sought-after scholar of his day. It is equally bizarre that only one person would transmit this hadith from Wakī', who was another pillar of hadith transmission. Should this lack of corroboration from scholars who, it would seem, should have students spreading this hadith far and wide, lead us to doubt the reliability of this report from Ibn 'Umar? The nature of these transmitters' relationships with one another lessens our worries. Wakī' was the leading disciple of Sufyān, so much so that he was called 'The Transmitter of Sufyān (rāwiyat Sufyān),' and when Sufyān died Wakī' took up his place teaching in the mosque. Although 'Alī b. Muhammad was not as famous as these two earlier generations, he was in Kufa for many years with Wakī' and did not emigrate from the city to his new home in Qazvin until after Wakī''s death. None of the transmitters in the isnād, then, were students who studied only briefly with their sources for the hadith; all were long-term students or senior disciples, so it is not surprising that they might have heard some hadiths from their teachers that other students who had less exposure to them did not. The report from Ibn 'Umar thus seems reliable. Its lack of corroboration may cause us enough concern, however, to deem it hasan instead of sahīh. This is, in fact, how many later hadith critics judged this hadith. Al-Nawawī and al-'Irāqī called it hasan. Al-'Irāqī's student, the famous Ibn Hajar, notes that while some of the transmissions of the report are weak the tradition is 'established (ma'rūf).' Al-Būsīrī states that the hadith is sahīh based mainly on the transmission of Ibn 'Umar in the Sunan of Ibn Mājah. The modern hadith scholars al-Albānī and Khaldūn al-Ahdab also deem the hadith authentic. HADITH CRITICISM CASE STUDY TWO: CONDEMNING BELIEF IN FREE WILL This case study deals with a much more controversial topic: do human beings have free will or has God preordained their actions? Some Muslim schools of theology, such as the Mu'tazila, affirmed free will because they insisted that God was totally just (how could He punish people for deeds He ordained for them?). For Sunni Islam, however, the question was more one of power than justice. Sunni theologians wanted to protect the notion of God's power (qadar), namely His power to know eternally what all human actions would be. If humans were free to choose, they thought, this would give humans power beyond God's knowledge. Sunni scholars thus insisted that God predestined a person's fate in the womb. How this could be reconciled with the justice of God punishing the bad and rewarding the good in the afterlife was a divine mystery beyond human ken. The two traditions discussed here address the early Islamic school of thought that believed in free will, referred to by Sunnis as the Qadariyya (or Qadarites). One hadith refers to them as Zoroastrians (majūs) because Zoroastrians believe in two deities, a benevolent creator god and a god of darkness. For Sunnis, believing that humans possessed a power beyond the control of God was tantamount to elevating them to godlike status; hence, a second god. The second group referred to in one of the hadiths, the Murji'a, was a school of thought that believed in suspending judgment about people's fate in the afterlife. Chapters condemning the Qadarites were commonplace in the Sunni hadith collections of the ninth and tenth centuries, and a huge number of elaborate hadiths were forged denigrating that theological position. Here we will examine two of the more reliable (from a Sunni perspective) hadiths on the subject. They are instructive because they illustrate well the difference between the criticism of narrations and those of the traditions they constitute. We also see how later critics could take advantage of this distinction in their rulings on authenticity. As we shall see, all but two of the following narrations were declared decidedly 'weak' or even forged by hadith critics in the early period, and even the one narration that might rise to the level of hasan still suffered from serious flaws. Early critics like al-Bukhārī, Ibn 'Adī, and al-'Uqaylī (d. 323/934) pointed out the flaws in these individual narrations, assuming their learned audience would know that such errors had no bearing on other narrations of the same traditions. When the twelfth-century scholar Ibn al-Jawzī wrote his influential collection identifying forged hadiths, however, he declared both the traditions examined here to be forged altogether. Figure 3.8a Hadith 1 on the Qadarite Heresy: 'Two types...' – the Narration of Ibn 'Abbās The first hadith is the Prophet's statement 'Two types from my community have no share in Islam: the Murji'ites and the Qadarites,' with some narrations including variations such as the phrase that these two groups 'will not gain my intercession.' As Figure 3.8a illustrates, a main narration of this tradition comes through the Companion Ibn 'Abbās via his student 'Ikrima. This narration is only transmitted from 'Ikrima by Nizār and Sallām, both of whom are harshly criticized by a wide range of hadith critics. Moreover, the individual narrations from transmitters like 'Abdallāh al-Laythī have each been identified as unacceptable (munkar), due to a lack of corroboration, or declared false by early critics such as Ibn 'Adī and al-'Uqaylī. As a result of all this, the tradition from Ibn 'Abbās has uniformly been declared weak by scholars such as al-Khatīb al-Baghdādī, al-'Alā'ī, Ibn Hajar, al-Suyūtī, al-Albānī, and others. Figure 3.8b Hadith 1 on the Qadarite Heresy: Sundry Narrations As Figure 3.8b shows, there were other narrations of this 'Two types...' tradition as well. Like the version through Ibn 'Abbās, all these narrations were declared unreliable by Muslim scholars at various times. For several of the narrations, we see the problem of a lack of corroboration. This raised suspicions because it might be an instance of a sinister forger 'stealing' an isnād from an existing hadith and attaching it to a concocted matn. Or it might be the result of a careless transmitter accidentally creating a whole new, baseless transmission for a hadith. Looking at each narration from left to right on the chart, we see: • The narrations from the Companion Anas b. Mālik found in the Hilyat al-awliyā' (Ornament of the Saints) of Abū Nu'aym al-Isbahānī (d. 430/1038) and the Ibāna al-kubrā (Greater Clarification) of the Hanbalī theologian Ibn Batta (d. 387/997) each depend on transmitters who are either wholly unidentified or whose reliability is unknown (majhūl al-hāl). • The narration through Anas Humayd in the Mu'jam al-awsat of al-Tabarānī comes via transmitters who are all reliable, according to al-Haythamī. But they are not common transmitters from one another, and al-Tabarānī himself boasts of how no one besides Abū Damra Anas b. 'Iyād narrated this from Humayd, and no one besides Hārūn narrated it from Abū Damra. Because of the total lack of corroboration from this transmission, Ibn 'Adī calls this narration 'unknown (munkar).' • The two narrations from the Companion Jābir b. 'Abdallāh are also both found in al-Tabarānī's Mu'jam. Bahr al-Saqqā' was so incredibly unreliable that one early critic recalled that, after he had written down some hadiths from Bahr, a cat, sensing the value of the material, came and urinated on the pages. As for the narration via Sahl b. Qarīn, al-Tabarānī boasts that only Sahl narrated this from his father, from the famous jurist Ibn Abī Dhi'b. But, as Ibn 'Adī notes, this narration is a gross error on the part of Sahl. • The narration via the Kufan jurist Ibn Abī Laylā 'Amr b. Qāsim, also in al-Tabarānī's Mu'jam al-awsat, is unreliable because 'Amr was known for lacking corroboration for his narrations. • The narration from Ibn Abī Laylā that is found in the Kitāb al-sunna of Ibn Abī 'Āsim (d. 287/900) is an isolated narration and relies on a weak transmitter, Sulaymān b. Ja'far. The second tradition regarding Qadarites quotes the Prophet as saying, 'The Qadarites/those who deny God's power (qadar) are the Zoroastrians of my nation....' Although al-'Uqaylī noted that all its narrations are via weak transmitters, some were reliable enough to earn the tradition an overall rating of sahīh from al-Hākim al-Naysābūrī and hasan from al-Albānī. Looking at Figure 3.9, from left to right, we see: • The most reliable narration is found in the Sunan of Ibn Mājah and comes from the Companion Jābir b. 'Abdallāh, via a chain of strong transmitters, until Baqiyya b. al-Walīd. Although Ibn 'Adī noted that Baqiyya would often narrate from Ibn Jurayj via unmentioned intermediaries – a major violation – in this case he names as his intermediary the leading jurist and hadith transmitter of Syria, al-Awzā'ī. • The narrations from Ibn 'Umar via Salama b. Dīnār (Abū Hāzim) Zakariyyā b. Yahyā b. Manzūr, found in the Mu'jam al-awsat of al-Tabarānī and the Kitāb al-sunna of Ibn Abī 'Āsim, are dismissed as unreliable because al-Bukhārī, Ibn Ma'īn, al-Nasā'ī, and others said Zakariyyā was very weak. Moreover, as Ibn 'Adī notes, only Zakariyyā's narration from Salama includes Salama specifying that he heard the hadith from Nāfi'. This is important, since Ibn Hajar states that it is largely agreed upon that Salama did not hear directly from the Companion Ibn 'Umar. If the narration from Nāfi' Salama is unreliable, then the only remaining narrations from Salama come through Ibn 'Umar Salama, which includes a break in the isnād. Some critics, such as al-Hākim al-Naysābūrī and Ibn al-Qattān of Fez (d. 628/1230), considered this narration sahīh provided (and this is a big provided!) that Salama had heard hadiths directly from Ibn 'Umar. Figure 3.9 Hadith 2 on the Qadarite Heresy: 'The Zoroastrians of my nation ...' • The narrations from Ibn 'Umar via 'Umar b. 'Abdallāh, the freeman of Ghufra, appear in works like the Sunan of Abū Dāwud and the Musnad of his teacher Ibn Hanbal. 'Umar the freeman of Ghufra was a moderately respected transmitter whose main fault was frequent mursal narrations, i.e., quoting a Companion without specifying that he heard the hadith from an intermediary (as in the case of one narration in the Musnad of Ibn Hanbal). This is compensated for by his specifying in another narration in the Musnad that he heard the hadith from Ibn 'Umar Nāfi'. But, as Ibn 'Adī and al-Albānī point out, the lack of clarity constitutes a flaw ('illa) in the narration. • There is also a narration through 'Umar of Ghufra via an unnamed man from the Medinan Ansār, from the Companion Hudhayfa b. Yamān, found in the Sunan of Abū Dāwūd and Ibn Hanbal's Musnad. It includes an additional clause in the matn: '... and they are the party of the Antichrist, and it befits God to join them with him.' This narration is unreliable because of the unidentified transmitter. • One narration via Nāfi' bypasses the problem of 'Umar of Ghufra. According to al-Bukhārī and Ibn 'Adī, however, it is fatally flawed (munkar) because it is known only through the unreliable al-Hakam b. Sa'īd. • Finally, the narrations of the hadith from the Companion Abū Hurayra are hopelessly tangled. These are found in several works from the tenth century, but the earliest source for them is the Kitāb al-qadar of Ja'far al-Faryābī (d. 301/913) and the Kitāb al-sunna of Ibn Abī 'Āsim (narrations not shown). They all come through the Syrian Successor Makhūl. But one comes through an unidentified 'man,' while the others have Makhūl citing Abū Hurayra, whom he never met, and come through the problematic transmitter 'Atā' al-Khurāsānī. The one narration that features Makhūl narrating from Abū Hurayra via an intermediary, the prominent Successor of Mecca, Ibn Abī Rabāh, is known to us only via Maslama b. 'Alī, who is criticized for this uncorroborated narration. Conclusion: Rating these Two Hadiths With the exception of the narration of the 'Qadariyya are the Zoroastrians...' hadith from Jābir in the Sunan of Ibn Mājah, every narration of these two traditions is either impugned for weak transmitters, lack of corroboration, or both. Looking at these narrations as particulars, Ibn al-Jawzī thus considered the two hadiths to be complete forgeries. Most later scholars, however, defended the overall acceptability of our two hadiths. Responding to what they thought was an extreme ruling by Ibn al-Jawzī, al-'Alā'ī, Ibn Hajar, al-Suyūtī, and most recently Ahmad al-Ghumārī and al-Albānī all defended these two hadiths. They argued that most of the narrations are weak, but they do not merit the label of outright forgeries. When they are aggregated, the hadiths even rise to the level of hasan. Several scholars took a middle ground. Al-Munāwī labeled both hadiths as weak, and the Hanafī scholar Ibn Abī al-'Izz (d. 792/1390) declared simply that all hadiths on the Qadariyya are weak.111 SUGGESTIONS FOR FURTHER READING For further information on hadith criticism and its historical development, see Ignaz Goldziher's Muslim Studies II, Muhammad Siddiqi's Hadith Literature (Cambridge, 1996), Eerik Dickinson's The Development of Early Sunnite H.adīth Criticism (Leiden, 2001), and Jonathan Brown's The Canonization of al-Bukhārī and Muslim (Leiden, 2007). For a work specifically discussing the contributions of Sunni hadith critics, see Scott Lucas, Constructive Critics, H.adīth Literature and the Articulation of Sunnī Islam (Leiden, 2004). See also Brown, 'Critical Rigor versus Juridical Pragmatism,' Islamic Law and Society 14, no. 1 (2007), pp.1–41. For more depth on the issue of content/matn criticism of hadiths, see J. Brown, 'How We Know Early Hadith Critics Did Matn Criticism and Why It's So Hard to Find,' Islamic Law and Society 15 (2008), pp.143–184 and the same author's 'The Rules of Matn Criticism: There Are No Rules,' Islamic Law and Society 19 (2012), pp. 356–396. For more on how sure Muslims scholars were that the Prophet had said something and debates over using hadiths scholars knew were unreliable, see the author's 'Did the Prophet Say It or Not?: the Literal, Historical and Effective Truth of Hadiths in Sunni Islam,' Journal of the American Oriental Society, 129, no. 2 (2009), pp. 1–27; and 'Even if it's not True it's True: Using Unreliable Hadiths in Sunni Islam,' Islamic Law and Society 18 (2011), pp. 1–52. Two useful primary sources for the method of hadith criticism in the early period are G.H.A. Juynboll's 'Muslim's Introduction to His Sahih,' republished in Studies on the Origins and Uses of Islamic Hadīth (Variorum, 1996) and J. Brown's translation of The Kitab al-'Ilal of Imam al-Tirmidhi (Madina Institute, 2018). Eerik Dickinson has translated one of the most important Muslim texts on the technical terms of hadith study, the Muqaddima of Ibn al-Salāh, into English under the title An Introduction to the Science of Hadith (Reading, UK, 2005). James Robson has also translated an earlier and shorter manual on hadith criticism by al-Hākim al-Naysābūrī entitled An Introduction to the Science of Tradition (London: Luzac & Co., 1953). A recent example of traditional Muslim hadith criticism is Zafar Ahmad al-Tahānawī's (d. 1974) Qawa'id fi Ulum al-Hadith: Principles of the Sciences of Hadith (London: Turath Publishing, 2014). A translation of a representative book of mawdū'āt (forged) hadiths is Mullā 'Alī al-Qārī's Encyclopedia of Hadith Forgeries, trans. G.F. Haddad (Beacon Books, 2013). Ibn al-Jawzī's fascinating book on storytellers, popular preachers, and their abuse of hadiths has been translated into English by Merlin Swartz as Ibn al-Jawzī's Kitāb al-Qus.s.ās. wa'l-Mudhakkirīn (Beirut: Dar El-Machreq, 1986). ENDNOTES 1 Benjaminson and Anderson, Investigative Reporting, p. 30. 2 'Pet food: too posh to eat pooch,' The Economist, June 20, 2015. 3 Al-Dhahabī, Mīzān al-i'tidāl, vol. 2, p. 293. 4 Ibid., vol. 3, p. 517. 5 Cited from al-Madā'inī's Kitāb al-ahdāth; Ahmad b. Sa'd al-Dīn al-Miswarī, Al-Risāla al-munqidha min al-ghiwāya fī turuq al-riwāya, pp. 51–55. 6 'Abdallāh b. al-Zubayr al-Humaydī, Al-Musnad, vol. 1, p. 2. 7 'Abd al-Razzāq al-San'ānī, Musannaf, vol. 10, p. 381. 8 Sahīh Muslim: kitāb al-janā'iz, bāb al-mayyit yu'adhdhabu bi-bukā' ahlihi 'alayhi. 9 Musnad Ibn Hanbal: vol. 6, p. 246. 10 Abū Zur'a al-Dimashqī, Tārīkh Abī Zur'a al-Dimashqī, p. 270. 11 For an example, see al-Dhahabī, Mīzān al-i'tidāl, vol. 2, p. 369. 12 Ismā'īl b. Ahmad al-'Ajlūnī, Kashf al-khafā', vol. 1, p. 227. 13 'Kuntu 'ind al-nabī dhāt layla qāl: unzur hal tarā fī al-samā' min shay' ...'; Musnad Ibn Hanbal: vol. 1, p. 209. 14 Al-Suyūtī, al-La'ālī' al-masnū'a fī al-ahādīth al-mawdū'a, vol. 1, p. 357. 15 Al-Rāfi'ī, al-Tadwīn fī akhbār Qazwīn, vol. 1, p.452. 16 Osama al-Syed Mahmoud, personal communication 2/06. 17 Al-Suyūtī, al-La'ālī al-masnū'a, vol. 1, p. 16; vol. 2, p. 221. 18 Al-Khatīb, Tārīkh Baghdād, vol. 9, p. 334; vol. 2, p. 379. 19 9 Mullā 'Alī Qārī, al-Asrār al-marfū'a fī al-akhbār al-mawdū'a, p. 442. 20 Ibid., p. 236; Ibn al-Jawzī, Kitāb al-mawdū'āt, vol. 1, p. 41. 21 Al-Dhahabī, Mīzān al-i'tidāl, vol. 1, p. 187; Qādī 'Iyād, Kitāb al-shifā, p. 226. 22 Al-Hākim al-Naysābūrī, Kitāb al-madkhal ilā ma'rifat kitāb al-iklīl, pp. 134–135. 23 Ibn 'Adī, al-Kāmil fī du'afā' al-rijāl, vol. 1, p. 151. 24 Al-Dhahabī, Mīzān al-i'tidāl, vol. 1, p. 141. 25 Ibn al-Jawzī, Kitāb al-mawdū'āt, vol. 1, p. 39. 26 Ibn Hajar, Fath al-bārī, vol. 1, p. 266. 27 Al-'Ajlūnī, Kashf al-khafā', vol. 1, pp. 412–413. 28 Mullā 'Alī Qārī, al-Masnū' fī ma'rifat al-hadīth al-mawdū', p. 121. 29 Al-'Ajlūnī, Kashf al-khafā', vol. 1, pp. 319–320; Ibn Abī Hātim al-Rāzī, 'Ilal al-hadīth, vol. 2, p. 342. 30 Sahīh Muslim: muqaddima, bāb al-isnād min al-dīn. 31 Al-Albānī, Silsilat al-ahādīth al-da'īfa wa al-mawdū'a, vol. 1, p. 53. 32 2 Jonathan Brown, 'How We Know Early H.adīth Critics Did Matn Criticism,' pp. 170–171. 33 Sahīh Muslim: muqaddima, bāb al-isnād min al-dīn. 34 Al-Hākim, Kitāb al-madkhal ilā ma'rifat kitāb al-iklīl, p. 58. 35 Lucas, Constructive Critics, pp. 143–156. 36 Abū Ghudda, ed., Arba' rasā'il fī 'ulūm al-hadīth, p. 180. 37 Abū Ja'far al-'Uqaylī, Kitāb al-du'afā' al-kabīr, vol. 1, p. 13. 38 Sahīh Muslim: muqaddima, introduction. 39 Al-'Uqaylī, Kitāb al-du'afā' al-kabīr, vol. 1, p. 13. 40 Al-Khatīb, Tārīkh Baghdād, vol. 10, p. 260. 41 Al-Dhahabī, Mīzān al-i'tidāl, vol. 1, pp. 218 ff. 42 Muhammad Ibn al-Amīr al-San'ānī, [Question and Answer], 38b. 43 Muhammad b. 'Aqīl, al-'Atb al-jamīl 'alā ahl al-jarh wa al-ta'dīl, p. 92. 44 Al-Dhahabī, Mīzān al-i'tidāl, vol. 2, p. 205. 45 Ibn Abī Hātim, al-Jarh wa al-ta'dīl, vol. 2, p. 37. 46 Al-Mundhirī, Jawāb al-hāfiz al-Mundhirī, p. 89. 47 Al-Dhahabī, Mīzān al-i'tidāl,vol. 4, p. 237. 48 Al-'Irāqī, al-Taqyīd wa al-īdāh, p. 231. 49 Sahīh al-Bukhārī: kitāb fadā'il al-sahāba, bāb 1. 50 Al-Khatīb, al-Kifāya, vol. 1, p. 188. 51 Ibn Taymiyya, Majmū'at al-fatāwā, vol. 27, p. 223. 52 'Alī Jum'a, personal communication, 8/27/03. 53 Jum'a, Qawl al-sahābī 'ind al-usūliyyīn, p. 34. 54 For example, the Prophet's stepson Hind b. Abī Hāla; al-Bukhārī, Kitāb al-du'afā' al-saghīr, p. 123. 55 Abū Ghudda, Arba' rasā'il fī 'ulūm al-hadīth, pp. 111, 207; J. Brown, 'Crossing Sectarian Boundaries in the 4th/10th Century,' pp. 55–58. 56 Abū Zur'a al-Dimashqī, Tārīkh Abī Zur'a al-Dimashqī, p. 93. 57 Ibn Abī Hātim al-Rāzī, al-Taqdima, p. 127. 58 Salāh al-Dīn al-'Alā'ī, Jāmi' al-tahsīl fī ahkām al-marāsīl, p. 80. 59 Jāmi' al-Tirmidhī: kitāb al-'ilal, bāb al-mursal. 60 Ibn Hibbān al-Bustī, Sahīh Ibn Hibbān, vol. 1, pp. 144–145. 61 Sahīh Muslim: muqaddima, introduction. 62 Al-Dhahabī, Mīzān al-i'tidāl, vol. 2, pp. 440–441. 63 Sahīh Muslim: muqaddima, introduction. 64 Jāmi' al-Tirmidhī: kitāb al-jihād, bāb mā jā'a fī al-mighfar. 65 Jāmi' al-Tirmidhī: kitāb al-'ilal; kitāb al-birr wa al-sila, bāb mā jā'a fī adab al-walad. 66 Al-Khalīlī, Al-Irshād, p. 21. 67 J. Brown, 'Critical Rigor versus Juridical Pragmatism,' p. 21 ; 'Alī b. 'Umar al-Dāraqutnī, Kitāb al-ilzāmāt wa'l-tatabbu', ed. Muqbil al-Wādi'ī (Medina, al-Maktaba al-Salafiyya, [1978]), pp. 266–7. 68 J. Brown, 'Critical Rigor,' pp. 38–41. 69 Badī' al-Sayyid al-Lahhām, al-Imām al-hāfiz Jalāl al-Dīn al-Suyūtī, pp. 460–463. 70 Al-Dhahabī, Mīzān al-i'tidāl, vol. 3, p. 306. 71 Al-Bukhārī, al-Tārīkh al-awsat, vol. 2, pp. 109–110. 72 Muslim, Kitāb al-tamyīz, p. 147. 73 Ibn al-Murtadā, Tabaqāt al-mu'tazila, p. 81. 74 This is attributed to 'Alī b. al-Madīnī; Ibn 'Adī, Al-Kāmil, vol. 1, p. 131. 75 Sunan al-Nasā'ī: kitāb al-janā'iz, bāb al-niyāha 'alā al-mayyit. 76 Ibn Qutayba, Ta'wīl mukhtalif al-hadīth, p. 208. 77 Ibn 'Abd al-Barr, Kitāb al-tamhīd, vol. 1, p. 58. 78 Jāmi' al-Tirmidhī: kitāb al-'ilal. 79 Al-Dhahabī, Mīzān al-i'tidāl, vol. 1, p. 119. 80 Al-Husayn b. Ibrāhīm al-Jawzaqānī, al-Abātīl wa al-manākīr, pp. 89–90. 81 Ibn al-Jawzī, Kitāb al-mawdū'āt, vol. 1, p. 106. 82 J. Brown, 'The Rules of Matn Criticism,' pp. 364, 376–80. 83 Ibn Khuzayma, Sahīh Ibn Khuzayma, vol. 1, p. 3. 84 Ibn Hajar, al-Nukat 'alā kitāb Ibn al-Salāh, p. 134. 85 Ibn Taymiyya, Majmū'at al-fatāwā,vol. 18, p. 23. 86 Jāmi' al-Tirmidhī: kitāb al-'ilal. 87 Hamd al-Khattābī, Ma'ālim al-sunan, vol. 1, p. 6. 88 Ibn Abī Hātim, al-Jarh wa al- ta'dīl, vol. 2, pp. 30–31. 89 Al-Khatīb, al-Kifāya fī ma'rifat usūl 'ilm al-riwāya, vol. 1, p. 399. 90 Al-Khatīb, al-Jāmi', vol. 2, p. 195. 91 J. Brown, 'The Rules of Matn Criticism,' pp. 362–64 92 Abū Bakr al-Jassās, Usūl al-Jassās, vol. 1, pp. 504 ff., 2, pp. 3–6, 14. 93 Ibn al-Salāh, Muqaddima, p. 454. 94 Ibn Hibbān, Sahīh Ibn Hibbān, vol. 1, p. 145. 95 Jamāl al-Dīn al-Zayla'ī, Nasb al-rāya li-ahādīth al-Hidāya, vol. 1, p. 342. 96 Al-Dhahabī, Siyar a'lām al-nubalā', vol. 17, p. 175. 97 Al-Nawawī, al-Adhkār, p. 214. 98 Ibn Taymiyya, Majmū'at al-fatāwā, vol. 19, p. 144. 99 Al-Nawawī, Sharh Sahīh Muslim, vol. 1, p. 240; al-Suyūtī, 'al-Ta'zīm wa al-manna fī anna abawayh rasūl Allāh fī al-janna,' p. 2. 100 Mullā 'Alī Qārī, Al-Asrār al-marfū'a, p. 305. 101 Al-'Ajlūnī, Kashf al-khafā', vol. 1, pp. 236–237. 102 Ibn Qayyim al-Jawziyya, Kitāb al-rūh, p. 32. 103 Mālik, al-Muwatta': kitāb mā jā'a fī al-ru'ā. 104 Sunan Ibn Mājah: kitāb ta'bīr al-ru'ā, bāb ru'yat al-nabī. 105 See 'Abd al-Rā'ūf al-Munāwī, Fayd al-qadīr sharh al-Jāmi' al-saghīr, vol. 11, pp. 5805–6. 106 Al-Rāfi'ī, al-Tadwīn fī akhbār Qazwīn, vol. 1, p. 309. 107 William Chittick, Imaginal Worlds, p. 10. 108 Chittick, The Sufi Path of Knowledge, pp. 251–252. 109 John Voll, 'Two Biographies of Ahmad Ibn Idris al-Fasi (1760–1837),' p. 641. 110 Mullā 'Alī Qārī, Al-Masnū', p. 216. See also, al-Sakhāwī, Maqāsid, p. 424. 111 Ibn al-Jawzī, Kitāb al-Mawdū'āt, vol. 1, pp. 275–278; Ibn Abī al-'Izz, Sharh al-'Aqīda al-Tahāwiyya, p. 273; Ibn Hajar, Hidāyat al-ruwāt, vol. 1, p. 102; al-Suyūtī, al-La'ālī al-masnū'a, vol. 1, pp. 236–240; al-Munāwī, Fayd al-qadīr, vol. 7, p. 3743, vol. 8, p. 4398; Ahmad al-Ghumārī, al-Mudāwī, vol. 4, p. 638; al-Albānī, Da'īf Sunan Ibn Mājah, p. 11, idem, Silsilat al-ahādīth al-da'īfa, vol. 12, pp. 481–482. * The early scholar al-Dārimī (d. 255/869) interpreted 'Umar's command 'Be frugal in narrating from the Prophet' to apply only to reports about his battles, not to hadiths about law and belief; Sunan al-Dārimī: intro chapters, bāb man hāba al-futyā. PROPHETIC TRADITIONS IN SHIITE ISLAM INTRODUCTION Muhammad's authority to interpret definitively the meaning of the Quran and instruct Muslims did not disappear when he died. It continued in the form of an inheritance left to the Muslim community. To a large extent, sectarian divisions in Islam have revolved around competing claims over who should assume this role of authoritative interpreter. The tradition that became Sunni Islam offered one answer: the community as a whole, represented by the ulema (the Muslim scholarly class), was heir to Muhammad. Their collective interpretation of Islam, expressed through consensus (ijmā'), was as definitive as the Quran or the Prophet's edicts. The tradition that would become Shiite Islam proposed a different answer: the family of the Prophet had inherited his authority, which was held by select members of the family known as imams. The first imam was 'Alī b. Abī Tālib (d. 40/660), Muhammad's cousin and the husband of his daughter Fatima, through whom all descendants of the Prophet trace their ancestry. Shiites maintain that the Prophet had imparted his knowledge to 'Alī, and through 'Alī to his descendants. When one of these revered descendants, Mūsā al-Kāzim (d. 183/799), was asked if the Prophet had brought mankind all the knowledge they would require to understand their religion and if any of that had been lost, he replied, 'No, it is with his family.'1 Mūsā's father, Ja'far al-Sādiq (d. 148/765), had given the same answer. The Quran contains the answers to all questions, he said, 'but men's minds cannot grasp them.' For an imam in whose veins the Prophet's esoteric knowledge of God's will runs, however, he can see these answers in the Quran 'as easily as he looks at his own palm.'2 Hadiths were one medium for transmitting the Prophet's legacy through the generations of his community as they expanded outwards from Medina in time and space. Since Shiism had a different vision of the heirs to the Prophet's authority, it is no surprise that the Shiite hadith tradition differs greatly from its Sunni counterpart. As the majority of the world's Shiites subscribe to the Imami, or Ithna'asharī ('Twelver,' so called because it traces the Prophetic authority through twelve imams) creed, and since Imami hadith scholarship has dwarfed that of other Shiite sects, in this chapter we will focus mainly on the Imami Shiite hadith tradition. We will then turn our attention briefly to Zaydi Shiite hadith scholarship. As in the previous chapters, mention of 'authentic' or 'forged' hadiths refers to Muslim standards for reliability, not Western historical ones. In Sunni Islam, hadiths were reports transmitted from the only individual that Sunnis deemed infallible: the Prophet Muhammad. In Imami Shiite Islam, the infallibility of the Prophet lived on in the form of the imams, each one appointing one of his sons as the next imam. Not only were these imams therefore the best source for sayings of the Prophet, they themselves were sources of their own hadiths. The vast majority of Imami Shiite hadiths thus occur in one of three forms: 1 A hadith of the Prophet is transmitted through an isnād made up of the imams after him. 2 The saying of an imam is transmitted from him by later imams. 3 The saying of an imam is transmitted from him via an isnād of his followers. Figure 4.0 The Twelve Imams Figure 4.1 Forms of Imami Shiite Hadiths Whether a hadith originated with the Prophet or an imam, or whether or not the isnād between an imam and the Prophet was complete was of no importance. After all, imams were infallible and spoke with the inherited authority of the Prophet. A famous Shiite hadith makes this amply clear. The sixth imam, Ja'far al-Sādiq, is reported to have said: My hadiths are the hadiths of my father, and the hadiths of my father are the hadiths of my grandfather, and the hadiths of my grandfather are the hadiths of al-Husayn, and the hadiths of al-Husayn are the hadiths of al-Hasan, and the hadiths of al-Hasan are the hadiths of the Commander of the Faithful ('Alī b. Abī Tālib) (s), and the hadiths of the Commander of the Faithful are the hadiths of the Messenger of God (s), and the hadiths of the Messenger of God are the words of God most high.3 Shiites also sometimes narrated hadiths from the Prophet via his Companions in the same manner as Sunnis. But as we will discuss below, this was generally done for polemical purposes. There was little reason for Shiites to rely on the all-too-fallible Companions of the Prophet when they believed that the imams who descended from him were immune to deception or misguidance. THE DEVELOPMENT OF EARLY SHIITE HADITH LITERATURE Three major events defined the Imami Shiite community and had a formative influence on its hadith tradition. First, the failure of the early Muslims to acknowledge collectively that 'Alī and his descendants should have been the rightful political and religious rulers in Islam made the idealistic Sunni vision of the early Muslim community untenable. Unlike the categorical trust that Sunnis placed in the reliability of the Companions as hadith transmitters, Shiites believed that even this founding generation had failed. Any Companion who did not support 'Alī's claim to succeed the Prophet was at best complicit with injustice, at worst an active denier of the truth. Second, for the Imami Shiites, like other Shiite groups who identified religious leadership with the Prophet's descendants, this reliance on the family of the Prophet resulted in a crisis when the line of imams seemed to come to an end. In 260/874, Hasan al-'Askarī, the eleventh imam, died in captivity in the Abbasid court. A young man, he had no heir that the public knew of. The Shiite imams had served as the authoritative interpreters of the Quran, the Prophet's legacy, and Islam in general for their followers. Who now would meet this need? Some members of the Shiite community claimed that the eleventh imam had indeed had a son, who had been hidden away by the community from the Abbasid caliph. Tired of the unjust and iniquitous world, the infant boy had vanished in an underground cave in Samarra, to return in the future as the rightly guided Messiah (Mahdī) and 'fill the world with justice as it had been filled with injustice.' In the coming decades, certain members of the community claimed to be in contact with the 'Hidden Imam,' even delivering questions posed by members of the community to him. Eventually the prominent Shiite noble Ibn Rawh al-Nawbakhtī formalized this function, announcing that he and two predecessors were 'ambassadors (safīr)' of the Hidden Imam.4 In 329/941 the third formative event occurred: the last of the 'ambassadors' died. This controversial office, claimed disputably by many, proved too problematic to both the Hidden Imam and his community, and all contact between the two would be cut off until the Imam's return. The last 'ambassador' informed his followers soon before his death that the Hidden Imam had instructed him that anyone from that point on who claimed contact with the Imam was a fraud.5 The Shiite community, who had held that God would not leave His community without an authoritative interpreter of His religion, found itself completely alone. This duty would now fall upon the shoulders of the scholars. Although not in contact with him, they would act as the Hidden Imam's regents until his return. It is in this period of crisis, beginning with the initial disappearance of the twelfth imam and reaching a crescendo with his ultimate occultation (passing into a state of supernatural seclusion), that we find the earliest development of Imami Shiite doctrine and hadith. First, the Imami community, with its centers at Qumm and Rayy in Iran, would have to distinguish itself from other Shiite groups who believed that it was in fact earlier imams who had represented the end of the earthly Alid line and would return as the awaited Mahdī. Hasan b. Mūsā al-Nawbakhtī's (d. between 300–310/912–922) and Sa'd b. Abdallāh al-Qummī's (writing 292/905) ninth-century books on various sects of the Shiites are the first surviving articulations of Imami doctrine. These books seek to carve out a doctrinal identity for the Imami Shiites that distinguishes them from both the earlier Shiite extremist groups, such as those that believed that 'Alī was divine, as well as the groups such as the Ismailis (many of whom awaited the return of the imam Ismā'īl, the brother of the seventh imam Mūsā al-Kāzim, whom they claimed was in occultation) and the Waqifiyya sect, who believed that it was Mūsā al-Kāzim who had gone into occultation. Furthermore, who was this twelfth 'Hidden' imam, unknown to all but a few prominent Shiites, and what was the nature of his occultation? Even many of the Shiite families who had believed in the imamate of the Hidden Imam's father al-Hasan al-'Askarī did not know the answer to these questions. The scion of a great Shiite family of Qumm, Ibn Bābawayh (d. 381/991), attempted to clarify these points to his community in his Epistle on Beliefs, which comprehensively formulated the doctrine of Imamis.6 What heritage did Imami Shiite scholars like Ibn Bābawayh have to draw on in their efforts to define Imami law and doctrine? Like many pious Muslims in the first three generations of Islam, those individuals who believed that the family of the Prophet enjoyed a special status or religious authority collected the sayings and rulings of the imams in order to preserve their legacy. In particular, the students who flocked around the sixth imam, Ja'far al-Sādiq (The Truthful), in Medina collected their notes of his teachings. The legacy of his son, the seventh imam, Mūsā al-Kāzim, was also collected in numerous small books by his students. Even until the time of the eleventh imam, devotees of the family of the Prophet labored to record their teachings, rulings, and interpretations of the Quran.7 A notebook of sayings of imams like Ja'far al-Sādiq was called an asl ('source,' pl. usūl). Hundreds (Imami Shiites have traditionally talked of the 'four hundred usūl,' but other numbers have been mentioned as well) of these usūl were compiled, sometimes by a student of the imam recording his teachings directly and sometimes through an isnād from the imam to a slightly later collector. The usūl contained the material essential for formulating a religious and communal vision: elaborations of doctrine, answers to legal queries and polemics against those who opposed the rightful station of the ahl al-bayt (The Family of the Prophet). In addition, early Shiite compilers collected books on the virtues (fadā'il, khasā'is) of 'Alī and his progeny as well as the history of their careers. Zayd b. Wahb (d. 96/714–15), a Kufan devotee of the family of the Prophet, compiled a book of the sermons of 'Alī (Kitāb khutab amīr al-mu'minīn).8 Like the Sunni hadith tradition, some of these early books may really have been written after the deaths of their supposed authors by some later figure. Even some Shiite scholars, for example, doubt the authenticity of a book of hadiths attributed to the Successor Sulaym b. Qays al-'āmirī called Kitāb al-saqīfa.9 Some of the usūl drew on these dubious early books, like the 'Book of the Sunna, Rulings and Judicial Cases' (Kitāb al-sunan wa al-ahkām wa al-qadāyā) of the Companion Ibrāhīm Abū Rāfi' and al-Sahīfa al-sajjādiyya attributed to the fourth imam, 'Alī Zayn al-'Ābidīn.10 These early books may have really existed, or they may have been conjured up by later Shiites eager to show that 'Alī and his descendants truly had some special knowledge, in book form, that no other Companions possessed. For the Imami community, eager to elaborate a clear doctrine, ritual, and law in the absence of its imam, however, these usūl were not very useful. They needed to be reorganized according to topic. Starting in the early eighth century, Shiite scholars began making selections of hadiths and organizing them into 'compendia' (jāmi', pl. jawāmi') and 'topical books' (mubawwab). These books could either address one issue or, like the musannaf and sunan books of the Sunnis, a whole range of subjects. For example, Ja'far al-Sādiq's student Ghiyāth b. Ibrāhīm had compiled a book of the imam's teachings organized along the lines of what was permitted or forbidden for various legal topics.11 Ibn al-Qaddāh (d. c. 180/796–7) collected a book of hadiths specifically on the nature of heaven and hell.12 These early topical collections by students of the imams provided a foundation for the Imami Shiite community to draw from and build on. Muhammad b. al-Hasan al-Saffār al-Qummī (d. 290/903) wrote the famous Basā'ir al-darajāt, which specifically dealt with the virtues and prerogatives of imams.13 Ibn Bābawayh's Kitāb al-jāmi' li-ziyārat al-Ridā provided reports on the virtues of the eighth imam and the importance of visiting his grave, while the Kitāb al-jāmi' al-kabīr fī al-fiqh by Ibrāhīm b. Muhammad al-Thaqafī (d. 283/896) more closely resembled a comprehensive sunan book.14 A tafsīr replete with reports about why verses of the Quran were revealed was attributed to the eleventh imam al-Hasan al-'Askarī (although Shiite scholars debate whether or not the imam actually wrote it). Even as the usūl and early books were broken up to create these topical works, some Shiite scholars like Ahmad Ibn 'Uqda (d. 332/944), who were deeply committed to hadith transmission, continued to transmit the usūl in their original form – approximately thirteen survive today.15 It is interesting that, as Ron Buckley has noted, Shiites started compiling topical collections of hadiths as part of developing their law at approximately the same time that great Sunni scholars such as Mālik b. Anas and al-Bukhārī were doing the same.16 THE SHIITE HADITH CANON These topical works of law, ritual, and doctrine formed the basis for what became the four books of the Shiite hadith canon: the Kāfī fī 'ilm al-dīn of Muhammad b. Ya'qūb al-Kulaynī (d. 329/939), the Man lā yahduruhu al-faqīh of Ibn Bābawayh (d. 381/991) and the two collections of Abū Ja'far Muhammad b. al-Hasan al-Tūsī (d. 460/1067), the Tahdhīb al-ahkām and the Istibsār fīmā ukhtulifa fīhi al-akhbār. While the Sunni hadith canon is made of books very similar to one another in structure and purpose (they are all from the sunan genre), the components of the Shiite canon represent varying tools for different visions of the role of hadith in religious rulemaking.17 Al-Kulaynī offered his massive al-Kāfī fī 'ilm al-dīn (The Sufficient Book in the Knowledge of Religion) as a source for Shiites who could not find scholars possessing true knowledge of Islam or sort out the tangled web of reports narrated from the Prophet and the imams. Al-Kulaynī says that this dearth of knowledge was due to the unwillingness of scholars to resort only to 'the Quran and the Prophet's sunna with true knowledge and understanding.' Instead, they have turned to blind imitation (taqlīd), what they saw as their own best judgment (istihsān) and baseless interpretation (ta'wīl). The Kāfī, al-Kulaynī says, is the answer. It will suffice for 'those who want knowledge of the religion and to act on it according to authentic reports from the Truthful Ones [i.e., the imams] and the established Sunna that is the basis for right legal action.'18 The Kāfī covers the whole range of legal topics applicable in Muslim life as well as the issues of the origins and nature of the imamate. Like al-Bukhārī's Sahīh, the very structure of the books explains the lessons the reader should derive from it; the titles of each subchapter instruct the reader how to understand the hadiths it includes. The author trusts the book to be its own explanation. A generation later, the great Ibn Bābawayh compiled another comprehensive topical hadith collection designed to assist Imami Shiites who had no other source for understanding Islam properly. His Man lā yahduruhu al-faqīh (He Who Has No Legal Scholar at Hand) is even more consciously a reference work than the Kāfī. Unlike al-Kulaynī, Ibn Bābawayh does not provide full isnāds for each hadith. He does not want the reader to concern himself with such specialized details, but rather assures his audience that he has only included reports that are authentic.19 Ibn Bābawayh and early Imami scholars sought to meet the immediate challenges facing the community with reports from the Prophet and imams alone as evidence. Ibn Bābawayh's most famous student, Muhammad b. al-Nu'mān al-Hārithī (d. 413/1022), called al-Shaykh al-Mufīd, however, was a Mu'tazilite rationalist who saw hadiths as only a limited component of elaborating law and doctrine for the Imami community. Hadiths should be part of a larger framework for understanding Islam, used properly and supervised by a more authoritative master: reason. As a follower of the Mu'tazilite school in Baghdad, al-Shaykh al-Mufīd believed that rational investigation was an essential tool for determining correct belief, and he abandoned his teacher Ibn Bābawayh's reliance on using āhād reports from the imams as evidence in many issues.20 It was one of al-Shaykh al-Mufīd's students in Baghdad who would be responsible for half of the Shiite hadith canon and become one of the most influential scholars in Shiism: Muhammad b. al-Hasan al-Tūsī (d. 460/1067). While al-Kulaynī and Ibn Bābawayh had assured their readers that their books consisted of only authentic hadiths, al-Tūsī's two hadith works made this authentication process more transparent. Furthermore, for him hadiths were clearly just one part in a larger process of deriving law. Al-Tūsī's first book, the Tahdhīb al-ahkām, is in fact not a true hadith collection at all. It is a commentary on a legal work by al-Shaykh al-Mufīd (called al-Muqni'), structured along its lines but focusing on its hadiths. Al-Tūsī's al-Istibsār fīmā ukhtulifa fīhi al-akhbār (Seeking Clarity on that which Reports Differ) resembles much more closely the books that Sunni scholars like al-Shāfi'ī devoted to sorting out and reconciling hadiths that seemed to contradict one another: books of ikhtilāf al-hadīth (see chapter 5). Western scholars refer to these four collections as the Shiite hadith 'canon' because Shiites consider them the most authoritative sources for hadiths.21 In effect, with the compilation of these four works, the earlier usūl and topical hadith collections became practically obsolete.22 The authority of the canonical collections does not, however, entail that criticizing the authenticity of hadiths in them is unseemly or impermissible. Their canonicity derives from their widespread acceptance and use, not their infallibility. CONTINUED HADITH LITERATURE AND THE MEGA-COLLECTIONS Of course, the formation of the Shiite hadith canon did not mean an end to Shiite hadith literature. Ibn Bābawayh devoted several books to explaining the legal reasoning behind a selection of hadiths as well as explaining the meanings of controversial or confusing hadiths (his 'Ilal al-sharā'i' and Ma'ānī al-akhbār). We also have the surviving records of great Shiite scholars like Ibn Bābawayh giving dictation sessions (amālī) to students in which they would narrate a selection of hadiths from the Prophet, the imams, and even Sunni hadith transmitters for teaching purposes. Of course, Shiite scholars continued to write about the virtues of the imams in books like Khasā'is amīr al-mu'minīn by al-Sharīf al-Radī (d. 406/1015) and the Kitāb al-irshād fī ma'rifat hujaj Allāh 'alā al-'ibād by al-Shaykh al-Mufīd. Although not strictly a hadith collection, al-Sharīf al-Radī's Nahj al-balāgha (The Path of Eloquence), a collection of what are said to be the speeches of 'Alī b. Abī Tālib (of which some are clearly among the oldest surviving pieces of Arabic writing), is seen as a literary masterpiece by Shiites and Sunnis alike (although Sunnis consider much of the book to be forged).23 Also frequently cited is Ibn Shahrāshūb's (d. 588/1192) collection of all the literature on the lives, virtues and feats of the imams: the massive Manāqib Āl b. Ābī Tālib. The greatest transformative step that the Shiite hadith tradition took after its canon had formed, however, occurred much later. In the early seventeenth century, a movement arose among Shiite scholars in the Hijaz, Iraq, and Iran that opposed what it viewed as the overly rationalist character of Imami Shiite thought as well as the overly hierarchical structure of the Shiite clergy. Followers of this trend believed that Imami Shiites should reaffirm their reliance on the hadiths of the Imams as the only true way to understand law and dogma properly, and they were thus known as the Akhbārī school (because of its reliance on akhbār, reports). This led to a renewed interest in collecting and commenting on Shiite hadiths in the seventeenth century.24 Although Shiites did not develop as extensive a tradition of penning massive commentaries on their hadith collections as did Sunnis, in this period they did amass several mega-collections that combined and commented on existing hadith works, and some of which are more gigantic than even the largest Sunni commentary.25 Three of these mega-collections are extremely well known. The first is the Wasā'il al-shī'a ilā ahādīth al-sharī'a (The Paths of the Shiites to the Hadiths of the Holy Law) by Muhammad b. al-Hasan al-'Āmilī (d. 1104/1693). Second, Mullā Muhsin Fayd al-Kāshānī (d. 1091/1680) wrote a massive digest and commentary on the four canonical hadith collections, entitled al-Wāfī. The last is a work astounding not only in its vast size, but also in the great accuracy with which its author drew on and cited earlier books. The mammoth Bihār al-anwār (Oceans of Light) by Muhammad Bāqir al-Majlisī (d. 1110/1700), one hundred and ten printed volumes, is so enormous that one needs a guidebook, the Safīnat al-bihār (The Ship of the Seas) by 'Abbās al-Qummī (d. 1936) to navigate it effectively. The Bihār covers almost all the topics pertinent to Shiite history, belief, and law. Not only does Majlisī's huge collection include the material found in earlier hadith books, the author also unearthed old manuscripts of usūl that survive only in his book.26 Majlisī's work is encyclopedic, not critical, and he left his readers to decide what material is authentic or not. SHIITE HADITH CRITICISM Shiite hadith criticism began much later than its Sunni counterpart, appearing in full force only in the early eleventh century. While the imams were alive, there was no need to worry about forged hadiths – any reports attributed to an earlier imam would be checked by his descendants.27 In the immediate wake of the twelfth imam's disappearance, however, Shiites like al-Kulaynī, and later Ibn Bābawayh, understood that it was now the responsibility of scholars to assure that the Shiite community only acted on reports authentically traced to the imams. The failure of scholars to distinguish between reliable and unreliable hadiths had been a leading motivation for the writing of al-Kulaynī's and Ibn Bābawayh's collections. Writing in the decades after the final occultation of the twelfth imam, Ibn Bābawayh already acknowledged that the two usūl books of Zayd al-Zarrād and Zayd al-Narsī were forged.28 Early Shiite hadith scholars like al-Kulaynī and Ibn Bābawayh had believed that the usūl of the imams contained all the knowledge necessary for the Shiite community to survive during the Hidden Imam's absence. This school of thought, later known as the Akhbārī school, considered the four canonical collections to be totally reliable records of the earlier usūl books. With the rise of the Shiite Mu'tazilite school of al-Shaykh al-Mufīd in Baghdad (later the origin of the Usūli school, which advocated the use of independent legal reasoning and a more critical use of hadiths), Shiite scholars began to look more skeptically at the contents and use of these collections. Their contents sometimes created serious liability for what had emerged as Imami orthodoxy. Al-Kulaynī's Usūl, for example, contained a report that the existing Quran was only one third of the original revealed book. In the decades after al-Kulaynī's death, however, Ibn Bābawayh had established the historical integrity of the Quranic text as a tenet of Imami belief.29 Imami scholars acknowledged that some reports in these books could have been inserted by Shiites with deviant beliefs. Moreover, even a pious and well-intentioned usūl compiler could have made an error in including one report instead of another. Like the Sunnis, some Imami Shiites forged hadiths to help reinforce communal identity. One forged hadith, for example, said that visiting the grave of the eighth imam, 'Alī al-Ridā, in Mashhad was worth seventy pilgrimages to Mecca.30 Transmitter Criticism Like the Sunni tradition, Shiite hadith criticism centered on evaluating transmitters and then using this information to help decide the reliability of isnāds. Proper belief was the centerpiece of Shiite transmitter criticism. Before the occultation of the twelfth imam and the formation of a distinct Imami Shiite community, there was a sense that a Muslim's realization that the family of the Prophet was the sole religious authority was testament enough to his reliability. It was thus reported that Ja'far al-Sādiq had said, 'Know the status of people by the extent to which they narrate from us (i'rifū manāzil al-nās 'alā qadr riwāyatihim 'annā).'31 As the Shiite scholarly tradition grew more elaborate, however, this would not suffice. Al-Shaykh al-Mufīd's student, the famous al-Tūsī (d. 460/1067), began developing a system of transmitter criticism to weed out reports from unreliable people and ensure that Shiites were only taking hadiths from 'the party of truth.'32 Although al-Tūsī seems to have been the first Shiite to employ a system of rating the reliability of transmitters, like the Sunnis, Shiite hadith scholars had long been keeping records in order to identify the myriad of people who made up their isnāds to the imams. Ahmad Ibn 'Uqda (d. 332/944) devoted a large book to identifying all the people who studied with and transmitted the teachings of Ja'far al-Sādiq, Ahmad b. Muhammad al-Hamdānī (d. 333/944–5) wrote a book entitled 'The Book of Dates and Those Who Narrated Hadiths (Kitāb al-tārīkh wa dhikr man rawā al-hadīth),' and later Ahmad b. Muhammad al-Jawharī (d. 401/1010–11) compiled a work called 'The Comprehensive Book on Identifying Hadith Transmitters (Kitāb al-ishtimāl 'alā ma'rifat al-rijāl).'33 Although these books have been lost, the earliest surviving book on Shiite transmitters, that of Muhammad b. 'Umar al-Kashshī (d. c. 340/951), focuses on laying out the full names of transmitters, their relationships to other transmitters and, if possible, when they lived. Like many early Sunni books of hadith transmitters, these books were concerned more with identifying transmitters than criticizing them. When he began his efforts to make sure no fraudulent material had crept into the usūl since the disappearance of the twelfth imam, al-Tūsī had to ensure that Shiites had received material from Muslims with the proper beliefs. Certainly, Imami Shiites needed to be on guard against hadiths forged or propagated by anti-Shiite Sunnis. But the more immediate danger was sifting out reports from Shiites who had extremist beliefs like the deification of 'Alī and those who believed that the line of the Prophet had ended with an earlier imam going into occultation. Before worrying about Sunni opponents, the Imami community had to demonstrate that it was not extremist and to distinguish itself from other Shiites. Al-Tūsī's book of transmitter criticism (Rijāl al-Tūsī) is thus more concerned with identifying Shiite transmitters who believed that it was actually an earlier imam, like Mūsā al-Kāzim, who had disappeared and ended the imamate than with criticizing anti-Shiite Sunnis. Ibn Hanbal, a fierce critic of Shiism, is mentioned in the books with no disapproving comment, while many Shiites are dismissed for their belief in the occultation of an earlier imam or their extremist Shiite beliefs. Al-Tūsī tries to list those transmitters who collected usūl from the imams, determining whether they are 'trustworthy (thiqa)' or not. Abū al-'Abbās al-Najāshī (d. 450/1058) followed al-Tūsī in compiling an influential book of Shiite transmitter criticism, the Rijāl al-Najāshī. Unlike al-Tūsī, however, he aimed his book at a Sunni audience. Tired of his opponents accusing Shiites of having no trad-ition of hadith transmission and hadith books, he offers example after example of accomplished Shiite hadith authors and the isnāds in which he found them. He even uses books of Sunni transmitters to help in his evaluation. It appears, in fact, that al-Najāshī was consciously imitating the methods and language of Sunni transmitter criticism; he frequently called narrators 'weak (da'īf),' or 'having accurate transmissions (sahīh al-samā'),' just like his Sunni contemporaries. Isnād and Matn Criticism Al-Tūsī not only seems to have been the first Imami scholar consistently to evaluate hadith transmitters, he was also the first to apply these criticisms to authenticate or dismiss hadiths. In the Istibsār he uses isnād criticisms to show how what seems to be two contradictory hadiths is really just an unreliable hadith clashing with a reliable one.34 The Shiite science of isnād criticism was further developed by Jamāl al-Dīn b. Tāwūs (d. 673/1274) of Baghdad and the great founder of the Hilla school in Iraq, 'Allāma Muhammad b. Idrīs al-Hillī (d. 726/1325). Shiite hadith criticism continued to draw on and in effect mirror Sunni hadith criticism. The first major book defining the technical terms and methods of Shiite hadith criticism, written by al-Shahīd al-Thānī (d. 965/1558) (entitled 'Knowledge of Hadith, Dirāyat al-hadīth'), is basically a digest of the Sunni Ibn al-Salāh's famous Muqaddima. Only on a few important issues does the Shiite method diverge from its Sunni counterpart. For example, a hadith is defined as the report transmitted from any 'infallible (ma'sūm)' individual, not just the Prophet. This allows for the Shiite reliance on the hadiths of the imams.35 The concern for avoiding extremist Shiites or believers in earlier vanished imams appears clearly in the labels that Shiites use to indicate unreliable narrators: 'extremist (ghāl)' and 'believing in the occultation of an earlier imam (Wāqifī),' from whom one can accept hadiths only before he adopted deviant beliefs.36 Allowance is made for occasionally narrating from Sunnis: one of the sub-grades of hasan hadiths, 'trustable (muwaththaq),' is defined as a hadith that is reliable even though a Sunni is in the isnād.37 Al-Shahīd al-Thānī sharply critiques his Sunni brethren by noting how they concerned themselves only with the outward signs of a transmitter's upright character ('adāla), ignoring the need for an appropriate belief in the family of the Prophet. Hence, he says with an air of tragedy, there is such a plethora of supposedly 'authentic' hadiths in Sunni eyes.38 As the Sunnis knew well, Mu'tazilism had always held an examin-ation of the contents of a hadith to be the final arbiter in determining its authenticity. The Shiite adoption of the Mu'tazilite framework in the eleventh century thus meant that content criticism would enjoy a more prominent role in Shiite hadith criticism than it did among Sunnis. Just because the isnād was reliable did not mean the report was authentic or legally compelling.39 Al-Sharīf al-Murtadā (d. 436/1044) maintained that every report attributed to the Prophet or imams had to be authenticated by reason.40 Influential scholars like 'Allāma al-Hillī would not even accept the medium grade of reports, hasan, because they were too unreliable.41 Interestingly, even the earlier Akhbārī scholars like al-Kulaynī had reserved an important role for content criticism. The Kāfī cites a number of hadiths from the Prophet and Ja'far al-Sādiq with statements like 'Everything is compared to the Book of God and the Sunna, and any hadith that does not agree with the Book of God is but varnished falsehood.'42 While Sunni scholars had uniformly rejected statements such as Ja'far's because they contradicted the important role of hadiths in explaining and modifying the Quran (see chapter 5), Shiites embraced them as an indication of the importance of content criticism. THE RELATIONSHIP BETWEEN SUNNI AND SHIITE HADITHS Although we have seen some of the important differences between the Sunni and Shiite traditions of hadith study, they have never been totally separate. They share common origins, overlap, and have interacted with one another over the course of Islamic history. The chief factors for the commonalities or interactions between the two have been the decidedly non-sectarian beliefs of many early Shiites, the lingering (and sometimes burgeoning) devotion to the family of the Prophet among Sunnis, and the Shiite need to draw on Sunni hadiths in their defense of Shiite doctrine. To what extent can we talk about separate bodies of Sunni and Shiite hadiths? In the first two hundred years after the death of the Prophet, the majority of early Shiites did not espouse a doctrine that differed dramatically from the majority of Muslims. Of course, there were those supporters of 'Alī and his family who despised or totally rejected the legitimacy of the first two rulers after the Prophet – Abū Bakr and 'Umar – who were lionized by mainstream Sunni Islam. Sunnis could generally not accept such Shiites as Muslims in good standing. Other early Shiite extremists believed that 'Alī was God incarnate and were thus ostracized uniformly by other Muslims, Sunnis and Shiites alike. There was also a germinating Imami community who looked to the Shiite imams for sole religious guidance. Most early Shiites, however, were merely characterized by 'an enhanced reverence' for the descendants of the Prophet, an attraction to their charisma and support for their general disapproval for the less-than-ideal regimes of the Umayyads and early Abbasids.43 Love for the family of the Prophet was particularly intense in Kufa, 'Alī's adopted capital and the setting for many 'Alid revolts against the Umayyads. In fact, Sunni hadith critics accepted that, in the case of a Kufan transmitter, such loyalties did not mean the transmitter was necessarily Shiite. It was just part and parcel of being Kufan. Although never considered infallible religious authorities or the perennial rightful rulers of Islam, the family of the Prophet has always been venerated in Sunni Islam. Certainly, in times of intense Sunni/Shiite conflict or in the writings of diehard Sunnis like Ibn Taymiyya (d. 728/1328), Sunnis have deemphasized this. Even the notoriously anti-Shiite Shams al-Dīn al-Dhahabī (d. 748/1348), however, warned 'May God curse those who do not love 'Alī.'44 Especially in the first two centuries of Islam, many scholars later glorified by Sunni Muslims, such as Abū Hanīfa and al-Shāfi'ī, displayed pronounced affection for the family of the Prophet. Brought before the Abbasid caliph on charges of being an extreme Shiite, al-Shāfi'ī composed a verse of poetry proclaiming that, if loving the family of the Prophet was being a heretic, then he would proudly admit to that charge. Even the most trusted Sunni hadith collections contain hadiths urging Muslims to love and honor the Prophet's family and descendants. Al-Bukhārī included in his famous Sahīh the report in which the Prophet said, 'Fatima is part of me, so whoever has angered her has angered me (Fātima bad'a minnī fa-man aghdabahā aghdabanī).'45 In the seventh and eighth centuries, much of what would make up the Shiite hadith corpus was just hadiths expounding the virtues of 'Alī.46 Sunni hadith critics embraced much of this material. Ibn Hanbal himself commented that 'there has not appeared via authentic isnāds, hadiths testifying to the virtues of any Companion like what has appeared testifying to the virtues of 'Alī b. Abī Tālib.'47 In the eighth century, however, as the sayings of imams like Ja'far al-Sādiq were compiled, we see the emergence of an independent body of specifically Shiite hadiths.48 By the time of the twelfth imam's final disappearance in 941 CE, the body of material that made up the Shiite hadith corpus was effectively complete.49 What sorts of hadiths did this corpus consist of? First, we find hadiths that are simply not found among Sunnis, such as hadiths in which the Prophet is quoted as explicitly foretelling the coming of the twelve imams and ordering Muslims to follow them, or the hadiths of the imams themselves. Sunnis would never accept hadiths requiring them to believe in the Twelver imamate, nor would they even consider the reports of the imams as counting as 'hadiths.' With their collection of the hadiths of the imams, the Shiites thus built up a body of material totally absent in Sunni hadith collections even though they might dovetail perfectly with Sunni themes. Reports in the Kāfī in which Mūsā al-Kāzim curses those who use analogical reasoning to derive Islamic law would fit seamlessly into the writings of Ibn Hanbal or al-Bukharī, but the fact that they were the hadiths of an imam put them outside the pale of Sunni Prophetic hadiths.50 Second, we find pro-Shiite hadiths that appear in Sunni books but without the sectarian element. In the collection of Ibn Bābawayh's dictation sessions (Amālī), he narrates a hadith that the pro-'Alid Companion Jābir b. 'Abdallāh narrated from the Prophet: ' 'Alī b. Abī Tālib is the earliest to embrace Islam in my community, the most knowledgeable of them, the most correct in his religion, the most virtuous in his certainty, the most prudent, generous and brave of heart, and he is the imam and caliph after me.'51 We find that many Sunni hadith collections, even early ones such as the Musannaf of 'Abd al-Razzāq al-San'ānī (d. 211/827) and the Musnad of Ibn Hanbal, include the section of this hadith that says that 'Alī is 'the earliest to embrace Islam in my community, the most knowledgeable of them.' The sections ordaining him as caliph and imam, however, are absent. Third, we find hadiths with a distinct pro-'Alid content that both Sunnis and Shiites accept equally. For example, the famous hadith of Ghadīr Khumm, in which the aging Prophet stops his followers by the pool of Ghadīr Khumm and tells them 'Whoever's master I am, 'Alī is his master.' The vaunted Sunni hadith critics al-Tirmidhī and al-Hākim al-Naysābūrī both considered this report to be authentic. In another hadith that al-Hākim, Ibn Khuzayma, and even the great Muslim b. al-Hajjāj include in their Sahīh collections, the Prophet tells his followers, 'Indeed I am leaving you with two things of great import (thaqalayn) ... you will not go astray as long as you hold fast to them: the Book of God and my family.' Of course, Sunnis and Shiites have upheld two very different interpretations of these hadiths. Shiites view them as clear evidence that Muhammad wished 'Alī and his descendants through Fatima to succeed him both in temporal and religious leadership of the Muslim community. Sunnis view them as two exhortations to honor 'Alī and the Prophet's family, but contextualize such hadiths with the plentiful pool of reports in which the Prophet praises his leading Companions like Abū Bakr and 'Umar using the same language and appears to reserve places of leadership for them. Some Sunnis were less patient with such pro-'Alid hadiths than others. Al-Hākim al-Naysābūrī, who was so accepting of pro-'Alid reports that he was accused of Shiism, declared authentic the hadith in which the Prophet supposedly said, 'O Fatima, God is angered when you are angered, God is pleased when you are pleased.' Al-Hākim's teacher, al-Dāraqutnī (d. 385/995), however, was not so generous. He exposed it as a hadith that the fifth imam Muhammad al-Bāqir attributed directly to the Prophet – a typical and laudable Shiite isnād, but a case of broken transmission (mursal) according to Sunnis.52 Al-Tabarānī's collections featured a hadith in which the Prophet reversed the sun so that 'Alī could make up a prayer he had missed. Ibn al-Jawzī, Mullā 'Alī al-Qārī and others ruled it a forgery by Shiites, while other prominent Sunnis like Qādī 'Iyād and al-Suyūtī declared it sahīh.53 Finally, many Shiite hadiths appear in the Sunni collections that aimed merely at collecting as many hadiths as possible and made no pretension at any critical stringency. Many of these collections, such as the Hilyat al-awliyā' (The Ornament of the Saints) of Abū Nu'aym al-Isbahānī (d. 430/1038), were works devoted to documenting the rich heritage of Sufism and therefore included a great deal of pro-'Alid material. 'Alī was, after all, seen as the progenitor of the Sufi tradition and the beginning of most of the isnāds though which the Sunni Sufi orders traced their teachings to the Prophet (see chapter 7). These reports were generally innocuous, with no sectarian edge, and urged goodly and pious behavior. While Ibn Bābawayh quoted the fifth imam Muhammad al-Bāqir that the Prophet had said that the best of God's slaves are those 'Who, when they seek perfection in their acts, hope for good tidings, seek forgiveness when they do wrong, are thankful to God when they give, persevere when they are tried, and forgive when they are angered,' Abū Nu'aym cites it through a very Sunni isnād in his Hilyat al-awliyā'.54 The biggest factor in the Sunni embrace of many Shiite hadiths was the veneration for the family of the Prophet that gained great currency among the Sunni Muslim majority of Egypt, Iraq, Iran, and Central Asia beginning in the eleventh century. In that time, almost every village and town 'discovered' its own imāmzāde, or the tomb of a pious descendant of the Prophet, to serve as a local pilgrimage and miracle center.55 The Sunni fascination with the family of the Prophet as a medium for baraka (blessing) led to a widespread study and transmission of hadiths narrated through the Shiite imams, even if professional hadith scholars like al-Dhahabī and Mullā 'Alī Qārī (d. 1014/1606) decried such books as forgeries. In the Iranian city of Qazvin in particular, the Sahīfa of the eighth imam 'Alī Ridā (d. 203/818), who traced his isnāds back through the imams to the Prophet, became widely transmitted for pietistic purposes. Most of its contents were harmless pieces of advice, such as 'Knowledge is a treasure, and questions are its key.'56 The religious power of an isnād through the imams sometimes manifested itself in bizarre and miraculous reports. The great Sunni hadith critic Ibn Abī Hātim al-Rāzī (d. 327/938) is reported (falsely, in my opinion) to have said that once, when he was in Syria, he saw a man unconscious in the road. He remembered that one of his teachers had once told him, 'the isnād of 'Alī Ridā, if it is read over a senseless person, he'll recover.' Ibn Abī Hātim tried out this cure, and the man returned immediately to health.57 As we found in our discussion of Sunni hadiths, for Sunni critics a hadith transmitter's sectarian affiliation ultimately took the back seat to his or her reliability in transmission. If you consistently transmitted hadiths that were corroborated by other experts, even deviant beliefs would not disqualify you from participating in the Sunni hadith tradition. Individuals with pronounced Shiite leanings, such as 'Abd al-Rahmān b. Sālih (d. 235/849–50) and Sa'īd b. Khuthaym (d. 180/796–97), thus served as respected and valued transmitters in mainstay Sunni hadith books such as the Sunans of al-Nasā'ī and al-Tirmidhī. In theory, Sunni hadith critics restricted themselves from accepting the transmissions of Shiite narrators who tried to convert others to their cause (since this might provoke them to forge pro-Shiite hadiths) or, at the very least, not accepting those hadiths with a pro-'Alid message from such Shiite transmitters. In reality, however, even the great Muslim b. al-Hajjāj included in his Sahīh a report from a known Shiite, 'Adī b. Thābit (d. 116/734), in which the Prophet announced that only a believer could love 'Alī and only a hypocrite could hate him. As such, we find a marked overlap of transmitters between the Sunni and Shiite hadith traditions. Abān b. Taghlib (d. 140/757) was a well-known and devoted Kufan Shiite who appears as a narrator from the imams in al-Kulaynī's Kāfī, but all the Sunni Six Books except Sahīh al-Bukhārī included his hadiths as well. On rare occasions, there was also overlap between Sunnis and Shiites on influential hadith critics. Ibn 'Uqda (d. 332/944) was the most important collector of the Shiite usūl and a pioneer in compiling the names of Shiite transmitters.58 Yet he was praised by the most prominent Sunni critics of his day, like al-Dāraqutnī and Ibn 'Adī, and later the scholar al-Subkī (d. 771/1370) called him 'one of the hadith masters of the Shariah;'59 this, even though he was such a staunch Shiite that he occasionally disparaged Abū Bakr and 'Umar. He commanded one the most impressive memories of his day, either having memorized or being current with 850,000 hadiths, 3,000 from the family of the Prophet alone. When he wanted to move from his native Kufa, he found that his personal library of six hundred camel-loads of books prevented him. Not only did Sunnis appreciate Ibn 'Uqda's command of hadith transmissions, they also valued his opinions on evaluating transmitter criticism. In fact, the earliest evaluation of al-Bukhārī's and Muslim's famous Sahīhayn comes from Ibn 'Uqda.60 SHIITE USE OF SUNNI HADITHS Imami Shiism matured under the looming shadow of the Sunni Abbasid caliphate and had to survive under Sunni states such as the Seljuq Turks, the Ilkhanid Mongols, and the Ottoman Empire. Even during periods in which Shiites achieved political ascendancy, such as the tenth century (called the 'Shiite Century' because the Shiite Buyids ruled Iraq and Iran, with the Shiite Fatimids in Egypt and Syria), Shiites still lived as a minority among the Sunni masses. Shiite scholars very much appreciated the use of Sunni hadiths, especially reports with a pro-'Alid bent, as tools for either debating their Sunni opponents or convincing them that Imami Shiism presented no threat to Sunni Islam. The Shiite scholar Radī al-Dīn Ibn Tāwūs (d. 664/1266) kept a digest of the Sahīhayn in his library for such uses.61 In such cases, Shiites would abandon their own method of hadith criticism and play by Sunni rules in the hopes of convincing Sunnis on their own terms. Ibn Bābawayh, for example, began one of his dictation sessions in the mosque with a hadith narrated from the Prophet by Abū Hurayra, whom Shiites considered an arch-liar who had covered up 'Alī's right to the caliphate by forging hadiths to the contrary. In this hadith, however, Abū Hurayra is quoted telling the Muslims to fast on the eight-eenth of the month Dhū al-Hijja because that was the day of Ghadīr Khumm – the day when the Prophet had announced to his followers that 'Alī was to be their master after him.62 In his efforts to prove that no one in history had ever been named 'Alī before 'Alī b. Abī Tālib, the Shiite scholar of Qazvin, Abū al-Husayn Qazvīnī (d. c. 560/1165), invoked as evidence the Sahīhayn and other Sunni hadith books that 'are relied upon.' Qazvīnī tells his opponents to 'take up the Sahīhayn' and find the hadith that says that 'Alī's name is written on the leg of God's throne and on the doorway to Paradise as the brother of Muhammad. Since both these structures existed before the creation of the world, 'Alī is doubtless the first person to have been so named.63 Qazvīnī's attempt was admirable, but it did not convince his opponents; the hadiths he cited were nowhere to be found in the Sahīhayn or any reputable Sunni collection.64 THE ZAYDI HADITH TRADITION Zaydism is a branch of Shiism associated with Zayd b. 'Alī (d. 122/740), son of the fourth imam 'Alī Zayn al-'Ābidīn, who rebelled unsuccessfully against the Umayyads in the twilight days of their rule. Although Zaydi Islam is a relatively small sect, flourishing in classical times in Kufa and northern Iran but now limited to northern Yemen, its hadith tradition deserves attention due to both its originality and influence. Zaydis believe that the true teachings of Islam, as a religious system and a message of political justice, have been preserved by members of the family of the Prophet who rose up against the tyrannical and impious rule of the Umayyads, Abbasids, and later dynasties. Unlike Sunnis, Zaydis do not see early Islamic history as an idealized expansion of the pure faith under ultimately legitimate Muslim rulers. Zaydis believe that 'Alī should have been the first caliph, but, unlike Imami Shiites, they believe that the Prophet's instruction on this matter was ambiguous.65 Zaydis also break with Imami Shiism by not attributing a specific line of infallible, divinely specified imams with any special access to the esoteric truths of Islam and the Quran. Nor do they pay any special attention to the awaited Hidden Imam. Instead, Zaydis believe that the family of the Prophet is the histor-ical protector and preserver of the true teachings of Islam and that it is their duty to stand up for justice in the face of oppressive rulers. Any member of the family of the Prophet who combines a mastery of Islamic scholarship with an ability to stand up against injustice has the right to call himself the imam. In many ways, Zaydism is a middle ground between Sunni and Imami Shiite Islam. In their outlook on hadiths, Zaydis can be distinguished from Sunnis by four features: 1) an enhanced reverence for the family of the Prophet, 2) a case-by-case evaluation of the Companions, 3) a more cynical view of early Islamic history, and 4) their Mu'tazilite thought. Zaydis summarize this with a quote from their Imam al-Hasan b. Yahyā b. al-Husayn b. Zayd b. 'Alī: The solution to disagreements over what is permissible and prohibited is to follow the clear and established texts from the Quran and to draw on those well-known, consistently transmitted reports from the Prophet which have no chance of being conspired forgery, as well as reports from the righteous members of his Family that agree with the clear indications of the Book of God. In addition, we must follow the just and pious members of the Family of the Messenger of God. These are the compelling proofs for Muslims, and it is not permitted to follow other than these.66 The Zaydi Imam al-Murtadā Muhammad b. Yahyā (d. 310/922) said: Indeed many hadiths disagree with the Book of God most high and contradict it, so we do not heed them, nor do we use them as proof. But all that agrees with the Book of God, testified to by it as correct, is authentic according to us, and we accept it as evidence. And also what our ancestors narrated, father from son, from 'Alī, from the Prophet, we use as proof. And what was narrated by the reliable (thiqāt) people of the Prophet's Companions, we accept and apply it. And what disagrees with [all] this we do not see as correct, nor do we espouse it.67 Zaydis feel that there is undeniable evidence from the Quran and Sunna that 'Alī and his descendants through the Prophet's daughter enjoy unique virtues and leadership responsibilities. The legal rulings and consensus of scholars from the Family of the Prophet and the hadiths they transmit are authoritative for Zaydis. Like Imamis, Zaydis accept the mursal hadiths of imams (their narrations from the Prophet without citing a full isnād). In addition, as Imam Sharaf al-Dīn (d. 965/1557–8) stated, whatever scholars from the Family of the Prophet declare to be authentic hadiths is so. Although Zaydis foreswear those who openly opposed the Family of the Prophet, they generally allow the narration of hadiths from Sunni transmitters either in order to use their hadiths as evidence against them or because those specific hadiths have been verified by Zaydi scholars. One of the Zaydi criticisms of the Sunni hadith tradition is the relatively small reliance on hadiths transmitted through the family of the Prophet. Zaydi scholars, for example, blame al-Bukhārī for narrating hadiths via Khārijites known for their hatred of 'Alī but not through the revered imam Ja'far al-Sādiq. Zaydi Islam also upholds a unique stance on the Companions of the Prophet. Both Sunni and Imami Shiite Islam espouse absolute positions – either anyone who saw the Prophet even for a moment was upstanding or only those who actively supported 'Alī were. For Zaydis, only those individuals who enjoyed prolonged exposure to the Prophet and remained loyal to his teachings after his death are worthy of the title 'Companion.' Individuals known for impious behavior, like Walīd b. 'Uqba, or those who actively fought against 'Alī, such as Mu'āwiya, are not considered to be Companions at all. Zaydis take Sunnis to task for naively believing that anyone who met the Prophet could serve as a reliable hadith transmitter. Zaydis maintained this more cynical perspective in their approach to early Islamic history in general. The political agendas of Umayyad and Abbasid rule, they assert, left lasting affects on Sunni Islam. They believed that the Umayyads had encouraged the forgery of anti-Alid hadiths as well as hadiths praising other less worthy Companions. The Abbasids cultivated the four Sunni madhhabs as a means to stem any loyalty to the Family of the Prophet, making a dismissal of the Prophet's Family a hallmark of early Sunni Islam. As influential to their hadith worldview as their Alid loyalties is the Zaydi commitment to the Mu'tazilite school of theology and legal theory. Like other Mu'tazilites, Zaydis believe that passing the tests of the Quran and reason is essential for determining the authenticity of hadith. Zaydis often require hadiths to be massively transmitted (mutawātir) or accepted by the consensus of scholars in order to be used in defining theological stances. But Zaydis also accepted hadiths on these subjects if they were approved by imams. The Mu'tazilite rejection of anthropomorphism has led Zaydis to dismiss any hadith that describes God in overly human terms in a manner that could not be interpreted figuratively. Zaydis thus hold that hadiths like the ones stating that when God sits on his throne it squeaks like a saddle or that Muhammad is physically seated next to God on His throne are elements of Jewish and Christian lore that crept into the Islamic tradition through early converts like Ka'b al-Ahbār. Major Zaydi Hadith Collections and Critics The specifically Zaydi corpus of hadith is not as vast as either its Sunni or Imami Shiite counterparts. Its foundation is the Musnad of Zayd b. 'Alī, which Zaydis claim to be the first book of hadiths written in Islam. It consists of 228 Prophetic hadiths, 320 reports from 'Alī, and two reports from al-Husayn.68 Interestingly, many of the reports that Zayd narrates from his great-great grandfather 'Alī appear as Prophetic hadiths in Sunni collections, such as the statement 'The ulema are the heirs of the prophets. The prophets have not left a dinar or a dirham; rather, they left knowledge as an inheritance among the scholars.'69 Small amālī, or dictation session, collections are very important in Zaydi Islam. Two famous ones are the Amālī of Abū Tālib Yahyā b. Husayn (d. 424/1033) and the Amālī al-sughrā of Imām al-Mu'ayyad Ahmad b. al-Husayn al-Hārūnī (d. 421/1030). Another central work of hadith and law is the Jāmi' al-kāfī of Abū 'Abdallāh Muhammad b. 'Alī of Kufa (d. 445/1053–4). Zaydis have generally drawn heavily on what we would define as the Sunni and Imami Shiite hadith reservoirs. Zaydi scholars regularly quote mainstream Sunni hadith collections as well as Imami works like the Usūl al-kāfī of al-Kulaynī and the Nahj al-balāgha of al-Sharīf al-Radī, choosing material that they feel conforms to Zaydi doctrine. Zaydis can draw from such eclectic sources because of the intermediate position that their school occupies between Sunni and Imami Shiite Islam. Sunni scholars that the Sunni tradition saw as favoring or cultivating a great affection for the Family of the Prophet are seen by Zaydis as pious Shiites. The Zaydi scholar Sārim al-Dīn al-Wazīrī (d. 914/1508) thus declares that al-Nasā'ī, who refused to write a book on the virtues of Mu'āwiya, al-Hākim al-Naysābūrī, who declared the hadith of Ghadīr Khumm to be sahīh, and al-Tabarī are all Shiites.70 The most important works of Zaydi hadith criticism appeared relatively late in Islamic history. Although these books draw at great length from earlier works of Zaydi hadith scholarship, few early works have survived intact. Zaydis view Ibn 'Uqda (d. 332/944) (mentioned above as a Sunni and an Imami hadith critic, an indication of how elastic these sectarian identities could be) as the progenitor of their formalized study of hadith transmitters and criticism, citing his many lost books on the various students who transmitted from imams like Ja'far al-Sādiq.71 The most frequently cited later works are al-Falak al-dawwār fī 'ulūm al-hadīth wa al-fiqh wa al-āthār (The Orbiting Heavenly Body on the Sciences of Hadith, Reports and Law), an ambitious one-volume work by the fifteenth-century scholar Sārim al-Dīn Ibrāhīm al-Wazīrī that lays out the basics of the Zaydi worldview, hadith criticism, important transmitters, and stances on major legal issues, as well as the Kitāb al-I'tisām of al-Qāsim b. Muhammad b. 'Alī (d. 1059/1620). SUGGESTIONS FOR FURTHER READING A further study of Shiite hadiths should begin with more involved reading on Shiism in general. Heinz Halm's Shi'ism (2nd ed., New York, 2004) is both succinct and comprehensive, discussing all the branches of Shiism. Moojan Momen's An Introduction of Shi'i Islam (New Haven, 1985) is a classic guide to Imami Shiism in particular. For specific discussions of Shiite hadith, see Etan Kohlberg's chapter 'Shī'ī Hadīth' in The Cambridge History of Arabic Literature: Arabic Literature until the End of the Umayyad Period (London, 1983) as well as his article 'Al-Usūl al-Arba'umi'a' in Jerusalem Studies in Arabic and Islam 10 (1987). Ron P. Buckley's article 'On the Origins of Shī'i Hadīth' in Muslim World 88, no. 2 (1998), Robert Gleave's 'Between Hadīth and Fiqh: The "Canonical" Imāmī Collections of Akhbār' in Islamic Law and Society 8, no. 3 (2001), and Andrew Newman's The Formative Period of Twelver Shī'ism: Hadīth as Discourse between Qum and Baghdad (Richmond, Surrey, 2000) are also very informative. Anyone interested in the early period of Shiism under the imams should consult Hossein Modaressi's encyclopedic Tradition and Survival: A Bibliographical Survey of Early Shī'ite Literature Vol. 1 (Oxford: Oneworld, 2003). For a summary of the circumscribed Ismaili hadith tradition, see Ismail Poonwala, 'Hadith Isma'ilism' in the Encyclopedia Iranica. For an analysis of Imami Shiite hadith criticism, see Asma Afsaruddin's article 'An Insight into the Hadīth Methodology of Jamāl al-Dīn Ah.mad b. T.āwūs,' Der Islam 72, no. 1 (1995): 25–46. For original works of Shiite hadith scholarship in translation, see a fascinating section of al-Kulaynī's Al-Kāfī, trans. Muhammad Hasan al-Rizvani (Karachi, 1995) and 'Abd al-Hādī al-Fadlī and al-Shahīd al-Thānī, Introduction to Hadīth, including Dirāyat al-Hadīth, trans. Nazmina Virjee (London, 2002). ENDNOTES 1 Muhammad b. Ya'qūb al-Kulaynī, Al-Kāfī (Karachi), p. 150. 2 Ibid., pp. 158–160. 3 Ibid., pp. 136–137. 4 Heinz Halm, Shi'ism, p. 36. 5 Ibid., pp. 36–37. 6 Ibid., p. 42. 7 Etan Kohlberg, 'Shī'ī Hadīth,' p. 301. 8 Hossein Modaressi, Tradition and Survival, p. 81. 9 Kohlberg, 'Shī'ī Hadīth, pp. 300–301. 10 Ibid., p. 306. 11 Modaressi, Tradition and Survival, p. 228. 12 Ibid., p. 147. 13 Kohlberg, 'Shī'ī Hadīth,' p. 304. 14 Kohlberg, 'Al-Usūl al-Arba'umi'a,' p. 133. 15 Ibid., p. 170. 16 Ron Buckley, 'On the Origins of Shī'i Hadīth,' p. 182. 17 Robert Gleave, 'Between Hadīth and Fiqh: The "Canonical" Imāmī Collections of Akhbār,' p. 351. 18 Al-Kulaynī, al-Usūl al-kāfī, vol. 1, pp. 45–49. 19 Ibn Bābawayh, Man lā yahduruhu al-faqīh, vol. 1, p. 71. 20 Al-Sharīf al-Murtadā, 'al-Man' min al-'amal bi-khabar al-wāhid,' in Masā'il al-Murtadā, p. 81. 21 Gleave, p. 352. 22 Kohlberg, 'Al-Usūl al-Arba'umi'a,' p. 135. 23 See al-Dhahabī, Mīzān al-i'tidāl, vol. 3, p. 124. 24 Devin Stewart, 'The Genesis of the Akhbārī Revival,' p. 188. 25 Kohlberg, 'Shī'ī Hadīth,' p. 306. 26 Kohlberg, 'Al-Usūl al-Arba'umi'a,' p. 137. 27 Ibid., pp. 139–140. 28 Ibid., p. 141. 29 Mohammed Amir Moezzi, The Divine Guide in Early Shiism, pp. 89–90. 30 Halm, p. 58. 31 Al-Kulaynī, al-Kāfī (Karachi), pp. 129–130. 32 Kohlberg, 'Al-Usūl al-Arba'umi'a,' pp. 139–141. 33 Ahmad b. 'Alī al-Najāshī, Rijāl al-Najāshī, vol. 1, pp. 225, 240. 34 Gleave, p. 372. 35 'Abd al-Hādī al-Fadlī and al-Shahīd al-Thānī, Introduction to Hadīth, including Dirāyat al-Hadīth, p. 25. 36 Ibid., p. 34. 37 Ibid., p. 26. 38 Ibid., p. 25. 39 Cf. Kohlberg, 'Shī'ī Hadīth,' p. 303. 40 Halm, p. 51. 41 Al-Fadlī and al-Thānī, p. 26. 42 Al-Kulaynī, al-Kāfī (Karachi), p. 179–180. 43 Buckley, p. 168. 44 Al-Dhahabī, Mīzān al-i'tidāl, vol. 4, p. 357. 45 Sahīh al-Bukhārī: kitāb fadā'il ashāb al-Nabī, bāb manāqib qarābat Rasūl Allāh. 46 Buckley, p. 168. 47 Ibn Abī Ya'lā, Tabaqāt al-hanābila, vol. 2, p. 156. 48 Kohlberg, 'Shī'ī Hadīth,' p. 299. 49 Ibid., p. 303. 50 Al-Kulaynī, Al-Kāfī (Karachi), p. 147. 51 Ibn Bābawayh, Amālī al-sadūq, p. 7. 52 Al-Dhahabī, Mīzān al-i'tidāl, vol. 2, p. 492; al-Hākim, al-Mustadrak, vol. 3, p. 154. 53 Al-Suyūtī, al-La'ālī al-masnū'a, vol. 1, pp. 308–313; idem, al-Khasā'is al-kubrā, vol. 2, p. 82; al-Albānī, Silsilat al-ahādith al-da'īfa, vol. 2, p. 395. 54 Ibn Bābawayh, Amālī, p. 9; Abū Nu'aym al-Isbahānī, Hilyat al-awliyā' fī tabaqāt al-asfiyā', vol. 6, p. 120. 55 Cf. Halm, pp. 58–59. 56 'Musnad 'Alī Ridā,' p. 446. 57 Al-Rāfi'ī, Al-Tadwīn fī akhbār Qazwīn, vol. 3, p. 482; Sunan Ibn Mājah: muqaddima, bāb fī al-īmān. 58 Kohlberg, 'Al-Usūl al-Arba'umi'a,' pp. 130–131. 59 Tāj al-Dīn al-Subkī, Tabaqāt al-shāfi'iyya al-kubrā, vol. 1, pp. 314–316. 60 J. Brown, 'Crossing Sectarian Boundaries,' pp. 55–58. 61 Kohlberg, A Medieval Muslim Scholar at Work, pp. 324–325. 62 Ibn Bābawayh, Amālī, p. 2. 63 Nāsir al-Dīn Qazvīnī, Ketāb-e naqd, pp. 576–578. 64 The hadith of 'Alī's name being written on the doorway to Paradise does, however, appear in the Kitāb fadā'il al-sahāba of Ahmad b. Hanbal; Ibn Hanbal, Kitāb fadā'il al-sahāba, vol. 2, p. 665. 65 Muhammad Yahyā al-'Azzān, Al-Sahāba 'ind al-zaydiyya, p. 56. 66 'Abdallāh Hamūd al-'Izzī, 'Ilm al-hadīth 'ind al-zaydiyya p. 42. 67 Al-Miswarī, Al-Risāla al-munqidha, pp. 60–62. 68 Al-'Izzī, 'Ilm al-hadīth 'ind al-zaydiyya, p. 271. 69 Zayd b. 'Alī, Musnad Zayd b. 'Alī, p. 383. 70 Sārim al-Dīn Ibrāhīm al-Wazīr, Al-Falak al-dawwār fī 'ulūm al-hadīth wa al-fiqh wa al-āthār, pp. 69, 222. 71 Al-'Izzī, 'Ilm al-hadīth 'ind al-zaydiyya, p. 225. THE FUNCTION OF PROPHETIC TRADITIONS IN ISLAMIC LAW AND LEGAL THEORY THE AUTHORITY OF THE SUNNA IN LAW All Muslims believe that the Quran is the primary source of Islamic law. Throughout Islamic history, the vast preponderance of Muslims have also affirmed that the teachings of the Prophet adjust, augment and explain the Holy Book, although they have disagreed on how and to what extent it occurs. The Quran is not a detailed legal manual. Only about five hundred of the book's verses provide legal injunctions, and even on major questions such as ritual prayer the Quran is often vague. For both Sunni and Shiite Islam, the Prophet's Sunna has thus proven an essential resource for explaining and supplementing the Quranic message. As the Companion 'Imrān b. Husayn supposedly told a person who wanted to take religious law only from the Holy Book and not from the Sunna, 'Indeed you are an idiot, do you find in the Book of God prayer explained!? Do you find in it fasting explained!? Indeed the Quran ordains this, but the Sunna explains it.'1 As the lens through which the Quran was understood, the Sunna of the Prophet has controlled the way in which Muslims have interpreted the Quranic revelation. Although no Muslim would claim that the word of Muhammad is ontologically equal or superior to the word of God, early Sunnis such as Yahyā b. Abī Kathīr (d. 129/747) long ago acknowledged that 'The Sunna came to rule over the Quran, it is not the Quran that rules over the Sunna.'2 This was not in any way an admission of any deficiency in the Quran – rather it recognizes that the book required the Prophet's example and teachings in order to explain its verses and unlock its manifold meanings to an evolving community. As many early Muslims such as Ayyūb al-Sakhtiyānī (d. 131/748) noted, 'The Quran needs the Sunna more than the Sunna needs the Quran.'3 Muslim schools of thought at various times have insisted, out of principle, that the words of a mere mortal, even Muhammad, could never conceivably carry more interpretive weight than the word of God. Yet they have all historically recognized that, whichever way one chooses to phrase it, the Prophet's legacy has profoundly informed and altered the way the Quran's legal message has been understood. The word 'Sunna,' of course, is not fully synonymous with 'hadith.' In the first century and a half of Islamic history, 'sunna' was often understood as the accepted set of practices and beliefs of the Muslim community as passed on from the Companions. A 'hadith' was merely a report from the Prophet that may or may not have actually been acted on as a rule in daily Muslim life. Shu'ba b. al-Hajjāj was thus considered a master of hadiths but not of sunna, while Sufyān al-Thawrī (d. 161/778) was considered a master of both.4 We have already seen that Mālik believed that the practice of the people of Medina, which he felt had been transmitted en masse from the time of the Prophet, was a much more reliable source for discovering the Prophet's Sunna than a solitary hadith narrated by one isnād. By the time of Mālik's student al-Shāfi'ī, however, among the ahl al-hadīth a concerted study of hadiths had become the essential route for learning and implementing the Sunna of the Prophet. The importance of hadiths in the Sunni derivation of Islamic law is clear from the sources from which the different Sunni schools of law drew. Hanafīs ranked the sources of law as 1) the Quran, 2) sound hadiths, 3) Companion opinions, and 4) methods of legal reasoning based on the Quran and Sunna. Al-Shāfi'ī consulted 1) the Quran and reliable hadiths, 2) the consensus of scholars, 3) Companion opinions, and 4) analogical reasoning based on the Quran and Sunna. Mālikīs described their sources of law as 1) the Quran, 2) the Prophet's Sunna, which was understood through hadiths, Companion rulings, and the practice of Medina, 3) consensus, 4) legal reasoning and communal needs. Hanbalīs described Ibn Hanbal's sources of law as 1) the Quran and reliable hadiths, 2) the consensus of the early community, 3) Companion opinions, 4) weak hadiths, and 5) analogical reasoning based on the Quran and Sunna.5 It is worth noting that accepting the Sunna and hadiths as an essential source of Islamic law was not uncontested. In the first two centuries of Islam (and indeed, in the modern period as well, see chapter 10), there were schools of thought that rejected the use of hadiths in Islamic law entirely. The works of al-Shāfi'ī record his disputations with these scholars, known to Sunnis as the 'People of Speculative Theology (ahl al-kalām),' who could not accept the idea of taking their religion and its laws from reports transmitted merely 'from so-and-so, from so-and-so.'6 This was a function fit for something as historically reliable as the Quran alone. This extreme skepticism towards hadiths, however, died out in classical Sunni and Shiite Islam, although its traces will be seen below in the Mu'tazilite approach to hadiths. Sunni Islam in particular followed the reasoning with which al-Shāfi'ī had confronted the 'People of Speculative Theology': without the Sunna and hadiths, how could Muslims know the details of prayer or of the Ramadan fast?7 THE INTERACTION OF THE SUNNA WITH THE QURAN IN LAW Al-Shāfi'ī offered a succinct description of the manner in which the Sunna could affect interpretation of the Quran. First, the Prophet could demonstrate that the meaning of a general Quranic verse was more specific than it appeared. The Quran, for example, states 'The thief, male or female, cut off their hand in retribution for what they have done, an exemplary punishment from God, for God is mighty and wise' (Quran 5:38). We learn from a hadith narrated from the Prophet by Aisha, however, that we should 'not cut off someone's hand for an item whose value is less than a quarter dinar' (1/4 dinar is approximately $25). From other hadiths we learn that the punishment also does not apply in cases of stealing things from unsecured locations, embezzlement or taking things publicly.8 The Sunna also clarified ambiguous or vague Quranic commands. The Quran orders Muslims to pray and fast, but only the Sunna explains how these rituals are performed. The Sunna could also abrogate or add entirely new information to the Quran. The Quran forbids Muslims from eating carrion, but in a famous hadith the Prophet approves of a group of Muslims who had eaten the meat of a dead whale they had found on the beach, for he reminds them that everything that comes from the sea is permissible to eat. Hadiths also inform Muslims that they can eat dead grasshoppers they find. The Quran forbids men from marrying their mothers, sisters, daughters, or aunts (with the corresponding male relationships for women implied as well), saying that women 'other than these are permissible' (Quran 4:24). Hadiths add that a man cannot marry a woman and her aunt at the same time. Traditional Sunni scholars have uniformly rejected the hadith, invoked by Mu'tazilites, that orders Muslims to reject hadiths that differ with the Quran. As al-Shāfi'ī said, such an idea was 'pure ignor-ance,' since the purpose of hadiths was to explain, modify, and add to the Quran. Hadiths could thus by definition break with the evident meaning of Quranic verses. Coming from the ahl al-ra'y tradition, the Hanafīs also recognized these interactions between the Sunna and the Quran, although as we will see they maintained different standards for when hadiths could fulfill these functions. Hanafī legal theorists discussed how hadiths could reinforce Quranic rulings (called an 'affirming indication,' or bayān taqrīr), add explanatory information to a Quranic ruling (called an 'explanatory indication,' or bayān tafsīr), or replace and restrict a Quranic ruling (called an 'abrogating indication,' or bayān tabdīl).'9 DIFFERENT CONDITIONS FOR THE USE OF HADITHS IN LAW The ahl al-hadīth movement (the original core of Sunni Islam) was built on the premise that a report established as coming from the Prophet was legally compelling. As al-Shāfi'ī famously stated, 'If the hadith is reliable, then that is my ruling (in sahha al-hadīth fa-hādhā madhhabī).'10 Both sahīh and hasan hadiths were considered admissible in law, and we have seen that early ahl al-hadīth jurists like Ibn Hanbal sometimes acted on weak hadiths if they could find no other evidence whatsoever on a particular issue. When Sunni legal theory matured in the eleventh century, it was accepted that, although āhād (i.e., non-massively transmitted) hadiths did not yield epistemological certainty (yaqīn) that the Prophet had made that statement, they did yield a very strong probability (zann). This was sufficient for fixing law and ritual. While almost all legal hadiths were āhād, the Quran was epistemologically certain, massively transmitted from the time of the Prophet. This posed a problem for proponents of the majority Ash'arī school of legal theory (subscribed to by Shāfi'ī, Mālikī, and many Hanbalī scholars). These legal theorists could not accept that an āhād hadith, which conveyed mere probability, could replace a Quranic ruling. They therefore rejected the doctrine that āhād hadiths could abrogate (naskh) the Quran. But if this were the case, then how could they explain rulings such as allowing eating dead fish or the prohibition on marrying a woman and her aunt? As the Ash'arī legal theorist Ibn Fūrak (d. 406/1015) cleverly explained, this was possible because such a ruling could be phrased as an āhād hadith specifying or adjusting Quranic verses, not replacing their rulings.11 The various groups that made up the Partisans of Legal Reasoning (ahl al-ra'y) also accepted the compelling power of hadiths. In principle, no Muslim could argue that the Prophet's words merited anything short of obedience. Abū Hanīfa is quoted as saying, 'Whoever says that we prefer our own legal reasoning (qiyās) to a revealed text [from the Prophet] has lied, by God, and defamed us. For what need is there for legal reasoning in the presence of such a text!?'12 The crux of the difference between the ahl al-hadīth and the ahl al-ra'y was how one determined if a hadith was reliable enough to be accepted in law. As a rule, the Hanafī school of law does not allow hadiths to abrogate or specify the evident meaning of Quranic verses unless the report is mashhūr (widespread and accepted by jurists). They viewed specification (takhsīs) of a Quranic verse as a form of abrogation (naskh) of the holy book and therefore did not permit it by āhād hadiths. For example, the other three Sunni schools of law require a Muslim to have the intention to perform his ritual ablutions before he starts washing on the basis of the famous hadith 'Indeed deeds are [judged] by intentions (innamā al-a'māl bi'l-niyyāt).' But because this hadith is only narrated by one solitary chain of transmission for four stages in the isnād (Prophet 'Umar b. al-Khattāb 'Alqama b. Waqqās Muhammad b. Ibrāhīm Yahyā b. Sa'īd al-Ansārī), the Hanafīs do not consider it widespread enough to adjust the Quran, which simply instructs Muslims to wash certain parts of their bodies for ablutions (Quran 5:6). For Hanafīs, then, one can take a shower and then retroactively count that as one's ablutions even if one had not intended to do so while showering. In the case of a hadith that is not widely enough transmitted to be deemed mashhūr, Hanafīs do not accept it in legal discussions if it deals with a case of 'umūm al-balwā, or an issue of great importance to Islamic law. If the issue addressed by the hadith were crucial for Muslims' understanding of their religion, then God and His prophet would have assured that it was transmitted by more reliable means. Hanafīs also do not accept a non-mashhūr hadith if the early scholars who transmitted it did not act according to its ruling. If the hadith truly represented the Prophet's Sunna, then why would a pious narrator not follow it? Finally, until the 1000s CE many Hanafī jurists favored their own legal reasoning over a non-mashhūr hadith if its transmitters were not considered skilled in legal analysis. A hadith from Sahīh al-Bukhārī quotes the Prophet permitting parties in a sales transaction to change their minds up until 'the two part company.' Although accepted as a rule in the Shāfi'ī and Hanbalī schools, this broke with the Hanafī school's principle that sales are finalized upon agreement, barring some fraud or defect. Hanafīs did not reject this hadith outright. Rather, they turned to comments on it by the Kufan authority Ibrāhīm al-Nakha'ī (d. 96/717), who explained that 'parting company' was understood not in the physical sense but as the verbal end of the negotiation.13 The Mālikī school of law was also considered by some to be part of the ahl al-ra'y movement. It is very difficult, however, to determine exactly what the early Mālikī stance on hadiths was. Mālik himself often rejected hadiths that contradicted the practice of the people of Medina. For example, Mālik also did not act on the evident meaning of the 'parting company' hadith because it was not acted on in Medina. He also took the meaning of 'parting company' as ending the negotiation. Mālik also chose not to act on hadiths that he recognized as reliable if he feared they would lead to misunderstandings or facilitate prohibited acts (a concept known as sadd al-dharā'i', or 'blocking means'). He did not allow acting on a sahīh hadith that recommended that Muslims fast for six days in the month immediately following the obligatory month-long fast of Ramadan because he feared people would confuse this optional fast with the required one.14 The Mu'tazilite school of theology and legal theory, of course, retained the most rigorous standards for accepting hadiths for use in law. According to later Mu'tazilites, the founder of the school, Wāsil b. 'Atā' (d. 131/750), would only accept hadiths if they were agreed upon as authentic by the whole community of scholars.15 For matters of law, the Mu'tazilite master Abū Hudhayl (d. 200/815) required a hadith to have four separate narrations, although later members of the school required only two.16 WEAK HADITHS AND PRACTICE: DIFFERENT PROOFS FOR THE AUTHENTICITY OF LEGAL HADITHS During the formative first three centuries of the Sunni legal tradition, there was a diversity of approaches to weighing the evidence provided by isnāds against the accepted practice of legal scholars. Despite their obsession with the isnād as the only means of authenticating hadiths, early ahl al-hadīth jurists affirmed that the widespread acceptance of a legal ruling could offset a lackluster isnād. In such a case, it is actually the accepted practice of Muslim scholars that justifies the ruling. The hadith only embodies it in the Prophetic word. The Quran specifies certain family relations who automatically inherit if a family member dies (Quran 4:11–12). In a hadith that appears in the Four Sunans of al-Tirmidhī, al-Nasā'ī, Abū Dāwūd and Ibn Mājah, the Prophet states that 'The killer does not inherit,' meaning that if someone murders someone from whom they stand to inherit, they will not inherit anything. Despite being widely quoted, al-Tirmidhī notes that 'this hadith is not sound,' an opinion with which later critics agree. Yet al-Tirmidhī adds, 'practice has been based on this hadith amongst the people of knowledge.' Indeed, though this hadith is the only scriptural basis for this position, the ruling has been agreed upon by all schools of law in Islam.17 Another famous example occurs in the case of inheritance as well. The Quran and hadiths set detailed regulations for how much a person must leave to each of his or her inheritors – a person can distribute no more than one third of the estate to people of his or her own choosing. In a famous hadith, however, the Prophet declares, 'No bequest to an inheritor unless the inheritors all agree (lā wasiyya li-wārith illā in shā'a al-waratha)'; in other words, one cannot leave part of this third to someone who already inherits automatically. Every one of the many narrations of this hadith suffers from some flaw in the isnād according to Muslim hadith critics. But as al-Shāfi'ī and the Mālikī hadith scholar of Lisbon, Ibn 'Abd al-Barr (d. 463/1070), declared, 'With reports like this that became well established among all the scholars, it is not necessary to provide an isnād. For its widespread transmission and well-known status among them is stronger than any isnād.'18 Some also maintained that juridical mastery obviated the need to cite an isnād at all. From the early Islamic period onward, jurists from the Hanafī school held that a competent scholar of the early period need not provide an isnād for a hadith he cited. Unlike the Partisans of Hadith, they therefore considered mursal hadiths (hadiths in which an early scholar such as a Successor quoted the Prophet without an isnād, see chapter 3) to be acceptable proofs in legal discourse. They argued that when Abū Hanīfa cited the Prophet's words or deeds as legal proof without providing any isnād, this was because he was so confident in the authenticity of the hadith that he did not bother with a chain of transmission.19 In addition, in the time of Abū Hanīfa (who was considered a Successor because he had seen the Companion Anas b. Mālik as a boy) it had not become predominate practice for scholars to provide isnāds. Mālik thus frequently included mursal hadiths in his Muwatta'. Al-Shāfi'ī, however, led the Partisans of Hadith attack on mursal hadiths and insisted on providing an isnād in order to prove the reliability of one's hadith. He stated that he had examined the mursal hadiths in circulation and found that only those of the senior Successor Sa'īd b. al-Musayyab were reliable, since it was assumed that he had heard them all through his father-in-law Abū Hurayra.20 Because there was a break in the isnāds of mursal hadiths, the ahl al-hadīth considered them to be unreliable. Scholars from the Shāfi'ī and Hanbalī schools of law thus only used mursal hadiths as evidence if they came from Sa'īd b. al-Musayyab, when they were backed up by the legal rulings of Companions or to tip the balance in the case of two competing hadiths.21 THE EVOLVING USE OF HADITHS IN THE SUNNI SCHOOLS OF LAW Although hadiths have played an undeniably crucial role in constructing Islamic law, that role has not remained static since the early period of Muslim legal thought. As we saw in the musannaf period, early legal scholars like Mālik b. Anas relied on Companion opinions and the rulings of early jurists from the Successor generation more often than Prophetic hadiths. Companion opinions and analogical legal reasoning ranked highly among the sources of law that the Shāfi'ī, Mālikī, Hanafī, and Hanbalī schools identified. By the ninth century, however, it had become necessary for schools of law to find Prophetic hadiths to justify their stances. In his massive book of substantive law, the Umm, al-Shāfi'ī had cited only about four thousand three hundred hadiths with full isnāds to the Prophet as evidence. The eleventh-century Shāfi'ī scholar Abū Bakr al-Bayhaqī, however, filled his massive Sunan al-kubrā (The Great Sunan) with over twenty thousand narrations from the Prophet in order to back up every detail of Shāfi'ī law. The history of Sunni legal thought, however, was not a linear process of collecting more and more hadiths to justify a certain legal position. The Sunni schools of law were evolving interpretive traditions that presented evidence in different ways depending on their needs. Each madhhab (school of law) represented a tradition of transmitting, explaining, reexamining, adjusting and adapting the body of law originated by its founding figures. In the case of the Hanbalī school of law, for example, the legal opinions given by Ibn Hanbal were collected from his senior students by Abū Bakr b. al-Khallāl (d. 311/923–4). His student al-Khiraqī (d. 334/945–6) sifted through the many and sometimes seemingly contradictory opinions of Ibn Hanbal, attempting to place each one in its proper context. His work, known as the Mukhtasar (The Abridgement), was the foundational text of the Hanbalī school. Later scholars transformed this work to fit various needs. Ibn Qudāma (d. 620/1223), for example, channeled the Mukhtasar into four works of increasing size and complexity: the 'Umda (The Pillar), designed to introduce students of the school to its principal rulings; the Muqni' (The Convincing Book), which introduced Hanbalī students to the various differences of opinion among the school's major figures; the Kāfī (The Sufficient Book), which introduced students to the evidence and argumentation for these positions; and finally the huge Mughnī (The Obviating Book), which added more evidence and the opinions of other schools of law as well. The Muqni' was digested by Mūsā al-Hajjāwī (d. 968/1560) into a small and easily memorized text called the Zād al-mustaqni' (Provisions for One Seeking Certainty), which provided the official Hanbalī stances on issues of law. This work was then explained by Mansūr al-Buhūtī (d. 1051/1641) in his al-Rawd al-murbi' (The Abundant Garden), in which the author expanded the work and also provided the reader with evidence for its rulings. In these works, the Hanbalī school's use of hadiths expanded and contracted according to the purpose of a particular book. We can see this clearly in the example of the Hanbalī position on how someone should pray if he is too weak to stand or even sit up straight: he should lie on his side facing the direction of prayer, nodding with his head to represent the normal bowings and prostrations of prayer. The Mukhtasar of al-Khiraqī does not concern itself with providing evidence on this – it merely seeks to identify Ibn Hanbal's stances on legal issues. The lengthy Mughnī of Ibn Qudāma, however, provides a myriad of Quranic verses, hadiths, and early scholarly opinions to justify Ibn Hanbal's choice. We find Ibn Qudāma citing a hadith that Ibn Hanbal had included in his famous Musnad: The Prophet said to 'Imrān b. Husayn: 'Pray standing, and if you cannot, then sitting, and if you cannot, then on your side (salli qā'iman wa in lam tastati' fa-qā'idan wa in lam tastati' fa-'alā janb).' This was excellent evidence for the Hanbalī opinion, since the hadith had been included in the Sahīhayn and was thus extremely reliable. Ibn Qudāma also lists other hadiths transmitted by al-Nasā'ī that add that the person should lie down fully if unable to lie on his side.22 Centuries later, however, when al-Buhūtī was providing evidence for the Hanbalī position in his Rawd al-murbī', he omitted these reliable hadiths and instead used an otherwise very weak hadith from the Sunan of al-Dāraqutnī. The reason for this was clear: this one hadith lays out the Hanbalī position word for word! It reads: The Prophet said: The sick person should pray standing if he can. If he cannot, he should pray sitting down. If he is unable to prostrate, he gestures with his head and makes the gesture of prostration lower than the gesture representing bowing. If he is unable to pray sitting, he should pray on his right side facing the direction of prayer, and if he is unable to do that he should lie with his legs facing the direction of prayer.23 In the Mughnī, Ibn Qudāma sought to collect the most reliable hadiths as evidence to support the Hanbalī school. For al-Buhūtī, the school's position was already justified. He only wanted to provide his reader with one concise piece of evidence that summarized it even if that hadith was unreliable. IKHTILĀF AL-HADĪTH: DISAGREEMENT AND DIFFERING INTERPRETATION OF HADITHS AMONG JURISTS The Prophet taught thousands of followers, interacted with his community for twenty-three years, and acted as a judge and political leader for the last ten. As a result, sifting through his Companions' sundry recollections of his words in order to determine his precedent (Sunna) was a monumental task. The vast number and complex meaning of the hadiths with which jurists had to contend in their attempts to derive Islamic law made the hadith tradition fertile ground for disagreement and varying interpretations. Even a cursory reading of major hadith collections illustrates the difficulty of reaching definitive conclusions based on hadiths. In al-Tirmidhī's Jāmi', for example, we find one section listing hadiths forbidding drinking while standing up followed by another section with hadiths describing how the Companions saw the Prophet drinking while standing up! In addition to determining which hadiths to act on, a Muslim scholar had to place these hadiths within the framework of Quranic injunctions and the specific interests of the Muslim community. A common saying among Muslim scholars thus identifies hadith critics with pharmacists, who provide the medicine, and legal scholars with doctors, who know how to use this medicine properly.24 Disagreement was often the outcome of limited access. As we have seen, in its first two centuries the hadith tradition was highly localized. In Medina, Mālik did not have access to the same hadiths as Abū Hanīfa in Kufa. These two jurists were thus working from different bodies of hadiths. Al-Shāfi'ī is reported to have said that the hadiths that provide the basis for all legal rulings (usūl al-ahkām) are only fifty or so in number. He adds that his teacher Mālik only had thirty, while his teacher Sufyān b. 'Uyayna (d. 196/811) in Mecca had all but six.25 Assuming that scholars had access to the same hadiths, what are the factors that could lead Muslim jurists to reach different legal conclusions on their basis? Why might a scholar ignore a hadith or take one over another? The fourteenth-century analyst Ibn Taymiyya (d. 728/1328) explained that disagreements over the Prophet's Sunna as communicated by the hadith literature revolved around three points.26 First, a scholar might not have thought that a certain hadith was reliable. Instead, he might have chosen another narration over it. For an example, let us turn to al-Tirmidhī's Jāmi', which documented legal disagreement as well as hadiths. In his section on how one should say 'Amen' in prayer, al-Tirmidhī writes: It was reported to us by Bundār Muhammad b. Bashshār: it was reported to us by Yahyā b. Sa'īd al-Qattān and 'Abd al-Rahmān b. Mahdī: it was reported to us by Sufyān, from Salama b. Kuhayl, from Hujr b. 'Anbas, from Wā'il b. Hujr: he said, 'I heard the Prophet read [the Quranic verse in prayer] "And not those rejected by God nor those who have gone astray" and then he said, "Amen," stretching out his words.' And on that issue there are also hadiths from 'Alī b. Abī Tālib and Abū Hurayra. The hadith of Wā'il b. Hujr is a hasan hadith, and that is the position of more than one of the people of knowledge from among the Companions of the Prophet, the Successors and those after them. They hold that a person raises his voice in saying 'Amen' and does not say it silently. This is the opinion of al-Shāfi'ī, Ahmad b. Hanbal and Ishāq b. Rāhawayh. But Shu'ba b. al-Hajjāj narrated this hadith from Salama b. Kuhayl, from Hujr b. al-'Anbas, from 'Alqama b. Wā'il, from his father, that 'the Prophet read [the verse] "Not those rejected by God nor those who have gone astray," and said "Amen" but lowered his voice.' I heard Muhammad [al-Bukhārī] say, 'the first hadith, [that] of Sufyān, is more authentic than the [second] hadith, [that] of Shu'ba on that issue. And Shu'ba erred at several points in the hadith, saying "from Hujr b. al-'Anbas", when it is really 'Hujr b. 'Anbas... and he added in the hadith "from 'Alqama b. Wā'il" when that is not part of the hadith's [isnād]. Rather it is "from Hujr b. 'Anbas, from Wā'il b. Hujr." Finally, [Shu'ba] said, "and he lowered his voice," when really it is "and he extended his voice in saying Amen." I asked Abū Zur'a [al-Rāzī] about that hadith and he said, 'Sufyān's hadith on that issue is more authentic than Shu'ba's.' He added, 'And there is [a hadith of] al-'Alā' b. Sālih al-Asadī, from Salama b. Kuhayl, like the narration of Sufyān. It was reported to us by Abū Bakr Muhammad b. Abān: it was reported to us by 'Abdallāh b. Numayr: it was reported to us by al-'Alā' b. Sālih al-Asadī, from Salama b. Kuhayl, from Hujr b. 'Anbas, from Wā'il b. Hujr, from the Prophet, the likes of Sufyān's hadith, from Salama b. Kuhayl.'27 Here we see the debate surrounding two narrations of the same hadith, one through Sufyān, from Salama b. Kuhayl, which describes the Prophet saying 'Amen' out loud during prayer; and one through Shu'ba, from Salama b. Kuhayl that says the opposite. Jurists like al-Shāfi'ī and Ibn Hanbal chose Sufyān's narration, which describes the Prophet saying 'Amen' out loud, rejecting Shu'ba's version. Al-Tirmidhī provides the opinions of the influential hadith critics al-Bukhārī and Abū Zur'a al-Rāzī to explain why: Shu'ba's narration includes an error (a very minor one!) in the name of the transmitters and adds another transmitter incorrectly into the isnād. More import-antly, al-'Alā' b. Sālih al-Asadī's narration of the hadith from Salama b. Kuhayl corroborates Sufyān's narration of 'Amen' being said out loud. The hadith scholars' critical method, focusing on the reliability of the isnād and corroboration, thus led many jurists to uphold saying 'Amen' out loud in prayer. Second, a jurist might conclude that one hadith had abrogated another one, annulling and replacing its ruling. All hadith scholars and jurists acknowledged an authentic hadith in which the Prophet instructed Muslims to perform ablutions after eating food cooked by fire. Al-Suyūtī even declared it mutawātir.28 Sunni scholars, however, agreed on hadiths transmitted by Ibn 'Abbās and Abū Bakr that during the last few years of his life in Medina the Prophet had been served a cooked lamb shoulder and then had prayed his afternoon prayer without performing ablutions. The Companions therefore understood that the earlier requirement for ablutions had been nullified.29 Several hadith scholars penned books devoted to listing and analyzing hadiths that abrogated or were abrogated. Ibn Hanbal's student Abū Bakr Ahmad al-Athram (d. 261/875) wrote his Nāsikh al-hadīth wa mansūkhuhu (Abrogating and Abrogated Hadiths), Ibn Shāhīn (d. 385/996) of Baghdad and Abū Bakr al-Hāzimī (d. 584/1188–89) also wrote large and widely studied works on hadith abrogation. Finally, a jurist might not have thought that a hadith addressed a particular issue or may have weighed it against other evidence in a manner that differed from other jurists. We have already seen that Hanafīs did not allow hadiths to modify or abrogate Quranic rulings unless they were well established. This led Hanafīs to break with the other Sunni schools of law in not requiring Muslims to declare their intentions before performing ritual ablutions. Mālik, for his part, favored the practice of Medinans over many hadiths. In the case of the apparent contradiction between hadiths in which the Prophet instructed his followers not to drink while standing up and hadiths describing the Prophet doing just that, many jurists understood this as meaning that drinking standing up was discouraged but nonetheless permissible.30 The context in which a hadith appeared could have tremendous impact in its implications. We find, for example, two narrations of a hadith narrated from 'Urwa b. al-Zubayr, from his aunt Aisha, from the Prophet. In one the Prophet states 'Whoever is tried by having daughters and perseveres with them, they will veil him from the Hellfire [on the Day of Judgment].' This report does not leave a very positive impression of daughters! In the second narration, however, we find illuminating details. Aisha recounts how 'A woman entered asking me [for food] and had two daughters with her. But all I had with me was a date, so I gave it to her, and she split it between her two daughters without eating any herself. When the Prophet came I told him of this, and he said, 'Whoever is tried by these daughters, they will be a veil from Hellfire [on the Day of Judgment].'31 In the modern period, context has strongly informed the use of another gender-related hadith. In his defense of women's right to hold public office, the Egyptian scholar Muhammad al-Ghazālī (d. 1996) noted that the majority of classical scholars had objected to women serving as judges on the basis of the sahīh hadith, 'The people who entrust their affairs to a woman will not succeed (lan yufliha qawm wallū amrahum imra'a).' Al-Ghazālī, however, retorts that the context in which this hadith was said clarifies its meaning. The Persian Sassanid Empire was experiencing internal political crises as well as military defeats at the hands of the Byzantines. In the midst of this trouble, the Sassanids brought a woman to the throne. The Prophet was merely noting that this would not prevent the empire's downfall.32 Ever creative, Jalāl al-Dīn al-Suyūtī (d. 911/1505) wrote a book on the 'reasons for the appearance of hadiths' (Asbāb wurūd al-hadīth¸ the book had that same title), as did Ibrāhīm b. Hamza (d. 1708). These books, however, did not introduce any new information about hadiths. The context and motivations for the Prophet's statements were already found either within hadith collections or in commentaries on these works. Books like al-Suyūtī's simply culled that information from these sources and reorganized it. The different reasons for disagreement over interpreting hadiths could coincide. Al-Shāfi'ī described how scholars should address such situations. In a case of clashing hadiths, one should first examine which hadiths have the most reliable isnāds. First, he states unequivocally that no two reliable hadiths can be contradictory, since it is impossible for the Prophet to have an inconsistent Sunna. Instead, one must determine the proper relationship between the contrasting hadiths. Al-Shāfi'ī states that hadiths that convey different rulings on an issue may indicate that the Prophet intended there to be latitude and flexibility. If this is not the case, then the one hadith might address certain circumstances and the second one other circumstances. If neither of these options is possible, one hadith must abrogate the other. The scholars who emerged amongst the early generations of Muslims were key resources in fitting the data provided by individual, reliable hadiths into a coherent system. As Abū Dāwūd wrote in his Sunan, 'If two reports from the Messenger of God clash, one looks to what the Companions and those who came after them acted on.'33 We can see the way in which reconciliation and abrogation interacted in the question of 'the Two Prostrations of Error (sajdatā al-sahw).' When Muslims perform their canonical prayer – done five times daily – their prayers consist of a fixed cycle of actions and utterances including bowing, prostrations, and kneeling. In the last prayer cycle of the prayer, the worshipper performs the 'Taslīm', or turning one's head to the right and left and saying 'May the peace and mercy of God be upon you (al-salām 'alaykum wa rahmat Allāh)' to the person to the right and left. This marks the end of the prayer. If a worshipper errs in the proper procedures of the prayer, they can touch their foreheads to the ground twice while seated at the end of the prayer. These two prostrations are called 'The Two Prostrations of Error.' The Shāfi'ī school holds that these prostrations should be done before the Taslīm, while Hanafīs maintain that they should be performed afterwards. Mālikīs and Hanbalīs take more subtle positions. The following is al-Tirmidhī's discussion of the different hadiths dealing with this issue and the different ways that scholars have interpreted them. He mentions a hadith affirming that the Two Prostrations are made before the Taslīm, only alluding to another famous one in which the Prophet prays them afterwards: It was reported to us by Qutayba [b. Sa'īd]: it was reported to us by al-Layth [b. Sa'd], from Ibn Shihāb [al-Zuhrī], from al-A'raj, from 'Abdallāh b. Bujayna al-Asadī, associate of the Banū 'Abd al-Muttalib [family], that the Prophet stood up in the Noon prayer when he should have remained seated, so when he finished his prayer he prostrated twice, saying 'God is most great (Allāhu akbar)' for both prostrations, before saying the final Taslīm [to exit the prayer]. And the congregation following the Prophet in prayer did the same as him. He had done this to make up for forgetting to remain seated during part of the prayer. ... The hadīth of Ibn Bujayna is a hasan sahīh hadith, and it is acted on by some of the people of knowledge, being the opinion of al-Shāfi'ī. He holds that the Prostrations of Error are always before the Taslīm, saying that this hadith abrogates the other hadiths on this issue. Al-Shāfi'ī mentions that this hadith represents the practice of the Prophet in the last stage of his career. Ahmad Ibn Hanbal and Ishāq b. Rāhawayh say that if someone stands up in prayer in the midst of his normal two prostrations he should perform the two Prostrations of Error before the Taslīm as per the hadith of Ibn Bujayna. The scholars have disagreed on when one should perform the two Prostrations of Error, before the Taslīm or after it? Some hold that one should perform them after the Taslīm; this is the position of Sufyān al-Thawrī and the Kufans [in other words, the Hanafīs]. Some have said 'before the Taslīm,' and this is the position of most the Medinan jurists like Yahyā b. Sa'īd, Rabī'a [al-Ra'y] and others. This is the opinion of al-Shāfi'ī. Others have said that if the mistake is adding something to the prayer then the Prostration of Error is after the Taslīm, and if it is an error of omission then before the Taslīm. This is the opinion of Mālik b. Anas. Ahmad Ibn Hanbal said, 'All the hadiths related from the Prophet concerning the two Prostrations of Error should be employed, each according to its specific context.' He sees that when the Prophet stood up incorrectly in the hadith of Ibn Bujayna, he prayed the two Prostrations before the Taslīm. When the Prophet accidentally prayed five prayer cycles during the Noon prayer (which consists of four) he prayed the two Prostrations after the Taslīm. And when the Prophet accidentally said the Taslīm after only two prayer cycles in the four-prayer-cycle Noon or Afternoon prayers, he did the two Prostrations after the Taslīm. So every report is acted on according to its specific context, and every error in prayer that is not mentioned in one of these hadiths, then the two Prostrations of Error should be before the Taslīm.34 On this issue, we see that al-Shāfi'ī concluded that the hadith of the Prophet performing the two Prostrations of Error before the Taslīm abrogated all earlier hadiths and represented the Prophet's final Sunna. Mālik and Ibn Hanbal, however, attempted to reconcile the contrasting hadiths on the issue. Several influential works were devoted to examining and attempting to reconcile seemingly contradictory hadiths. The first and most famous was al-Shāfi'ī's Ikhtilāf al-hadīth. The Hanafī scholar Abū Ja'far al-Tahāwī (d. 321/933) also wrote his voluminous Sharh mushkil al-āthār. Ibn Qutayba (d. 276/889) devoted his Ta'wīl mukhtalif al-hadīth to defending and reconciling hadiths that Mu'tazilites had dismissed as contradictory or irrational. THE FUNCTION OF HADITHS IN ISLAMIC LEGAL THEORY Hadiths did not just provide much of the substance of Islamic law, they also informed the theories through which that law was understood and derived. The Prophet's legacy shaped the manner in which Muslim legal theorists discussed law and epistemology, and these theorists also turned to hadiths as justification for their own ideas. In chapter 3 we saw how Islamic legal theory (usūl al-fiqh) affected hadith criticism. Now let us examine how hadiths influenced Islamic legal theory. Interestingly, many of the most important hadiths in legal theory are considered weak (da'īf) by Muslim hadith critics. Genealogy of Knowledge and the Transmission of Authority from the Prophet The Sunni tradition portrays itself as a genealogy of transmission in which each generation of scholars inherits its knowledge and methods of reasoning from its teachers. Paralleling the isnād exactly, this chain continues back to the Prophet. It is this transmission from teacher to student that creates and passes on interpretive authority. The hadith that expressed this worldview and was frequently invoked to bolster it was narrated from the Prophet by the Companion Abū Dardā' and is found in the three sunans of Abū Dāwūd, al-Tirmidhī, and Ibn Mājah: 'Indeed the scholars are the inheritors of the prophets (al-'ulamā' warathat al-anbiyā').' Books in the Sunni tradition (written, of course, by members of the scholarly class) frequently refer to the ulema by this honorific. The great thirteenth- century Sufi master Abū Hafs al-Suhrawardī (d. 632/1234) wrote to one of the most vaunted legal theorists of his day, Fakhr al-Dīn al-Rāzī (d. 606/1210), that the religious knowledge of the Muslim scholars is 'the greatest inheritance. For earthly inheritors received the inheritance of the world according to the rules of the people of the earthly world, while the prophets bequeath as their legacy divine wisdom. So know that, just as there is no station higher than that of prophethood, there is no honor above that of those who inherit this station.'35 Even the early scholar of the Successors, Abū al-Zinād (d. 130/748), used to tell his students that, just as the Quran ordered Muslims not to raise their voices over that of Muhammad, 'Silence in the presence of the scholars and respecting them is incumbent upon those learning, for the scholars are the inheritors of the prophets.'36 This hadith thus served to justify the Muslim scholarly class's role as the sole interpreters of the Prophet's message. Interestingly, most scholars, such as al-Suyūtī, consider this hadith to be weak.37 Ibn Hajar, however, notes that there are enough reports conveying this meaning to prove that the hadith has some basis in the Prophet's speech.38 The Companions were the first essential link in the Sunni genealogy of knowledge. They transmitted the Prophet's legacy in the form of hadiths. Moreover, in their own approaches to questions of law and dogma the Companions demonstrated the principles and methods of reasoning of the early Muslims. The Companions were the medium and lens through which the Prophet's teachings passed on to later generations. Not only were the actual legal rulings of senior Companions such as 'Alī, 'Umar, and Zayd b. Thābit an important legal source for later scholars like Abū Hanīfa and al-Shāfi'ī, but the Sunni worldview and notion of religious authority depended on a veneration of the Companions. If they could not be trusted, then how could one have confidence in the Shariah? A hadith commonly employed to affirm the Companions' suitability as the conduit for the transmission of this legal authority was 'My Companions are like the stars, which ever of them you follow, you will be rightly guided (ashābī ka'l-nujūm bi-ayyihim iqtadaytum ihtadaytum).' This hadith was commonly found in books of legal theory in order to prove that any Companion was a worthy representative of the Prophet's legal teachings. Both the ahl al-hadīth and ahl al-ra'y bent the hadith to their own purposes, however. Al-Shāfi'ī's student al-Muzanī (d. 264/878), who wrote the most important abridgement of al-Shāfi'ī's Umm, contended that it meant that the Companions were all upstanding hadith transmitters.39 The Hanafī legal theorist Fakhr al-Islām al-Bazdawī (d. 482/1089) argued that the hadith demonstrates that, like the Companions, Muslim scholars should employ their individual legal reasoning (ra'y).40 Yet this hadith is also considered unreliable or even forged by Muslim hadith critics. The manner in which these hadiths about the inheritance of knowledge in Islam were woven together by scholars can be seen in a work of the Damascene scholar Ibn Taymiyya (d. 728/1328), who wrote that, after believing in God and the Prophet, it is the duty of all Muslims to follow the scholars 'who are the inheritors of the prophets and whom God made like the stars, by whom one seeks guidance on land and sea.'41 The Authoritative Consensus of the Muslim Community (ijmā') The most powerful expression of authority in the Sunni tradition is not the Quran or even the Prophet's Sunna. Rather, it is ijmā', or the consensus of the community. As an adage of Cairo's al-Azhar University puts it, 'Consensus is the stable pillar on which the religion depends (al-ijmā' al-rukn al-rakīn yastanidu ilayhi al-dīn).' If the Sunna controls the interpretation of the Quran, then consensus controls the interpretation of the Sunna. In the controversial modern debate over whether or not Islam requires Muslim women to wear headscarves, some argue that this law is not found in the Quran and that the hadiths ordering it are not reliable. But since the community of Sunni scholars has historically declared that it is 'agreed upon by consensus' that the headscarf is required, arguing otherwise means breaking with the Sunni schools of law. The role of ijmā' in Islamic law began in the early Islamic period. The Successor al-Musayyab b. Rāfi' (d. 105/723–4) stated, for example: The community, if an event occurred for which they could find no reports from the Prophet, would come together on it and reach a consensus. And the truth was in what they agreed on, the truth was in what they agreed on.42 Consensus received more formal justifications in books of legal theory. Because the Quran did not provide any unambiguous evidence that the consensus of the Muslims was authoritative, scholars turned to hadiths. One of the most commonly cited proofs is a famous hadith, the most well-known version of which can be found in the Sunan of al-Tirmidhī through Ibn 'Umar, that the Prophet said, 'Indeed God most high will not bring my community together on an error, and the hand of God is over the collective, and who splits away splits away into the Hellfire (Inna Allāh ta'ālā lā yajma'u ummatī 'alā dalāla wa yad Allāh 'alā al-jamā'a, wa man shadhdha shadhdha ilā al-nār).'43 Ibn Hajar al-'Asqalānī notes that 'this is a well-known hadith narrated via many paths, but none of them are free of some criticism,' although al-Suyūtī declares the hadith to be hasan because of its many narrations.44 In addition to such criticisms of the hadith, legal theorists actually found themselves in an even direr predicament: an āhād hadith such as this one did not yield the certainty that scholars required to establish an important principle of legal theory. Unfortunately, the usual tool that Sunni legal theorists used to turn an āhād hadith into absolute certainty was to claim that the community had come to consensus on its accuracy! Since Sunni scholars were at risk of lapsing into circular reasoning here, legal theorists like al-Ghazālī (d. 505/1111) argued that the authenticity of this hadith was not guaranteed by consensus but rather by 'the general rules governing reality (al-'āda al-jāriya).' If Muslim scholars from Spain to Central Asia agreed on this hadith, it was realistically impossible for it not to have a true basis in the Prophet's teachings.45 Creating Islamic Law outside the Quran and Sunna In the Sunni tradition the Quran and Sunna are known as 'the two bases (al-aslān)' and are the only constitutive sources of law. Consensus derives its authority from them, and legal analogy refers new cases back to known rules from the Holy Book and the hadiths. Muslims, however, have maintained avenues for legal reasoning outside the letter of these scriptures. Various Sunni schools of law have reserved the right to rule on legal issues based on the best judgment of legal scholars or in pursuit of the Muslim community's best interest (with the general stipulation that such rulings cannot contradict the Quran and Sunna). Both these procedures are based on and legitimized by hadiths. Like the other hadiths in this section, however, these reports do not measure up to the standards of Muslim hadith critics. In fact, the famous report 'Whatever the Muslims see as good is good according to God; and whatever the Muslims see as reprehensible is reprehensible according to God (mā ra'āhu al-muslimūn hasanan fa-huwa 'ind Allāh hasan wa mā ra'āhu al-muslimūn sayyi'an fa-huwa 'ind Allāh sayyi')' is not really a Prophetic hadith at all. Hadith critics determined that it was a statement of the Companion Ibn Mas'ūd. Yet the early Hanafī scholar of Baghdad, Muhammad b. al-Hasan al-Shaybānī (d. 189/805), one of Abū Hanīfa's leading disciples, attributed it to the Prophet in his argument for Muslims instituting new practices that they felt enhanced their religious life but did not exist during the time of the Prophet. Specifically, he was defending 'Umar b. al-Khattāb's decision to organize voluntary communal nightly prayers in the mosque during the month of Ramadan.46 This was not practiced during the Prophet's lifetime but was quickly embraced and became ubiquitous in the Muslim world. An even more famous hadith is the Prophet's saying 'No harm and no harming (lā darar wa lā dirār),' which Abū Dāwūd, the author of one of the Six Books, called one of the four pillars of legal hadiths.47 Mālik and his student al-Shāfi'ī narrated this hadith as a mursal report, while Ibn Mājah had it via a full isnād from the Companion 'Ubāda b. Sāmit in his Sunan. It has generally been considered hasan. Regardless of its authenticity in the eyes of hadith scholars, however, this hadith became a central principle in Islamic legal thought. Muslim legal theorists used the phrase to elaborate what they saw as one of the principal goals of Islamic law, namely 'Promoting benefit and preventing harm.' They have also used it to justify the widely accepted notion of 'public interest (maslaha mursala),' which posited that Muslim scholars could rule in the interest of their community as long as they did not contravene any explicit injunctions from the Quran or Sunna. The Hanbali scholar Najm al-Dīn al-Tūfī (d. 716/1316) used this hadith to craft the controversial argument that if the public interest of the Muslim community clashed with scripture, public interest should take precedence.48 SUGGESTIONS FOR FURTHER READING The most interesting book to read on this topic is the recently translated Muhammad 'Awwama, The Influence of the Noble Hadith upon the Differences of Opinion Amongst the Jurist Imams (London: Turath, 2014). To see how Mālik used hadiths in his Muwatta', see Aisha Bewley's translation of the book, entitled Al-Muwatta of Imam Malik ibn Anas (London: Kegan Paul Intl., 1989) and Umar F. Abd-Allah's Malik and Medina (Brill, 2013). For the manner in which al-Shāfi'ī placed hadiths in his system of legal theory, see the translation of his extremely influential Risāla entitled, The Epistle on Legal Theory, trans. Joseph Lowry (New York: NYU Press, 2015). For more reading on the use of hadiths in early Sunni law, see Harald Motzki, The Origins of Islamic Jurisprudence: Meccan Fiqh Before the Classical Schools, trans. Marion Katz (Leiden: Brill, 2002); Yasin Dutton's The Origins of Islamic Law: The Qur'an, the Muwatta' and Medinan 'Amal (London: Curzon, 1999); Scott Lucas's 'Abu Bakr Ibn al-Mundhir, Amputation and the Art of Ijtihād,' International Journal of Middle Eastern Studies 39 (2007): 351–368, and Christopher Melchert's 'The Traditionist-Jurisprudents and the Framing of Islamic Law,' Islamic Law and Society 8, no. 3 (2001): 383–406. For a general discussion of the legal implications of hadiths in mature Sunni law, see Ibn Rushd's The Distinguished Jurist's Primer, trans. Imran Ahsan Nyazee (Reading, UK: Garnet Pub., 1994). For in-depth discussions of mature Sunni legal theory, see Wael Hallaq's A History of Islamic Legal Theories (Cambridge: Cambridge University Press, 1997) and Bernard Weiss's The Search for God's Law (Salt Lake City: University of Utah, 1992). For a translation of a short book that Ibn Rajab al-Hanbalī (d. 795/1392) devoted to the 'Scholars are the inheritors of the prophets' hadith, see Ibn Rajab al-Hanbalī, Heirs of the Prophets, trans. and introduction Zaid Shakir (Chicago: Starlatch Press, 2001). ENDNOTES 1 'Inna al-Qur'ān ahkama dhālik wa al-sunna tufassiru dhālik'; Abū Sa'd al-Sam'ānī, Adab al-imlā' wa al-istimlā', p. 4. 2 Sunan al-Dārimi: introductory chapters, bāb al-sunna qādiya 'alā kitāb Allāh. 3 'Al-Qur'ān ahwaj ilā al-sunna min al-sunna ilā al-Qur'ān'; Abū Muhammad al-Barbahārī, Sharh al-sunna, p. 71. 4 Ibn Abī Hātim al-Rāzī, al-Jarh wa al-ta'dīl, p. 2:20. 5 Abū Zahra, Abū Hanīfa, p. 235; idem, Al-Shāfi'ī, p. 166; idem, Ibn Hanbal, p. 205; idem, Mālik, p. 224. 6 Al-Shāfi'ī, Al-Umm, p. 7:256. 7 Al-Shāfi'ī, Al-Risāla, p. 177. 8 Jāmi'al-Tirmidhī: kitāb al-hudūd, bāb fī kam tuqta' al-yad; Sunan Abī Dāwūd: kitāb al-hudūd, bāb man saraqa min hirz, bab al-qat' fī al-khulsa.... 9 Abū Zahra, Abū Hanīfa, p. 266. 10 Ibn Hibbān, Sahīh Ibn Hibbān, p. 5:498. 11 Brown, The Canonization of al-Bukhārī and Muslim, p. 191. 12 'Abd al-Wahhāb al-Sha'rānī, Al-Mīzān al-kubrā, p. 1:71. 13 Jāmi' al-Tirmidhī: kitāb al-buyū', bāb mā jā'a fī al-khiyār; Anwar Shāh Kashmīrī, al-'Arf al-shadhī (Karachi, Qadīmī Kutubkhāne), p. 304. 14 Abū Zahra, Mālik, p. 259; al-Muwatta': kitāb al-buyū', bāb bay' al-khiyār. 15 Abū Hilāl al-'Askarī, Kitab al-awā'il, p. 2:119. 16 Brown, The Canonization of al-Bukhārī and Muslim, pp. 178 ff. 17 Jāmi' al-Tirmidhī: kitāb al-farā'id, bāb mā jā'a fī ibtāl mīrāth al-qātil. 18 Ibn 'Abd al-Barr, al-Tamhīd, p. 24:290. 19 Al-Tahāwī, Sharh mushkil al-āthār, p. 15:39. 20 Al-'Alā'ī, Jāmi' al-tahsīl fī ahkām al-marāsīl, p. 40. 21 See Muhammad 'Awwāma, Athar al-hadīth al-sharīf fī ikhtilāf al-a'imma al-fuqahā', pp. 30 ff. 22 Ibn Qudāma al-Maqdisī, al-Mughnī, p. 2:570; Musnad Ibn Hanbal: 4 :426. 23 Mansūr al-Buhūtī, Al-Rawd al-murbi', p. 108. 24 Al-Khatīb, 'Nasīhat li-ahl al-hadīth,' p. 124. 25 Al-Khalīlī, Al-Irshād, p. 6. 26 Ibn Taymiyya, Majmū'at al-fatāwā, pp. 19:128 ff. 27 Jāmi' al-Tirmidhī: kitāb al-salāt, bāb mā jā'a fī al-ta'mīn. 28 Al-Suyūtī, Al-Azhār al-mutanāthira fī al-ahādīth al-mutawātira, p. 12. 29 Jāmi' al-Tirmidhī: kitāb al-tahāra, bāb mā jā'a fī al-wudū' mimmā ghayyarat al-nār; bāb tark al-wudū' min al-nār. 30 Badr al-Dīn al-Zarkashī, Al-Bahr al-muhīt fī usūl al-fiqh, p. 3:268. 31 Jāmi' al-Tirmidhī: kitāb al-birr wa al-sila, bāb mā jā'a fī al-nafaqa 'alā al-banāt wa al-akhawāt. 32 Muhammad al-Ghazālī, Al-Sunna al-nabawiyya bayn ahl al-fiqh wa ahl al-hadīth, pp. 56–57; Ibn Hajar, Fath al-bārī, p. 13:70–71. 33 Ibn 'Adī, Al-Kāmil, p. 1:125; Sunan Abī Dāwūd: kitāb al-salāt, bāb man qāla lā yaqta'u al-salāt shay'. 34 Jāmi' al-Tirmidhī: kitāb al-salāt, bāb mā jā'a fī sajdatay al-sahw qabl al-taslīm. 35 Al-Munāwī, Fayd al-qadīr, vol. 8, p. 4:4101. 36 Ibn Battāl, Sharh Sahīh al-Bukhārī, vol. 1, p. 196. 37 Al-Suyūtī, Al-Jāmi' al-saghīr, p. 352. 38 Al-'Ajlūnī, Kashf al-khafā', vol. 2, p. 83. 39 Ibn Hajar, Fath al-bārī, vol. 4, p. 70. 40 Fakhr al-Islam al-Bazdawī, Usūl al-Bazdawī, vol. 1, p. 236. 41 Ibn Taymiyya, Majmū'at al-fatāwā, vol. 19, p. 128. 42 Sunan al-Dārimī: introductory chapters, bāb al-tawarru' 'an al-jawāb fīmā laysa fīhi kitāb wa lā sunna. 43 Jāmi' al-Tirmidhī: kitāb al-fitan, bāb mā jā'a fī luzūm al-jamā'a. 44 Ibn Hajar, Talkhīs al-habīr, p. 3:141; al-Suyūtī, al-Jāmi' al-saghīr, p. 113. 45 Wael Hallaq, 'On the Authoritativeness of Sunni Consensus,' pp. 434 ff. 46 Muhammad b. al-Hasan al-Shaybānī, Muwatta' Mālik: bāb qiyām shahr Ramadān wa mā fīhi min al-fadl. 47 Al-Khatīb, al-Jāmi', vol. 2, p. 301. 48 Najm al-Dīn al-Tūfī, Risāla fī ri'āyat al-maslaha, p. 23. THE FUNCTION OF PROPHETIC TRADITIONS IN THEOLOGY INTRODUCTION Throughout their history, Muslims have rarely doubted that hadiths should play some role in understanding what actions were acceptable or unacceptable in God's sight. Even the most intransigent rationalists of ninth-century Baghdad accepted that hadiths could be used as a source for law if narrated by two or four chains of transmission. Law has always been a central part of the Islamic faith tradition, but it has not required total certainty. The different Sunni legal schools, for example, accepted that differences of interpretation could exist regarding the sources of the law, and the dubious authenticity of some of those sources itself left room for further doubt. Since the eleventh century, mainstream Sunni opinion has held that, even if considered reliable, hadiths narrated by only a limited number of chains of transmission (termed āhād hadiths, which are the vast preponderance of reports that make up the hadith collections) yield only strong probability (zann rājih) and not total certainty (yaqīn) that they were truly the commands of the Prophet. This strong probability has been deemed acceptable for deriving Islamic law, so in practice both scholars and lay Muslims have treated sahīh hadiths as being the authenticated words of the Prophet. But what about theology, those tenets of what Muslims should believe about God, the cosmos, and a person's fate after death? Did the Quran not lambast earlier communities who had made pronouncements about God and religion based not on revelation but merely on their own beliefs? The Quran had proclaimed that 'they have no knowledge of this, they do but conjecture' (Quran 45:24). If Muslim scholars held that the reports found in the great hadith compilations of the ninth century only yielded 'strong probability' as opposed to the total certainty yielded by the Quran, what should be the role of hadiths in theology? THE ORIGINAL SUNNIS AND THE PRIMACY OF HADITHS IN THEOLOGY By the twelfth century, Sunni Islam had become a very adaptive religious tradition that could accommodate four varied schools of law, divergent schools of both literalist and speculative theology, and numerous Sufi orders all under one 'big-tent' of deference to the Quran and the Prophet's legacy. Since that time, Sunni scholars have been able to adopt the rational methods of Greek logicians and the thought of Gnostic Christians into the Islamic tradition, all the while sincerely professing their loyal adherence to the Prophet's Sunna and rejection of bid'a, or heretical innovation in religion. The Sunni worldview, however, was not always so flexible. Sunni Islam began as the small and strictly conservative ahl al-hadīth (Partisans of Hadith) sect in the eighth and ninth centuries. For these original Sunnis 'the isnād is part of religion,' and they preached that if anyone 'impugns reports from the early community or denies anything from the hadiths of the Messenger of God, then doubt his Islam.'1 Even great scholars like Abū Hanīfa, who promoted using independent legal reasoning, were heretics in the eyes of these original Sunnis.2 For these original Sunnis, in whose ranks we find early pillars of the hadith tradition like Ibn Hanbal, al-Bukhārī, Muslim, Abū Dāwūd, and al-Tirmidhī, hadiths were not only reliable enough to inform Muslims of proper theology – they were its primary source. As early Sunnis proclaimed, 'Islam is the Sunna, and the Sunna is Islam,' and 'the Sunna of the Messenger of God is not known by reason, but by transmission.'3 Some of the theological beliefs that these early Sunnis upheld (and have since become part of Sunni Islam) included: A belief that God knew before creation whether a person would enter Heaven or Hell and that humans cannot comprehend the true nature of free will and predestination. A belief in the 'punishment of the grave' ('adhāb al-qabr), or the notion that the dead are punished for their sins or rewarded for their good deeds in the grave even before they are resurrected on the Day of Judgment. This recompense will be determined by a test administered by two angels, Munkar and Nakīr, who will appear to a person in his grave and ask him about God, the true religion, and the Prophet. A belief that Jesus will return at the end of time along with another Messianic figure known as the Mahdī (The Guided One) and that together they will vanquish the Antichrist (Dajjāl). A belief that late at night God descends to the lowest heavens to answer the prayers for forgiveness of those Muslims who have stayed up late in worship (see the hadith examined at the end of chapter 9). A belief that on the Day of Judgment believers will be rewarded for their faith by actually seeing God. A belief that there will be certain landmarks on the Day of Judgment. One of these is the Fount (al-Hawd), a pool where Muhammad will meet his community. Another is the Bridge (al-Sirāt). This bridge crosses Hellfire, and, although the believers will cross it easily, for the unbelievers it will become narrower than a hair and sharper than a sword, causing them to fall into Hell. None of these articles of faith is clearly laid out in the Quran. There are vague or ambiguous references to some of these tenets; the holy book contains verses such as 'On that Day [of Judgment] their faces will be pleased, gazing at their Lord' (Quran 75:22–23), which Sunnis have argued establish seeing God. But the only unambiguous description for these beliefs, and the only mention at all of others such as the Antichrist and the Mahdī, come from hadiths such as the following: The hadith from the Companions 'Abdallāh b. Mas'ūd, Hudhayfa b. Yamān, Jundub, and others in various permutations that the Prophet said, 'I will be the first of you to the Fount [on the Day of Judgment], with some from among you raised up with me but then falling back trembling. I will say, "O my Lord, these are from my community!" but it will be said, "You do not know what wrongs they committed after you!" ' (from the Sahīhayn of al-Bukhārī and Muslim) The hadith of the Companion Abū Sa'īd al-Khudrī: We were afraid that there would come after our prophet some catastrophe, so we asked the Prophet of God and he said, 'Indeed in my community there will be the Messiah (mahdī), he will come and live five or seven or nine (the transmitter was not sure).' We asked the Prophet, 'Five or seven or nine what?,' and he said, 'years.' Then the Prophet continued, 'And a man will come to the Messiah and say, 'Give me, give me,' and he will dispense whatever he can from his own clothing.' (From the Sunan Ibn Mājah and the Jāmi' of al-Tirmidhī)4 The hadith of Abū 'Ubayda b. al-Jarrāh, that 'the Messenger of God said, "Indeed every prophet since Noah has warned his community of the Antichrist (Dajjāl), so indeed I warn you of him." Then he described him and said, "It may be that some of those who have seen me or heard my words will live to see him." ' (From the Jāmi' of al-Tirmidhī)5 The hadith of the Companion Abū Hurayra, from the Prophet: 'Indeed the dead person goes to the grave, and the righteous man sits in his grave with no fear or terror. It is said to him, "What [religion] were you?" and he replies, "Islam." And it is said to him, "Who is that man?" and he replies, "Muhammad the Messenger of God, he came to us with clear evidence from God and we believed in him." It is said to him, "Did you see God?" and he replies, "It is not for anyone to see God." Then a small glimpse of Hell is given to him, and he sees its people bound to one another, and it is said to him, "Behold what God has spared you!" Then he is given a glimpse of Heaven and sees its splendor and all within. It is said to him, "This is your place, you believed in truth and died with that belief, so you will be resurrected in truth, God willing." The iniquitous man, however, sits in his grave terrified. It is said to him, "What [religion] were you?" and he replies, "I do not know." And it is said to him, "Who is that man?" and he replies, "I heard the people saying things about him so I said them too." Then he is shown a glimpse of Heaven and its splendor, and it is said to him, "Look at what God has denied you." Then he is shown a glimpse of Hell, and he sees its inhabitants bound to one another, and it is said to him, "This is your place, you were in doubt, in doubt you died and in doubt you will be resurrected, God willing." ' (from the Sunan of Ibn Mājah)6 The hadith narrated by Abū Hurayra in which the Prophet says: 'Adam and Moses argued, and Moses said, "O Adam, you whom God created with His hands and breathed His spirit into have led the people astray and exiled them from Paradise." Adam replied, "And you, O Moses, whom God purified with His own speech, do you blame me for committing an act which God had fated for me before the creation of the heavens and the earth?" So Adam bested Moses in the argument.' (from the Sahīh Muslim)7 The hadith narrated by Abū Hurayra that 'The Messenger of God (s) came out to us while we were debating free will and predestination (al-qadar) and was angered to the point that his face turned red, as if a pomegranate had burst on his cheeks. He said, "Is this what you have been taught to do?! Is this what I was sent with!? Indeed those who came before you perished when they began debating this matter, so I have ordered you not to contend over it." ' (from the Jamī' of al-Tirmidhī)8 The elaborate epistemological (having to do with the study of knowledge and its sources) classification of sources into those yielding probability or certainty, introduced into Sunni Islam in the tenth century by Muslim rationalists, was totally foreign to the early Sunnis. Hadiths that early Sunnis deemed authentic according to their system of criticism were the words of the Prophet and compelling in every sense. As Ibn Hanbal said about the hadith in which the Prophet foretells that Muslims will literally see God on the Day of Judgment, 'We believe in it and we know that it is the truth.'9 When al-Tirmidhī presents a hadith describing how God will take people's charitable donations 'with His right hand,' the author explains: More than one scholar has said that this hadith and other narrations like it dealing with God's attributes and the Lord most high's descending every night to the lowest heavens, that these narrations have been established [as reliable] and are to be believed. They say that one should not fall into error concerning them and say 'How could this be?' It has been reported that Mālik b. Anas, Sufyān b. 'Uyayna, and 'Abdallāh b. al-Mubārak all said about such hadiths, 'Take them as is without asking "How".' Such is the stance of the scholars from the People of the Sunna and the Early Community (Ahl al-Sunna wa al-Jamā'a).10 Contrast this with the stance of early Muslim rationalists like the great Mu'tazilite author al-Jāhiz (d. 255/869), who wrote 'If not for reason, religions would never be upheld for God, and we would never have been able to distinguish ourselves from the atheists, and there would be no distinction between truth and falsehood.'11 For these rationalists, the idea that God could be seen or move from place to place, they felt, belittled the omnipotent and unknowable creator of the universe. Claims that people would be punished in their graves had no basis in the Quran and were only transmitted by glorified rumors – precisely what the Quran had warned Muslims against. LATER SUNNISM AND THE RECONCILIATION OF REASON AND HADITHS IN THEOLOGY The tenth century witnessed a merging of the strict, literalist Sunni theological beliefs of Ibn Hanbal and the rationalist Mu'tazilites' theories of knowledge. The individual most responsible for this was Abū al-Hasan al-Ash'arī (d. 324/935–6), who was born in Basra in southern Iraq and became a prominent member of the Mu'tazilite rationalist school there. In 300/912–13, however, he had a series of dreams in which the Prophet appeared to him and instructed him to take care of his community, to follow the Sunna but not to abandon the ways of rationalist theology. He understood this as meaning that he should embrace the beliefs of the Sunnis but express and defend them with the tools of rational and speculative argument. Al-Ash'arī's strategy of forcing the rationalist methods of the Mu'tazilites into service for Sunni beliefs became hugely influential. It allowed a merging of the Sunni and Mu'tazilite schools, and in the century after al-Ash'arī's death three Sunni scholars, Abū Ishāq al-Isfarā'īnī (d. 418/1027), Ibn Fūrak (d. 406/1015), and Abū Bakr al-Bāqillānī (d. 403/1013), combined hadith scholarship and the ration-alist tools of the Mu'tazilites into what became the dominant Ash'arī school of theology. Because the ways in which knowledge is derived affect law as well as theology, this school was also a way of looking at legal theory. It is often referred to as the Ash'arī, or 'Majority (Jumhūr)' school of theology and legal theory. Along with the surviving ahl al-hadīth school of the early Sunnis (discussed below), which still generally rejected all use of rationalist tools, the Ash'arī/Majority school constitutes one of the two great Sunni theological and legal-theory orthodoxies.i Abū al-Hasan al-Ash'arī embraced all the tenets of the early Sunni theology, such as the punishment of the grave, seeing God on the Day of Judgment, and the denial of unrestricted free will, proclaiming that these were the beliefs of true Sunnis.12 Merging Sunni beliefs and the Mu'tazilite vision of knowledge, however, presented serious challenges. As we saw in chapter 3, with the contributions of legal theory to hadith criticism, Mu'tazilite legal theory and its Ash'arī successors divided reports transmitted from the past into two distinct levels, each conveying its own level of certainty and suited to its appropriate tasks. Āhād reports, or those transmitted by only a few chains of transmission, yielded probable knowledge (zann) and were only suitable for establishing Islamic law or the details of ritual. The second type of reports was a massively transmitted (mutawātir) one, or a report transmitted by such a vast number of people in so many different places that it is impossible to imagine that anyone could have made it up or conspired to forge it. Although the hadiths establishing the beliefs mentioned above by al-Ash'arī appear in highly respected Sunni hadith collections such as the Sahīhayn of al-Bukhārī and Muslim, they were only āhād hadiths. The Mu'tazilite and Ash'arī traditions of epistemology had made clear the requirements that reports had to meet in order to convey absolute certainty. Legal theorists required that a hadith be transmitted by anywhere from five to forty transmitters at every stage in its transmission in order to be considered mutawātir. Other influential Ash'arīs, like al-Juwaynī (d. 478/1085), avoided this focus on specific numbers. Instead, they argued that a hadith was mutawātir as long as it was transmitted via circumstances that made conspiring to forge it impossible and allowed it to convey immediate certainty to anyone who heard it. But as we saw in chapter 3, Sunni hadith scholars admitted that no (or at most one) hadith actually met these requirements for being mutawātir. How could the Sunnis who followed the new Ash'arī tradition of theology and epistemology, then, justify their beliefs in things like the punishment of the grave or the coming of the Antichrist? They found two solutions: first, legal theorists like Abū Ishāq al-Isfarāyīnī and Hanafī contemporaries like Abū Bakr al-Jassās (d. 370/981) developed a middle tier of reports between āhād hadiths and the almost unattainable certainty of mutawātir ones. This middle tier was called 'well-known (mashhūr)' or 'widespread (mustafīd)' and was defined as those hadiths that might have started out with only a few chains of transmission but then became massively transmitted as time went on. Their authority was guaranteed not by the breadth of their transmission, but rather by the fact that the Muslim community had agreed on their authenticity.13 Second, in the eleventh century, Ash'arī hadith scholars and legal theorists like al-Khatīb al-Baghdādī (d. 463/1071) and Abū Hāmid al-Ghazālī (d. 505/1111) articulated the notion of reports that were 'mutawātir bi'l-ma'nā', or 'massively transmitted in their meaning.' Even if one particular hadith, they said, was not transmitted widely enough to meet the requirements for being mutawātir, what happened if you had a number of different hadiths that all shared one common element? Maybe no one hadith about the Messiah (Mahdī) could be considered mutawātir, but what if we collected all the hadiths mentioning him? We find a hadith in the books of al-Tirmidhī, Ibn Mājah, al-Bayhaqī, and al-Hākim al-Naysābūrī transmitted by several Companions in which the Prophet says, 'When the black banners come from eastern Iran, go join that army, for indeed the Messiah is among them.' We find another hadith from two Companions in which the Prophet tells his followers that, even if only one day were remaining before the end of the world, God would lengthen that day so that He could send a messiah from the descendants of the Prophet with the same name as him. In another hadith through 'Alī, the Prophet predicts the coming of one of his descendants who will fill the earth with justice as it has been full of injustice. Even in the comments of the Companions, we find Ibn 'Abbās saying that a ruler will come from the family of the Prophet, bringing justice so absolute that under his rule flocks of sheep will be safe from predators.14 If we take all these hadiths together they all agree on one common element: there is a Messiah who will come. According to Ash'arī scholars, just as it is impossible to imagine that one massively transmitted hadith could have been forged, so it is impossible to imagine that all these separate hadiths could be forged with one common theme if that theme were not really representative of the Prophet's words. By creating a middle tier of non-mutawātir hadiths whose certainty was assured by the consensus of the Muslim community or whose meanings appeared in many different hadiths that together could be considered mutawātir, Muslims from the mainstream Ash'arī school of theology could justifiably believe in articles of faith found not in the Quran, but rather in their hadith collections.15 THE OTHER SUNNI ORTHODOXY: THE SURVIVING AHL AL-HADĪTH SCHOOL The Ash'arī school of theology is often called the Sunni 'orthodoxy.' But the original ahl al-hadīth, early Sunni creed from which Ash'arism evolved has continued to thrive alongside it as a rival Sunni 'orthodoxy' as well. While Ash'arīs proclaimed the theological beliefs of the early Sunnis like Ibn Hanbal, the influence of Mu'tazilite rationalism had led them to decline some of the most extreme early Sunni beliefs. Certainly, Ash'arīs affirmed that believers would 'see God' on the Day of Judgment, but this could not involve actually seeing God as we see objects in front of us today. Rather, God will create an optical image of God in their minds. How could an omnipotent creator, wholly outside creation, be seen? The Quran says that our vision 'cannot grasp Him' (Quran 6:103). Yes, authentic hadiths left no doubt that God does indeed 'descend to the lowest heavens' at some point in the night, but how could an unencompassable being engage in physical movement? Rather, it was God figuratively 'approaching' the believers by responding to their prayers.16 Ash'arī theologians had accepted the Mu'tazilite principle of content criticism. As al-Ghazālī said, any hadith describing God in an anthropomorphic way or assigning Him some physical location must be interpreted figuratively or rejected as false.17 In a famous hadith known as the Hadith of the Slave Girl (hadīth al-jāriya), the Prophet tests to see if a slave girl was Muslim by asking her if he was a prophet and asking her where God was. She replied by saying 'In the sky (fī al-samā')'. The Prophet acknowledged this as a correct profession of faith and ordered that the girl be freed.18 Ash'arī theologians, however, said that, although it is recognized as authentic, this hadith is only āhād and is not sufficient to establish belief.19 Extreme Ash'arīs have gone so far as to say that anyone who assigns a direction to God or believes that He actually moves is an unbeliever.20 In the wake of the tenth-century Ash'arī synthesis, some Muslim theologians still maintained the strict details of the early Sunni creed. This continuation of the original Sunni theological school is often referred to as the Salafī school of theology (because they claim to follow the righteous early Muslim community, or the Salaf) or as followers of 'Traditional (Atharī)' or ahl al-hadīth theology. Famous adherents of this school include the Sufi 'Abdallāh al-Ansārī (d. 481/1089) of Herat and the Damascene scholar Ibn Taymiyya (d. 728/1328). For this Salafī school, reason has no role in determining theological beliefs. It is 'nothing more than a tool for distinguishing things.'21 If the Prophet described God as descending during the night, who are we to insist that this descent occurs in one form as opposed to another? Ibn Taymiyya argues that the early Muslim community had no compunction about assigning a direction to God. He asserted that the Quran, the Sunna, and the practice of the righteous early community provided undeniable evidence that it was acceptable to point upward when referring to God (although he maintained that this meant that God was above the heavens, not in them).22 Adherents of the Salafī school of theology felt that the Ash'arīs had allowed the influence of rationalism to lead them astray from the true beliefs of Muhammad. How could they claim that a sahīh hadith cannot provide a reliable basis for belief, demanded the Salafī scholar Abū Nasr al-Wā'ilī of Mecca (d. 444/1052), but that frail human reason can?23 Hadiths like the Hadith of the Slave Girl that address theological tenets, al-Wā'ilī continues, have been transmitted by numerous chains of transmission that are more than enough to make one's heart feel at ease with believing in them.24 Unlike the wayward Ash'arīs, al-Wā'ilī boasts, his school of theology is that of the true 'People of the Sunna (ahl al-sunna), who stand fast on what the early generations (salaf) had transmitted to them from the Messenger of God.'25 Today this school of ahl al-hadīth theology is espoused by the Wahhābī movement in Saudi Arabia and the various other hadith-based Salafī movements (see chapter 10 for more on this). SUGGESTIONS FOR FURTHER READING For an accessible discussion of the Mu'tazilite rationalist school, including the translation of one of their texts, see Yahyā Nātiq bi'l-Haqq, Basran Mu'tazilite Theology, ed. Wilfred Madelung et al. (Leiden: Brill, 2011); Defenders of Reason in Islam: Mu'tazilism from Medieval School to Modern Symbol, by Richard Martin et al. (Oxford: Oneworld, 1997). A selection of different theological creeds, including one attributed to Ibn Hanbal, is translated in Montgomery Watt's Islamic Creeds (Edinburgh: Edinburgh University Press, 1994). Another excellent selection can be found in John Alden Williams, ed., The Word of Islam (Austin: University of Texas, 1994, chapter 5). Two of al-Ash'arī's short treatises on theology have been translated in The Theology of al-Ash'ari, trans. Richard McCarthy (Beirut: Imprimérie Catholique, 1953). For a discussion of apocalyptic visions in Islam, see David Cook, Studies in Muslim Apocalyptic (Princeton: Darwin Press, 2002). ENDNOTES 1 Al-Barbahārī, Sharh al-sunna, p. 81. 2 Al-Khatīb, Tārīkh Baghdād, vol. 2, p. 176. 3 Al-Barbahārī, Sharh al-sunna, p. 59; Abū Nasr al-Wā'ilī, Risālat al-Sijzī ilā ahl Zabīd, p. 99. 4 Jāmi' al-Tirmidhī: kitāb al-fitan, bāb mā jā'a fī al-mahdī. 5 Jāmi' al-Tirmidhī: kitāb al-fitan, bāb mā jā'a fī al-dajjāl. 6 Sunan Ibn Mājah: kitāb al-zuhd, bāb dhikr al-qabr wa al-bilyā. 7 Sahīh Muslim: kitāb al-qadar, bāb hijāj Ādam wa Mūsā (s). 8 Jāmi' al-Tirmidhī: kitāb al-qadar, bāb mā jā'a fī al-tashdīd fī al-khawd fī al-qadar. 9 Ibn al-Farra, Al-'Udda fī usūl al-fiqh, vol. 3, p. 900. 10 Jāmi' al-Tirmidhī: kitāb al-zakāt, bāb mā jā'a fī fadl al-sadaqa. 11 Al-Jāhiz, Rasā'il al-Jāhiz, vol. 1, p. 285. 12 Abū al-Hasan al-Ash'arī, Maqālāt al-islāmiyyīn, vol. 1, pp. 346–348. 13 Brown, The Canonization of al-Bukhārī and Muslim, pp. 183–193. 14 See Ahmad al-Ghumārī, Ibrāz al-wahm al-maknūn min kalām Ibn Khaldūn, p. 113. 15 Al-Sarakhsī, Usūl al-Sarakhsī, vol. 1, p. 329. 16 Al-Kawtharī, Maqālat, p. 145. Al-Bayjūrī (d. 1860) held that the hadith referred to the descent of God's angels, not God himself; al-Bayjūrī, Sharh Jawharat al-tawhīd, p. 158. 17 Abū Hāmid al-Ghazālī, al-Mankhūl min ta'līqāt al-usūl, p. 286. 18 Sunan Abī Dāwūd: kitāb al-ayman wa al-nudhūr, bāb al-raqaba al-mu'mina. 19 Taqī al-Dīn al-Subkī, al-Sayf al-saqīl fī al-radd 'alā ibn al-Zafīl, p. 94. 20 See, for example, al-Kawtharī, Maqālāt, p. 146. Ibn Hajar al-Haytamī, al-Fatāwā al-hadīthiyya, p.152. 21 Al-Wā'ilī, Risāla, p. 85. 22 Ibn Taymiyya, Majmū'at al-fatāwā, vol. 3, p. 97; Abū Zahra, Ibn Taymiyya, p. 269. 23 Al-Wā'ilī, Risāla, p. 101. 24 Al-Wā'ilī, Risāla, pp. 187–190. 25 Al-Wā'ilī, Risāla, p. 99. i There is a third Sunni school, the Māturīdī school, which closely resembles the Ash'arī school and thus will not be discussed in this book. THE FUNCTION OF PROPHETIC TRADITIONS IN SUFISM INTRODUCTION The Islamic mystical tradition, or Sufism, has historically been one of the religion's most important components. Sufism has played a dual role in Islamic history. It has served as the medium through which a spiritual elect has achieved and described direct experience with God. At the same time, through popular rituals and the veneration of saints, Sufism has allowed those unsung masses in Islamic civilization, whether villagers in India or merchants in the Balkans, to feel closer to God and more intimately ensconced in their faith. As the tradition of seeking and describing direct mystical experiences with God, Sufism is 'the art of knocking' on the door of the Divine.1 Because for Muslims Muhammad was the human closest to God, practitioners of Sufism also see it as the science of understanding and applying the Prophet's message in the fullest and most perfect way. As the process of fulfilling the duties of the pious Muslim and gaining proximity to God, the famous Sufi Abū Bakr al-Shiblī (d. 334/945–6) described Sufism as 'comforting the heart with the fan of purity, clothing the mind with the cloak of faithfulness, acquiring generosity and rejoicing in meeting God.'2 As the perfection of character, Sufism is 'all proper manners, for every time and every place.'3 As in other domains, in Sufism hadiths have served as a source of guidance and a medium of connection to the Prophet. In one sense, in Sufism the isnād of the hadith is all-important, for it establishes the transmission of the Prophet's teaching, his excellence of character as well as esoteric knowledge inherited from him and taught by the pious elite. In another sense, however, isnāds and their authenticity mean nothing in Sufism – those Sufi masters for whom the door has been opened have been able to access God's truth directly without the medium of prophecy or Muhammad's teachings. For them, truths about the reality of God and man are true whether actually said by the Prophet or phrased in his words. The tension has been a constant one in the Sufi tradition. One early Sufi, al-Dārānī (d. 204/820) taught that, even if you are inspired to perform some act of worship, you should not do so until you find a hadith justifying it. Ironically, another Sufi took a similar statement from Ibn Hanbal and tacked on a forged isnād to the Prophet.4 THE FOUNDATION OF SUFISM IN HADITH: THE HADITH OF GABRIEL Hadiths have always played an important role in Muslim etiquette and pious ethics. The famous hadith scholar Abū Dāwūd once wrote that a Muslim only needed to know four hadiths, none of which involve dogmatic or legal strictures: 'Actions are judged only by intentions,' 'Part of a person perfecting their Islam is to leave aside matters that do not concern them,' 'What is prohibited is clear, what is permissible is clear, and what is other than that is uncertain,' and 'No one's faith is complete until he wishes for his brother what he wishes for himself.'5 From its early coalescence in the ninth century, the Sufi tradition has employed hadiths to instruct those seeking the Sufi path and to justify its teachings. The Forty Hadith collection devoted to Sufism written by the famous Iranian Sufi Abū 'Abd al-Rahmān al-Sulamī (d. 412/1021) was one of the most widely transmitted books in the centuries after its author's death and served as a primer for Sufism among Muslim students. It contained hadiths urging piety, generosity, and asceticism, such as 'Whoever wants to join me, let him suffice from the goods of this world with only what a traveler needs. And beware of mixing with the rich.'6 The hadith that has historically essentialized the Sufi tradition and provided its most firm foundation in the Prophet's teachings is the famous Hadith of the Angel Gabriel. This report is extremely well known and met Muslim hadith critics' highest standards of authent-icity. It appears in the Sahīhayn of al-Bukhārī and Muslim, as well as the three Sunans of Abū Dāwūd, al-Tirmidhī, and Ibn Mājah, narrated from the Prophet by the Companions 'Umar b. al-Khattāb, Talha b. 'Ubaydallāh, Anas b. Mālik, or Abū Hurayra. The version from Abū Hurayra appearing in al-Bukhārī's Sahīh reads: Ishāq Jarīr Abū Hayyān Abū Zur'a Abū Hurayra: One day the Prophet was out before the people when a man came walking up to him and said, 'O Messenger of God, what is faith (īmān)?' [The Prophet] said, 'Faith is to believe in God, His angels, His messengers, that you will meet Him, and to believe in the resurrection.' [The man] said, 'O Messenger of God, what is Islam (submission)?' [The Prophet] replied, 'Islam is to worship God, not associate anything with Him, to perform the prayer, render the poor tithe, and fast Ramadan.' The man asked, 'O messenger of God, what is ihsān (perfection)?' [The Prophet] said, 'Ihsān is to worship God as if you could see Him, for indeed even if you cannot see Him, He sees you.' [The man] said, 'O messenger of God, when is the Hour [of Judgment]?' [The Prophet] said, 'The one being asked is no more knowledgeable about that than the one asking, but I will tell you about its signs: when women give birth to their mistresses, that is one of the signs; when the naked and barefoot rule the people, that is one of the signs; one of five things that only God knows "Indeed God knows the Hour, he sends down the rain and knows what is in the wombs" (Quran 31:34). Then the man left, and the Prophet ordered that he be brought back to him, but no one could find him. Then the Prophet said, 'That was Gabriel, he came to teach the people their religion.'7 The Hadith of Gabriel has served as a formative expression of how Muslims broadly conceive of their religion. The hadith structures Islam in three tiers: it consists first of select articles of belief, followed by the outward submission to God through the performance of set rituals and deeds. Beyond these two basic levels of religious commitment lies the level of supererogatory piety sought by those who truly want to live in a state of constant God-consciousness: ihsān. Sufism has defined itself as the quest for ihsān, to be continually in a state of remembering God and acting accordingly. Sufis have therefore considered their path to be an optional one. Those who do not choose to pursue it still remain fully Muslim in faith and practice. Sufis elect to go beyond what is required. 'For this elite of the elite,' explains the great theologian and mystic Abū Hāmid al-Ghazālī (d. 505/1111), 'the verse "And God is better and more enduring" (Quran 20:73) has become manifest, and they have chosen a place "in an assembly of truth in the presence of an omnipotent Lord" (Quran 54:55).'8 THE ISSUE OF THE AUTHENTICITY OF SUFISM AND THE ISNĀD OF SUFI TEACHINGS From its inception, Islam has been an iconoclastic faith opposed to erecting intermediaries between God and man, founded on the premise that only revelation can shape the contours of faith and ritual. This extremely conservative approach to tenets of belief and ritual (as opposed to law) explains why Muslims from China to Great Britain, Sunni and Shiite, all pray their daily prayers in the same way, differing only in details. This conservative spirit has also meant that, although Sufism has played an undeniably prominent role in Islam, it has also been one of the most controversial dimensions of the faith tradition. The central objection launched by Muslim critics of Sufism has been that it contains elements of heretical innovation (called bid'a) or belief not originally part of Islam. Some Muslim scholars have found three aspects of Sufism to be problematic: 1) ritual practices and prayers that are viewed as imported innovations not originating in the Sunna of the Prophet or his Companions, 2) the institution of Sufi brotherhoods in the twelfth century with formalized relationships between a spiritual guide (Arabic 'shaykh' or Persian/Turkish 'pīr') and his disciples, and 3) a theosophical cosmology that upholds the 'Unicity of Existence (wahdat al-wujūd),' or the notion that only God actually exists and that creation is a mere illusion. The first point was unacceptable to many Muslim scholars because it seems to break with the fundamental Islamic principle that only the Quran and Sunna can serve as the basis for ritual and belief. As Ibn Qayyim al-Jawziyya (d. 750/1351), a famous critic of Sufism, explained, in Islam 'the presumption about claims of ritual is that they are false until some proof is provided, whereas the presumption in contracts and personal interactions is that they are valid until proven otherwise.'9 The second point caused concern because Sufi brotherhoods and the veneration of shaykhs seemed to create formalized institutions and invest certain people with authority unacknowledged in the Prophet's message. As Ibn Taymiyya objected, 'It is not for anyone to belong to a shaykh by swearing to be his follower... but rather he should take as a guide anyone who is from among the people of faith without specifying anyone with an excessive position of spiritual authority.'10 Finally, for many, 'the Unicity of Existence' was a theological perspective similar to pantheism, or the belief that the divine was present in creation and objects of nature – a position firmly rejected in Islam. Architects and proponents of the Sufi tradition were aware from an early stage of these objections and sought to ground their ideas in the original revelation of the Prophet. Abū al-Qāsim al-Junayd (d. 298/910), the epicenter of classical Sufism in Baghdad, thus declared that 'Our science [of Sufism] is bounded by the Quran and the Sunna.'11 Sufis admitted that practices such as ritual gatherings where the names of God are recited or specific liturgies said after prayers were innovations. But they were like flowers that had blossomed from seeds rooted in the Prophet's original teachings. As the Sufi Abū al-Hasan al-Fūshanjī (d. 348/959) said, 'Today Sufism is a name without a reality, it was once a reality without a name.'12 Al-Fūshanjī's quote raises another important point concerning objections to Sufism: many of Sufism's harshest critics, such as Ibn al-Jawzī (d. 597/1201) and Ibn Taymiyya, were themselves Sufis who only rejected certain corrupted components of Sufism, such as extremist beliefs or the excessive practices of some Sufis. They maintained the legitimacy of the ethical components of Sufism, what they called 'the science of purifying the heart.' As in hadiths and law, the principal anchor for the authenticity of Sufism was the isnād. The Sufi tradition cultivated two kinds of isnāds to the Prophet. The first was known as the isnād al-tazkiya (isnād of purification) or the isnād al-suhba (isnād of discipleship) and was a commonsense feature of traditional Islamic piety. The second form of isnād represented a formal or mystical chain of transmission from teacher to student back to the Prophet. The isnād of purification/discipleship was based on a very sensible premise. If the Companions spent many years around the Prophet, they would have learned his pious and God-fearing ways from his example. The Successors who studied at the Companions' hands would have learned this from them, and so would any committed students of the Prophet's teachings in subsequent generations. A sincere scholar's duty to his students did not stop at teaching them the Quran, the Sunna, and Islamic law. He also instructed them on proper etiquette and instilled in them a desire for ihsān. We can see an example of this with Ismā'īl b. 'Ulayya (d. 193/809) of Baghdad, an early hadith scholar whose mother had brought him to a senior scholar and said, 'This is my son, let him be with you and take from your etiquette and character.'13 As a youth the famous jurist and Sufi of Baghdad, Ibn al-Jawzī, would attend the hadith dictation sessions of one teacher who would recite a hadith and then start crying out of fear of God and love for the Prophet. Later in life Ibn al-Jawzī would write, 'I benefited more from his crying than his simply transmitting the hadith.'14 The earliest recorded isnāds for Sufi teachings go back through al-Junayd. One Ja'far al-Khuldī (d. 348 /959) said that he 'took' from al-Junayd, who took from al-Sarī al-Saqatī, from Ma'rūf al-Karkhī, from Farqad al-Sabakhī, from al-Hasan al-Basrī, from Anas b. Mālik and the other great Companions, from the Prophet.15 The famous Sufi systematizer al-Qushayrī (d. 465/1072) traces his isnād through his teacher Abū 'Alī al-Daqqāq, from Abū al-Qāsim al-Nasrābādī, from al-Shiblī, from al-Junayd, from Sarī al-Saqatī, from Ma'rūf al-Karkhī, from Dāwūd al-Tā'ī, from the Successors, from the Companions, from the Prophet.16 The second type of isnād in Sufism was understood as the transmission of esoteric knowledge – a weighty matter indeed – or something equally intangible but less serious: the transmission of blessings (baraka) from a saint to an aspirant. Many Muslims believed that the Prophet had chosen certain Companions with whom to deposit secret knowledge beyond the comprehension of normal Muslims and limited to the spiritual elite. The Companion Hudhayfa b. Yamān was told about all the strife and challenges that would afflict the Muslims until the Day of Judgment, and it was reported that Abū Hurayra said, 'I memorized two vessels [of knowledge] from the Prophet. As for the first, I made it known among the people. As for the second, if I made it known my throat would be cut.'17 This esoteric knowledge could be transmitted from the Prophet to a Companion, and later from saint to student, by a mere touch. As one report (admittedly very unreliable, according to Muslim hadith critics) has it, when 'Alī was washing the Prophet's body for burial some water splashed from the body into 'Alī's eyes, granting him in one instant 'the knowledge of the ancient and latter day sages.'18 Many Sufis believed that this knowledge could be transmitted from such Companions through teacher to student. For many Sufis, however, and even for critics of Sufism, these isnāds were not conduits for any secret mystical knowledge. They were merely symbols for the transmission of blessings from a revered pious figure to his students. Only in the eleventh and twelfth centuries did the Sufi tradition elaborate the isnād as a medium for transmitting the Prophet's mystical knowledge or his blessings, at which point 'Alī b. Abī Tālib first emerged as an important component in the Sufi chain of transmission.19 'Alī had always been seen as the Prophet's spiritual heir, leading al-Junayd to say, 'that is a person who was granted 'ilm ladunnī', or the directly, divinely granted wisdom that God gives to select people.20 Sufis quoted the Companion Ibn Mas'ūd as saying that the Quran was revealed with 'an Outer and Inner meaning, and indeed 'Alī b. Abī Tālib has with him the knowledge of both.'21 The Sufi isnād through 'Alī became very famous after the eleventh century because of what was known as the 'Investiture with the Cloak (libs al-khirqa).' In this ritual, a Sufi master put a khirqa (a cloak or shawl) on a student being initiated into his Sufi order. The khirqa became the sign of 'taking the path' of a Sufi order and was often given to the student after he had fulfilled certain requirements such as a year of charity or of spiritual vigilance. Along with being told the special prayers of the order and giving his oath of allegiance to the shaykh, being invested with the khirqa was a crucial part of joining a Sufi order. Sometimes khirqas were colored and served as the uniform for a particular Sufi order. In addition to the khirqa of initiation, Sufis also cultivated the tradition of the khirqat al-tabarruk, or the 'cloak of blessings,' which was given as a benediction to a layman who did not intend to join the order.22 The famous Hanbalī scholar and Sufi Ibn al-Mubrad (d. 909/1502) explains that the devoted student of knowledge should 'be invested with a khirqa to wear, for blessing is to be hoped for from that. And a group of the righteous early Muslims used to do this, asking the righteous to invest them with a cloak and seeking to learn from their behavior and actions.'23 Ibn al-Mubrad provides us with one of the isnāds for his khirqa, which we immediately note proceeds via the Family of the Prophet. He traces it back through a long chain of masters to: Abū Bakr al-Shiblī, who was invested with the khirqa by the hand of Abū al-Qāsim al-Junayd, who received it from the hand of Sarī al-Saqatī, who received it from the hand of Ma'rūf al-Karkhī, who was the spiritual disciple of 'Alī b. Mūsā al-Ridā, who was the disciple of [his father Mūsā] al-Kāzim, who was the disciple of [his father] Ja'far al-Sādiq, who was the disciple of [his father Muhammad] al-Bāqir, who was the disciple of [his father] Zayn al-'Ābidīn, who was the disciple of his father al-Husayn, who was the disciple of his father 'Alī b. Abī Tālib, who was the companion of the Prophet.24 The most famous isnād for the khirqa, however, was through the Successor al-Hasan al-Basrī, from 'Alī, from the Prophet. Critics of Sufism pounced on the chain of transmission for the khirqa as a point of vulnerability. Because the Sufi tradition had invested so much of its legitimacy in this isnād, the methods of hadith criticism would become a central tool for those who wished to question that legitimacy or to defend it. Ibn al-Jawzī of Baghdad criticized the way the Sufis of his day wore the khirqa in order to appear pious and gain repute. In fact, he rejected the idea of having an isnād for receiving the khirqa from one's shaykh, calling it 'all a lie' that had no basis in the Sunna.25 Ibn Taymiyya argued that, not only did the donning of a khirqa not come from the Prophet's practice, not even the early Sufis engaged in the practice (we can note in Ibn al-Mubrad's isnād (above) that all mention of receiving the khirqa goes no further back in time than Ma'rūf). 'Rather,' he writes, 'it resembles more a king passing on the trappings to his successor... which is fine if done with good intentions. But as for making that a Sunna [of the Prophet] or a path to God most high, that is not the case.'26 Many critics of Sufism attacked a more technical aspect of the khirqa isnād. Many Sufis traced their isnāds through al-Hasan al-Basrī, from 'Alī to Muhammad. But hadith masters who did not support many Sufi practices, such as Ibn al-Salāh (d. 643/1245), Ibn Hajar (d. 852/1449), and al-Sakhāwī (d. 897/1402) all argued that al-Hasan al-Basrī had never met or heard hadiths from 'Alī.27 How could he have received the khirqa, or any knowledge at all for that matter, from him? Proponents of Sufism have tried to find evidence from the hadith tradition to bolster the claim of al-Hasan receiving the khirqa from 'Alī. Al-Suyūtī (d. 911/1505) points out that al-Hasan al-Basrī was born in Medina and grew up in the house of one of the Prophet's wives. He met many of the Companions and attended congregational prayers led by the caliphs 'Uthmān and 'Alī. Since 'Alī did not leave Medina until al-Hasan was fourteen years old, al-Hasan would have had ample time to study with 'Alī. Furthermore, al-Suyūtī finds examples of hadiths where al-Hasan al-Basrī explicitly states that he heard the report from 'Alī, such as the hadith from the Musnad of Abū Ya'lā al-Mawsilī that 'The parable of my community is like the rain: it is not known which is better, its beginning or its end.'28 The debate over the strength of the isnād for the khirqa and al-Hasan's hearing hadith from 'Alī was intense and has lasted until the present day, when the Moroccan Ahmad al-Ghumārī wrote a book entitled 'The Evident Proof for Sufis Being Connected to 'Alī (al-Burhān al-jalī fī intisāb al-sūfiyya ilā 'Alī).' But ultimately this one point cannot settle the argument over the legitimacy of Sufism. As is clear from the isnāds listed above, Sufis cite many other isnāds for their teachings that do not involve al-Hasan al-Basrī, 'Alī, or the khirqa. More importantly, many of the hadith scholars, such as Ibn al-Salāh, who criticized the isnāds for the khirqa practice, themselves sought and received khirqas from Sufi masters! Regardless of the authenticity of the practice, they did so because it had become an accepted tradition for receiving blessings (baraka) from pious Muslim saints. No matter how poor its isnād, the khirqa carried great weight as the sign of a relationship with a Sufi master as well as a token of his blessings. HADITHS IN THEOSOPHICAL SUFISM Since the early period of Sufism, mystics have underscored the absolute contrast between the ultimate reality of God and the transience of His creation. As the Quran states, 'All things perish except His face' (Quran: 28:68). Many Sufis stressed how all of creation is nothing more than an ephemeral reflection of God's magnificence and held that man's greatest accomplishment is to penetrate the veil of this world and 'become annihilated' in God in this life – as one forged hadith puts it, to 'die before you die.'29 A truly pious and perspicacious mystic grasps that God reveals His beauty (tajallī) in every object in this world and that the pinnacle of human awareness is to know God more and more intimately through His signs and perfectly reflect His attributes. Attaining this state of being dissolved in God is what led ecstatic Sufi mystics like Bayazid al-Bastāmī (d. 261/874) to declare 'Glory be to Me!' and the famous Sufi martyr al-Hallāj (d. 309/922) to pronounce 'I am the Ultimate Truth/God (anā al-haqq)!,' both phrases being otherwise reserved for God alone. To achieve this profound understanding was to reconnect completely with the source of all existence and fulfill the deepest yearnings of the soul. As the great Persian Sufi poet Jalāl al-Dīn Rūmī (d. 672/1273) wrote, like the reed flute whose song laments its separation from the reed bed: Every person who has long remained far from his source, Longingly seeks the day of his reunion. This mystical worldview flourished in the writings of Sufis like al-Ghazālī but was first organized into a comprehensive cosmology, or view of the universe, by the seminal Sufi Muhyī al-Dīn Ibn 'Arabī (d. 638/1240), who hailed from Spain, traveled throughout the Middle East and eventually died in Damascus. Ibn 'Arabī devised a conception of creation as a reflection of God's perfect attributes. Each of the manifold components and dimensions of the cosmos and the natural world mirrors His endless beauty, order, and creative capacity. The pinnacle and capstone of creation is mankind, the element that reflects God's most essential attribute: His unity. Humans embody within their souls and character all the multiplicity of the cosmos but are able to bring them into unified balance and proper proportion. A person who has achieved this state of enlightened balance not only embodies 'the spirit of the cosmos,' he or she also is the most perfect reflection of God's perfection. This is 'the perfect human being (al-insān al-kāmil),' who has purged him or herself of imperfections and grown closer and closer to God's attributes until he dissolves into non-existence. For only God truly exists at all.30 For Ibn 'Arabī, investiture with the khirqa symbolizes 'putting on' the divine qualities.31 The function of revealed religion is similar. Each of the great prophets sent by God to their respective communities embodied and reflected one of His attributes. Their culmination, which Ibn 'Arabī refers to with the Quranic phrase 'the Seal of the Prophets' (Quran 33:40), was Muhammad. He was 'the perfect human' par excellence, the consummate reflection of God who represented the goal that all seekers of truth sought and the station attained by saints. His timeless reality, which Ibn 'Arabī called 'the Muhammadan Reality (al-haqīqa al-muhammadiyya)' was, in fact, the whole purpose of creation. The theosophical Sufi tradition, brought to its height by Ibn 'Arabī, explained the reason for God's creation in the 'Hadith of the Hidden Treasure,' which Ibn 'Arabī cites many times in his massive treatise al-Futuhāt al-makkiyya (The Meccan Revelations). It is a hadith qudsī, in which the Prophet quotes God directly as saying 'I was a hidden treasure, and I wanted to be known. So I created the cosmos so that I might be known' (kuntu kanza makhfīyan fa-ahbabtu an u'raf fa-khalaqtu al-khalq li-u'rafa).This hadith communicated an essential point of Ibn 'Arabī's cosmology: knowing God is the purpose of all creation. Humans exist because God wanted them to know Him and strive to become His flawless reflections. Although this sense is conveyed in Quranic verses such as the one reading 'I have not created the jinn or mankind except to worship me' (Quran 51:56, with Ibn 'Abbās glossing 'worship' as 'know'), the Hadith of the Hidden Treasure imbued this motivation with an almost emotional longing that conveys the themes of desire and intimate knowledge so key to the Sufi tradition. A second hadith that served as an important piece of evidence in theosophical Sufism was known as the Hadith of Reason (hadīth al-'aql). It is another qudsī hadith, in which the Prophet explains: Indeed God, when he created reason, He said to it, 'Come,' and it came. Then He said, 'Go back,' and it went back. So God said, 'By my glory and beauty, I have not created anything nobler than you. By you I will take and by you I will give' (Inna Allāh lammā khalaqa al-'aql qāla lahu: aqbil fa-aqbala, thumma qāla adbir fa'adbara, fa-qāla 'wa 'izzatī wa jamālī mā khalaqtu khalqan ashraf minka, fa-bika ākhudhu wa bika u'tī). This hadith established an important tenet of Sufism and speculative theology in Islam in general: man's reason is ultimately subordinate to God and serves the cause of grasping His truth. For Ibn 'Arabī and upholders of the theosophical Sufi tradition, there were three ways for humans to attain knowledge: prophetic revelation, inspiration from God (often called 'dhawq,' 'tasting,' or kashf, 'unveiling'), and ra-tional investigation. Yet the mainstream Sunni tradition, especially in its infancy during the ninth and tenth centuries, was highly suspicious of relying on reason. They considered it a loophole for human beings to meddle in matters of religion that God alone should define. For Sufis, the Hadith of Reason established that reason obeyed God and prophecy. Unfortunately, neither the Hadith of the Hidden Treasure nor the Hadith of Reason had any basis in the actual words of the Prophet, according to Muslim scholars. Opponents of Ibn 'Arabī's theosophical Sufism, such as Ibn Taymiyya, said that the Hadith of the Hidden Treasure 'has no isnād, weak or strong, to the Prophet,' and even moderate scholars who supported Sufism, like Ibn Hajar and Mullā 'Alī Qārī, acknowledged that its attribution to the Prophet was baseless.32The Hadith of Reason actually did appear in some hadith collections, although highly unreliable ones. Ibn Hanbal's son 'Abdallāh included it as a mursal hadith in his book of zuhd, and al-Tabarānī included it in his large mu'jam. However, every major Sunni hadith critic, from early figures such as al-'Uqaylī (d. 323/934) and al-Dāraqutnī to later ones such as al-Sakhāwī and Mullā 'Alī Qārī, agreed that the report was extremely weak or forged.33 Ibn 'Arabī himself was no amateur in hadiths; he had cultivated his own collection of hadiths with full isnāds back to the Prophet. He acknowledged that these two hadiths had no basis according to the methods of hadith critics. Rather, as he states in the case of the Hadith of the Hidden Treasure, it was known to be 'sound on the basis of unveiling (kashf)' (see Chapter 3 on Criticism through Unveiling).34 What concern was it to Sufis if no reliable isnād could be found for an important hadith? Sufi masters like Ibn 'Arabī felt that their understanding of the cosmos superseded the mere probabilities generated by Sunni hadith criticism and its reliance on the isnād. As the early Sufi al-Bastāmī was quoted as saying, 'You take your knowledge dead from the dead, but I take my knowledge from the Living One who does not die.'35 SUGGESTIONS FOR FURTHER READING Fortunately, a great deal has been written about Sufism in English. Helpful works include Annemarie Schimmel's Mystical Dimensions of Islam (Chapel Hill: University of North Carolina Press, 1975) and Sayyed Hosein Nasr's Sufi Essays (London: G. Allen & Unwin, 1972). Michael Sells' Early Islamic Mysticism (New York: Paulist Press, 1996) contains many original texts in translation. For a more specific discussion about the theosophical Sufism of Ibn 'Arabī, see Claude Addas, The Quest for the Red Sulfur: The Life of Ibn 'Arabī (Cambridge: Islamic Text Society, 1993) and William Chittick's The Sufi Path of Knowledge (Albany: State University of New York Press, 1989). For an edited collection of essays dealing with debates over Sufism within the Islamic tradition, see F. de Jong and Bernd Radtke's Islamic Mysticism Contested (Leiden: Brill, 1999). For a translation and discussion of many of the hadiths frequently used in Sufism, see Javad Nurbakhsh, Traditions of the Prophet (New York: Khaniqahi-Nimatullahi Publications, 1981). Ibn 'Arabī's Mishkāt al-anwār is translated as Divine Sayings, trans. Stephen Hirtenstein (Oxford: Anqa Publications, 2004). ENDNOTES 1 Martin Lings, What is Sufism?, p. 7. 2 Al-Khatīb, Tārīkh Baghdād, vol. 14, p. 393. 3 This statement is from Abū Hafs al-Naysābūrī; Al-Sulamī, Tabaqāt al-sūfiyya, p. 119. 4 Al-Makkī, Qūt al-qulūb, vol. 1, p. 167; Abū Nu'aym al-Isbahānī, Hilyat al-awliyā', vol. 10, p. 15. 5 Ibn Nuqta, Kitāb al-taqyīd, p. 280. 6 Al-Sulamī, Kitāb al-arba'īn fī al-tasawwuf, p. 5. 7 Sahīh al-Bukhārī: kitāb al-īmān, bāb 38. 8 J. Brown, 'The Last Days of al-Ghazzālī and the Tripartite Division of the Sufi World,' p. 93. 9 Ibn Qayyim al-Jawziyya, I'lām al-muwaqqi'īn, vol. 1, p. 344. 10 Ibn Taymiyya, Majmū'at al-fatāwā, vol. 11, p. 289. 11 Al-Khatīb, Tārīkh Baghdād, vol. 7, p. 251. 12 'Alī Hujvīrī, Kashf al-mahjūb, p. 49. 13 Al-Dhahabī, Mīzān al-i'tidāl, vol. 1, p. 217. 14 Ibn al-Jawzī, Mashyakhat Ibn al-Jawzī, p. 86. 15 Ibn al-Nadīm, The Fihrist, p. 455. 16 'Abd al-Ghāfir al-Fārisī, Tārīkh Naysābūr, pp. 513–514. 17 Sahīh al-Bukhārī: kitāb al-'ilm, bāb hifz al-'ilm. 18 Badr al-Dīn al-Zarkashī, Al-Tadhkira fī al-ahādīth al-mushtahira, p. 93. 19 J. Spencer Trimingham, The Sufi Orders in Islam, p. 261. 20 Abū Nasr al-Sarraj, The Kitáb al-Luma' fi'l-Tasawwuf, p. 129. 21 Abū Nu'aym al-Isbahānī, Hilyat al-awliyā', vol. 1, p. 65. 22 Trimingham, The Sufi Orders in Islam; pp. 80, 183–185. 23 Ibn al-Mubrad, Tahdhīb al-nafs li'l-'ilm bi'l-'ilm, p. 86. 24 Ibid., p. 88. 25 Ibn al-Jawzī, Talbīs Iblīs, pp. 186, 191. 26 Ibn Taymiyya, Majmū'at al-fatāwā, vol. 11, p. 289. 27 Shams al-Dīn al-Sakhāwī, Al-Maqasid al-hasana, p. 338. 28 Al-Suyūtī, al-Hāwī li'l-fatāwā, vol. 1, pp. 102–104. 29 Javad Nurbakhsh, Traditions of the Prophet, p. 66. 30 William Chittick, Imaginal Worlds, pp. 34–37. 31 Lings, What is Sufism?, p. 18. 32 Al-Sakhāwī, Al-Maqāsid al-hasana, p. 334; Mullā 'Alī Qārī, Al-Asrār, pp. 269 ff. 33 Al-Albānī, Silsilat al-ahādīth al-da'īfa, vol. 1, p. 53. 34 Chittick, The Sufi Path of Knowledge, p. 250. 35 'Abd al-Wahhāb al-Sha'rānī, Al-Tabaqāt al-kubrā, p. 11. THE FUNCTION OF PROPHETIC TRADITIONS IN POLITICS If there is one area of the Islamic heritage familiar to the lay reader, it is that of politics. Yet this is a subject that the Quran does not address in any elaborate manner. The themes of power, obedience, of rise and fall that grace the pages of the holy book concern how human communities should relate to God's absolute dominion, not the proper modes of human governance. The Quran instructs Muslims to 'Obey God, and obey the Messenger and those in authority amongst you' (Quran 4:59), and it praises those who conduct their affairs by mutual consultation (shūrā) (42:38). 'Reconciliation is best,' the Quran teaches (4:128), but otherwise it is not a strikingly political text. The basic foundations of Muslim political life were laid not in the Quran but through the rapid and immediate experience of the early Muslim community: first as it consolidated power in Arabia towards the end of the Prophet's life; and then as it burst into the greater Middle East after his death in 632 CE.1 Many of the key, early traditions and institutions of the Muslim polity emerged from Arabian tribal life: the role of the leader as first amongst equals, cleverly balancing competing interests; the centrality of mutual oaths of allegiance (bay'a) between the leader and his subjects (see Quran 4:10); the significance of family relations and tribal politics; the temptations of conquest and the challenge of fairly distributing its spoils; and finally the hopeless suffering of civil war. Both these ideals and instructions for dealing with political realities infused the hadith corpus as it formed in the early Islamic period. But in that formative era Muslims were only a small minority in their new empire (for example, even 230 years after the Islamic conquests, only fifty percent of Iraq was Muslim and only forty percent of Iran).2 They ruled over a diverse population with its own ancient political heritage. Within a century and a half of the Prophet's death, the massively expanded state he had founded had moved its capital from Medina, first to Kufa, then to Damascus, and then finally to Baghdad, 'The City of Peace' and 'The Navel of the World.' Arabian political tradition gave way as Muslim rulers adopted the Near Eastern Roman and Persian traditions of the ruler being, as one unreliable but still very popular hadith phrased it, 'the shadow of God on earth.'3 THE CALIPH IS FROM THE QURAYSH In June 2014, the Islamic State of Iraq and Sham (ISIS) issued a proclamation that it had 'established the Islamic caliphate and appointed a caliph for the state of Muslims.' It had chosen as the caliph a man known as Abu Bakr al-Baghdadi, one of its guerilla leaders. He was not the most expressive or powerful member of the organization, but he was a descendent of the Prophet's tribe of Quraysh. This bolstered his claim to Islamic leadership.4 The Prophet had made it clear that this bloodline was a requirement for a claimant to the caliphate, as is described in famous hadiths in Sahīh al-Bukhārī and Sahīh Muslim, such as 'This matter will remain with the Quraysh as long as there are two of them,' and other hadiths in which the Prophet states, 'Dominion is with the Quraysh,' 'The Quraysh are the authorities over the people in good and bad until the Day of Resurrection,' and 'The leaders (a'imma) are from the Quraysh.'5 Until its abolition in 1924, leadership in the Muslim community had been tied in some way or another to the institution of the caliphate (Arabic khilāfa, with caliph, khalīfa, meaning 'successor' or 'appointed representative'). Although various forms of this word are used in the Quran, in the holy book they generally convey the notion of succession in time. In two instances the Quran uses the term khalīfa to describe those whom God has placed on earth to exercise authority or to whom some authority has been delegated (Quran 38:26 and 2:30). But by the late 800s CE Muslim exegetes had elided all of these meanings and merged them with the notion of supreme political authority in the Abode of Islam.6 Nonetheless, surviving evidence – such as coins – leaves no proof of the title 'caliph' being used before the late 600s CE. At that point, well into the Umayyad dynasty, it appears alongside the primary title that had been used by Muslim rulers since the decade after the Prophet's death: 'Commander of the Faithful (amīr al-mu'minīn)' (this title is attested in a rock inscription dated 58/678, during the reign of the first Umayyad caliph, Mu'āwiya).7 The title of caliph is, however, mentioned repeatedly in the hadith corpus, which also provides detailed guidance on the qualifications and conditions for Muslim rulers as well as the duties of their subjects. The title of caliph has cast a long shadow in Islamic civilization. But neither the reality of this office nor perceptions of it have been static. Leadership of the Muslim community passed from the Prophet's close friend Abū Bakr, who had been selected through a contentious negotiation within the Muslim community, through three other close lieutenants of the Prophet, until 657 CE. At that point, the Muslim state fragmented in civil wars over who should hold the reins of power. This strife – as well as any notion of meritocratic rule – came to an end in 692 CE, when the Umayyad clan of the Quraysh tribe solidified their dynasty in Damascus, passing the mantle of caliph down within their family. In 750 CE, after several years of rebellion against the crumbling Umayyad regime, descendants of the Prophet's uncle, 'Abbās, seized the title and built the new caliphal capital of Baghdad. As spoils of war from raids or new conquests dwindled, however, the Abbasid caliphs lost control of their armies and provincial governors. By the mid 800s, the provinces of North Africa, Egypt, and what is today northeastern Iran and Central Asia were controlled by local dynasties bound only by nominal loyalty to the caliphs. In Baghdad itself, the Abbasid caliphs had become prisoners or pawns in the hands of the Turkic slave bodyguards originally imported to protect them. From the late ninth century onward, the Abbasid caliphs would enjoy the 'protection' of various Persian or Turkic warlord dynasties. The caliphate survived despite its lack of military clout because it provided the symbolic aegis under which the Abode of Islam cohered. The various local dynasties that ruled in the caliph's name could only argue their legitimacy in the language of Islam. So compelling was the office of the caliphate that parallel claimants arose: the Shiite Fatimid ruler of North Africa declared himself caliph in 910 CE, and soon after the surviving Umayyad province of Andalusia declared itself a caliphate as well. In the central Islamic lands the prestige of the Abbasid caliphate waned. In 1258 CE the pagan Mongols sacked Baghdad and executed the Abbasid caliph and most of his family. A refugee member of the Abbasid clan fled to Cairo, where he and his descendants continue to 'rule,' and, more accurately, to bestow the formal right to rule in their name upon the Mamluk sultans of Egypt and Syria. Ironically, on the expanding peripheries of Islamic civilization the caliphate still carried great prestige. The warlord sultan of Delhi in the mid 1300s proudly had his appointment as the Abbasid caliph's legitimate deputy read aloud at Friday prayers. In 1498 CE the sultan of the Songhay Empire of Mali, Askia Muhammad, also obtained the blessings of the Abbasid caliph in Cairo to rule.8 The belief that the caliph had to hail from the Quraysh tribe was widely held during the early centuries of Islam. The widely respected scholar al-Nawawī (d. 676/1277) wrote that this was the consensus of the Prophet's Companions.9 It was so important, in fact, that when the Abbasid caliphs fell under the actual control of the Persian Buyid state in 945 CE, and later under the control of the Turkic Seljuq dynasty, leading Sunni scholars like al-Ghazālī preferred to theorize a nominal Qurayshi caliph who 'delegated' authority to a Persian or Turkic warlord rather than to transfer the title of caliph to that warlord himself.10 This formalistic effort to preserve a Qurayshi caliphate, however, soon lost out to a more pragmatic approach. Beginning with al-Ghazālī's own mentor, the famous Shāfi'ī jurist and theologian al-Juwaynī (d. 478/1085), Muslim scholars began to see that the caliph and the real holder of power had to be one and the same person, regardless of lineage.11 By the 1400s, however, the currency of political legitimacy had suffered staggering inflation. In the wake of the Mongol conquests, it was descent from the world conqueror Genghis Khan that granted a right to empire. Such favor of God, shown through conquest, obviated any need for recognition from the caliph, argued a prominent Sunni theologian of the era. In fact, he declared the Turkic warlord who ruled western Persia to be the caliph.12 In the sixteenth century various sultans in Southeast Asia took the title of caliph and commander of the faithful as well.13 When the Ottoman Empire conquered Egypt and Syria in 1517, the sultan received recognition from the last Abbasid caliph for his legitimate rule. But this was less than a formality. For the Ottoman sultans, conquest of Constantinople in 1453 bestowed upon them the title of Caesar. Moreover, the real anchor of their legitimacy was as supposed descendants from the great Oghuz Turkish clan that had conquered the Middle East in the eleventh century.14 As the millennium of the Islamic calendar approached (1591 CE), the rulers of powerful Muslim states took on the title of the messianic Mahdī. Both the Ottoman Suleiman the Magnificent (d. 1566 CE) and the Mughal sultan Akbar the Great (d. 1605 CE) thus ruled as 'emperor of Islam, Mahdī,' etc. Caliph was but one of the titles they both claimed. Had it mattered more, the Ottomans certainly had the strongest claim to the universal caliphate. The dynasty had formally received recognition from the last Abbasid caliph. Akbar's grandson, the Mughal emperor Shah Jahan (d. 1666 CE), praised the Ottoman sultan as 'successor' of the first four caliphs, known in Sunni Islam as the Rāshidūn (rightly guided) caliphs. But this was a diplomatic nicety.15 Being the caliph in such a context granted little leverage. In the sixteenth century, the newly Muslim state of Aceh in Southeast Asia hailed the Ottoman sultans as 'God's caliph on earth.' But this was only because the Ottomans had sent crucial arms and military support in the Acehnese war against the Portuguese.16 In the mid nineteenth century, however, the claim of universal caliphate took on renewed utility for the Ottoman Empire. In the wake of conflicts in Russia and the Caucasus, the Ottoman sultan 'Abd al-'Azīz (r. 1861–76) reasserted his family's claim to the universal caliphate to act as the protector of Muslim refugees. The last powerful Ottoman sultan, 'Abd al-Hamīd II (r. 1876–1909), realized that even greater potential lay in foregrounding the Ottoman title. Encroached on from all sides by the colonial machinations of the European Great Powers, and with his empire being chipped away by nationalist movements in the Balkans, Sultan 'Abd al-Hamīd realized he could leverage his title as the caliph of all the world's Muslims, many of whom now lived under British, French, or Dutch rule, to protect himself from colonial pressures.17 Ironically, reviving the caliphate's Quraysh requirement may not have been a Muslim initiative. Eager to oppose what they considered to be the dangerous influence of Ottoman claims to global Muslim authority, elements within the British government began agitating against the legitimacy of the Ottoman claim to the caliphate. Beginning in 1877, numerous British Orientalists put forth arguments that the Ottomans could not be the caliphs since they were clearly not descended from the Quraysh. They happily pointed to the hadiths stating this condition. British authorities hoped to move the seat of the caliphate to friendlier areas that fell under British influence, such as Egypt or later to Mecca.18 In March 1924, the Turkish Republic abolished the caliphate. That same month Sherif Husayn of Mecca, a proud Qurayshi descendant of the Prophet and also a British client, proclaimed himself caliph (only a few months later he fled Mecca into exile as Saudi armies conquered the Hejaz).19 Two years later it was the turn of the king of Egypt, who was of Albanian-Turkish descent, to hold a caliphal congress in hopes of receiving nomination for the office. Though the king's hopes were ultimately dashed, his supporters countered those who argued that the caliph had to be of Qurayshi descent by pointing to the long precedent of non-Quraysh caliphs.20 They had a strong point. The Ottomans, Mughals, and many other claimants to the caliphate had all ignored the Quraysh requirement. But how could they have done so when it is so clearly stated in hadiths found in the premier Sunni hadith collections? In his argument against the Quraysh condition, al-Juwaynī notes regarding the hadith 'The leaders are from the Qurasyh (al-a'imma min Quraysh)' that 'some leading scholars have ruled that it is widely transmitted (mustafīd), with its attestation known with certainty (maqtū' bi-thubūtihi).' Al-Juwaynī rebuts this by drawing on the epistemological standards developed in Sunni legal theory and theology: the hadith may be sahīh, but its narrations fall short of the number needed for massive parallel transmission (tawātur) and thus for certainty. Therefore no certainty ('ilm) exists as to the genealogical requirement. In fact, al-Juwaynī adds, God can, and has, granted temporal power to whomever He chooses.21 Addressing the Ottoman lack of proper genealogy after that dynasty's claim to the caliphate in the early sixteenth century, the Ottoman grand vizier Lutfī Pasha wrote a treatise in 1544 CE in which he argued that the hadiths on the Quraysh requirement were only applicable to the first few decades of Islamic rule, namely the era of the four Rāshidūn caliphs.22 In fact, Lutfī Pasha had a strong argument. Terse hadiths like 'The leaders are from the Quraysh' were among the least reliable reports on this subject in the eyes of Sunni hadith critics. The most reliable narrations specify conditions for the Quraysh claim to the caliphate. A hadith in Sahīh Bukhārī, narrated by Mu'āwiya, quotes the Prophet as saying, 'Indeed this matter lies among the Quraysh, and no one will oppose them but God will cause him to fall upon his face as long as they uphold the faith' (emphasis mine).23 Others, from less reliable collections such as the Sunan of al-Bayhaqī and the Musnad of Ibn Hanbal, include the condition 'as long as they obey God and are righteous in His rule,' or that the Quraysh 'have a right upon you all as long as they do three things: as long as they are just; if mercy is sought from them, they grant it; and as long as, if they make a covenant, they fulfill it.'24 According to the great historian, hadith scholar, and social philosopher Ibn Khaldūn (d. 808/1406), the conditional nature of the requirement for Qurayshi descent was clear from the reasoning behind the hadiths. The only reason God had placed leadership of the Muslim community in the hands of the Quraysh, Ibn Khaldūn argued, was because of the tribe's strong group solidarity ('asabiyya), which the philosopher considered to be the essential ingredient for a successful state. Following the natural cycle by which such a ruling group loses its solidarity (success breeds complacency and then weakness, observed Ibn Khaldūn), the reason for God having favored the Quraysh would no longer apply.25 THE LEGITIMACY OF REBELLION IN SUNNI ISLAM Anyone who doubted the relevance of hadiths in the modern world had only to follow events in Egypt from 2011 to 2013, during the Arab Spring and its subsequent winter chill. Throughout this tumultuous period, invocations of the Prophet's words flew back and forth across various media as contending parties argued for or against protest, revolution, and finally various government responses, each invoking religious argument to prove the legitimacy of their claims. As the protests against the regime of Hosni Mubarak forced the leader out in late January 2011, Egyptians arguing that it was a Muslim's duty to protest cited the hadith that 'The best jihad is a word of truth spoken before an oppressive ruler (kalimat haqq 'ind sultān jā'ir).'26 Many ulama, including the then Grand Mufti of Egypt, 'Alī Jum'a, warned against the protests and the chaos and bloodshed that might result, quoting a hadith that had become well known despite being highly unreliable: 'Civil strife sleeps, and God curses whomever awakens it.'27 When a military coup finally toppled the president elected to replace Mubarak and the army massacred over a thousand civilians protesting the coup, Jum'a also turned to hadiths to assuage any guilt on the part of the military and its supporters. He drew on the hadith that 'Whoever seeks to break apart this nation, when it is united, strike him with the sword whoever he may be.'28 The Prophet's career passed from oppression, through exile and struggle, and finally to victorious return. Once he and his followers had been expelled from their home city of Mecca, the Quran granted the Muslims permission to fight the Quraysh lords of the city in order to regain what they had lost. Although the holy book notes several times the severity of warfare and killing, it stresses that the Muslims' cause was just. God commands the Muslims to fight those who had made war on them, who had driven them from their homes and who were trying to extirpate their religion. War is unappealing, the Quran affirms, but 'strife (fitna) is worse than killing' (Quran 2:191, 217). Fighting should be avoided, but there are causes that justify it: self-defense, securing religious freedom, and defense against injustice.29 But what happens when these just causes clash with the Quranic command that Muslims should 'Obey God, and obey the Messenger and those in authority amongst you'? It is silent on whether this means Muslims should refrain from rebellion if threats against life, property, and justice come from their own rulers. The Sunni hadith corpus, however, is not silent. As it gelled in the ninth century, Sunni Islam was dogmatically politically quietist. In this respect it stood out against the politically activist strains of Islam that eventually coalesced into the Zaydi Shiite tradition, which produced consistent rebellions against Umayyad and then Abbasid rule through the late 800s CE, when Zaydis retreated to redoubts in northern Iran and soon thereafter to Yemen. Very much unlike the Zaydi doctrine that a true imam proved himself in part by openly resisting tyranny, firm tenets of Sunni doctrine were that Muslims should 'pray behind every righteous and sinful leader' and that obedience to the ruler was an absolute requirement provided he did not command them to disobey God.30 These positions rested not on the Quran but on the myriad hadiths found in the mainstay Sunni hadith collections like the Sahīhayn of al-Bukhārī and Muslim. They conveyed a clear political message. Reports attributed to the Prophet include 'Whoever obeys the ruler has obeyed me, and whoever disobeys the ruler has disobeyed me,' and 'Incumbent upon you is listening and obeying, in hardship and in ease, in what pleases and displeases, and even if your properties are taken unfairly.'31 In one hadith, the Prophet is asked about rulers who would deny people their rights. After hesitating to answer several times, he replies, 'Listen and obey, for what they have taken on is upon them, and what has been put on you is upon you.'32 Perhaps the most extreme is the hadith, found in Sahīh Muslim, in which the Prophet tells the Companion Hudhayfa: There will be after me leaders who will not be guided by my guidance, nor will they abide by my Sunna. Men will arise among them whose hearts are those of devils though they be in human bodies.... Listen and obey the commander, even if your back is beaten and your wealth taken. Listen and obey.33 Yet there were limits. The hadiths commanding obedience even to unjust rulers draw a line at the ruler demonstrating 'egregious disbelief (kufran bawāha),' and the Prophet's order to listen to and obey rulers has the condition 'as long as they pray.'34 In addition, Muslims should not obey commands that entail clearly disobeying God's law. When the commander of one raiding party sent out by the Prophet ordered his soldiers to jump into a fire to show their respect for his assigned command, they refused. They told the Prophet, who applauded them for their disobedience. 'Obedience is only in what is right,' he explained, which Sunni scholars soon formulated into a maxim: 'There is no obedience to a creature if it means disobeying the Creator.'35 The Sunni tenet is clear: Muslims must not rebel against a ruler no matter how unjust or impious he is provided he is nominally Muslim. The reasoning behind the Sunni position, and presumably behind the sayings attributed to the Prophet, was simple. Injustice and oppression were evils, but they were markedly better than civil war and anarchy. A brutal and uncaring ruler was awful. But, in theory at least, Muslims who steered clear of posing any challenge to him could lead their lives in relative safety and security. It was fitna (civil, political, and misguided religious strife) that was the ultimate worldly evil, since it undermined all other areas of life, 'trading security for fear, spilling blood, freeing the hands of the foolish, launching attacks upon the Muslims and spreading corruption in the land,' as the famous scholar al-Qurtubī (d. 671/1273) wrote. A saying commonly repeated in Sunni works of political theory was 'An oppressive leader is better than unending strife (imām ghashūm khayr min fitna tadūm).'36 In hadiths, the strife (fitna) that the Prophet spoke of was understood to be the civil wars that ravaged the nascent Muslim polity in the decades after his death, the general decay of the Muslim polity over time, as well as the tribulations and temptations prophesied to afflict the world as the end of days approached. 'There will be fitnas,' one famous hadith states, 'in which the one who stays seated is better than the one who stands, and the one who stands still is better than the one who walks....'37 Countless hadiths of varied reliability preach the same message: do not involve yourselves in such strife. 'If there is fitna between the Muslims,' states another hadith, 'then take up a sword of wood.'38 Al-Nawawī summarized the Sunni position: rebellion against the ruler is prohibited by the consensus of the Muslims even if he is sinful, due to a fear of strife (fitna) and anarchy. The only exception is if the ruler becomes an avowed unbeliever.39 This tenet of political theory remained strong into the modern period. The most notable hadiths on the topic were brought together by the Ottoman judge Yūsuf al-Nabhānī (d. 1932), a passionate advocate of the last caliphs, in his Forty Hadiths on the Obligation of Obeying the Commander of the Faithful. Sunni quietism, however, was at odds with the Quran's powerful imperative for ordaining justice in the public sphere. 'Indeed God commands justice, virtue and giving the near of kin their due, and He forbids indecency, wrong and wickedness,' states the Quran (16:90). It commands those who believe to 'be steadfast in upholding justice, witnesses to God, even against yourselves, your parents or your kin' (Quran 4:135). This theme of standing for justice is also stated most explicitly in well-known hadiths from the mainstay Sunni collections. When the Umayyad caliph Marwān tried to give the sermon on Eid before the prayer instead of after it, a man rose and objected that the caliph was changing the Sunna. The Companion Abū Sa'īd al-Khudrī then rose and reminded everyone of the Prophet's command, 'Whoever among you sees a wrong, let him change it with his hand. And if he is not able, then with his tongue. And if he is not able, then with his heart, but that is the weakest of faith.'40 Outside the Sunni fold, other Muslims had long read the Quran as prohibiting the tolerance of unjust rulers. God tells Abraham that he is making him a 'leader (imām)' for all mankind but that, among his progeny, 'My covenant does not include the unjust (zālimīn)' (Quran 2:124). Some Muslims understood this as meaning that no tyrant could be a rightful ruler or authority. Adherents to this school of thought read the quietist hadith (found in the Sahīhayn) in which the Prophet states, 'We do not contest the authority of those holding it (lā nunāzi'u al-amr ahlahu),' not as Sunnis did, namely 'we do not contest the authority of those in charge,' but rather that legitimate holders of authority must be 'befitting it (ahluhu).'41 Even some Sunnis trod a more nuanced path between political quietism and activism. This was particularly true amongst early figures, who predated the formation of classical Sunnism. Abū Hanīfa, for example, supported several rebellions against the Umayyads and Abbasids. The Hanafī scholar al-Jassās (d. 370/981) reminded his readers that Abū Hanīfa's position was 'well known on fighting oppressors and unjust leaders.' Al-Jassās shared the position of the Mālikī scholar Ibn Khuwayz Mindād (d. 390/1000), who explained that the Quranic verse stating that no one unjust can uphold God's covenant meant that, indeed, no unjust person could be the rightful caliph. But, he adds, Muslims should not rebel against such a ruler or try to remove him until the decision-making elite (ahl al-hall wa'l-'aqd) decided he should be removed.42 Commenting on the above hadiths warning against involvement in fitna, the Shāfi'ī scholar Muhibb al-Dīn al-Tabarī (d. 694/1295) affirms that Sunnis all agreed that Muslims should not involve themselves in conflicts between parties driven by desire for power or worldly goods. But this does not entail remaining silent in any disagreement: ... since, if it were required to stay out of every disagreement between two parties among the Muslims, and to break the sword, then none of God's limits would be upheld. Falsehood would never be defeated, and the people of oppression and hypocrisy would find an easy path to declare licit people's inviolable property and to spill their blood....43 Nor should we understand that Sunni Islam approved of unjust or despotic rulers. Hadiths clearly condemned unjust conduct on the part of the ruler, even if they urged Muslims to obey the ruler nonetheless. The Sahīhayn feature the hadith promising that God will deny Heaven to rulers who cheat their subjects of their rights.44 Another hadith quotes the Prophet as saying, 'Indeed there will be rulers over you all, but do not aid them in their injustice or believe their lies....'45 The dogmatic quietism of the Sunni tradition, however, was able to elide the activist message found in some hadiths. The influential sixteenth-century Hanafī scholar Mullā 'Alī Qārī explained that the hadith calling on believers to right wrongs by force if needed should be understood as follows: 'Enjoining right with the hand is done by the state, with the tongue by scholars, and with the heart by the masses.' This was repeated by the Salafi scholar Muqbil bin Hādī al-Wādi'ī (d. 2001), who penned a whole book, intended for mass audiences, entitled A Way out of Strife (Makhraj min al-fitna). Al-Wādi'ī argues that not rebelling against the state is the key to escaping chaos and violence.46 In light of the intense debates sparked by the Arab Spring/Winter, contention has swirled around details of some of the hadiths advocating political quietism, in particular the Companion Hudhayfa's dramatic narration that Muslims should obey the ruler even if he beats their backs and takes their property (found in Sahīh Muslim). Interestingly, this clause of the hadith appears in only a few of the many, varied narrations of this tradition via Hudhayfa. It is also a rare instance of a hadith in the Sahīhayn being criticized. The tenth-century hadith master al-Dāraqutnī had concluded that this narration of the hadith suffered from a broken isnād, since the narrator who reported it from Hudhayfa, one Abū Salām, had never actually met him or even anyone around him.47 Al-Nawawī argued that this flaw was compensated for by the collective strength of the tradition. But he did not address the specific wording of 'even if your back is beaten or your wealth taken.' Modern defenders of the hadith have argued that a similar wording is found in a narration in the Sunan of Abū Dāwūd and the Musnad of Ibn Hanbal and point to al-Albānī's conclusion that this narration is hasan.48 Depending on their political leanings, Muslim scholars have understood the meanings of this hadith as either supporting existing regimes or validating their opposition. The well-known Saudi scholar 'Abd al-'Azīz al-Turayfī, who has shown himself to be more politically conscious than the generally quietist clerical establishment in his country, nonetheless offers that the details of the controversial added clause do not matter because they are merely examples of the overall injustice (zulm) that a ruler might visit upon his subjects. The Prophet's ruling is the same: do not rebel as long as the ruler is nominally Muslim.49 One of the most outspoken scholarly critics of the quietist camp in and after the Arab Spring has been the Mauritanian hadith scholar Muhammad Hasan Didū. In a 2013 television appearance, he argues that Hudhayfa's tradition must be read in its entirety. Referring to the narration of it in the Sunan of Abū Dāwūd, which defenders use to substantiate the 'beating backs and taking wealth' clause, Didū notes how the Prophet precedes this remark with a condition: 'If God has a caliph in the world, even if he strikes your back or takes your wealth, obey him.' The viewer is left with the conclusion that extreme political quietism is only owed to the one, universal caliph of the Muslims, not to petty dictators. Didū reinforces this when he states that these dictators do not implement the Shariah and therefore do not enjoy the obedience due a true Muslim ruler.50 SUGGESTIONS FOR FURTHER READING For an overview of Islamic political thought and its relation to law, see Ovamir Anjum's Politics, Law, and Community in Islamic Thought (Cambridge: Cambridge University Press, 2012), and for a comprehensive study of the caliphate and disputes around it, see Mona Hassan, Longing for the Lost Caliphate (Princeton: Princeton University Press, 2016). Yūsuf al-Nabhānī's forty hadith collection has been translated as Forty Hadiths on the Obligation to Obey the Ruler, trans. S. Z. Chowdhury (CreateSpace, 2015). For an excellent study on the heritage of political activism and quietism in Sunni Islam, see Ahmet Alibašic, 'The Right of Political Opposition in Islamic History and Legal Theory: An Exploration of an Ambivalent Heritage,' Shajarah: Journal of ISTAC 4, no. 2 (1999): pp. 231–295. For an important analysis of Muslim scholars articulating Shariah arguments for or against rising up against oppressive rulers in the Arab Spring, see Aria Nakissa, 'The Fiqh of Revolution and the Arab Spring: Secondary Segmentation as a Trend in Islamic Legal Doctrine,' Muslim World 105 (2015): pp. 398–421. For more on the bay'a, see Ella Landau-Tasseron, The Religious Foundations of Political Allegiance: A Study of Bay'a in Pre-Modern Islam (Washington, D.C.: Hudson Institute, 2010), available at https://www.hudson.org/content/researchattachments/attachment/1166/20100521_baya3may20.pdf. ENDNOTES 1 Paul Heck, 'Politics and the Qur'ān,' in Encyclopaedia of the Qur'ān, ed. Jane Dammen McAuliffe (Leiden: Brill, 2001). 2 Richard Bulliet, 'Conversion to Islam and the Emergence of a Muslim Society in Iran,' in Levtzion, ed., Conversion to Islam, p. 31; idem, Conversion to Islam in the Medieval Period, p. 85. 3 Al-Albānī, Silsilat al-ahādīth al-da'īfa, vol. 1, pp. 687–688; vol. 2, pp. 69–70; Ahmad al-Ghumārī, al-Mudāwī, vol. 4, pp. 269–270. 4 See 'Dā'ish yu'linu qiyām khilāfa islāmiyya wa yubāyi'u al-baghdādī,' Al-Hayat, 29 June 2014, <http://www.alhayat.com/Articles/3292478>; and Ali Hashem, 'The Many Names of Abu Bakr al-Baghdadi,' Al Monitor, 23 March 2015, <http://www.al-monitor.com/pulse/en/originals/2015/03/isis-baghdadi-islamic-state-caliph-many-names-al-qaeda.html>; Cole Bunzel, 'From Paper State to Caliphate: The Ideology of the Islamic State,' Brookings Institute (2015), pp. 18, 23 and 26. Available at <https://www.brookings.edu/research/from-paper-state-to-caliphate-the-ideology-of-the-islamic-state/>. 5 For these hadiths, see Sahīh al-Bukhārī: kitāb al-ahkām, bāb al-umarā' min Quraysh; Sahīh Muslim: kitāb al-imāra, bāb al-nās taba' li-Quraysh; Jāmi' al-Tirmidhī: kitāb al-manāqib, bāb fī fadl al-yaman (the author notes that the most reliable version is actually a Companion opinion); kitāb al-fitan, bāb mā jā'a anna al-khulafā' min Quraysh; Musnad Ibn Hanbal, vol. 3, p. 129. 6 Wadad Kadi, 'Caliph,' in Encyclopaedia of the Qur'ān. 7 See Ovamir Anjum, Politics, Law, and Community in Islamic Thought, p. 47; Ali Ibrahim Ghabban and Robert Hoyland, 'The inscription of Zuhayr, the oldest Islamic inscription (24 AH⁄AD 644–645), the rise of the Arabic script and the nature of the early Islamic state,' Arabian Archeology and Epigraphy 19 (2008): pp. 216–218. 8 John O. Hunwick, 'Muhammad b. Abī Bakr,' in Encyclopaedia of Islam, 2nd ed., P. Bearman, Th. Bianquis, C. E. Bosworth, E. van Donzel, W. P. Heinrichs, eds. First published online: 2012. 9 Al-Nawawī, Sharh Sahīh Muslim, vol. 12, p. 441. 10 See Abū Hāmid al-Ghazālī, al-Iqtisād fī al-i'tiqād, p. 115. 11 Anjum, Politics, Law, and Community in Islamic Thought, pp. 111–112. 12 This theologian was the famous Jalāl al-Dīn Davānī (d. 908/1502); John Woods, The Aqquyunlu, pp. 103–105. 13 Howard M. Federspiel, Sultans, Shamans and Saints, p. 45. 14 Hakan Karateke, 'Legitimizing the Ottoman Sultanate: a Framework for Historical Analysis,' in Legitimizing the Order: The Ottoman Rhetoric of State Power, pp. 26–27. 15 Aziz Ahmad, Studies in Islamic Culture in the Indian Environment, p. 38. 16 Martin Kramer, Islam Assembled: The Advent of the Muslim Congresses, p. 4. 17 M. Şükrü Hanioğlu, A Brief History of the Late Ottoman Empire, p. 130. There is evidence that a message from 'Abd al-Hamīd prevented major Muslim forces from joining an uprising against the USA in the Philippines; Kemal Karpat, The Politicization of Islam, p. 235. 18 Tufan Buzpinar, 'Opposition to the Ottoman Caliphate in the Early Years of Abdülhamid II: 1877–1882,' pp. 59–89; Mona Hassan, Longing for the Lost Caliphate, pp. 9, 171–182. 19 Kramer, Islam Assembled, pp. 83–85. 20 Kramer, Islam Assembled, p. 101. 21 Al-Juwaynī, Ghiyāth al-umam, pp. 62–63. 22 Karateke, 'Legitimizing the Ottoman Sultanate,' p. 27. 23 Sahīh al-Bukhārī: kitāb al-ahkām, bāb al-umarā' min Quraysh. 24 Al-Bayhaqī, al-Sunan al-kubrā, vol. 8, p. 246; Musnad Ibn Hanbal, vol. 4, p. 424. 25 Ibn Khaldūn, The Muqaddimah, p. 159. 26 Sunan al-Nasā'ī: kitāb al-bay'a, bāb fadl man takallama bi'l-haqq 'ind imām jā'ir. 27 This hadith first appears in the thirteenth century, in al-Rāfi'ī's Tadwīn fī akhbār qazwīn, vol. 1, p. 291. Just a few decades later the hadith was used by the Ayyubid sultan to warn a scholar against making trouble; al-Subkī, Tabaqāt, vol. 8, p. 231. See also al-Suyūtī, al-Jāmi' al-saghīr, p. 370; al-'Ajlūnī, Kashf al-khafā, vol. 2, p. 108; Nakissa, 'The Fiqh of Revolution,' p. 412. 28 See <https://www.youtube.com/watch?v=081BXWsGWhc>, where Jum'a elides several hadiths from Sahīh Muslim: kitāb al-imāra, bāb hukm man farraqa amr al-muslimīn wa huwa mujtami'. See also the Human Rights Watch report on the massacres, available at <https://www.hrw.org/report/2014/08/12/all-according-plan/raba-massacre-and-mass-killings-protesters-egypt>. 29 See Quran 2:217; 2:190–193; 22:39–40; 60:7. 30 Abū Ja'far al-Tahāwī, The Creed of Imam al-Tahāwī, p. 68. 31 Sahīh al-Bukhārī: kitāb al-fitan, bāb qawl al-Nabī s sa-tarawn ba'dī umūran tunkirūnahā; Sahīh Muslim: kitāb al-imāra, bāb wujūb tā'at al-umarā'.... 32 Sahīh Muslim: kitāb al-imāra, bāb fī tā'at al-umarā' wa in mana'ū al-huqūq. 33 Sahīh Muslim: kitāb al-imāra, bāb al-amr bi-luzūm al-jamā'a 'ind zuhūr al-fitan. See also Sunan of Abū Dāwūd: kitāb al-fitan wa'l-malāhim, bāb dhikr al-fitan wa dalā'ilihā. 34 Sahīh Muslim: kitāb al-imāra, bāb wujūb al-inkār 'alā al-umarā' fīmā yukhālifu al-shar' wa tark qitālihim mā sallū.... 35 Sahīh al-Bukhārī: kitāb al-ahkām, bāb al-sam' wa'l-tā'a li'l-imām mā lam takun ma'siya; Jāmi' al-Tirmidhī: kitāb al-jihād, bāb mā jā'a lā tā'a li-makhlūq fī ma'siyat al-khāliq. 36 This is originally attributed to the Companion 'Amr b. al-'Ās; Abū Hāmid al-Ghazālī, Ihyā' 'ulūm al-dīn, vol. 4, p. 2616. 37 Sahīh al-Bukhārī: kitāb al-fitan, bāb takūnu fitna al-qā'id fīhā khayr min al-qā'im. 38 Sunan Ibn Mājah: kitāb al-fitan, bāb al-tathabbut fī al-fitna. 39 Al-Nawawī, Sharh Sahīh Muslim, vol. 12, pp. 466–470. 40 Sahīh Muslim: kitāb al-īmān, bāb bayān kawn al-nahy 'an al-munkar min al-īmān.... 41 Al-Qurtubī, al-Jāmi' li-ahkām al-Qur'ān, vol. 1, p. 520; Sahīh al-Bukhārī: kitāb al-fitan, bāb qawl al-Nabī (s) sa-tarawn ba'dī umuran tunkirūnahā. 42 Al-Qurtubī, ibid; Abū Bakr al-Jassās, Ahkām al-Qur'ān, vol. 1, pp. 85–87. 43 Al-Munāwī, Fayd al-qadīr, vol. 2, p. 842. 44 Sahīh al-Bukhārī: kitāb al-ahkām, bāb man istar'ā ra'iyya fa-lam yansuh; Sahīh Muslim: kitāb al-īmān, bāb istihqāq al-wālī al-ghāshsh li-ra'iyyatihi al-nār. 45 Musnad Ibn Hanbal, vol. 3, p. 24; vol. 6, p. 395. 46 'Alī Qārī, Mirqāt al-mafātīh, ed. Jamāl Aytānī (Beirut: Dār al-Kutub al-'Ilmiyya, 2001), vol. 9, p. 324; Muqbil bin Hādī al-Wādi'ī, al-Makhraj min al-fitna, pp. 143, 186; idem, Majmū' fatāwā al-Wādi'ī, p. 74. 47 Al-Dāraqutnī, Kitāb al-Tatabbu', ed. Muqbil al-Wādi'ī (Medina: al-Maktaba al-Salafiyya, 1978), pp. 181–182. 48 Sunan of Abū Dāwūd: kitāb al-fitan wa'l-malāhim, bāb dhikr al-fitan wa dalā'ilihā; Musnad Ibn Hanbal, vol. 5, p. 403. The wording in this version is '... and if God has a caliph on earth, and he strikes your back and takes your wealth, obey him....'; al-Albānī, Silsilat al-ahādīth al-sahīha, vol. 4, p. 400 (#1791). See <http://www.ahlalhdeeth.com/vb/showthread.php?t=60584>; <http://www.almeshkat.net/vb/showthread.php?t=99133>. 49 <https://www.youtube.com/watch?v=utzUaboX-NI> 50 <https://www.youtube.com/watch?v=2ey9D2Konac>; <https://www.youtube.com/watch?v=2Lo3LD1wmhU> THE AUTHENTICITY QUESTION: WESTERN DEBATES OVER THE HISTORICAL RELIABILITY OF PROPHETIC TRADITIONS INTRODUCTION Thus far we have discussed hadiths and their functions in Islamic civilization as a tradition developed by a people who affirmed that Muhammad was a prophet, the last in a series sent to humanity by a God who created the universe and is its sole font of truth. So far, the hadith tradition has unfolded among Muslims. Though they might have disagreed on the proper use or interpretation of hadiths, Muslims have controlled the boundaries of the discussion. This book, however, does not assume that the reader believes that God influences the course of history or that Muhammad was a prophet. Instead, you may have noticed (assuming I've done my job) that this book discusses hadiths in a 'neutral' or 'objective' tone according to the methods of modern historians of a religious tradition. Like Muslim hadith critics, however, our methods of historical criticism in the West have their own tradition with its own assumptions. What we must admit before any further discussion is that, because a book does not assume that God directly intervenes in human events, that Muhammad was a prophet, or that hadiths are in general authentic, then what it really assumes is that God does not directly interfere in historical events, that Muhammad was just a man, and that there are real doubts about the historical reliability of the entire hadith corpus. Few Western readers of this book, for example, would accept the explanation that we know the Muslim hadith tradition is an accur-ate record of Muhammad's words because God would never let his chosen religion go unpreserved (a standard Muslim explanation). As you can imagine, discussion of hadiths in the West differs dramatic-ally from its indigenous Muslim counterpart. This chapter explores the Western academic investigation of early Islamic history and its radical critiques of the Sunni hadith tradition. 'The Authenticity Question,' as we will term it, has two implications that we must bear in mind. First, Western scholars' critical examination of hadiths and the methods that Muslims used to authenticate them can be seen as laudably advancing our understanding of Islamic origins and as part of a larger human endeavor to expand all areas of knowledge. Second, however, Western criticism of the hadith tradition can be viewed as an act of domination in which one worldview asserts its power over another by dictating the terms by which 'knowledge' and 'truth' are established. From this perspective, one could ask why the 'light' that Western scholars shed on hadiths is necessarily more valuable to 'the advancement of human understanding' than what the Muslim hadith tradition has already offered. As the likes of Edward Said have shown, knowledge is power, and studying an object is an act of establishing control over it. It is thus no coincidence that four of the five main avenues through which the Western study of the Islamic world progressed grew out of European colonial or diplomatic interests (the French study of Islamic law and culture in colonial North Africa, similar Dutch studies in Southeast Asia, British studies of Persianate Islam in India, and European diplomatic interest in the Ottoman Empire). The fifth avenue, which proved most important for our subject, was that of Semitic studies, and stemmed from Biblical studies (as we shall discuss below).1 European diplomats in the late nineteenth century plotted how to promote a 'progressive' Islam among their colonial populations, much as their American successors have in the twenty-first. Western discussions about the reliability of the hadith tradition are thus not neutral, and their influence extends beyond the lofty halls of academia. When reports surfaced in 2008 that the Turkish government was preparing a 'radical revision' of the Sunni hadith canon, mainstream Western media applauded this move towards reformation (the rumor proved false).2 The Authenticity Question is part of a broader debate over the power dynamic between 'Religion' and 'Modernity,' and between 'Islam' and 'the West.' Instead of approaching the Authenticity Question from a teleological perspective, where we assume that the native 'Muslim' vision of the hadith tradition is wrong and that Western scholars have awakened it from its millennial slumber and are guiding it gradually forwards, we will assume what I think is a more accurate approach: the hadith tradition is so vast and our attempts to evaluate its authenticity so inevitably limited to small samples, that any attitudes towards its authenticity are necessarily based more on our critical worldview than on empirical fact. Because we ultimately cannot know empirically whether Muhammad was a prophet or a character formed by history, or whether or not God played any role in preserving his words for posterity, we will not look at the Authenticity Question as one to which there is a right and wrong answer. Instead, we will identify what the various schools of thought on this question have taken as their basic assumptions and how they have built on them. We will examine how some schools of thought reacted to others and how their assumptions cast doubt on those of others. THE ORIGINS AND ASSUMPTIONS OF THE WESTERN STUDY OF HADITH VS. THE ISLAMIC TRADITION The Muslim hadith tradition and the Western academic study of Islamic origins represent diametrically opposed approaches to evaluating the authenticity of reports about the past. Both are critical, in that they concern themselves with questions of the reliability of historical sources, but they proceed from two sets of assumptions that are at loggerheads. The following section is a digression from the subject of hadiths, but it is an essential one if we are to understand why Western and Muslim scholars view the study of hadiths so differently. As we have seen, the Sunni tradition of hadith criticism was founded on a commitment to sifting reliable from unreliable hadiths based on criteria that examined both the sources of a report and its contents. In the absence of conflicting evidence or some strong objection, however, Muslim hadith scholars and jurists treated a report attributed to the Prophet prima facie as something he really said. Ibn Hanbal thus famously stated that even a hadith whose authenticity was not established was a better source for law than ruling by one's reason alone. A critical examination of a hadith was required only when a scholar had some compelling reason to doubt its authenticity. Even then, the charismatic authority of the Prophet could overwhelm any critical concerns. The famous Egyptian scholar Ibn al-Hājj (d. 737/1336) ignored the legal ruling of a hadith and was subsequently afflicted by leprosy. When the Prophet appeared to him in a dream, the scholar asked him why he was being punished, since he had analyzed the hadith and concluded that it was not reliable. The Prophet replied, 'It suffices you to have heard it.' Ibn al-Hājj repented and was cured by the Prophet in his dream.3 Furthermore, Muslim belief that the Prophet had been granted knowledge of the unseen and intended his legacy to form the basis for the civilization of Islam has meant that Muslims venerate statements attributed to the Prophet before they doubt them. Skepticism towards hadiths was not the default setting of Muslim hadith critics. The approach of Western scholars has been the converse. According to the famous Lord Acton (d. 1902), the modern historian cannot believe in the presumption of innocence. His first reaction to any historical report must be suspicion.4 The modern Western study of history, commonly referred to (despite its internal diversity) as the Historical Critical Method (HCM), is an approach to the past that emerged from Renaissance humanism and the critical approach to the sources of history and religion that subsequently developed in Germany in the eighteenth and nineteenth centuries. Maintaining a 'historical critical' perspective towards the past means that we do not accept what historical sources tell us without question. Instead, we interrogate them and attempt to establish their reliability according to a set of assumptions about how human society functions. As the great German historian Leopold von Ranke (d. 1886) declared, history is about looking behind the sources to find out 'What really happened.'5 Numerous books have been written on the origins of the modern, historical critical worldview. In brief, its roots lie in 1) The Renaissance rediscovery of the Classical heritage of Greece and Rome; 2) The Age of Discovery, particularly the discovery of the New World; and 3) The Protestant Reformation. The rediscovery of the Classical heritage gave European scholars a sense of historical distance from the past and revealed the historical changes undergone by long revered texts like the Bible. At the same time, it affirmed a constant, unchanging human nature – an essential tool for how Western scholars authenticate stories from the past. Greek and Roman historians exuded a cosmopolitan skepticism that European minds found irresistible and introduced the model of the historian as detached analyst, as opposed to Christian chronicler. Ironically, reengaging with Classical philosophy did not energize rumination on metaphysics and theology as much as it led to a new focus on studying the rules governing the material world. Meanwhile, the discovery of the Americas exploded the established map of the world, which had been drawn from the genealogies and geographies of the Bible. The Protestant Reformation dismantled the Church's monopoly on interpreting scripture, ultimately resulting in a view of the Bible as a historical product bound in its own context rather than an inerrant and timeless spring of literal truth. The roots of the HCM emerged from the fourteenth to the sixteenth centuries, when Italian and French humanist scholars were reintroduced to the range of the Classical Greco-Roman heritage through manuscripts brought from the Muslim world and Byzantium. This led Western European scholars to a new perspective towards their cultural heritage. Western Europe had always considered itself a continuation of the Roman tradition, looking to Roman law and literature as exempla. But this relationship lacked any notion of historical distance; pre-Renaissance medieval artists painted Biblical heroes in the armor of English knights and portrayed French kings in Roman regalia.6 History was conceived according to the scheme articulated by St. Augustine (d. 430) and drawn from Biblical themes and markers. Since the time of Adam, history had been punctuated by one great cosmic event, the life of Christ, and since his crucifixion mankind had been in unrelenting decline, awaiting his second coming. One effect of the Renaissance 'rebirth' of interest in Roman figures like Cicero (d. 43 BCE) was that Italian scholars like the poet Petrarch (d. 1374) developed a sense of historical depth. Far from Augustine's medieval synthesis of the Classics and Christianity, what Petrarch found as he fell in love with the prose of Cicero's Latin letters was a pagan outlook on religion. Cicero's writings revealed a culture of supercilious skepticism alongside public piety. The famous Roman Senator readily admitted how ridiculous Roman religious practices were but still demanded they be respected in public.7 Nowhere was historical distance more obvious than in the Latin language itself. Renaissance humanism was first and foremost a realization of how different (or, according to the humanists, how decadent) medieval Church Latin was from the language of Cicero. This fascination with recovering the pure Latin of the ancient Romans led the Italian scholar of language, or philologist, Lorenzo Valla (d. 1457) to realize how many Latin words had come to mean something other than their original meaning. Examining a document called The Donation of Constantine, which the Roman emperor Constantine supposedly had written in the early fourth century granting the pope control over lands in the West, Valla pointed out that the presence of linguistic anachronisms (things that appear out of place in time – like a letter supposedly written by Jesus but mentioning mobile phones) meant that this document must have been a later forgery. The document mentions 'fiefs,' or land grants, but Valla points out that this word did not appear until much later.8 Noticing how language changed over time had led Valla to unmask a historical forgery that had long served as a pillar of the papacy's claim to the right to act as a temporal power. Identifying anachronisms would serve as a pillar of the HCM. The Renaissance fascination with language as a tool for rediscovering origins had even more stunning implications for the study of the Bible. One of Valla's successors in philology, the famous Desiderius Erasmus of Rotterdam (d. 1536) duplicated Valla's obsession with Classical Latin in the field of Greek. Erasmus devoted his career to producing the most reliable and accurate versions of ancient Greek texts by comparing the oldest possible manuscripts of the books and then purging them of mistakes made in copying and the linguistic misunderstandings or even insertions of later scholars. When producing a new edition of the original Greek text of the New Testament, Erasmus discovered that a verse that had long been part of the Latin Bible and used as a definitive proof of the Trinity was a later addition totally absent in the original Greek.9 Erasmus' life straddled stunning discovery and religious upheaval. In the span of his adult life, two new continents were added to the map. Not only had the great minds of the past never guessed their existence, but their inhabitants had no place in the Biblical genealogy based on Adam's children. With the globe as conceived by Church fathers shattered, a path was opened for novel scholarship. The French Protestant Isaac de la Peyrère (d. 1676) made the controversial argument that the Bible must have been more local than global. Adam was not the first man but merely the patriarch of one of many tribes (since Cain was able to flee and marry elsewhere, see Genesis 4:16). Similarly, Noah's flood was not global, just a local punishment for the land of Canaan.10 By Peyrère's time, the Protestant Reformation had opened new space for theological speculation in Protestant realms like England and the Netherlands. The revival of philosophy, or the notion that metaphysical truth can be attained by reason alone, led to the blossoming in seventeenth-century England of Deism, or the belief in a rational God knowable and bound by reason. In line with contempt for the papacy and the discovery of the human hand in shaping scripture, Deists like John Toland (d. 1722) argued that Christianity had originally been a purely rational religion but that the early Church had corrupted it with Roman superstitions.11 The great Protestant reformers had called for Christianity to be based on scripture alone, with the Holy Spirit, not Church tradition, guiding the believer to the proper understanding of the Bible. In contrast to Church fathers, who had long read Biblical passages in accord with Church doctrine or with select tenets of Aristotelian philosophy, Protestant founders like John Calvin (d. 1564) insisted on a reading of the Bible that adhered more closely to its literal sense.12 Ironically, this approach produced an influential Protestant outgrowth whose perspectives on the Bible proved hugely consequential. The Quakers soon came to see the inspiration of the Holy Spirit as a more important guide to truth than scripture, so critiques of the Bible's historical integrity began losing their sting.13 By the late seventeenth century, such developments had raised a key question at the fringes of Protestant thought. If truth could be known from outside scripture, either through reason or inspiration, and if that scripture itself seemed more and more like a historical product of a flawed Church tradition, then was the Bible really a timeless vessel of universal truth? Benedict Spinoza (d. 1677) of Amsterdam gave the most influential answer. In his landmark Theological-Political Treatise, he argued that the Bible must be treated as the product of a particular time and place, phrased in the language and idiom of its original audience. The Old Testament's description of God walking with man (Genesis 5:24) or the miracles of Jesus in the New Testament were not universal theological claims or historical facts. They were expressions of how religion was understood by the Bible's original audiences. This did not mean that the Bible was pointless, but it no longer held the paramount place in the hierarchy of truth. The 'universal foundation' of all religion, wrote Spinoza, was to love God and love one's neighbor, to 'defend justice, assist the poor, not to kill, not to covet other men's property, etc.'14 But the historically bound Bible only shared in this truth, it did not monopolize it. Contrast Spinoza's approach with the Muslim position that the Quran is, as Muslim scholars have held, 'the most truthful of speech, suitable for all times and all places.'15 The critical methods of Erasmus and the philosophical outlook of Spinoza and the Deists took root and blossomed in the university cities of Germany, where the HCM emerged as a clear scholarly methodology in the late 1700s. The philological study of ancient texts led to a myriad of critical revelations about Greco-Roman history and the Bible. Examining the style of Greek in Homer's Iliad and Odyssey, F. A. Wolf concluded in 1795 that the two works could not have been the product of one author.16 Studies of the New Testament Gospels led German scholars to conclude that, far from being themselves eye witnesses to the events of Jesus' life, the gospel writers Luke and Matthew had both constructed their versions of Christ's life based on material from the book of Mark. As Voltaire (d. 1778) reported, scholars now knew that the many non-canonical gospels that had been discovered actually predated the four gospels of the New Testament.17 One German scholar, Hermann Reimarus (d. 1768), made the controversial but ultimately influential contention that the first generations of Christians had invented much of the life of Jesus. Leading German scholars of theology adopted the position that the truth of religion was knowable first and foremost by reason, with both scripture and Church teachings constructed by human hands. The truth of biblical narrative was no longer assumed. It had to correspond to reason and fact. Of course, some German scholars still maintained the inerrant and literal truth of the Bible. Others tried to rationalize its miracles (Jesus did not walk on water, for example, this was merely what the Apostles perceived). But what emerged as the conventional approach, exemplified by the theology professor Johann Semler (d. 1791), was that the true function of the Bible was to convey spiritual truth, not historical or scientific fact. The Biblical canon was a historical development, and its particular meanings were tied to the worldviews of its original audiences. The Bible was no longer the sole storehouse of truth for mankind. Rather, it was just a stage in man's journey towards a greater philosophical truth working its way through history.18 The development of the HCM among German scholars culminated in David Friedrich Strauss's (d. 1874) controversial 1835 book The Life of Jesus. The work called for a total rejection of the historicity of the gospels (Jesus' miracles were just 'culturally conditioned myths') and a recognition that Christianity must be based on the Christ of faith not of history.19 By the mid nineteenth century, what had been controversial seventy years earlier had become mainstream scholarship. The primary focus of university scholarship in Germany had shifted from Christian theology to history (though controversy still raged in more conservative colleges in Scotland and America). Historians no longer served the Bible and theology, now these subjects were merely objects of historical study.20 A crucial principle of the HCM was that the original founders of all religions were not actually responsible for the later, formalized teachings of those religions. This idea was already present in Voltaire's observation that the early Church fathers relied on non-canonical gospels.21 But it was ultimately formalized by the German sociologist Max Weber (d. 1920), who argued that a religion's orthodoxy was organized by later generations in order to institutionalize the founder's charismatic religious authority. Contrast this with the Sunni belief that hadith scholars were merely preserving their Prophet's original teachings by 'fending off lies from the Sunna of God's Messenger.' This new German school of history assumed that the first step of studying any text was to question its reliability and determine its authenticity. In other words, the default setting for scholars was to doubt the reliability of material transmitted about the past. Certainly, this principle of doubt did not mean that European historians doubted everything about the past. But as their criticisms of the textual integrity of Homer's epics or the historical veracity of the Bible illustrate, they were willing to indulge fundamental doubts about the cornerstones of Western history and religion based upon what they considered anachronisms or stylistic inconsistencies within a text. Contrast this with the statement of Sunni hadith critics like Mullā 'Alī al-Qārī (d. 1014/1606), who asserted that 'it is manifestly obvious that if something has been established by transmission [from the Prophet], then one should not heed any contradiction with sense perception or reason.'22 In contrast to the mission of Muslim chroniclers – to preserve God's message and recount the history of God's chosen community – from the eighteenth century onward European historians envisioned themselves as detached observers. They were inspired by the Classical historians whose works Petrarch and others had recovered in the Renaissance. In writing his monumental Decline and Fall of the Roman Empire, Edward Gibbon (d. 1794) channeled the Roman historians Tacitus (d. circa 117 CE) (whom he called the first historian who 'applied the science of philosophy to the study of facts')23 and Polybius (d. 118 BCE), who insisted it was the historian's duty to criticize friend and foe impartially.24 Far from defending some religious truth, historians like Gibbon saw themselves like Cicero, standing above and outside religion's benighted confessional traditions while remarking on the deeper, underlying constancies of human history. Along with an a priori doubt about textual reliability and the human construction of religious orthodoxy, the HCM rested on other revolutionary methodological foundations. The Renaissance had reacquainted European scholars with the Classical skepticism of Sextus Empiricus (d. circa 210 CE), who dismissed inherent truth and universal morality as unknowable and who urged people to focus on their immediate moral and physical surroundings. In the sixteenth century, the Italian city of Padua emerged as a center for 'natural philosophy' (i.e., science) where Aristotle's empirical observations, not his metaphysics, were front and center. Based on this Classical foundation, scholars in Padua developed the procedure of hypothesis and demonstration that became the foundation of empirical investigation.25 The writings of the Roman philosopher Lucretius (d. circa 55 BCE), a materialist who believed that only the material world existed and that natural causes, not the gods, governed our affairs, became wildly popular in the seventeenth and eighteenth centuries. His poetic stanza 'Happy is he who understands the causes of things' became a mantra often quoted by Enlightenment scholars. It embraced a materialist understanding of the world in which events proceeded according to natural laws and not according to divine intervention. The most influential scientists of the seventeenth and eighteenth centuries, such as Blaise Pascal (d. 1662), were still committed Christians. But for them, in order to protect Christian belief from critics, faith had to be placed beyond the realm of reason and scientific study. The physical world, on the other hand, was created by God according to fixed laws that could be measured and relied on. In the late 1700s, a certain crass materialism emerged that did not just set the metaphysical respectfully aside. It mocked any belief in the supernatural (reminiscent of Lucretius himself). Particularly evident in the writings of the French encyclopedist Diderot (d. 1784), this crass materialism would become a dominant cultural theme in Europe by the late 1800s. Contrast this with the position of Muslim scholars (and, indeed, medieval Christians) that scripture and empirical observation had to be read in accord with one another, since both revelation and nature were 'signs' of God. The scientific revolution sealed the assumption that miracles or God's direct involvement could not be called on to explain history and scripture. European historians embraced the Roman poet Horace's command 'Let no god intervene (nec deus intersit)'; it was the immutable laws of nature and human society that shaped human history. They followed their Greco-Roman exemplars, who adhered to the ancient position that human nature was an unchanging constant.26 Herodotus (d. circa 420 BCE), the 'Father of History,' concluded that Helen could not actually have been at Troy because people would never choose fighting a ten-year war over surrendering a woman they had wrongly abducted in the first place.27 Just as Newton discovered the laws of motion, Voltaire described human society as governed by its own, constant laws.28 One of the central principles of the HCM was thus the Principle of Analogy (sometimes called, clumsily, uniformitarianism), which dictates that, although cultures can differ dramatically from place to place and era to era, human societies always function in essentially the same way. As a result, we can reconstruct how and why events transpired in Greece thousands of years ago based on our understanding of how individuals and groups function in our own societies today. If people generally tend to pursue their own interests and advance their own agendas today, then they did so in Greek times or at the time of Christ, and no one can be realistically exempted from such motivations.29 Contrast this with the Sunni Muslim view of history in which, as the Prophet supposedly said, 'The best generation is the one in which I was sent, then the next, then the next' (or, indeed, contrast it with the pre-Renaissance Christian view of history). For Sunni hadith critics, the Prophet's time was 'free of evil.'30 His Companions were incapable of lying about him and certainly not analogous to anyone else. Along with the Principle of Analogy and the detection of anachronisms to identify unreliable reports, the HCM has also relied on a tool often referred to as the Principle of Dissimilarity. Articulated by the Dutch classicist Jakob Perizonius (d. 1715), this states that a report that seems to contradict or challenge orthodoxy is probably originally true, since no one trying to construct or defend that orthodoxy would have made it up.31 In the study of the Bible, these trains of thought led to the development of what was termed Form criticism in Germany in the first decades of the twentieth century. This method of criticism combined the presumed doubt in the integrity of texts with the modern critic's confidence that the construction of these texts was affected by very profane, worldly interests. Form critics identified smaller sections within Biblical books from which their larger narratives were composed. Each of these smaller components, termed forms, 'served a definite function in a concrete situation in the life of the early church.' 'The main purpose for the creation, the circulation, and the use of these forms was not to preserve the history of Jesus, but to strengthen the life of the church.'32 From the mid nineteenth century to the early twentieth, the various strands of European thought on science, history, and religion came together to form a worldview immediately familiar to us today. Often called Positivism, it held that through their newly developed methods of science and rigorous scholarship, humans were able to cast aside ignorance and superstition and uncover the truth about their surroundings and their past. Equally important, only truth so discovered was worth following. Although glimpses of it had appeared in the Renaissance and around the time of the French Revolution, one crucial pillar of Positivism was the notion of progress – that human civilization was improving. Unlike almost everything else mentioned so far, this belief was unprecedented. It was alien to the Greeks, the Romans, and St. Augustine alike. Despite two world wars, Positivism remains alive today. It is immediately exemplified by the popular character Sherlock Holmes, whose detailed scientific method allows him to reconstruct past events and determine the exact character of any person. As summarized neatly by Voltaire, historians applying the HCM believed reports coming from people in the past if 'what they say of themselves is to their disadvantage, when their stories have some resemblance of truth, and they do not contradict the normal order of nature.'33 The important basic assumptions and methods that together made up the Historical Critical Method of scholars in Europe and later America are: 1 a presumption of doubt about the authenticity or reliability of a historical text or historical reports; 2 a general suspiciousness towards orthodox narratives presented in such texts or reports; 3 the conviction that by analyzing historical sources using the methods noted above a scholar can sift the reliable from unreliable by identifying which parts of the text served which historical agendas. The development of the Historical Critical Method would have immediate consequences for the questions of authenticity in the Islamic tradition. The nineteenth century in particular saw French and British scholars begin investigating the life of Muhammad and Islam's origins as part of their efforts to dominate colonized Muslim populations. For German scholars of the ancient Near East, studying Islam was a byproduct of Biblical studies. In his efforts to better understand the historical development of the Old Testament, the German Biblical scholar Julius Wellhausen (d. 1918) saw studying Islam as the best way to approximate the Bible's Semitic context. But, in seeking to 'uncover' the origins of Islam and its scripture, these German scholars were engaging in a conscious, if well-intentioned, act of domination. As it was announced proudly in 1902 at a German Orientalist conference, 'the darkness of antiquity has been illuminated' and 'light has been carried into the dusky forests' of India, Africa, and the Middle East by Europeans uncovering the origins and developments of these peoples' religions. As one scholar has put it, Theodor Nöldeke's (d. 1930) influential 1860 book on the origins of the Quran typified 'Europe's newfound confidence in its superior knowledge of oriental texts and traditions.'34 More important for our purposes, these Orientalists were making an imposing assumption: that what had proven true of Christianity and the Bible must be true of all other religions and all other sacred texts as well. Soon the methods of Biblical scholars would be brought to bear on the Arab-Islamic tradition. THE STAGES OF WESTERN CRITICISM OF EARLY ISLAMIC HISTORY Unlike Muslims, who developed a distinct and independent science of hadiths, Western scholars have studied hadiths as part of a broader investigation of early Islamic history and the origins of the religion. We can divide these studies into three general areas, all of which touch upon the reliability of hadith literature: early Islamic political and sectarian history, the origins of the Quran, and the origins of Islamic law. In the Western study of early Islam and the Authenticity Question we can discern four stages that are either chronologically or thematically distinct: 1 The Orientalist Approach: the initial application of the Historical Critical Method to early Islamic history, which challenges many features of the traditional Islamic legal and historical narratives but accepts its general structure. 2 The Philo-Islamic Apology: the arguments of some non-Muslim and Muslim scholars trained in the West responding to Orientalist critiques of hadiths. 3 The Revisionist Approach: beginning in the late 1970s, this approach applied the critical assumptions of the Orientalist Approach at a more basic level and questioned the greater narrative of early Islamic history, the origins of the Quran and of Islamic law. 4 The Western Revaluation: since the 1980s, this approach has rejected the extremes of the Revisionist Approach while continuing criticism of the early Islamic period according to the Historical Critical Method. Rejecting the radical skepticism of the Revisionists, however, has led some Western scholars to recognize both that the Orientalist method involves some questionable assumptions and also that the Muslim hadith tradition is much more sophisticated than previously believed. THE HISTORICAL CRITICAL METHOD AND THE MATN: GOLDZIHER'S REVOLUTIONARY CRITICISM OF HADITHS One of the first Western writers to question the reliability of the hadith corpus as a source for Muhammad's life and deeds was the Scotsman William Muir (d. 1905), who served as a colonial administrator and educator in British India. In his Life of Mohamet (1861) he rejects the hadith corpus as clearly biased and unreliable. Hadiths merely promoted the Muslim 'chorus of glory to Moh.ammad' as well as the political, sectarian, and scholarly ambitions of the early Muslim community.35 Only the Quran was a reliable source for the Prophet's teachings, Muir claims. Although he feels that 'European critics' must reject at least half of the material in Sahīh al-Bukhārī, Muir admits that some hadiths can be considered reliable. These include hadiths on issues on which independent reports are in general agreement as well as hadiths that portray the Prophet unfavorably (an example of the Principle of Dissimilarity at work).36 He also notes that classical hadith criticism was useless because it focused only on the isnād and not the content of the hadiths themselves.37 Although with Muir we see the application of the Historical Critical Method to hadith literature, it was the Hungarian Ignaz Goldziher (d. 1921) who applied this on a larger scale and with more academic rigor. Faithful to the German school of history, Goldziher approached the textual sources of early Islamic history and thought with 'skeptical caution.' The fact that there was no historical documentation of the Prophet's life written in his own time, and that material about him had been transmitted through the very flexible medium of oral traditions, meant that hadiths could not be viewed as documentary evidence. They were eminently subject to forgery and manipulation. Like Valla and the German biblical scholars, the critical keys that Goldziher used to sift true from false reports about the Prophet were anachronism and the Principle of Analogy; hadiths that seemed to address conflicts and concerns that emerged only after the Prophet's death must be propaganda created by parties involved in these conflicts, not the actual words of the Prophet. As a result, the contents of many hadiths not only prove they were forged, but they also allow the historian to determine who forged them and when.38 For Goldziher, then, hadiths serve not as a document of the Prophet's actual legacy, but rather as 'a direct reflection of the aspirations of the Islamic community.'39 Goldziher notes that the Prophet's authority was immediately both compelling and appealing to Muslims. He concludes that the limited writing down of hadiths was a very early process, but the very power of the Prophet's precedent meant that Muslims also quickly found manipulating hadiths for their own purposes irresistible.40 The fact that the Prophet could have had knowledge of future events served as a license for anachronism among early hadith forgers. Events unfolding in the nascent Muslim community could be 'described' or 'judged' by attributing statements to the Prophet, who had been informed about them by God.41 (The hadith on the Qadarites examined in Chapter 3 is an example of this). Goldziher lays out four main stages and motivations for the forgery of hadiths by Muslims during the first three hundred years of Islam: political agendas, legal agendas, sectarian agendas, and communal/historical agendas. For Goldziher, the original and most potent motivation for the forgery of hadiths was politics. Specifically, he argues that many hadiths and the nature of the early hadith tradition as a whole leave no doubt that the Umayyad dynasty pursued a program of political propaganda in which hadith forgery played an important part. Unlike the Muslim community during the Prophet's lifetime and the pious inhabitants of Medina after his death, in Goldziher's opinion Umayyad rule from Syria was entirely secular with no inherent Islamic legitimacy.42 The Umayyads thus arranged for hadiths to be forged which legitimized their rule and political practices. Goldziher argues, for example, that during the Second Civil War (680–92), when the Umayyads' enemy 'Abdallāh b. al-Zubayr (d. 73/692) was in control of Mecca and the pilgrimage routes, the Umayyads circulated a hadith that urged Muslims not 'to remove the saddles from their mounts [in other words, to visit] except at three mosques,' the Haram Mosque in Mecca, the Prophet's Mosque in Medina and the Al-Aqsa Mosque in Jerusalem. Goldziher infers that this hadith was an attempt to establish an alternative annual pilgrimage location in Umayyad-controlled territory in Palestine.43 When the Umayyad caliphs wanted to appear more majestic before the congregation by delivering sermons while seated at Friday prayers, agents of the dynasty forged a hadith that the Prophet had given his sermons while seated.44 The Umayyads were able to forge and circulate these hadiths successfully, Goldziher argues, because they patronized and sponsored the early collection of hadiths in general. Goldziher points out that the early pivot of hadith collection in the Hejaz and Syria, al-Zuhrī, served as a tutor to Umayyad princes and a judge for the state. He even wore the uniform of the Umayyad military. Goldziher thus does not find it surprising that al-Zuhrī appears in the isnād of the above- mentioned hadith of the three mosques suitable for visiting.45 He notes that many other early hadith masters, such as al-Sha'bī al-Himyarī (d. 103–10/721–8), were also associated with the Umayyad court. To a large extent, he suggests, the study of hadiths on a large scale occurred because of Umayyad interest in political propaganda. Just as political concerns drove forgery of hadiths in the Umayyad period, Goldziher continues, they continued to motivate forgery under the Abbasids. Unlike the 'secular' Umayyads, the Abbasid state was built on a religious message: the return of rule to the family of the Prophet, the Quran, and the Sunna.46 He argues that under Umayyad rule, many of the Muslims living in their newly conquered realms had very little knowledge about the ritual and legal details of their religion.47 Under Abbasid patronage, the pious religious scholars whose voices had been subdued during Umayyad times had to produce a comprehensive legal, dogmatic, and communal vision for the new Islamic empire. It was under the Abbasids that the Sunna of the Prophet became seen as the norm for all areas of life and that hadiths began to be used in religious law.48 Since the Quran contained very little legal material, these Muslim scholars had to resort to other means to construct Islamic law. The Partisans of Reason (ahl al-ra'y) turned to the legacy of Roman provincial law where, for example, Goldziher claims Muslims acquired the notion that a defendant in a case may clear himself of charges by swearing an oath. As for the Partisans of Hadith (ahl al-hadīth), 'the path followed by them was a less honest one.' They invented whole swathes of hadiths on issues of Islamic law and dogma in order to provide the raw material for their construction of Islamic trad-ition. With the Abbasids promoting such activities, he concludes, 'it may be imagined how greatly the fabrication of h.adīths flourished under these circumstances.' In addition to forging a vast number of hadiths, Goldziher claims that the Abbasid-era Partisans of Hadith also invented the system of hadith criticism wholesale as a tool for rebutting any hadiths that their opponents might use against them in debates.49 Like the Umayyads, the Abbasids and their partisans also forged hadiths to legitimize their rule. Concerning a hadith in which the Prophet gives the spoils of war to his clan, the Banū Hāshim, from whom the Abbasids claimed descent, while giving none to the Banū 'Abd Shams, the clan of the Umayyads, Goldziher remarks that the 'dynastic-legitimistic character of this h.adīth is obvious.'50 Throughout the early Islamic period, he asserts, pious Muslims also forged hadiths that allowed them to make sense of the turmoil and strife wracking their community. Thus we find the hadith in which the Prophet says that his is the best of generations and that all subsequent ones will diverge further and further from his golden age.51 These pious scholars similarly forged hadiths urging political quietism – a cause no doubt supported by the government – with hadiths such as 'Blessed is he who avoids public agitations (inna al-sa'īd man junniba al-fitan).'52 Forging hadiths became a way for religious scholars to narrate the course of Islam's history, as well as to predict its future, through the Prophet's words. Goldziher states that the Partisans of Hadith 'do not restrain themselves at all when they make the Prophet speak about the general development of the Islamic empire.' Hence we find hadiths describing how the Prophet, while digging the defensive ditch around Medina, saw visions of the faraway castles of Syria and Persia that the Muslims would conquer.53 Of course, Goldziher noted how more strictly sectarian conflicts also led to the forgery of large numbers of hadiths.54 Shiites eager to prove 'Alī's claim to leadership forged the hadith of Ghadīr Khumm, in which the Prophet is made to announce to his Companions that 'Whoever's master I am, 'Alī is his master.' Sunnis countered by forging exact counterparts to such hadiths featuring Abū Bakr or 'Umar instead of 'Alī, or circulating reports emphasizing that the Prophet had in fact made no will at all assigning a successor.55 He also identified some less idealistic motivations for forging hadiths. Individual cities, tribes, and schools of law would forge chauvinistic hadiths in which the Prophet would foretell or affirm their prominence.56 Since Goldziher's work provides the foundation for later Western criticisms of hadiths, we must pause to examine some of his assumptions. As we saw with the German school of historical criticism, Goldziher maintains an attitude of pronounced skepticism towards the orthodox Muslim narrative of Islamic history. It is neither shaped by God's will nor immune from the profane motivations that afflict humans everywhere. The early Muslim community was not some morally upright polity but a series of self-interested parties that exploited the authority of the Prophet to their benefit. At the root of his reasoning lies the critical assumption that, if a hadith serves the purposes of a group, it was forged by that group. This is especially clear if the hadith contains some anachronism. His willingness to indulge in skepticism is crucial for his conclusions about the hadith tradition. Describing the hadith activity of the early transmitter 'Abd al-Rahmān b. Khālid, Goldziher states confidently that 'there are presumably many [of his hadiths] which were to benefit the prevailing political tendencies, because this 'Abd al-Rahmān was for years an important official of Umayyad princes.'57 In other words, the simple fact that 'Abd al-Rahmān served as an Umayyad functionary meant that he must have forged hadiths to support Umayyad causes. Less skeptical scholars might not feel comfortable with this reasoning, since a person can work for a state or company without lying on its behalf. In the above-mentioned case of the Prophet giving his clan more of the spoils of war than he gave to the Umayyad clan, why should we assume that this is forged simply because it seems to support the anti-Umayyad agenda of the Abbasids? It is not inconceivable that the Prophet actually did grant his clan the lion's share of booty, especially since the chief of the Umayyad family, Abū Sufyān, had been a diehard opponent of Islam in Mecca. Sometimes Goldziher's vision of the hadith tradition as inherently manipulative and unreliable leads him to misinterpret evidence. As proof that Abbasid-era hadith scholars forged reports for the benefit of the state, he discusses the case of Ghiyāth b. Ibrāhīm, who made up a hadith in which the Prophet allowed raising pigeons for competition because Ghiyāth knew that the Abbasid caliph al-Mahdī was fond of them. Goldziher concludes that, although the caliph caught on to the forgery, 'the tale nonetheless shows what a court theologian was capable of doing in matters of the tradition.'58 This story, however, is only found in Muslim sources as a textbook example of the sin of forging hadiths. Sunni hadith critics reviled Ghiyāth b. Ibrāhīm as a forger and referred to the incident as an example of how one person forged a hadith and how the network of critics immediately caught it. Goldziher, on the other hand, uses a story designed to illustrate an exception to represent the rule. Goldziher's investigation of forgery in the hadith tradition nonetheless leads to some tremendous insights as to how pious Muslims could concoct lies about their Prophet. He describes how after the Prophet's death even his Companions forged hadiths 'which were thought to be in accord with his sentiments and could therefore, in their view, legitimately be ascribed to him.'59 Under the Umayyads and Abbasids, he suggests, hadith scholars could justify forging hadiths because phrasing statements as the words of the Prophet was the idiom in which authority was expressed. 'The end sanctified the means.' The widespread circulation of hadiths such as one in which the Prophet instructs Muslims that, if they hear a hadith whose meaning accords with the Quran, 'then it is true whether I said it or not,' demonstrate that some Muslims found no conflict in preserving what they felt were legitimate components of the Prophet's teachings by attributing false hadiths to him (Note: Muslim scholars considered this hadith to be unreliable or forged).60 Like Muir, Goldziher concluded that content criticism played no discernable role in the work of Muslim hadith critics. Even if the text of a hadith is replete with suspicious material, he observes, 'Nobody is allowed to say: "because the matn contains a logical contradiction or historical absurdity I doubt the correctness of the isnād." ' From this he concludes that 'Muslim critics have no feeling for even the crudest anachronisms provided that the isnād is correct.'61 Goldziher's conclusion that examining the contents of reports was not a component of early hadith criticism has been consistently echoed by Western scholars. DATING HADITH FORGERY BYISNĀDS: THE SCHOOL OF JOSEPH SCHACHT Goldziher had brought the European historical critical tradition to bear on hadith literature and had concluded that a significant number of hadiths that Muslims believed were authentic were actually forged as part of the articulation of Islamic political, legal, dogmatic, and historical worldviews. Western criticism of hadiths was brought to a new level by a German scholar named Joseph Schacht (d. 1969), who built on Goldziher's skepticism towards the reliability of hadith literature. Schacht also concludes that hadiths cannot be assumed in any way to actually describe the Prophet's life.62 While Goldziher focused on political propaganda and sectarian agendas, Schacht focused specifically on the function of hadiths in Islamic law. Whereas Goldziher had utilized the matn of hadiths to determine when and why they were forged, Schacht examined the isnāds and the diachronic (literally, 'across time') tradition of hadith collection and use. Legal hadiths, Schacht argues, do not represent the actual details of the Prophet's life. Rather, they were attributed to the Prophet by later schools of law to lend support to their doctrines.63 He presents one simple observation that underlies his entire criticism of the hadith corpus. If we look at admittedly early Muslim scholarly writings, such as the letter that al-Hasan al-Basrī (d. 110/728) addressed to the Umayyad caliph 'Abd al-Malik (d. 86/705) warning him not to adopt a predestinarian outlook, we find that al-Hasan does not mention hadiths as part of his argument. Instead, he draws on the Quran and stories of earlier prophets.64 Since Sunni hadith collections contain plentiful hadiths that al-Hasan al-Basrī could have used as evidence in his treatise, Schacht concludes, the fact that he did not use them in his polemics means that these hadiths must not have existed at the time.65 This type of argument is known as an argument e silentio, or 'from silence.' Schacht argues that the original study and elaboration of Islamic law, which he calls 'the ancient schools of law,' developed in cities such as Kufa and Medina around the practice of that local community and the opinions of its senior Muslim religious figures, such as Abū Hanīfa, Mālik b. Anas, and al-Layth b. Sa'd. The Prophet's Sunna was not an immediately revered source for law. Debates among these scholars, however, caused a great deal of contention because none of these ancient schools of law possessed arguments that their opponents found compelling enough to follow. Schacht thus concludes that by the late eighth and early ninth centuries, Muslim scholars of these ancient schools attempted to resolve this interpretive chaos by investing the legal precedent of the Prophet and his Companions with more authority. Schacht associates this transition with al-Shāfi'ī (d. 204/820), whose famous Risāla documents his campaign to identify the notion of authoritative precedent (sunna) solely with Prophetic hadiths.66 Figure 9.0 Schacht's Common Link According to Schacht's thought, the movement away from the precedent of numerous authoritative figures such as the Companions and Successors to the Prophet himself manifested itself in the 'backgrowth' of isnāds. Schacht's reasoning was simple and clear. Books surviving from the ancient schools of law, like Mālik's Muwatta', include far more reports from later figures than from the Prophet himself.67 The collections compiled after al-Shāfi'ī, however, such as the canonical Six Books, were undeniably focused on Prophetic reports.68 Furthermore, these collections often included reports attributed to the Prophet that the authors of earlier hadith collections had attributed to Companions or Successors. A report in the Muwatta' may be attributed to a Companion, while a generation later al-Shāfi'ī attributes the same report to the Prophet through a defective mursal isnād (in which there exists a gap in the isnād between the Prophet and the person quoting him). Two generations later, in the Sahīh of al-Bukhārī, we find the same hadith with a complete isnād to the Prophet.69 Schacht contended that the Prophetic versions of these reports had clearly been forged after the compilation of works such as the Muwatta', since if they had existed earlier, then scholars like Mālik no doubt would have included them in their writings to trump their adversaries in legal debates.70 In Schacht's view, the development of law in the first centuries of Islam was thus a slow process of finding more and more compelling sources of authority for legal or doctrinal maxims. Statements from Successors were the oldest and thus most historically accur-ate.71 In debates between early legal scholars, however, the problem of competing Successor reports was solved by disingenuous experts attributing these statements to the next highest rung on the ladder of authority: the Companions of the Prophet. We should thus treat these Companion reports as historical fabrications.72 By the mid eighth century, the problem of competing reports from the Companions resulted in such statements being pushed back to the Prophet himself. Al-Shāfi'ī proved the greatest champion of this total reliance on Prophetic hadiths. Since the major Sunni hadith collections consist almost entirely of reports from the Prophet, much of their material must have been put into circulation after al-Shāfi'ī's time.73 Schacht's conclusions yielded a simple rule: the farther back the isnād of a hadith goes, the more assured we should be of its fabrication and the later the date that this fabrication occurred.74 But how do we know who was responsible for the backgrowth of an isnād and when they had attributed a statement to the Prophet? For the legal hadiths that Schacht studies, he posits the theory of the Common Link (see Figure 9.0). Schacht notices that for the hadiths he selected for analysis, the report is transmitted by only one chain until a certain point several generations after the Prophet. After this transmitter, whom Schacht terms the 'Common Link,' the hadith spreads out to more chains of transmission. Since the eighth century witnessed a process of isnāds growing backwards, then it seems reasonable to assume that this Common Link is responsible for fabricating his isnād back to the Prophet. Everything before the Common Link is thus made up, which explains why the hadith only spreads out widely after him.75 Schacht adds that, in addition to the backgrowth of isnāds leading to a massive increase in the number of 'hadiths,' jurists and hadith scholars also created 'parallel' isnāds to help avert the arguments made by Mu'tazilites who rejected the use of hadiths with a limited number of chains of transmission.76 To avoid the stylistic awkwardness of putting what were clearly legal statements made by early Muslim scholars in the mouth of Muhammad, Schacht explains that the circumstances and contextual details of legal hadiths were added to provide 'an authentic touch.'77 Schacht's understanding of the early Islamic legal tradition and his Common Link Theory became the dominant vision of the hadith tradition among Western scholars and has exercised tremendous influence. This approach was elaborated further by the Dutch scholar G.H.A. Juynboll (d. 2010), one of the leading proponents of what we have termed the Orientalist school. While acknowledging that the origins of what became hadith literature no doubt occurred in the life the Prophet, Juynboll adds that 'surely it is unlikely that we will ever find even a moderately successful method of proving with incontrovertible certainty the histor-icity of the ascription of such to the prophet but in a few isolated instances.' Too many of the Companions, he continues, were credited 'with such colossal numbers of obviously forged traditions that it is no longer feasible to conceive of a foolproof method to sift authentic from falsely ascribed material.'78 If it is beyond the historian's means to prove that the Prophet did say something, Juynboll certainly believes that one can prove that he did not say something. He does this by dating when the hadith came into existence. Building on Schacht's Common Link Theory, Juynboll asserts that the more people transmit a hadith from a scholar, 'the more historicity that moment has.' In other words, the more people narrated a hadith from a transmitter, the more attestation there is that the hadith actually existed at the time.79 It must therefore have been forged at some earlier date. Any links in an isnād that lack such multiple attestations are of dubious historical reliability, especially in light of the supposed adoration that early Muslims had for hadiths and their preservation. Juynboll asks, if the Prophet had really uttered a certain hadith in the presence of his devoted followers, how do we explain why he 'should choose to convey his saying about [a topic] to just one companion, and why this companion should choose to convey it to just one successor?'80 For Juynboll, then, the only historically verifiable 'moment' in the transmission of a hadith occurs with a Common Link. Because it is inconceivable that a real hadith could be transmitted by only one isnād from the Prophet, anything before this Common Link must have been fabricated by him or her.81 Juynboll feels that concluding that a hadith must have been forged because more transmissions of it do not exist (an argument e silentio) is well justified. Since Muslim hadith scholars habitually collected all the available transmissions of a hadith they could find, their omission of any transmission must entail that it did not exist.82 In his case-by-case analysis of many hadiths, Juynboll develops a jargon for describing the different phenomena of isnād fabrication. As is illustrated in Figure 9.1, we see that the hadith has a clear Common Link, whom Juynboll would accuse of attributing the hadith to the Prophet along with a suitable isnād. We also find two other transmissions of the hadith besides that of the Common Link, one through the Common Link's source and another through a second Companion. Since there is no historical way to verify the existence of these two alternative transmissions (they lack a Common Link), they must have been forged by a transmitter or collector to provide an alternative chain of transmission, perhaps with a more elevated isnād, to that of the Common Link. Juynboll terms these alternative transmissions 'Diving' isnāds.83 A hadith that has no Common Link, only a set of unrelated 'diving' chains (which Juynboll terms a 'spider'), is not historically datable in any sense.84 Juynboll's judgment on 'diving' chains of transmission leads him to dismiss the whole notion of corroborating transmissions (mutāba'a) among Muslim hadith scholars. Because these chains of transmission appear independently and lack any Common Link, they cannot be verified and should be assumed to be forgeries. They are simply plagiarisms of the Common Link's isnāds to make the hadith seem more reliable. Juynboll notes that it 'never ceases to astonish' him that master Muslim hadith scholars like Ibn Hajar al-'Asqalānī did not realize that corroborating isnāds were in fact groundless fabrications.85 Figure 9.1 Juynboll's Common Link Theory As his treatment of corroborating transmissions suggests, Juynboll feels that the Muslim methods of hadith criticism were wholly ineffective at weeding out forged hadiths. First of all, he says, the science of hadith criticism emerged far too late to judge with any reliability what transpired in the early period of hadith forgery in the late seventh and early eighth centuries. Second, the methods of hadith critics did not consider the possibility that isnāds could be made up wholesale, a fact that rendered the proof value of any corroborating isnāds null. Juynboll notes that the phenomenon Muslim critics called tadlīs (obfuscation in transmission, see chapter 3) would have allowed disingenuous forgers to attribute a hadith to an earlier respected scholar. He claims that tadlīs 'was hardly ever detected.' Finally, he follows Goldziher in asserting the 'near absence of application of suitable criteria' for content criticism by early hadith critics.86 Like Goldziher and Schacht, Juynboll concludes that the 'programmatic' production of hadiths started after the death of the Companions, with the standardization of the isnād format taking place in the 680s and 690s.87 Following those earlier Orientalists, he agrees that hadiths originated as the exhortatory material of storytellers and preachers and only later addressed topics of Islamic law. Most of what Muslims considered to be the most reliable hadiths probably emerged in the 700s to 720s, when Muslim scholars began to invest the Sunna of the Prophet with ultimate authority and when the backgrowth of isnāds allowed material to be manufactured to furnish the Prophet's legacy. While Schacht had identified the backgrowth of an isnād if he found a Prophetic hadith in a collection like Sahīh al-Bukhārī that had appeared in an earlier collection as a statement of a Companion or Successor, Juynboll generalized this conclusion. Even if you cannot find a Companion/Successor opinion that corresponds to a Prophetic hadith, the fact that so many hadiths seem to have originated from these kinds of non-Prophetic statements makes 'any "prophetic" saying suspect as also belonging to that genre.'88 Using information provided by Muslim hadith critics and collectors themselves, Juynboll offers proof for the massive multiplication of hadiths in this period. In the earliest sources available, he says, major hadith transmitters like Ibn 'Abbās were described as narrating as few as nine hadiths from the Prophet. Yet by the time Ibn Hanbal compiled his vast Musnad in the first half of the 800s he collected 1,710 narrations from Ibn 'Abbās (although Juynboll admits that these included repetitions of the same hadith).89 Beyond the backgrowth of isnāds, in his numerous articles Juynboll criticized a variety of other concepts developed by Muslim hadith critics. He challenges the provenance of the isnād that Muslim critics considered one of the most reliable: Mālik Nāfi' Ibn 'Umar Prophet, by claiming that the transmitter Nāfi', the client of Ibn 'Umar, did not really exist as a major hadith narrator. Arguing that Nāfi' cannot be established as a Common Link, and pointing to the fact that the early transmission critic Ibn Sa'd (d. 230/845) did not describe him as a noteworthy hadith transmitter, Juynboll concludes that Mālik and other early scholars simply invented Nāfi' as a useful tool for anchoring their own legal opinions in the words of the Prophet.90 Juynboll also challenges the notion that attaining the level of mutawātir in the eyes of Muslim critics in any way guaranteed the authenticity of a hadith. Using his Common Link method on the famous hadith of 'Whoever lies about me intentionally, let him prepare a seat for himself in Hell,' Juynboll claims that Common Link analysis cannot establish it as reaching back to the Prophet. He thus concludes that if the most famous mutawātir hadith cannot be proven to be authentic according to his methods, then the whole idea of mutawātir hadiths 'is no guarantee for the historicity of a h.adīth's ascription to the prophet.'91 THE PHILO-ISLAMIC APOLOGY Orientalist criticisms of hadiths quickly elicited responses from Muslim scholars. Although he affirmed many of Muir's critiques of the hadith tradition, the Indian Islamic modernist, Sir Sayyid Ahmad Khan (d. 1898) retorted that Muir's assumption that the bulk of hadith transmitters were engaged in deliberate misrepresentation stemmed from his anti-Muslim bias. Furthermore, Khan accuses Muir of supporting his accusations of the political and sectarian motivations behind hadith forgery using as evidence the same reports he had deemed historically unreliable.92 Later, more in-depth responses to Orientalist criticisms came from scholars working and trained in Western universities who did not wholly agree with Goldziher, Schacht, and their followers. From the 1960s to the 1980s, a number of scholars, most of them from Muslim or Middle Eastern backgrounds, challenged Orientalist conclusions either wholly or in part. The most influential challenge came from Nabia Abbott (d. 1981) (a Christian from Iraq and later professor at the University of Chicago) who based her book Studies in Arabic Literary Papyri II: Qur'ānic Commentary and Tradition (1967) on a selection of early Arabic papyrus documents from the second half of the eighth and the early ninth centuries. Abbott presents an interesting challenge to Goldziher's theory that the Umayyad government, with its agents like al-Zuhrī, instituted hadith collection and actively fabricated a substantial component of the hadith corpus pursuant to their political agenda. Evidence from our earliest sources on the origins of hadith study, she contends, portrays the Umayyads as concerned first and foremost with collecting the Prophet's teachings on administrative issues like taxes and charity, not with material connected to the political image of their rule. She notes how the first state attempt to collect hadiths, ordered by the caliph 'Umar b. 'Abd al-'Azīz (d. 101/720), was limited to administrative hadiths. The hadiths that al-Zuhrī collected for the Umayyads for promulgation in the provinces dealt only with charitable tithes (sadaqa).93 Abbott argues that the 'family isnāds' like those from Nāfi' Ibn 'Umar or al-'Alā' b. 'Abd al-Rahmān his father Abū Hurayra emerged far earlier and were far more numerous than previously imagined. Umayyad rulers were attempting to make these private collections public, not ordering the forgery and circulation of baseless hadiths.94 Abbott also rebuts the argument that the exponential increase in the number of hadiths in the eighth and ninth centuries proves that hadiths were being forged en masse. First of all, she notes that even early written collections of hadith could be sizable: al-Hasan al-Basrī's sahīfa was a scroll six inches in diameter. Certainly, however, early written collections were much smaller than the great hadith compendia of the ninth century. Al-Zuhrī's library could be carried in one bag, while Ibn Hanbal's was twelve and a half camel loads, and al-Wāqidī's (d. 207/822) six hundred boxes.95 The explanation for this growth, however, was not necessarily forgery. Papyrus and parchment were extremely expensive, and scholars could only use them to record the most basic information about their hadiths, such as the matn with perhaps one isnād. With the arrival of cheap paper in the Middle East at the end of the eighth century, scholars could afford to write down every hadith narration they came across. In his famous Musnad, for example, Ibn Hanbal tried to include an average of seven narrations for every tradition he listed.96 As the science of hadith collection and criticism developed in the mid eighth century, a 'hadith' became identified with its isnād, not with its matn. As ninth-century scholars obsessively collected all the various transmissions (each called a 'hadith') of one tradition, the number of 'hadiths' multiplied rapidly. As isnāds developed and became interlaced, this number increased even more, while the actual number of Prophetic traditions remained relatively small.97 Abbott's challenging some of the Orientalist attacks on the Sunni hadith tradition, however, did not mean that she embraced it fully. She notes that the widespread disagreement between Muslim critics on the reliability of a transmitter or isnād 'nullified' the real effectiveness of the Muslim science of hadith as a critical tool.98 Abbott provides perhaps the most insightful explanation of how so much forged mater-ial did appear. Since Muslim hadith critics treated hadiths dealing with law much more severely than those that they used in exhortatory preaching (al-targhīb wa al-tarhīb), the type of matn greatly affected the critical stringency with which the hadith was treated. Much of the material forged in areas such as exhortatory preaching thus survived because Muslims allowed it to.99 A vigorous rebuttal of Orientalist scholarship came from an Indian scholar who studied at Cambridge University, Muhammad Mustafa al-Azami. In two books, Studies in Early h.adīth Literature (1978) and On Schacht's Origins of Muhammadan Jurisprudence (1984), Azami attacked Schacht's work (and also that of Goldziher) and those who had relied on his conclusions. One of the points for which Azami takes Goldziher and Schacht to task is the substantial inferences they make without any conclusive evidence. Goldziher, for example, had concluded that the Umayyad state had sponsored hadith forgery based on the fact that certain hadiths seemed to support Umayyad interests and that certain transmitters were linked to the court. Certainly, Azami acknowledges that the Umayyads fought groups like the Shiites. But he contends that there is no evidence of an official or unofficial Umayyad directive to fabricate hadiths for the cause of the state (here we should note that the historian al-Madā'inī did adduce evidence for this; see chapter 3).100 One of Azami's principal objections to Schacht is his reliance on a small number of sources to reach broad generalizations. Azami begins his discussion by pointing out how few sources Schacht had relied on and drawing attention to the numerous early Arabic manuscripts that had been discovered since his time. Western scholars of hadiths, he states, should update their data instead of parroting Schacht uncritically.101 Azami states that Schacht based his conclusions on the Muwatta' of Mālik and the Umm of al-Shāfi'ī, but he 'imposed the results of his study on the entire h.adīth literature.'102 Moreover, one of the isnāds that Schacht relies on for his evidence that isnāds grew backwards in Mālik's case was an instance in which later Muslim hadith critics believed Mālik had made a mistake. Schacht thus took an error on Mālik's part as an example of the rule instead of an exception to it.103 Azami also accuses Schacht of fundamentally misunderstanding the realities of early Islamic legal scholarship.104 Schacht's argument e silentio, where a scholar failing to mention a hadith or a complete isnād meant that the hadith or that complete isnād must not have existed at that time, is flawed. A legal expert (muftī), Azami argues, often answered questions without documenting the evidence he had used in arriving at his conclusion or without providing a full isnād for his hadiths. Azami provides an example from al-Shāfi'ī's famous Risāla, where al-Shāfi'ī provides an incomplete isnād for a hadith but excuses himself because he did not have with him the book that included his more complete isnād for that hadith.105 Finally, Azami devotes a large portion of his books to attempting to prove that Muslims had begun writing down hadiths and even using the isnād during the time of the Prophet and his Companions. Here, he relies on surviving sources from the eighth and ninth centuries which mention earlier written sources. He does this in order to disprove Schacht's claim that Prophetic hadiths only appeared as isnāds grew backwards, a claim Schacht based in part on a lack of books surviving from the first two centuries of Islam that could serve as evidence that Muslims had recorded hadiths during that time.106 Of course, here Azami relies on Muslims' testimony about their own thoroughness in hadith collection – a biased source that some Orientalists would not believe to begin with. THE REVISIONIST APPROACH AND THE CATEGORICAL REJECTION OF THE MUSLIM NARRATIVE Orientalists such as Goldziher, Schacht, and Juynboll had questioned the authenticity of individual hadiths and established a skeptical outlook towards hadith literature as a genre, but they did not doubt the overall narrative of the Prophet's life and Islamic origins. Muhammad was still assumed to have been a merchant from Mecca who had preached the monotheistic 'religion of Abraham' to his peers in Mecca before fleeing the city to establish a new Muslim community in Medina. Orientalists never questioned that he had claimed to receive revelations in the form of the Quran and had engaged in known conflicts with his enemies with the help of his famous cadre of Companions. From 1977 to 1979, however, a series of studies demanded that the Historical Critical Method be applied fully and consistently to early Islamic history. If historians were supposed to adopt a skeptical attitude towards obviously biased sources and attempt to rely on the earliest, best documented evidence possible, why had Western historians believed the grand Muslim narrative of Islam's origins at all? After all, the history of the Prophet's life, message, and community was told solely by Muslims, and there were no surviving textual sources from before the mid 700s, a full century after the Prophet's death. This would have provided ample time for Muslim scholars and historians – certainly not impartial in their activities – to construct whatever legacy they wanted for their 'Prophet' from scratch. This Revisionist criticism of the Orientalists applied equally to scholars like Azami who had objected to their critiques, for Azami had also relied on sources written down long after the first generations of Islam to reconstruct the early collection of hadiths. Two scholars, Patricia Crone (d. 2015) and Michael Cook, proposed rewriting early Islamic history using the earliest written sources on Islam, which had the added benefit of not being written by Muslims. On the basis of a set of surviving Christian religious writings dating from as early as 634 CE, Crone's and Cook's book Hagarism (1977) proposed that Islam had actually been a late version of apocalyptical Judaism in which the Arabs of the Hejaz had rediscovered their Abrahamic roots and sought to retake the Holy Land of Palestine. Clearly, this was a very different history than the detailed account of Muhammad's life and teachings given in the hadith literature! The novel contribution of the Revisionist approach was not the mechanics of criticizing the hadith tradition, but the scale of skepticism. Crone, for example, espouses Schacht's and Juynboll's theory about the backgrowth of isnāds and the conclusion that hadiths cannot really tell us anything about Islam before the year c. 100/720. Crone seconds the Orientalist critique that hadiths transmitted by Muslims reflect 'what the Prophet meant to them, not what the generation before them had taken him to say, let alone what he had said or done in his own particular time and place.'107 Figure 9.2 Cook's Theory of Tadlīs and Spread of Isnāds In her work on the origins of Islamic law, Roman, Provincial and Islamic Law (1987), Crone's severe doubt about the reliability of the Islamic historical tradition leads her to a new degree of skepticism towards the hadith corpus as a whole. '[I]n the field of substantive law,' she argues, 'traditions attributed to the Prophet must indeed be presumed to be inauthentic.'108 As an example, she takes one hadith that 'practically all' Orientalists had considered authentic: the famous 'Constitution' of Medina, the agreement between Muhammad and the Jews of Medina in which all parties agreed to be part of one 'community (umma)'. (Orientalists regarded this as authentic in part because it seems to contradict the orthodox Islamic notion that non-Muslims could not join Muslims in their religious polity, an example of the Principle of Dissimilarity at work.) Concerning the legal issue of patronage (walā'), early scholars like Ibn Jurayj (d. 150/767) and Ma'mar b. Rāshid (d. 153/770) had forbidden its sale or transfer, but they narrated no Prophetic hadiths to that effect. Based on Schacht's and Juynboll's argument e silentio, that would mean that no hadiths on that topic existed at their time. In the 'Constitution' of Medina found in the Sīra of Ibn Ishāq (d. 150/767), however, we find a statement by the Prophet banning the transfer of walā'. This hadith must have therefore been altered to meet this legal agenda sometime around the 770s CE.109 If even a report that Orientalists had felt confident about was not historically reliable, then what hadith could have escaped the ingenuous designs of early Muslim scholars? 'The chance of authentic material surviving at their hands is exceedingly small,' Crone contends. 'Indeed, in purely statistical terms it is minute.' She reminds her readers of figures Juynboll had collected about the growth of the numbers of hadiths supposedly narrated by Ibn 'Abbās. If there had been this massive increase, how do we know which ones Ibn 'Abbās really transmitted? 'Under such circumstances it is scarcely justified to presume h.adīth to be authentic until the contrary has been proven.' Since this is very difficult indeed, 'then the presumption must be that no h.adīth is authentic.'110 Crone (Meccan Trade and the Rise of Islam, 1987), and the scholars John Wansbrough (Quranic Studies, 1977) and John Burton (Introduction to Hadith, 1994) also stressed the exegetical origins of hadiths. In other words, hadiths were often created by Muslim scholars to help them explain the meaning of the Quran. Early Muslims disagreed on the meanings of many Quranic verses, so the hadiths produced to explain its meaning differed too.111 Although Revisionists generally built on the conclusions of the Orientalists, Michael Cook argues that even a key concession they had made – that a Common Link was a historically reliable moment in transmission – was wrong. Cook offers a novel argument as to how Muslim hadith transmitters were able to multiply the number of narrations of a hadith and, in essence, fabricate a Common Link. Juynboll had noted how tadlīs allowed disingenuous forgers to attribute a hadith to an earlier scholar by falsely inserting his name in the isnād. Cook saw an even more prominent role for tadlīs. In a traditional society, Cook explains, 'the relevant issue is not originality, but authority: sharp practice consists in falsely ascribing my view to a greater authority than myself.'112 Tadlīs was the means by which a hadith transmitter accomplished this. As shown in Figure 9.2, if C2 hears a hadith from his contemporary C1, who had heard it from his teacher B1 from A, and so on from the Prophet, C2 does not want to appear to be deriving religious knowledge from a peer. He therefore attributes it to the generation of his teachers, citing the hadith from his instructor B2 and extending the isnād back to A, et cetera. If history preserves both C1's and C2's isnāds, then it seems as though two chains of transmission eman-ated from A, when in reality there was only one. This accounts for the fraudulent spread of isnāds. By asserting that the matns of certain eschatological hadiths clearly emerged later than the Common Link in their isnāds, Cook argued that dating by Common Links was naive.113 THE WESTERN REVALUATION The fundamental doubts that Revisionist scholarship raised about early Islamic history prompted an unprecedented defense of the trad-itional narrative of hadiths and Islamic origins on the part of certain Western scholars. In a sense, regardless of the specific criticisms Western scholars might have launched at individual hadiths, they had heavily invested in the basic outline of Islamic history provided by Muslim historians and hadith scholars. To defend the overall integrity of the hadith tradition was to defend the vision of early Islamic history on which generations of Western scholars had relied. What we are calling here 'Revaluation' scholars have challenged two main aspects of Orientalist and Revisionist criticisms of hadiths. First, they have argued that many of the basic assumptions made by these two groups are inherently inaccurate. Second, Revaluation scholars have demonstrated that earlier Western criticisms did not take into account the massive breadth and complexity of the Islamic hadith tradition. When hadiths are looked at from this more humble perspective, many of the arguments advanced by Orientalists and Revisionists lose their efficacy. This does not mean that Revaluation scholars have accepted the Sunni vision of hadiths and their authenticity outright. While rejecting the Revisionist arguments, Fred Donner and others have espoused a theory that until the time of the Umayyad caliph 'Abd al-Mālik (d. 86/705), Islam as a religious ideology was very pluralistic and allowed both Christians and Jews to follow Muhammad's teachings without abandoning their own religions.114 Nonetheless, the tone of Revaluation scholars is less combative than earlier generations. They speak more of 'dating' when we can be sure a hadith was in circulation than deeming it forged and identifying who forged it. The most basic objection to the Revisionist recasting of the whole Muslim narrative of early Islamic history is that it simply asks us to believe too much. We might find it difficult to believe that Muslims could avoid all the pitfalls of historical manipulation, propagandizing, and error in their collection of hadiths, but it seems even harder to believe that a scholarly community stretching from Spain to Central Asia and plagued by intense internecine conflicts could have orchestrated such a colossal historical conspiracy in a time of pre-modern communication. As Fred Donner states in his rebuttal of the Revisionists, it is inconceivable that the divided and decentralized early Muslim community could somehow orchestrate a 'comprehensive redaction of the [Islamic] tradition as a whole into a unified form'115 without leaving ample historical evidence. Similarly, Harald Motzki notes that the forgery of hadiths on the massive scale suggested by Orientalists and Revisionists would have been prevented by the communal oversight of hadith scholars.116 Some scholars have revaluated the standing assumptions that Orientalists and Revisionists had made about the overall authenticity of hadiths. Crone had stressed what Goldziher, Schacht, and Juynboll had implied: no hadith could be assumed to be the authentic words of Muhammad. This point is contested most overtly by David Powers, who is also an early pioneer of what can be termed the 'large-scale' identification of Common Links, or the notion that when one collects all the available transmissions of a hadith, its Common Link is much earlier than those supposed by Schacht and Juynboll. In an article about wills and bequests in early Islamic law, Powers challenged Crone's and Cook's dismissal of a famous hadith in which the Prophet tells the Companion Sa'd b. Abī Waqqās that he may only specify one third of his wealth for his daughter (the rest is automatic-ally divided by existing Islamic inheritance law). Powers argues that examining the isnāds and matn of the hadith suggests that it did in fact originate with Sa'd b. Abī Waqqās. In light of her error in evaluating the hadith, Powers concludes that Crone's statement that Prophetic hadiths should be assumed to be inauthentic 'hardly inspires much confidence.' Quite the opposite, Powers asserts that the burden of proof 'lies on those who would deny the authenticity of reports attributed to the Prophet.'117 The default assumption is that a hadith is actually authentic. Power's argument for dating this hadith at the very latest during the time of the Companions rested on an examination of all the extant transmissions of the report – something that Crone had neglected. He admits that trying to authenticate an isnād and find a Common Link is delving into the 'realm of conjecture and speculation,' but he argues that it seems very unlikely that the Sa'd b. Abī Waqqās trad-ition is forged. He collects all the narrations of the tradition, which emanate from six different individuals who all converge on Sa'd as the Common Link. Powers states that it is: either strange or a remarkable coincidence that half a dozen Successors, living in different cities of the Umayyad empire and presumably working independently of one another, adopted the same story to illustrate the origins of the one-third restriction, tracing it back to the Prophet by means of fabricated isnāds, all of which converge on one and the same Companion.118 The 'large-scale' analysis of transmission and fundamental questioning of Orientalist and Revisionist assumptions has continued in force in the scholarship of the German Harald Motzki. In a sense, Motzki is the first Western scholar to treat hadiths with the same 'respect' as Muslim hadith masters did. Like figures such as Ibn Hajar al-'Asqalānī, his judgments about hadiths depend on collecting all the available narrations of the report, not just the ones easily accessible in well-known collections. Motzki's work proffers three main criticisms of previous Western hadith scholarship. First, he argues that the argument e silentio relied upon by Schacht, Juynboll, and Crone is invalid. Second, he demonstrates that Common Links are much earlier than previously thought, dating some to the time of the Companions in the second half of the seventh century. Finally, Motzki argues that, rather than being consummate forgers of hadiths, major hadith transmitters such as al-Zuhrī and Ibn Jurayj were in general reliably passing on reports from the previous generation. Orientalists and Revisionists had relied on the premise that an early scholar's failure to employ a Prophetic hadith, or the best possible version of that hadith, in a debate in which it would have been pertinent proves that this Prophetic hadith did not exist at that time or in that form.119 Motzki argues that this assumption is both unreasonable and inaccurate. A scholar could decide not to mention a hadith because he did not feel that it actually addressed the issue at hand. Especially in the time of early legal synthesists like Abū Hanīfa and Mālik, hadiths were still distributed regionally. We already saw the example of Mālik's Egyptian student informing him of a reliable hadith about washing one's feet that Mālik, who never left the Hejaz, had never heard. As for the assumption that if a hadith was transmitted via only one isnād in the early period then it must have been forged, Motzki argues that we should not expect to find numerous isnāds from figures like the Successors back to the Prophet. Isnāds, after all, only came into use during the Successors' generation in the late 600s/early 700s. Even for those early hadith transmitters and legal scholars who provided isnāds to the Prophet at that time, it was only necessary to provide one isnād for a hadith, not a bundle as became common in the second half of the 700s and the 800s. As for Juynboll's argument that Muslims obsessively transmitted hadiths, with hundreds of students attending their teachers' dictation sessions, common sense tells us that there are many reasons why history preserved one person's transmission from that teacher instead of those of many students. Just as only a small percentage of a teacher's students go on to become teachers themselves, so it is not inconceivable that only one of a hadith transmitter's students would go on to become a transmitter as well. Juynboll had argued that only the transmission of one to many can be considered a historically documented 'moment' in the life of a hadith. But, Motzki counters, if we only consider transmission from one person to a number of people historic-ally reliable, then why do we have only a few hadith collections or Partial Common Links (Common Links that form in the transmission of a hadith after the Common Link, see Figure 9.1)? If we have established that the hadith came into existence with the Common Link, and that any hadith that actually existed must have been transmitted by all those who heard it from a teacher, then after the Common Links we should find thousands of chains of transmission in the fourth and fifth generations. The fact that we find so few Partial Common Links strongly suggests that Common Links and Partial Common Links were the exception rather than the rule in the transmission of hadiths. Their absence thus cannot be construed as proof for a hadith not existing at that time. One of Motzki's central criticisms of Schacht's and Juynboll's work is the small number of sources from which they drew hadiths in determining the Common Link. In collecting transmissions of a hadith to locate a Common Link, for example, Juynboll relied principally on the Tuhfat al-ashrāf of Jamāl al-Dīn al-Mizzī (d. 742/1341), a work that collects together all the chains of transmission for a hadith but is limited to the traditions and transmissions found in the Six Books (and a few other small books). Motzki draws on a much larger and more diverse body of sources including early ones, such as the Musannaf of 'Abd al-Razzāq al-San'ānī (d. 211/827), and later ones, such as al-Bayhaqī's (d. 458/1066) Dalā'il al-nubuwwa. By consulting a much wider range of sources than these earlier scholars, Motzki demonstrates that the Common Links for the hadiths he analyzes actually belong to the time of the Companions in the second half of the seventh century. Motzki lays out his rebuttal of Schacht's and Juynboll's Common-Link-as-forger argument most clearly in an article devoted to studying the hadiths related to the Prophet's order that a prominent Jewish leader in Khaybar, Ibn Abī Huqayq, be assassinated. By gathering together a tremendous array of chains of transmission from a wide variety of sources, Motzki demonstrates that this hadith has not one Common Link but several who were working independently and thus must have relied on some earlier common source. In the case of the killing of Ibn Abī Huqayq, Motzki concludes that the common link transmitters of hadiths relating to the event probably received their reports no later than the last third of the seventh century.120 The hadith was circulating during the time of the Companions. Motzki's 'large-scale' analysis of hadith transmission is based on a method of analyzing the isnād and matn together (termed isnād cum matn analysis). He explains that this process relies on three premises: 1 Variants of a tradition are (at least partially) the result of a process of transmission. 2 The isnāds of the variants reflect (at least partially) the actual path of transmission. 3 If variant texts (matns) of a tradition emanating from the same common link are in fact similar enough, then it seems to be an authentic moment of transmission. If they are not similar, this is the result of either carelessness or intentional manipulation of the material.121 In order to determine whether the basic information found in the text of the hadith originated from before a Common Link, you must see if different Common Links all have the same basic matn. This requires a two-step process: 1) analyzing the elements of the different matn variants from all the chains of transmission emanating from one Common Link; 2) comparing the conclusions about the common material from that Common Link to the matn elements of other Common Links.122 One must then ask whether the differences between the versions of the matn from the two Common Links are significant enough to preclude the possibility that one copied from the other and then provided his hadith with a different isnād.123 If two variants of the same text from two separate Common Links are too disparate to be dependent on each other, then they must stem from an earlier common source. In order to verify this conclusion, one must determine whether variants on the common matn correlate with the chains of transmission. In other words, do the variants of the common story (matn) match the isnād tree?124 We can demonstrate this method of isnād cum matn analysis with a famous hadith stating that God descends at some point in the night to answer prayers (see Figure 9.3). Strictly speaking, isnād cum matn analysis must take into consideration all the extant transmissions of a hadith. Since that would be far too time-consuming for our purposes, we will only focus on those narrations that yield the sort of benefit associated with this type of analysis. In particular, we will look at two narrations of the hadith, one from Abū Hurayra and one from another Companion, Abū Sa'īd al-Khudrī. Figure 9.3 Isnād/Matn Analysis We find the narration of Abū Hurayra recorded earliest in the Muwatta' of Mālik, which means that we know that the hadith was in existence at the very latest during the mid eighth century when Mālik was writing. Mālik's fellow student of al-Zuhrī, Ma'mar b. Rāshid, had this transmission as well as the other version from Abū Sa'īd al-Khudrī. Examining, the two matns, we find that they contain the same general tradition but also feature noticeable differences. Matn 1, for example, states that God descends in the last third of the night, while Matn 2 says He descends after the first third. Matn 2 also includes the unique wording 'God bides His time.' Since we know the tradition existed with Ma'mar, but the differences between his two versions of the hadith preclude him having copied one from the other, he must have obtained the Abū Sa'īd version from an earlier source other than al-Zuhrī. If al-Zuhrī's source and Ma'mar's second source (presumably Abū Ishāq al-Sabī'ī) both had two different versions of the same general hadith, they must have received them from a common source, especially as Abū Ishāq was from Kufa and al-Zuhrī from the Hejaz. Since al-Zuhrī and Abū Ishāq, both Successors, died in 742–3 CE and 744–6 CE respectively, their common source must have lived in the late seventh century, which demonstrates that the hadith was in existence during the time of the later Companions. One of the key sources that Motzki uses in his investigation is the Musannaf of 'Abd al-Razzāq al-San'ānī (d. 211/827). In a series of articles in the early 1990s, Motzki used the Musannaf to prove that Schacht's conclusions about the reliability of legal hadiths were tainted by the narrow range of sources he consulted and a hypothesis-driven analysis by which Schacht judged the provenance of early legal material based on flawed assumptions about the nature of early Islamic legal scholarship. In one article, Motzki takes up the material that 'Abd al-Razzāq included in his Musannaf through the well-known isnād of Ibn Jurayj (d. 150/767) the famous Meccan Successor 'Atā' b. Abī Rabāh (d. 114/732). Motzki argues that both 'Abd al-Razzāq's and Ibn Jurayj's material and their manner of presenting it exhibits two startling characteristics that dispel the likelihood that they forged or intentionally misrepresented reports they transmitted. First, the characteristics of transmissions via the isnād are entirely consistent both in their form and content. Thus, both 'Abd al-Razzāq and his source Ibn Jurayj always use the term 'I heard it from (sami'tu)...' for some of their sources, while they use 'on the authority of ('an)' consistently for others. If either of these authorities were 'back projecting' their own legal views on to earlier authorities, Motzki argues, it is improbable that they could have maintained such formal consistency in their forgery.125 Second, 'Abd al-Razzāq admits to not knowing the exact origins of some of the hadiths in his collection, and Ibn Jurayj often admits to not understanding either the meaning or the wordings of the reports he transmits.126 Moreover, in his narrations from 'Atā' b. Abī Rabāh, Ibn Jurayj sometimes posed questions directly to this scholar and sometimes heard his opinions second or even third hand. Including less direct transmissions when he could have easily claimed to have heard 'Atā' first hand suggests that Ibn Jurayj was forthcoming about such transmissions.127 Based on this evidence, Motzki argues that 'Abd al-Razzāq and Ibn Jurayj both faithfully transmitted the material they received. Since there is thus little likelihood that the hadiths narrated by Ibn Jurayj from Atā' b. Abī Rabāh were forged, they can be seen as authentic representations of Muslim legal scholarship in Mecca in the late seventh and early eighth centuries.128 In another 1991 article, Motzki continues to use the Musannaf of 'Abd al-Razzāq as a tool to correct Schacht's conclusions about early Islamic legal hadiths, in particular legal material ascribed to the famous al-Zuhrī. Motzki compares the legal hadiths narrated by al-Zuhrī's students Ma'mar b. Rāshid and Ibn Jurayj from their teacher with material found in the book of another of al-Zuhrī's students, Mālik. By proving that both the hadiths from Ma'mar/Ibn Jurayj and Mālik came from a common source, presumably al-Zuhrī, Motzki suggests that material attributed to al-Zuhrī actually came from him. Especially in the case of Ma'mar and Ibn Jurayj, their narrations bear no signs of intended forgery. These scholars drew on very diverse sources, and they readily transmitted hadiths or scholarly opinions that disagreed with their own stances. If they were using these transmissions only as a means to promote their own legal agenda, why would they transmit reports that disagreed with them? Motzki devotes special attention to a bizarre report that al-Zuhrī attributes to one of the Prophet's Companions who allowed grown men to become related to women by breast-feeding from them. By establishing the transmission from al-Zuhrī and then showing that the material that al-Zuhrī reported was in itself compiled from several sources, Motzki argues that the Common Link for this report is in fact the Companion who supposedly said it in the second half of the seventh century. That al-Zuhrī personally disagreed with the Companion ruling he transmits (he did not approve of the practice of grown men suckling) testifies to his integrity as a transmitter.129 CONCLUSION: QUESTIONS ABOUT ASSUMPTIONS Motzki raises some other interesting questions about the assumptions made by Schacht and Juynboll, assumptions that, I think, we can trace back to the Historical Critical Method itself. Extreme skeptics of the hadith tradition are motivated by the historical-critical approach of the Western tradition, which asks whether we should believe what historical sources tell us. However, sometimes doubting these sources obliges us to believe things more fantastical than simply accepting that the source might be authentic. Juynboll assumes that all 'diving' chains of transmission, all corroborating chains, and in fact any chain of transmission that does not emanate from a Common Link are forged (see Figure 9.1). But why? In the example of the hadith of God's descent at night, the only Common Link is the Companion Abu Hurayra. There are seven other chains of transmission through other Companions (not listed in Figure 9.3); are we to suppose that all these other chains coming from the Prophet, via different Companions, all with slight variations in the matn that are dispersed with total consistency among these different chains, are all fabricated? All this in a period of a hundred and fifty years (about the time that the earliest surviving written source for this hadith, the Muwatta', was produced) within a circle of scholars who exerted a great deal of effort to prevent material from being forged wholesale about the Prophet? It seems more likely that the Prophet actually said that God descends at night to answer men's prayers. As Motzki points out, there is a certain a priori doubt about the reliability of the Muslim hadith tradition that may be totally groundless. Western historians are of course totally right to point out the suspicious anachronism in a hadith in which the Prophet says, 'If you see Mu'āwiya on my pulpit, kill him,' or the even more outrageous hadith of 'There will be in my community a man named Muhammad b. Idrīs [al-Shāfi'ī], and the strife he brings will be worse than Satan.' But prominent Muslim hadith critics like Ibn 'Adī, al-Jawzaqānī, and al-Dhahabī also considered the hadith about Mu'āwiya to be unreliable or fabricated outright, and the hadith condemning al-Shāfi'ī was used by Muslim scholars as a textbook example of forgery.130 Even though many Muslim scholars considered them unreliable, the hadiths condemning the Qadarites (qadariyya) appear in collections like the respected Four Sunan. Certainly, it seems that the proper name Qadarite did not develop for over a century after the death of the Prophet.131 But jumping to dismiss these hadiths as forgeries due to the anachronism of the Prophet 'foretelling' this sect's emergence is hasty. Western scholars might not accept that the Prophet could know the future, but the Quran clearly engages the questions of free will and predestination. Some Muslims in Muhammad's time could well have angered him by advocating the idea that God did not control human actions, so it is not unreasonable that he might have warned them against this. Crucially, for every hadith in which the Prophet condemns the Qadarites by this proper name there is a corresponding, non-anachronistic narration in which he refers to them as 'the people of qadar' or 'those who disbelieve in qadar.' In fact, these non-anachronistic narrations are the most reliable ones according to Muslim scholars. What seems like a clear case of anachronism to Western scholars might actually be a case in which the Prophet condemned an existing heresy, then some later transmitters of those hadiths lazily replaced 'the people of qadar/those who disbelieve in qadar' with the conventional label Qadarite as it had emerged in their time.132 Western critics from Goldziher onwards rebuked Muslim hadith scholars for not taking the contents of a hadith into consideration when analyzing its authenticity. But as we have seen, Muslim critics like al-Bukhārī did in fact use the contents of hadiths to prove that they were unreliable, although their degree of skepticism never approached that of the HCM. Certainly, Muslim hadith critics differ from modern Western criticism in that they believe that the Prophet could know the future, but perhaps Western scholars could benefit from their cautious approach. Western reasoning for why the hadith about visiting the three mosques must be forged rested on the fact that it seemed to promote an Umayyad agenda and that al-Zuhrī, who was associated with the Umayyad court, is in the isnād.133 But there are other early isnāds for this hadith that do not have al-Zuhrī in them.134 Should we reconsider our conclusion or assume, quite without reason, that these other isnāds were forged as well? The Al-Aqsa mosque is mentioned in the Quran, so is it so inconceivable that the Prophet would order his followers to pay special attention to it along with the Haram Mosque in Mecca and his mosque in Medina? There is a certain 'chicken and the egg' logic to the Western approach to the reliability of hadiths. Goldziher and others have regularly criticized the hadith, considered sahīh by Muslims, 'When you see the black banners approaching from Khurasan, go to them, for indeed the Messiah (mahdī) is among them,' which they consider to be a product of Abbasid revolutionary propaganda (the Abbasids both had black banners and emerged from Khurasan).135 But we must accept the fact that Muhammad, prophet or not, might actually have acted like a prophet and prophesied occasionally. Did the Abbasids forge this hadith about the black banners and the Mahdī, or did they take advantage of an existing hadith and simply tailor their banners to fit the messianic image that the Prophet had actually described? Looking outside the Islamic tradition, the Old Testament Book of Zechariah reads, 'Rejoice greatly, O Daughter of Zion! Shout, Daughter of Jerusalem! See, your king comes to you, righteous and having salvation, gentle and riding on a donkey, on a colt, the foal of a donkey' (Zechariah 9:9). Does the fact that the Gospels describe Jesus entering Jerusalem on a colt or donkey (Mark 11:1–11; Matthew 21:1–4) mean that Christians made up this part of the Book of Zechariah to bolster the case for Jesus being a messianic figure (we know this is not true since the Book of Zechariah predates Christianity)? Or did Jesus really enter Jerusalem (not unlikely) riding the transport of his day – a donkey (not unlikely) – an event that the Gospel writers then described in the language of Old Testament scripture to show how Jesus' life was part of Old Testament prophecy being fulfilled? Taken further, the entry of the Quaker James Nayler into the English town of Bristol in 1656, riding on a donkey with women strewing fronds before him and singing 'Holy, Holy, Holy', obviously does not mean that Quakers concocted the Gospel story. Nayler was simply casting himself in the image of Christ as portrayed in scripture.136 Similarly, some of the apparent anachronisms found in hadiths may simply be Muslims scripturalizing their own actions and history to dovetail with statements made by Muhammad. Both Muslim and non-Muslim scholars of hadiths have agreed that there are many forged hadiths. In my opinion, explaining how this came about involves understanding the choices made by the Sunni scholarly tradition more than it does doubting the systematic effectiveness of their method of hadith criticism. In theory as well as practice, the Three-Tiered system of demanding a source, investigating its reliability and seeking out corroborating evidence is an effective way of determining the authenticity of a report. Modern reporters, after all, employ a similar method. Juynboll and Cook cited the practice of tadlīs as the loophole by which hadiths were attributed to major transmitters or equipped with additional isnāds. Juynboll states that tadlīs 'was hardly ever detected.'137 But Muslim hadith scholars from the mid eighth century onward were obsessive about identifying which transmitters lapsed into tadlīs and when. Shu'ba (d. 160/776) said that 'tadlīs is the brother of lying' and studied the transmissions of his teacher Qatāda b. Di'āma closely to know when he had heard a hadith directly from the person he was citing and when it was unclear if there was an unspecified intermediary. Yahyā b. Sa'īd al-Qattān (d. 198/813) made sure to identify tadlīs even when it was done by as revered a figure as Sufyān al-Thawrī. Later, master critics like 'Alī b. al-Madīnī (d. 234/849), al-Husayn al-Karābīsī (d. 245/859), and others wrote multivolume books identifying the names of those who committed tadlīs and the degree of their laxity.138 Juynboll states that the critical method of Muslim hadith scholars did not take into account the possibility that isnāds were fabricated wholesale. But the intensive focus on finding corroboration in order to evaluate a transmitter was aimed at isolating those individuals who cited isnāds not backed up by other students of the same teacher. If a transmitter was making up isnāds wholesale, he would be identified as someone who 'is not corroborated (lā yutāba'u 'alayhi)' or narrates 'unacceptable (munkar)' hadiths. As we discussed in chapter 2, the number of hadiths transmitted by Ibn 'Abbās appears to increase incredulously only when we forget to distinguish between the relatively small number that Ibn 'Abbās actually heard from the Prophet and those in which he said 'the Prophet said...' leaving out the older Companion who had actually told him the hadith. Clearly, Muslim scholars' rulings on the reliability of individual hadiths cannot be accepted without careful examination. But, as Motzki and others have shown, the classical Islamic method of filtering out forged hadiths was much more effective than earlier scholars like Goldziher and Juynboll have believed. However, Sunni scholars only chose to apply their critical methods some of the time. Masters of early Sunni hadith criticism such as Sufyān al-Thawrī, Ibn al-Mubārak, Ibn Hanbal, Ibn Ma'īn, and Ibn Abī Hātim al-Rāzī all stressed that they dealt stringently with the isnāds of hadiths dealing with law and dogma but were lax with material concerning history (maghāzī), the virtues of people or acts (fadā'il), pious preaching (wa'z), the end of days (malāhim), good manners, and the meaning of Quranic terms (tafsīr). As Abbott stated, this material easily passed through the hadith scholars' critical filters. These were the doors that Sunni scholars left open for forged material. Al-Tirmidhī's collection offers a useful example, since he alone provided his own ratings for each hadith in his book. In chapters dealing with core legal topics, only a relatively small percentage of hadiths suffer from some lack or corroboration (gharīb): for the chapters on tithing (zakāt) and fasting (sawm), it is 17%. His chapter on inheritance (farā'id) has only 7%. Al-Tirmidhī's chapters on non-legal matters, however, have a much larger percentage of hadiths that the author himself acknowledges as problematic: apocalyptic strife (fitan) – 35%; the virtues of various early Muslims (manāqib) – 52%; pious invocations (da'awāt) – 50%; and manners (ādāb) – 27%. If corroboration was the keystone of Muslim hadith criticism, then al-Tirmidhī certainly dropped his critical guard in the non-legal chapters in comparison with legal ones. It is unfortunate that many of the areas that Western scholars consider the most important subjects of study – political history, apocalyptic visions, and Quranic exegesis – were simply not the priorities of Sunni hadith scholars. It is possible that it was prioritization of law over other areas that led to the inclusion of large numbers of unreliable hadiths in Sunni collections, not the failings of Sunni hadith-critical methods. SUGGESTIONS FOR FURTHER READING A great deal has been written about the Authenticity Question. Students interested in further reading would be best served by consulting the scholarly works cited in this chapter and its notes as the next step in examining the topic. In particular, Harald Motzki's digests of the various Western approaches to dating and evaluating hadiths in his article, 'Dating Muslim Traditions: a Survey,' Arabica 52, no. 2 (2005): 204–253, and his introduction to the edited volume on hadiths [H.adīth: Origins and Development, ed. Harald Motzki (Aldershot: Variorum, 2004), xiii–liii], are extremely useful surveys. A more recent survey of the field is Andreas Görke, Harald Motzki, and Gregor Schoeler, 'First Century Sources for the Life of Muh.ammad? A Debate,' Der Islam 89, no. 1 (2012), pp. 2–59. The H.adīth: Origins and Development volume also includes influential pieces on the Authenticity Question from a number of scholars not mentioned in this chapter and translated from their original languages into English. Although it is slightly dated, the Guide to Sira and Hadith Literature in Western Languages, ed. Munawar Anees and Alia N. Athar (London: Mansell Publishing, 1986) is also useful. Myron Gilmore's Humanists and Jurists (Cambridge: Belknap Press, 1963), Edgar Krentz's The Historical Critical Method (Philadelphia: Fortress Press, 1975), Anthony Grafton's Forgers and Critics (Princeton: Princeton University Press, 1990), Owen Chadwick's marvelous The Secularization of the European Mind in the 19th Century (Cambridge: Cambridge University Press, 1975), Klaus Scholder's The Birth of Modern Critical Theology, trans. John Bowden (Philadelphia: Trinity Press, 1996), Hans Frei's The Eclipse of Biblical Narrative (New Haven: Yale University Press, 1974) and Ernst Troeltsch's essay 'Historical and Dogmatic Method in Theology' in Religion in History, trans. James A. Luther and Walter Bense (Minneapolis: Fortress Press, 1991) are very useful introductions to the Historical Critical Method. For more on European Orientalism and the study of Islam, see Ahmad Gunny, The Prophet Muhammad in English and French Literature 1650 to the Present (Islamic Foundation, 2010); Avril Powell, Scottish Orientalists and India: The Muir Brothers, Religion, Education and Empire (Boydell, 2010); and Suzanne Marchand, German Orientalism in the Age of Empire (Cambridge University Press, 2009). ENDNOTES 1 Expanding on Marshall Hodgson, The Venture of Islam, vol. 1, p. 40. 2 Joseph Massad, Islam in Liberalism, pp. 65–73. See http://news.bbc.co.uk/2/hi/europe/7264903.stm.; http://blogs.reuters.com/faithworld/2008/03/07/turkey- explains-revision-of-hadith-project/ (last cited July 2016). 3 Al-'Ajlūnī, Kashf al-khafā, vol. 1, p. 12; al-Makkī, Qūt al-qulūb, vol. 1, p. 177. 4 Lord Acton, A Lecture on the Study of History, pp. 40–42. 5 Leopold von Ranke, Sämtliche Werke (1868–90), vol. 33, pp. v–viii. 6 For example, twelfth-century paintings of Gospel scenes in the Swiss church of Zillis show characters dressed in medieval clothes; Rosalind and Christopher Brooke, Popular Religion in the Middle Ages, p. 137; Myron P. Gilmore, Humanists and Jurists, pp. 1–10. 7 Cicero, The Nature of the Gods, pp. I:60–62, 71–73; Petrarch, The Secret, pp. 68–69. 8 Eugene F. Rice, Jr. and Anthony Grafton, The Foundations of Early Modern Europe, p. 82. 9 This verse reads: 'And there are three that bear record in heaven, the Father, the Word and the Holy Ghost: and these three are one...' King James Bible 1 John 5:7–8. Only four Greek manuscripts mentioned this famous 'Johannan comma,' and all were historically late; Jerry Bentley, Humanists and Holy Writ, pp. 45, 152–153. 10 Klaus Scholder, The Birth of Modern Critical Theology, p. 67; Travis Frampton, Spinoza and the Rise of Historical Criticism of the Bible, pp. 208–216. 11 Peter Gay, ed., Deism, pp. 72–77. 12 Hans Frei, The Eclipse of Biblical Narrative, pp. 25–26. 13 Scholder, Birth of Modern Critical Theology, pp. 37–40. 14 Benedict Spinoza, Theological-Political Treatise, pp. 170–171. 15 See for a version of this, al-Khatīb al-Baghdādī, Tārīkh Baghdād, vol. 6, p. 115. 16 F. A. Wolf, Prolegomena to Homer, p. 233. 17 Voltaire, Essai sur les Moeurs, p. 1:288. 18 Frei, Eclipse of Biblical Narrative, pp. 56–57, 162; Robert Morgan and John Barton, Biblical Interpretation, p. 48. See also Pico's (d. 1494) Oration on the Dignity of Man. 19 Robert Morgan and John Barton, Biblical Interpretation, p. 47; Thomas Howard, Religion and the Rise of Historicism, p. 34. 20 Howard, Religion and the Rise of Historicism, pp. 2, 12–13. 21 Voltaire, Essai sur les moeurs, p. 1:288. 22 Mullā 'Alī al-Qārī, al-Asrār al-marfū'a, p. 407. 23 Edward Gibbon, The Decline and Fall of the Roman Empire, vol. 1, p. 186. 24 Polybius, The Histories, p. I:14. 25 John Herman Randall, The School of Padua and the Emergence of Modern Science, pp. 18, 46–47. 26 Livy, The Early History of Rome, p. 3:1. 27 Herodotus, The Histories, p. II:120. 28 J. H. Brumfitt, Voltaire, Historian, p. 103. 29 Ernst Troeltsch, 'Historical and Dogmatic Method in Theology,' pp. 13–14; W. Von Leyden, 'Antiquity and Authority: A Paradox in the Renaissance Theory of History,' p. 488. 30 The scholar al-Kirmānī (d. 786/1384) said that it is an essential belief in Islam that there was no 'evil (sharr)' in the time of the Prophet; Ibn Hajar, Fath, vol. 13, p. 26. 31 Bart D. Ehrman, The New Testament, pp. 204–205; Arnaldo Momigliano, Studies in Historiography, p. 21. 32 Norman Perrin, What Is Redaction Criticism?, p. 16. 33 Voltaire, La Philosophie de l'Histoire, p. 121. 34 Suzanne Marchand, German Orientalism in the Age of Empire, pp. 157, 174, 183–184, 187; Nöldeke's Geschichte des Qorans has been translated as The History of the Qur'ān, trans. Wolfgang Behn (Leiden, Brill, 2013). 35 William Muir, The Life of Mohamet, p. xxxvii. 36 Ibid., pp. lxviii, lxxi. 37 Ibid., p. xlii. 38 Ignaz Goldziher, Muslim Studies II, pp. 19–22. Goldziher's German original, Mohammedanische Studien, was published in 1889–1890. 39 Goldziher, Introduction to Islamic Theology and Law, p. 40. 40 Goldziher, Muslim Studies II, pp. 22–23. 41 Ibid., p. 143. 42 Ibid., p. 40. 43 Ibid., pp. 44–45. 44 Ibid., p. 52. 45 Ibid., p. 44–47; Lecker, 'Biographical Notes on Ibn Shihāb al-Zuhrī.' 46 Goldziher, Muslim Studies, p. 75. 47 Ibid., pp. 38–40. 48 Ibid., p. 77. 49 ibid., pp. 79–85. 50 Ibid., p. 99. 51 Ibid., p. 121. 52 Ibid., pp. 95–97; Sunan Abī Dāwūd: kitāb al-fitan, bāb al-nahy 'an al-sa'ī fī al-fitna. 53 Goldziher, Muslim Studies, p. 122. 54 Ibid., p. 108. 55 Ibid., pp. 113–114. 56 Ibid., pp. 123–124. 57 Ibid., p. 52. 58 Ibid. pp. 74–75. 59 Ibid., p. 18. 60 Ibid., pp. 55–56. Al-Bayhaqī and Ibn Khuzayma know of no one 'from the east to the west' who corroborates this report. A similar report, also considered unreliable, is in the Musnad of Ibn Hanbal, vol. 2, p. 367. See al-Suyūtī, Miftāh al-janna fī al-ihtijāj bi'l-sunna (Beirut: Dār al-Kutub al-'Ilmiyya, 1987), p. 39; Ibn Qudāma, al-Muntakhab min al-'Ilal li'l-Khallāl (Riyadh: Dār al-Rāya, 1998), p. 145. 61 Ibid., pp. 140–141. 62 Schacht, 'A Revaluation of Islamic Tradition,' pp. 146–147. 63 Ibid., p. 151. 64 Ibid., p. 149. 65 Ibid., p. 151. 66 Schacht, The Origins of Muhammadan Jurisprudence, p. 13. 67 Ibid., p. 22. 68 Ibid., p. 4. 69 Ibid., pp. 165–166. 70 Schacht, 'A Revaluation,' p. 151. 71 Schacht, Origins of Muhammadan Jurisprudence, p. 157. 72 Ibid., p. 157. 73 Ibid., pp. 4–5. 74 See Schacht, Origins, pp. 39, 165; idem, 'A Revaluation of Islamic Tradition,' p. 147. 75 Schacht, Origins, p. 175. 76 Ibid., p. 166. 77 Ibid., p. 156. 78 Juynboll, Muslim Tradition: Studies in Chronology, Provenance and Authorship of Early H.adīth, p. 71. 79 Juynboll, 'Some isnād-analytical methods illustrated on the basis of several women-demeaning sayings from H.adīth literature,' in Studies on the Origins and Uses of Islamic H.adīth, p. 352. 80 Ibid., p. 353. 81 Ibid., p. 353. 82 Juynboll, Muslim Tradition, p. 98. 83 Juynboll, 'Some Isnād-analytical methods,' p. 368. 84 Juynboll, 'Nāfi', the mawlā of Ibn 'Umar, and his position in Muslim H.adīth literature,' in Studies on the Origins and Uses of Islamic H.adīth, p. 215. 85 Juynboll, '(Re)Appraisal of some Hadith Technical Terms,' p. 318. 86 Juynboll, Muslim Tradition, pp. 52, 73, 75. 87 Ibid., pp. 5, 10. 88 Ibid., pp. 72–74. 89 Ibid., p. 30. 90 Juynboll, 'Nāfi', the mawlā of Ibn 'Umar,' pp. 219, 238–239. 91 Juynboll, Muslim Tradition, p. 98. 92 Christian Troll, Sayyid Ahmad Khan: A Reinterpretation of Muslim Theology, pp. 132–134. 93 Abbott, Studies in Arabic Literary Papyri II: Qur'ānic Commentary and Tradition, pp. 31–32. 94 Ibid., p. 29. 95 Ibid., pp. 21–22, 49–51. 96 Ibid., p. 71. 97 Ibid., pp. 66, 71–72. 98 Ibid., p. 74. 99 Ibid., p. 77. 100 Muhammad Azami, Studies in Early H.adīth Literature, p. 14. 101 Ibid., p. xvi. 102 Ibid., p. 218. 103 Ibid., p. 239. 104 Ibid.; for examples, see pp. 239–242. 105 Ibid., pp. 219–221. 106 Ibid., pp. 19, 246. 107 Patricia Crone, Roman, Provincial and Islamic Law, p. 33. 108 Ibid., p. 31. 109 Ibid., pp. 32–33. 110 Ibid., p. 33. 111 Crone, Meccan Trade and the Rise of Islam, pp. 109–110; 203–231; John Burton, An Introduction to the Hadith, p. 181. 112 Michael Cook, Early Muslim Dogma: a Source-Critical Approach, pp. 107–108. 113 Cook, Early Muslim Dogma, pp. 100, 110; idem, 'Eschatology and the Dating of Traditions,' pp. 23–47. 114 Fred Donner, 'From Believers to Muslims: Confessional Self-identity in the Early Islamic Community,' pp. 9–53; idem, Muhammad and the Believers. 115 Donner, Narratives of Islamic Origins, p. 27. 116 Motzki, 'Dating Muslim Traditions: a Survey,' p. 235. 117 David S. Powers, 'On Bequests in Early Islam,' pp. 199–200. 118 Ibid., p. 195. 119 See Motzki, 'Quo vadis, Ḥadīt-Forschung?,' pp. 40–80. This has been translated as 'Whither Hadīth Studies?,' in Harald Motzki et al., Analysing Muslim Traditions: Studies in Legal, Exegetical and Maghāzī Íadīth (Leiden: Brill, 2010). 120 Motzki, 'The Murder of Ibn Abī H.uqayq,' pp. 231–232. 121 Ibid., p. 174. 122 Ibid., p. 182. 123 Ibid., p. 184. 124 Ibid., p. 187. 125 Motzki, 'The Mus.annaf of 'Abd al-Razzāq al-S.an'ānī as a Source of Authentic Ah.ādīth of the First Century A.H,' pp. 8–9. 126 Ibid., pp. 4, 11. 127 Ibid., p. 11. 128 Ibid., p. 12. 129 See Motzki, 'Der Fiqh des Zuhrī: die Quellenproblematik.' 130 Al-Jawzaqānī, Al-Abātīl, pp. 114–115; al-Dhahabī, Mīzān, p. 3:277; Ibn 'Adī, Al-Kāmil, vol. 5, pp. 1744, 1751, 1756. 131 See the Caliph 'Umar b. 'Abd al-Azīz's (d. 101/720) letter on the subject, where he refers to them as those who hold 'al-qawl bi'l-qadar'; Abū Nu'aym, Hilyat al-awliyā', vol. 5, p. 351. Compare with Mālik b. Anas referring to them as the qadariyya in his Muwatta': kitāb al-qadar, bāb al-nahy 'an al-qawl bi'l-qadar. The earliest appearance of the Qadarite hadiths is Dirār b. 'Amr (d. 200/815), Kitāb al-Tahrīsh, p. 99. 132 For the corresponding versions of these hadiths, see Sunan Ibn Mājah: introduction, bāb fī al-qadar; Musnad Ibn Hanbal, vol. 2, p. 125, etc. 133 Lecker, 'Biographical Notes on al-Zuhri,' p. 38. 134 Al-Humaydī, Al-Musnad, vol. 2, p. 330. 135 Al-Suyūtī, Al-Jāmi' al-saghīr, # 648. 136 A True Narrative of the Examination, Tryall, and Sufferings of James Nayler [London], n.p. 1657., p. 4–5. 137 Juynboll, Muslim Tradition, pp. 52, 73, 75. 138 Khatīb, Al-Kifāya, p. 2:371–378; idem, Al-Jāmi', vol. 2, p. 312. DEBATES OVER PROPHETIC TRADITIONS IN THE MODERN MUSLIM WORLD INTRODUCTION: SETTING THE STAGE FOR MODERNITY AND ISLAM In the eighteenth century, a network of interrelated economic, technological, social, and political changes began sweeping the world, beginning in England and Western Europe. Collectively known by scholars as Modernity, these forces ushered in a new phase of human history and raised inexorable questions about the nature of religion and its place in life. The challenges of Modernity have proven especially daunting for those peoples among whom it had not developed gradually before it was imposed through European colonization. Perhaps nowhere has it been felt more sharply than among Muslims. Since their confrontation with the Modern West, Muslims have faced one daunting question: if Islam is God's true religion, and Muslims God's chosen community, why are they so powerless and subordinate before the Modern West? In attempts to answer and redress this question, Muslim discourse in the modern period has found discussing the role of hadiths in Islam unavoidable. The stage for modern Muslim thought was set by two main forces: Western colonialism and indigenous Islamic movements of revival and reform. European arms quickly proved vastly superior to Muslim armies. The British East India Company had become the de facto government of several provinces of the Muslim Mughal Empire in India by 1764. In 1798 Napoleon occupied Egypt, and in 1882 the country was brought under British control. More alarming for Muslim scholars, however, was the seeming superiority of European ideas to Islamic tradition. European scientists bent to their will technologies undreamt of in Muslim lands, and European society functioned with undeniably impressive organization. The rationalism and historicism of the European Enlightenment accompanied colonial administrations, and European Orientalists soon began turning their critical gaze on the Islamic religious trad-ition. Some Muslims immediately mistrusted Orientalism and sought to rebut it. Others were convinced by elements of European thought and swayed by Western scholars of Islam. Many Muslims were confused over what elements of Modernity they should embrace and what this entailed for their faith. Whether accepted or rejected, however, European thought and the civilization it represented became a central player in modern Islamic thought. Interestingly, even before the impact of Modernity, Islamic civilization was shaken by entirely internal forces. In the mid 1700s, previously marginal parts of the Muslim world, such as West Africa, central Arabia, and India, brought forth unprecedented movements of Islamic revival and reform that would exercise tremendous influence on the whole Muslim world. These movements were driven by a sense that the Muslim community had lost its moorings in the legacy of the Prophet. It had been led astray by heretical accretions in theology and worship as well as by chauvinistic loyalty to the schools of law. Although they did not abandon the classical Islamic tradition, these movements sought to revaluate it and revive Islam's primordial greatness by breaking with taqlīd (unquestioning loyalty to existing institutions and tradition) and embracing ijtihād (independent reasoning based on the original sources of Islam – the Quran and Sunna). Many of these revivalist scholars believed that they were just as capable as classical masters like al-Shāfi'ī and Abū Hanīfa of deriving laws directly from the Quran and the Prophet's teachings. As the great revivalist scholar Ibn al-Amīr al-San'ānī (d. 1768) wrote, 'that gift of your Lord has not been made off-bounds, and the virtues that He has bestowed are not limited to those who have come before us.'1 Some of these movements were primarily scholarly, such as the reformist trend instigated in Yemen by al-San'ānī and in India by Shāh Walī Allāh (d. 1762). Others added a strong dimension of reforming Muslim society through force of arms, such as Osman dan Fodio's (d. 1817) expansionist Sokoto Caliphate in modern-day Nigeria or Ibn 'Abd al-Wahhāb's (d. 1792) militaristic Muwahhid movement (better known as Wahhābism) in central Arabia. This common mission of bypassing the rigid institutions of the Late Sunni Tradition to revive the pure Islam of the Prophet's time and purge it of later cultural or intellectual impurities pushed the hadith tradition to the forefront. What better way to return to the source of Islam's original greatness than by renewing the study of the Sunna? Praising the Sunni devotees of hadith (ahl al-hadīth) in the early Islamic period, al-San'ānī recites: They quenched their thirst by drawing from the sea of Muhammad's knowledge, They did not have those schools of law for watering holes.2 Many revivalist scholars not only demonstrated a rejuvenated interest in hadith studies, they also believed that they were just as qualified as the great Sunni hadith critics of the classical period to rule on the authenticity of hadiths. One of the interesting byproducts of the eighteenth-century movements of revival and reform was the shift of hadith studies from its medieval locus in Iran, Egypt, and Syria to the dynamic reformist regions of the Hejaz, Yemen, India, and eventually Morocco. Since the 1700s it has been Hejazi scholars like Muhammad Hayāt al-Sindī (d. 1750), Yemenis like Muhammad al-Shawkānī (d. 1834), Indians like Shāh Walī Allāh and 'Abd al-Hayy al-Laknawī (d. 1886–7), and Moroccans like Muhammad b. Ja'far al-Kattānī (d. 1927) who have pioneered new creative ground in hadith studies. Precisely why these similar but often unconnected movements arose at this time in distant corners of the Muslim world remains a mystery. Perhaps the Late Sunni Tradition, with its strict loyalty to schools of law, elaborate speculative theology, and Sufi brotherhoods had simply become too entrenched for Islam's inherent antipathy towards institutions of religious authority. When one considers that some late Sunni scholars like the Egyptian al-Sāwī (d. 1825) had asserted that anyone who did not follow one of the four Sunni schools of law was misguided, potentially an unbeliever, even if they followed clear indications from the Quran or Sunna, it seems easy to understand why some Muslims might conclude that reform was necessary.3 THE MODERN DEBATE OVER HADITHS: FOUR MAIN APPROACHES In light of these forces, a thoughtful Muslim living in early twentieth-century Cairo, Istanbul, or Delhi might have pondered the following questions: Islam is clearly in a state of decline, whether in comparison to modern Europe or in relation to its own original greatness. But is this due to some inherent failing in the Islamic intellectual trad-ition or because Muslims have lost touch with Islam's true nature? If one seeks to recover Islam's true nature, does one take Modernity into account or ignore it completely? Ultimately, in the attempt to understand how to live as Muslims in the modern world, what components of Muslims' historical heritage (in Arabic, turāth) should they embrace, abandon, or alter, and how does one justify these choices in a way that is authentically 'Islamic'? The hadith tradition in particular posed two major questions. In light of European historical criticism on the one hand and a revived commitment to the Prophet's authentic legacy on the other, 1) had the hadith tradition and its classical method of hadith evaluation produced a reliable representation of Muhammad's Sunna? and 2) what should be the overall place of hadiths and the Sunna in understanding Islam? We can identify four broad approaches taken by Muslims to answering these questions: Islamic Modernism, Modernist Salafism, Traditionalist Salafism and Late Sunni Traditionalism. Although this four-fold division is useful, it is not watertight. Some thinkers sway between schools or change their positions depending on context. Also, some of these names are nomenclatures that I have chosen and have not actually been used by their adherents. Nonetheless, this division is helpful for understanding the complexity of Islamic thought in the modern period. Not surprisingly, Islamic responses to Modernity arose earliest in those areas earliest exposed to Europe, particularly India, Egypt, and Ottoman Istanbul. ONE: ISLAMIC MODERNISTS AND THE 'QURAN ONLY' MOVEMENT Beginning in the second half of the nineteenth century, some Muslim scholars began challenging core components of the pre-modern Islamic tradition. Some concluded that the hadith tradition was not at all a reliable representation of Muhammad's message. A few of these thinkers went so far as to reject altogether the authoritativeness of the Prophet's precedent. We can label this overall trend as Islamic Modernism, which is characterized by a radical reconsideration of classical Islamic beliefs. An early, well-known Modernist was Chirāgh 'Alī (d. 1895), an Indian who worked in the civil service of the local ruler of Hyderabad. 'Alī was a close associate of the pivotal Islamic thinker of South Asia in the modern period, Sir Sayyid Ahmad Khan (d. 1898), whom we will discuss shortly. 'Alī rejected all sources of Islamic law and dogma except the Quran, and called for a reinterpretation of Islamic law based on the ideals of humanism (such as rationalism, science, and non-religiously based ethics). Limiting the sources of Islamic law to the Quran was not a hindrance to the Shariah, he argued, since the Prophet had expected his community to revise their law occasionally in accordance with the needs of the times. Influenced by the revivalist movement of Shāh Walī Allāh, he embraced ijtihād. Ijmā' (consensus), he felt, had never been an acceptable source of law, since 'Alī argued that even Ibn Hanbal had been skeptical about the validity of claims of ijmā' (Ibn Hanbal is often quoted as denying any actual occurrence of ijmā').4 'Alī accepted the criticism of hadiths published by Orientalists like Muir and Goldziher (see chapter 9) and felt that the hadith corpus was unreliable. Interestingly, it was 'Alī's desire to defend Islam against Orientalists that led him to this stance. He was disturbed by Christian missionaries and European polemicists claiming that Islam was fossilized and replete with irrational beliefs, such as those found in hadiths.5 Abandoning hadiths was necessary for saving the rest of Islam's message. Without the hadith corpus, 'Alī could offer unprecedented alternatives to beliefs that a modern mindset might consider backward. The jinn, a group of beings that the Quran mentions ambiguously as being composed of fire but that hadiths characterize as beings who inhabit earth in tandem with humans, he argued were actually another Semitic tribe.6 'Alī's thought was continued by what became known as the Ahl-e Qur'ān (The People of the Quran) movement in India. The Ahl-e Qur'ān saw hadiths as an embarrassing travesty in Islam and argued that Islamic dogma and law should be derived from the Quran alone. The movement was started by 'Abdallāh Chakrālawī (d. 1930) and Khwāja Ahmad Dīn Amritsari (d. 1936) between 1906 and 1917 and produced several journals devoted to elaborating its ideas. Amritsari had been a student at a missionary school, and his readings in hadiths led him to conclude that many hadiths were shockingly foul and patently false. He wrote a book on the Quran in which, among other things, he tried to demonstrate how Islamic inheritance law could be derived from the Quran without any reference to hadiths.7 The next generation of the Ahl-e Qur'ān was led by Muhammad Aslam Jayrapūrī (d. 1955), who mocked the traditional science of isnād criticism as senseless 'narration worship (rivāyat parastī).' Since whole isnāds were forged, he argued, it was impossible to distinguish truth from falsehood using isnād criticism.8 His colleague, Mistrī Muhammad Ramadān (d. 1940) abandoned the idea of trying to extrapolate the labyrinthine details of Islamic law from the Quran. The holy book readily provided all the legal information Muslims needed, he argued, and anything omitted or left ambiguous was intentional – God had left humans free to use their reason in order to adapt to new times.9 In recent decades, the 'Quran only' movement has flourished amongst the middle class and elite in Pakistan, particularly through the writings of Ghulam Ahmad Parwez (d. 1985) and his Tulu-e Islam (Islamic Dawn) foundation. Although the 'Quran only' movement flourished in India and Pakistan, it flared only briefly in the Arab world. In a 1906 issue of the famous Islamic reformist journal al-Manār (The Lighthouse), the Egyptian physician Muhammad Tawfīq Sidqī (d. 1920) wrote an article entitled 'Islam is the Quran Alone (al-Islām huwa al-Qur'ān wahdahu)' in which he argued that Islam was never meant to be understood from anything other than the Quran. One key proof for this was that the Prophet did not explicitly order the recording of his Sunna, and indeed hadiths were not set down in any lasting or reliable form for over a century after Muhammad's death. How, Sidqī asked, could God ever allow His religion to depend on such a dubious source?10 What has been understood as the 'Sunna' – the detailed precedent of the Prophet – was intended only to be binding on the first generation of Muslims; 'the Prophet gave the Sunna to the Arabs.'11 After the Companions, Muslims were expected to adapt their law to circumstance according to the principles laid out in the Quran.12 Like his Indian Ahl-e Qur'ān counterparts, Sidqī attempted to demonstrate how the details of Muslim prayer could be inferred from the Quran without hadiths. Hadiths were patently unreliable in Sidqī's opinion, with the possible exception of those very few that could be considered mutawātir.13 Hadith criticism had begun too late to catch many of the forged hadiths, and as a result many reports attributed to the Prophet were actually isrā'īliyyāt, or stories from Jewish lore.14 As a doctor, Sidqī devoted special attention to hadiths that he considered incompatible with the realities of modern medicine. He notes the controversial 'Hadith of the Fly' (found in Sahīh al-Bukhārī and other collections) in which the Prophet states that if a fly has landed in one's drink one should submerge it totally 'because on one wing is disease and on the other is the cure.'15 This was not only medically unsound, argued Sidqī, but it contradicted another command from the Prophet that if a mouse fell in liquid butter it should all be poured out.16 Sidqī's writings caused such a furore in al-Manār and other publications that he quickly recanted his ideas, and they died out in the Arab world.17 Although they have not announced 'Quran only' positions as explicitly as Sidqī and the Indian Ahl-e Qur'ān, many Islamic Modernists have effectively adopted this stance. The influential modern Arab biography, 'The Life of Muhammad (Hayāt Muhammad),' by the Egyptian intellectual Muhammad Husayn Haykal (d. 1956) was based on the Quran with reference to only one hadith: the famous Mu'tazilite hadith urging Muslims to reject any hadith that contradicts the Quran!18 Haykal defended his 'Quran only' biography by saying he was using 'new critical methods' that were not allowed during classical times and writing his book 'in the modern scholarly manner.' Haykal echoed Orientalist criticisms that many hadiths were forged during the early period of sectarian and political strife and that many were fabricated merely to glorify Muhammad's miraculous powers. He therefore rejected any miracles attributed to the Prophet. Moreover, classical Muslim critics like al-Bukhārī and Ibn Hajar did not even agree on what was reliable or not.19 By far the most influential Modernist critique of the Sunni hadith tradition came from the Egyptian Mahmūd Abū Rayya (d. 1970). A disciple of the leading Syrian reformist Rashīd Ridā (see below), Abū Rayya wrote a scathing work entitled 'Lights on the Muhammadan Sunna (Adwā' 'alā al-sunna al-muhammadiyya)' (1958) in which he argued that only the Quran, reason, and unquestionably reliable mutawātir accounts of the Prophet's legacy were originally meant to be the basis of Islam. 'As for applying the term "Sunna" to what is subsumed by the hadith corpus [in general], that is a later convention.'20 Neither the Prophet nor his Companions had seen fit to record his every word, and the early jurists of Islam had followed in their footsteps by acting on the legal principles of the Sunna as opposed to random hadiths. Nothing in Islam required Muslims to read or believe the contents of hadith collections.21 Like earlier Modernists, Abū Rayya explained that early hadith critics had not paid attention to the contents of hadiths, and that outrageous reports such as 'The Devil flees, farting, when he hears the call to prayer' had been declared sahīh.22 He also echoes the criticism about the long delay between the Prophet's death and the definitive recording of hadiths – a period in which myriad sectarian and political groups forged countless hadiths. The permissibility of 'narration of hadiths by general meaning (riwāya bi'l-ma'nā)' also led to the mutation and misunderstanding of many reports. Notions that all the Companions were upstanding were patently absurd, Abū Rayya argued, since the Companions violently disagreed with one another. Although Abū Rayya built directly on the work of Ridā, his criticism of the Companions took him outside the fold of what his teacher and mainstream Sunni Islam could tolerate. Abū Rayya rejected exempting the Companions from hadith criticism, saying that 'people are people in every era, and humans have natures, appetites and agendas that do not change.'23 This attitude closely resembles the Principle of Analogy used by Western scholars, and it is no coincidence that Abū Rayya referred his readers to the works of Goldziher and other Orientalists.24 Abū Rayya's most noteworthy contribution to Modernist criticisms of hadith was his multifaceted attack on the reliability of Abū Hurayra, the single most prolific transmitter of hadiths from among the Companions. Using reports from both Sunni and Shiite books of transmitter criticism, Abū Rayya produces evidence characterizing Abū Hurayra as a gluttonous and dishonest opportunist.25 Noting how he joined the Muslim community only three years before the Prophet's death, Abū Rayya asks how Abū Hurayra could ever have heard the thousands of hadiths he claimed to transmit. Citing an early Hanafī criticism of Abū Hurayra, he argued that he was not learned in issues of ritual and law and therefore frequently mangled the meanings of hadiths he reported.26 He added that Abū Hurayra was well known to be obsessed with isrā'īliyyāt, tales from Jewish lore about earlier prophets, and that he had no compunction about attributing such tales to the Prophet. Such reports included the unacceptably anthropomorphic hadith that 'God created Adam in His image' and the dogmatically offensive report (both found in Sahīh Muslim) that Moses knocked out the eye of the angel of death when he came to take his soul.27 Abū Rayya even considers the hadith urging Muslims to visit the Al-Aqsa mosque in Jerusalem to be one of the forged isrā'īliyyāt.28 Isrā'īliyyāt proved constantly irksome to Modernists, and Abū Rayya wrote a separate 1946 article entitled 'Ka'b al-Ahbār: the First Zionist' on the early hadith transmitter and Muslim convert from Judaism, Ka'b al-Ahbār (d. c. 32/653).29 Hadiths about the Messianic mahdī figure, Abū Rayya asserts, were similarly imported from Christian lore and falsely attributed to Muhammad by figures like the Companion Tamīm al-Dārī, who was a convert from Christianity.30 Abū Rayya's book proved extremely influential in the hadith debate, in part because of the author's broad erudition and in part because the book's style is less direct and caustic – and thus perhaps more convincing – than other Modernist works. It quickly prompted at least eight indignant book-length rebuttals from traditional Muslim scholars, the most famous of which was the Syrian Mustafā al-Sibā'ī's (d. 1964) al-Sunna wa makānatuhā fī al-tashrī'al-islāmī (The Sunna and its Place in Islamic Lawmaking) (1961).31 These rebuttals generally used orthodox Sunni arguments to respond to the criticisms of Abū Rayya as well as to those of Western scholars. Al-Sibā'ī, for example, deemphasizes the late writing down of hadiths by emphasizing the extraordinary memory of the early Arabs. Abū Hurayra's ability to transmit so many hadiths despite his relatively short exposure to the Prophet was due to his tremendous devotion to the Prophet's legacy, not any unscrupulousness. Finally, books of forged hadiths (mawdū'āt) showed that hadith critics did engage in content criticism (at least after the 1300s). Other defenses against 'Quran only' arguments relied solely on faith. The Pakistani Islamic political activist Abū al-'Alā' Mawdūdī (d. 1979) contended that the Sunna was intact because 'The God who preserved his last book also arranged for the preservation of the example and guidance of his last Prophet.'32 Islamic Modernism and its 'Quran only' trend have thrived among Western Muslim scholars. Although they have not always upheld explicit 'Quran only' positions, many have ignored hadiths in their discussions of Islamic law and dogma, as is the case with the American Amina Wudud's revaluation of the traditional Islamic view of gender, and Scott Siraj al-Haqq Kugle's argument for the permissibility of homosexual relationships in Islam.33 The 'Quran only' movement has continued in Turkey, where the activist intellectual Edip Yuksel and his colleagues have published the Reformist Quran, an English translation and explanation of the holy book written without consulting hadiths.34 We should also note a Modernist who has proven extremely adept at navigating the tradition of Islamic hadith criticism in order to argue for radical reform. In her work Women and Islam, the French- educated Moroccan social scientist Fatema Mernissi (d. 2015) states her intent to 'disinter' the original message of Islam 'from the centuries of oblivion that have managed to obscure it.'35 Her heroine is the Prophet's wife, Aisha, whose criticisms of other Companions' narrations from the Prophet Mernissi sees as epitomizing the critical spirit of Islam as well as the religion's original message of female empowerment. Mernissi argues that, with the exception of a minority of hadith critics, Muslim scholarship functioned as a tool of the social and political elite, indulging 'the desire of male politicians to manipulate the sacred.'36 In order to prove this, she examines two Companions known for transmitting hadiths that Mernissi considers misogynist and unbefitting her beloved Prophet: Abū Hurayra and Abū Bakra (not to be mistaken for Abū Bakr, the first caliph). The former transmitted sahīh hadiths such as the one that women, donkeys, and black dogs break a person's prayer if they pass in front of them, and the second narrated the hadith that 'The community that entrusts its affairs to a woman will not flourish' (the first is found in Sahīh Muslim, the second in Sahīh al-Bukhārī).37 Effectively engaging in historical psychoanalysis, Mernissi uses data from books of transmitter criticism to argue that Abū Hurayra harbored a deep personal resentment towards women and that Abū Bakra produced his hadith to secure his place with the caliph 'Alī after he had defeated Aisha at the Battle of the Camel in 656 CE.38 In a brilliant turn, Mernissi shows how Abū Bakra should be excluded as a hadith transmitter according to the Muslim hadith critics' own critical standards. Mālik is reported to have said that he would not accept hadiths from someone known to have lied about any matter, and Abū Bakra was once flogged for untruthfully accusing someone of committing adultery!39 Such misogynist figures as these transmitters, upon whom the most revered Sunni collections had relied, lead Mernissi to conclude that 'even the authentic Hadith must be vigilantly examined with a magnifying glass.'40 A unique Modernist vision for the proper treatment of hadiths came from the Pakistani intellectual and University of Chicago professor Fazlur Rahman (d. 1988). He acknowledged that the criticisms of Schacht and Goldziher were 'essentially correct' and that most hadiths were not actually spoken by the Prophet.41 Where Orientalists saw deception, however, Rahman saw the creative implementation of the Islamic message. Though many of the details of the Sunna were fabricated, the concept of the Sunna was authentic. Muhammad's Sunna was not detailed case law, but rather an umbrella of behavioral norms and an interpretive process by which Muslims could adapt their law to changing circumstances.42 This had been the practice of the Partisans of Reason (ahl al-ra'y), who had employed the legal reasoning learned from Muhammad, the original exemplar of Islam, to elaborate law in new situations. This was also why so many early hadiths were actually 'forgeries' – these early jurists had phrased the conclusions they reached using the interpretive process of the Sunna in the words of Muhammad. The Sunna was thus 'very largely the product of the Muslims themselves,' who acted organic-ally on the principles inherited from the Prophet through the mental act of ijtihād in order to form new law. Consensus (ijmā') was the acknowledgment of the community that a newly developed part of the Sunna was authoritative.43 For Rahman, the hadith tradition had been a creative process in which jurists had channeled the Prophet's authority to guide their community. Hadiths like those warning about the deterioration of Muslims' faith as time went on were designed to steer the community towards certain laudable goals.44 Yes, the hadiths in al-Bukhārī's and Muslim's Sahīhayn that predict the future were clearly fabricated by Muslims after the death of Muhammad. But they were not sinister forgeries, and the hadith corpus was not a conspiratorial web of lies, since participants in the hadith tradition never saw themselves as engaged in a strict process of recording history.45 Unfortunately, Rahman continues, the formation of the hadith canon and the literal submission to hadiths introduced by al-Shāfi'ī turned the dynamic Sunna into a petrified and unchanging set of rules. Rahman states that hadiths need to be reexamined critically according to historical criticism in order to determine if they were really part of the original Sunna, 'whose very life blood was free and progressive interpretation.'46 Once this is determined, modern Muslims can pick up with new interpretation where the jurists left off when the Sunna was frozen in the ninth century. Rahman acknowledges the value of isnād criticism in detecting forgeries. This method, however, can only tell us if a hadith is forged. It cannot ensure that it is not forged. For that we must employ modern historical criticism.47 One of the most dynamic Islamic modernist thinkers in South Asia since Rahman has been his fellow Pakistani Javed Ahmad Ghamidi. Trained as a youth in a Hanafī madrasa, Ghamidi later studied English literature and Islamic philosophy at university. He then became a disciple of Amin Ahsan Islahi (d. 1997), one of the most intellectually creative modern Muslim scholars of the Quran. Ghamidi has carried on and advanced Islahi's legacy, developing a novel method for reading the holy book that sees the Shariah as an eternal reality that must be clearly distinguished from Muslims' applications of its message in time and context – even its application by the Prophet. Certain aspects of Islamic law are thus, Ghamidi argues, meant to apply only in the Prophet's time, such as the death penalty for apostasy. Like Khan and other Islamic modernists (as well as Modernist Salafis, see below), Ghamidi enshrines the Quran as the primary source of Islamic law and dogma by reviving aspects of the classical Mu'tazilite and early Hanafī traditions. The Quran is thus unquestionably epistemologically and hermeneutically more powerful than the Prophet's Sunna, which Ghamidi trims down significantly. For him, the Sunna does not include the Prophet's optional acts of worship, his statements about science or nature, and it only pertains to 'religious,' not worldly, affairs. For Ghamidi, the Sunna is also qualitatively distinct from the hadith corpus, which he ranks as markedly lower in his epistemological and hermeneutic hierarchy. The Sunna can be known only through a combination of massively transmitted (mutawātir) hadiths and perpetual practice amongst the Muslim community. It cannot be known by isolated (āhād) hadiths, which should only be accepted if they concur with the Quran, the Sunna, reason and observed facts.48 TWO: MODERNIST SALAFĪS AND OPPOSING THE WEST The Salafī movement was the name that many of the adherents of this school of thought derived from the Salaf, or the pious early generations of Muslims, from whose example these reformists hoped to reconstitute Islam's original purity. To a large extent, the eighteenth-century movements of revival and reform were all Salafī in their approach; for them the early Muslim community represented their hopes for the future. It was powerful, dynamic, and preceded what many reformists viewed as the superstitions, blind loyalty to tradition, and the havoc wreaked on medieval Islam by foreign cultural accretions such as Greek logic and Persian mysticism. In terms of their thought, by the mid 1800s these Salafī movements had split into two main branches, which we will call the Modernist and Traditionalist Salafī groups. These two branches interacted with and affected one another, for both shared a common vision of recapturing the early Islam of the Salaf. But they proposed different means and had opposing attitudes towards Modernity. The Modernist Salafī trend has been the most influential and vigorous of the modern Muslim schools of thought. Nonetheless, it was essentially a response to Modernity. Its proponents looked back into history at the pure Arab Islam of the Prophet's time, but what they re-created by drawing unsystematically from the rich tradition of Islamic civilization was an Islam tailored to fit the modern world. Arguably the most influential Modernist Salafī was the Indian Sir Sayyid Ahmad Khan (d. 1898), whose thought ultimately aimed at the twin goals of the rationalization of Islamic dogma and 'the liberalization of Islamic law.'49 An employee of both the British East India Company and the Mughal dynasty, after the Indian rebellion of 1857 Khan remained fiercely loyal to the British. He believed that only by reconciling with Modernity and Western rule could Islam survive. In 1868 he adopted a Western lifestyle, and in 1875 he successfully founded the Anglo-Muhammadan Oriental College at Aligarh in India, the most successful center of reformist Islamic education (today called Aligarh Muslim University).50 Khan authored numerous books, including a commentary on the Bible and a commentary on the Quran, and established an influential Urdu-language journal called Tahdhīb al-akhlāq. In general, Khan followed Shāh Walī Allāh's reformist rejection of taqlīd and innovations in Islamic belief and worship.51 He also infused his works with distinctly modern notions, such as an acceptance of Darwinian evolution and the position that nothing in the Quran can be interpreted as contradicting the laws of nature. 'If the word [of the Quran] is not according to the work [the law of nature], then the word cannot be the word of God.'52 Of course, he notes, humans have only begun to understand the laws of nature!53 He also rejected claims of ijmā' as convincing proof in scholarly discourse.54 In the 1860s Khan encountered Muir's criticisms of hadiths, and he was immediately alarmed at this unsuspected attack on Islam from its external foes. In 1870 he began a refutation of Muir's book, although he also accepted many Orientalist criticisms.55 He acknowledged, for example, that classical Muslim scholars had not performed proper content criticism of hadiths (he contends that they had intended this to be done by later scholars) and that the historical lag in writing down hadiths had resulted in copious forgeries, many concocted to sanctify and glorify Muhammad. He also noted that the permissibility of 'narration by general meaning' had led to the unintentional alteration of many hadiths.56 Khan struggled with the solution to the hadith problem throughout his life, but he consistently affirmed that the hadith corpus had to be reexamined according to a new method of content criticism that he drew partly from the Hanafī school of law and Mu'tazilism and partly from Western historical criticism. First of all, hadiths incompatible with modern reason, belittling to the Prophet, or contradicting the Quran must be rejected.57 He embraced the Hanafī requirement that all the narrators of a hadith be competent legal scholars. Only mutawātir hadiths were immune from these critical standards, and these he defined as hadiths that have been accepted as reliable by Muslim scholars throughout history – only five of which he said exist. He added that hadiths should be screened to see if they describe miracles that could not be reasonably believed or historical events that could not have happened.58 Khan's critical method for hadith evaluation led him to revolutionary breaks with Islamic tradition. He believed that the Prophet's Sunna was only pertinent to matters of religion, not political or civil affairs.59 He concluded that the Prophet's miraculous night voyage to Jerusalem was actually done in a dream (both Sunnism and Shiism generally held that he had been physically transported), and that the Prophet did not perform miracles. Like Chirāgh 'Alī, he argued that the Quran's mentioning jinn did not really mean they existed as supernatural creatures. They could well be another Semitic tribe.60 Ultimately, defending Islam against infectious Western skepticism was Khan's real goal. Although he admitted many Orientalist criticisms of hadiths, he also understood that hadiths were essential for defending the basic Islamic worldview. When Muir suggested that part of the Quran might have been lost, Khan relied on hadiths to argue the contrary.61 In proposing that the Quran be the standard against which the contents of hadiths be judged, Khan was seeking to find a critical litmus test that both Muslims and Western Orientalists could agree on (since Orientalists also believed that the Quran was the most historically reliable Islamic document).62 Khan's concern for protecting religion from Modernity even led him to defend the Bible against European critics. Against claims that the global flood of Noah was impossible and not borne out in the historical record, Khan countered that the flood had really occurred but had been restricted to one locale.63 While Khan was writing in India, Egypt witnessed a simultaneous efflorescence of the Modernist Salafī movement. In fact, the most influential participants in Islamic thought in the late nineteenth- and twentieth-century Arab world were the Egyptian scholar Muhammad 'Abduh (d. 1905) and his Syrian student Rashīd Ridā (d. 1935). 'Abduh was educated at the renowned al-Azhar University in Cairo but was exiled from Egypt in 1882 for several years due to involvement in an anti-British rebellion. He traveled to Lebanon and France and eventually returned to Egypt, where he became chief muftī (jurisconsult) under British rule. Although 'Abduh never dealt with the issue of hadiths in a systematic way, he upheld the orthodox stance that the Sunna is the second major source of law and dogma in Islam. However, he accepted that the traditional methods of hadith criticism were insufficient and that the hadith corpus must be reexamined critically.64 In theory, he states, disobeying what is known to have been the Sunna of the Prophet is anathema. This holds true, however, for 'a few only of the traditions.' In the case of non-mutawātir hadiths, whoever feels comfortable with them can believe them. But no one can be forced to believe in them or be declared an unbeliever for rejecting them. No hadith, for example, should be believed if it undermines God's total transcendence.65 'Abduh was also very skeptical about hadiths predicting the future, the end of the world or isrā'īliyyāt, and accepted very few such reports as authentic.66 This notion of only requiring Muslims to believe in mutawātir hadiths would be a hallmark of both Modernism and Modernist Salafism. Decades later it would be elaborated in a formal religious ruling by the al-Azhar Fatwā Committee.67 'Abduh's senior student Rashīd Ridā proved his chief acolyte, and his journal al-Manār was the main forum for reformist writings. Ridā dealt with hadiths in much more detail than his teacher. Like 'Abduh, he argued that the Quran is the basis of Islam and that only mutawātir hadiths can truly be relied upon. After all, āhād hadiths yielded no more than probable knowledge, while true certainty came only from mutawātir reports. He equated mutawātir hadiths with the 'practical', living Sunna that all Muslims know, such as prayer, pilgrimage rituals, and a few of the Prophet's sayings. The chapters of hadith books that list the obscure details of the Prophet's words and actions, such as chapters on manners (adab), all consist of āhād hadiths and are not necessarily reliable.68 Like Sir Sayyid Ahmad Khan, Ridā believed that the permissibility of narrating the general meaning of hadiths had introduced many errors into the hadith corpus, since the narrators' opinions could be integrated accidentally into the hadith. Accepting isrā'īliyyāt was another source of misguidance. Even though they had been used in some of the canonical hadith collections, Ridā dismissed Ka'b al-Ahbār and another early transmitter, Wahb b. Munabbih, as unreliable because of their lax transmission of isrā'īliyyāt. Interestingly, Ridā argued that modern scholars were justified in overturning earlier approval of these two transmitters because, unlike classical Muslim critics, they could compare isrā'īliyyāt reports to the actual Jewish scriptures. Ridā thus dismisses Ka'b and Wahb as unreliable because their descriptions of the Torah were factually inaccurate (note: as the ninth-century scholar al-Jāhiz observed, by 'Torah' Ka'b and other early Muslims meant the Hebrew scriptures writ large).69 Like other reformists, Ridā called for āhād hadiths to be resubmitted to content criticism, a process that was originally part of the critical method of Muslim jurists but had been neglected. At one point, Ridā even states that the content criticism of classical Muslim scholars was the forerunner of modern historical 'analytical criticism.'70 Ridā devoted numerous articles in al-Manār to addressing problematic hadiths. He sometimes declared hadiths that had traditionally been considered authentic to be unreliable because their contents were unacceptable according to him. Using his in-depth knowledge of isnād criticism, however, Ridā could attribute this to a problem in the chain of transmission.71 The famous story of God ordering the moon to be split miraculously in half as proof of Muhammad's message to his opponents in Mecca had been a required belief in Sunni Islam (it is mentioned ambiguously in the Quran). Ridā, however, said that the various hadiths describing this event were so at variance with one another that one could not base one's faith on them.72 Another controversial hadith, found in Sahīh al-Bukhārī, that the sun passes under the earth and prostrates itself before the throne of God when it sets he declared false because it flatly contradicted modern science.73 The position of only requiring belief in mutawātir hadiths allowed Ridā ample leeway for some controversial hadiths. The Hadith of the Fly, for example, could be false or it could be true, since scientists used the flesh of a snake to help prepare antidotes to its poison.74 Since it was āhād, Muslims are not required to believe in the hadith either way. Ridā's and 'Abduh's approach to hadiths won many adherents among Muslim reformists. The Egyptian Modernist Salafī Mahmūd Shaltūt (d. 1963) was at first persecuted by conservative ulema for his reformist ideas but was eventually appointed as the head of al-Azhar by the Egyptian government (which had a reformist agenda). He held that Muslims cannot be declared unbelievers for rejecting any article of faith that is derived from āhād hadiths.75 Breaking with an essential tenet of faith in classical Sunni Islam, Shaltūt followed his reasoning to its logical but controversial conclusion: Muslims could not be repudiated for rejecting the long-held tenet of Jesus' return at the end of time or the belief in an Antichrist.76 Furthermore, he argued that one could not use consensus as proof for these issues of faith because even the consensus of the Muslim community means nothing on questions known only to God.77 'Abduh's and Ridā's school of thought was continued by Shaltūt's most famous pupil, the Azhar scholar Muhammad al-Ghazālī (d. 1996), in his prolific and extremely popular series of books on reviving Islam in the modern world. Like Shaltūt, al-Ghazālī reminds his readers of the classical legal theory stance that āhād hadiths are 'merely probable in their reliability and merely probable in their indication' and thus not suitable for essential beliefs.78 Similarly, he affirms the predominance of the Quran, saying, 'We believe that the Quran is the basis, and the Sunna is built on it.'79 Al-Ghazālī's overriding concern throughout his works is the looming presence of the West. Although he reiterates his profound respect for classical hadith scholars like al-Bukhārī, he admits that he will reject a hadith from the canonical collections 'if it touches upon the most intimate part of our religion, or opens frightening borders through which our enemies could pour.'80 When a student asks him about the sahīh hadith of Moses knocking out the angel of death's eye, he replies that its contents show that it is false, since God's prophet could not try to avoid his fate. Muslims, however, should worry about more important matters such as 'the fact that the enemies of Islam are encircling us.'81 THREE: TRADITIONALIST SALAFĪS AND THE ELEVATION OF HADITHS What we have termed Traditionalist Salafism emerged directly from the early modern movements of revival and reform. The most persistent and most politically active Traditionalist Salafī movement was founded by Muhammad b. 'Abd al-Wahhāb in the mid eight-eenth century in central Arabia, expanding through its alliance with the Saud family and eventually becoming the predominant religious movement on the Arabian peninsula. A second Salafī school appeared in the Yemeni city of Sanaa with the iconoclastic hadith scholars al-San'ānī (d. 1768) and al-Shawkānī (d. 1834). A third school developed in Damascus in the second half of the nineteenth century around revivalist hadith scholars Jamāl al-Dīn al-Qāsimī (d. 1914) and Tāhir al-Jazā'irī (d. 1920). At this same time an influential Salafī school also formed in Baghdad through the Hanbalī revival led by the famous Ālūsī family.82 In India, some of the devotees of Shāh Walī Allāh's revivalist scholarship formed their own strict Traditionalist Salafī school, dubbed the Ahl-e Hadīth (The People of Hadith), whose most famous representative was Siddīq Hasan Khān (d. 1890). Other heirs to Shāh Walī Allāh's legacy combined his hadith-based revivalism with India's longstanding adherence to the Hanafī school of law. This movement resulted in the founding of the influential school at Deoband in India. The most illustrative example of Traditionalist Salafīs is Muhammad Nāsir al-Dīn al-Albānī (d. 1999), an Albanian whose family immigrated to Syria. Growing up in Damascus, al-Albānī was deeply affected by Ridā's al-Manār articles on the extent to which unreliable hadiths had been used to justify Sufi practices.83 He began to speak out against what he saw as heretical innovations in every area of Syrian religious life and penned many works attempting to reorient social and religious practices to the pure Sunna of Muhammad as communicated by hadiths. Like the other reform movements, Traditionalist Salafīs have aimed at reviving Islam's original purity and greatness by clearing away the dross of later cultural accretions. Unlike Modernist Salafīs, who drew eclectically on Hanafī legal theory, Mu'tazilism, and modern rationalism, they have struggled literally to revive the Prophet's Sunna through a narrow focus on hadiths. Like their Modernist Salafī counterparts, Traditionalist Salafīs identify the causes of the Muslim community straying from the Sunna as excessive loyalty to the schools of law instead of a reverence for their sources, indulgence in speculative theology, and popular Sufi practices such as visiting the graves of saints. To cure these ills, Traditionalist Salafīs have not merely engaged in the study of hadiths, they have tried to cultivate its most critically rigorous spirit. They reject the use of weak hadiths in any matter, breaking with the practice of the classical Muslim scholars (see chapter 3). Al-Albānī asks rhetorically: if we do not dismiss hadiths once we have determined that they are unreliable, what is the point of the science of hadith criticism?84 Al-Albānī thus published numerous books dividing the hadiths contained in classical works such as the Four Sunans of Abū Dāwūd, al-Nasā'ī, al-Tirmidhī, and Ibn Mājah, the Jāmi' al-saghīr of al-Suyūtī, and the al-Targhīb wa al-tarhīb of al-Mundhirī into sound and unreliable. The Saudi hadith scholar 'Abdallāh al-Sa'd rejects the Late Sunni Tradition's method of bolstering evidence for a hadith's authenticity by using other dubious narrations (see chapter 3).85 The Indian hadith scholar Shibli Numani (d. 1916), a traditionalist associate of Ahmad Khan, compiled a new biography of Muhammad that purged it of reports transmitted by early Muslim historians that hadith critics had considered unreliable. Like Modernist Salafīs, Traditionalists were willing to cast aside the institutions of classical Islam, relying on hadiths as the ultimate source for interpreting the faith. The Sunna was preserved in the authentic hadiths, which are accessible to any Muslim. Like Modernists, Traditionalist Salafīs have been skeptical of claims of consensus, which served as the primary defense for employing weak hadiths as evidence and the legitimacy of many Sufi practices. They do not doubt the theoretical proof value of consensus, but the large number of dissenting scholarly opinions in Islamic history means that it was actually achieved only rarely. Unlike Modernists, however, Traditionalist Salafīs avow the same intense trust in hadiths found among the early ahl al-hadīth. They do not concur with the Modernist reemphasis on the Quran as the ultimate arbiter in matters of faith and law. Like the early ahl al-hadīth, al-Albānī asserts that in both law and dogma 'we cannot distinguish between God and His Prophet.'86 It is thus perfectly acceptable to derive articles of faith from āhād hadiths, which Muslims must accept. Did the Prophet not send single individuals as ambassadors to newly converted communities in order to teach them fundamental Islamic beliefs?87 Although Traditionalist Salafīs are willing to criticize a hadith for content reasons, like the early ahl al-hadīth they explain such faults by finding a flaw in the isnād. 'Abdallāh al-Sa'd thus declares, 'It is impossible for a hadith to have an untrue meaning without there being a flaw in the isnād.'88 Unlike their Modernist and Modernist Salafī counterparts, these Traditionalists do not approve of Aisha's criticisms of other Companions for narrating hadiths that seemed to contradict the Quran. Since these hadiths are well established by multiple sahīh isnāds, such apparent contradictions only mean that she did not interpret the Prophet's words correctly.89 Traditionalist Salafīs preserve the spirit of ijtihād. For them, hadith criticism did not end with the formation of the hadith canon in the classical period. It continues to this day, and modern scholars can achieve just as high a level of critical mastery as great classical scholars such as al-Dāraqutnī or Ibn Hajar. Tāhir al-Jazā'irī defends the right of modern scholars to criticize the meanings of hadiths in the Sahīhayn, rejecting the argument of those who warn that allowing criticism of the meaning of hadiths will open the door to the 'people with heretical agendas.' He disagrees, saying that proper criticism is a worthy practice.90 When asked about his controversial criticism of a famous classical hadith transmitter, al-Albānī replied that the science of hadith criticism 'is not simply consigned to books,' it is a dynamic process of critical review.91 Al-Albānī explained that one of the principles of Islamic scholarship is that 'religious knowledge cannot fall into rigidity.'92 This spirit of picking up the classical hadith tradition at its most critical point and applying it today has led to substantial achievements by Traditionalist Salafī scholars. Al-Albānī completed two voluminous series, 'The Series of Weak Hadiths and their Negative Effect on the Muslim Community' and 'The Series of Authentic Hadiths,' in which he revaluates thousands of hadiths. Many that he authenticates had previously been declared unreliable, and many hadiths that he criticizes had earlier won the approval of great classical critics like al-Bukhārī and Muslim. One of al-Albānī's students, the Yemeni Muqbil al-Wādi'ī (d. 2001) similarly compiled a large work entitled 'The Compendium of Sahīh Hadiths Not Found in the Two Sahīhs of al-Bukhārī and Muslim.' Traditionalist Salafīs have also revived the genre on the technical terminology and rules of hadith criticism (mustalah al-hadīth). The two most famous modern contributions are Jamāl al Dīn al-Qāsimī's Qawā'id al-tahdīth min funūn mustalah al-hadīth (The Principles of Regeneration from the Technical Science of Hadith Study) and Tāhir al-Jazā'irī's Tawjīh al-nazar ilā usūl al-athar (Examining the Principles of Transmitted Reports). These works are continuations of the classical mustalah books, such as that of Ibn al-Salāh, but are imbued with Salafī themes. Tāhir al-Jazā'irī, for example, lambasts the excessive traditionalism of the Sunni schools of law: 'The jurists interpret away any hadith that disagrees with their school, or oppose it with another hadith even if it is not well-known, even if that [first] hadith is found in the Sahīhayn.'93 Because the Salafī approach to Islamic scholarship centers on bypassing centuries of consensus-building among scholars and instead approaches the Quran and hadiths anew, it can produce divergent results. A set of Moroccan brothers who have proven the most adept hadith scholars of our time, Ahmad b. al-Siddīq al-Ghumārī (d. 1960) and his younger siblings 'Abdallāh (d. 1993) and 'Abd al-Hayy (d. 1995), followed the Traditionalist Salafī methodology. They felt entitled to reverse centuries-old rulings on the authenticity of specific hadiths and arrived at legal rulings that broke with all four Sunni schools of law. 'Abd al-Hayy argued conclusively that none of the founders of the four Sunni schools of law had access to all the necessary hadiths and that it was thus entirely acceptable to reject their rulings on the basis of hadith evidence. 'Abdallāh al-Ghumārī repeatedly wrote that 'taqlīd never comes to any good.'94 Ahmad al-Ghumārī concluded that the famous hadith in which the Prophet explained that the 'Greatest Jihad' was 'the struggle against one's own soul' was authentic, while classical critics had considered it weak or forged.95 Despite this similarity in approach to Traditionalist Salafīs like al-Albānī, the Ghumārī brothers emerged with polar opposite positions. Salafīs, both Modernist and Traditionalist, have consistently been deeply opposed to Sufism and intolerant of the Shiite veneration of 'Alī. The Ghumārīs' analysis of the Quran, hadiths, and scholarly tradition, however, has led them to embrace 'Alī as the best and most knowledgeable of all the Companions (and in Ahmad's case, to declare Mu'āwiya an unbeliever) as well as to defend vehemently Sufi practices such as visiting graves and engaging in group liturgies not practiced during the time of the Prophet.96 'Abdallāh al-Ghumārī repeatedly accused al-Albānī of unmitigated heresy, and at least one Wahhābī hadith scholar called 'Abdallāh al-Ghumārī an unbeliever. Unlike Modernists and Modernist Salafīs, Traditionalist Salafīs have no concern for the pressures of Modernity. They believe that if Muslims return to the authentic Sunna of the Prophet as preserved in the hadith corpus, the Muslim world will once again enjoy God's favor regardless of any perceived superiority boasted by the West today. Traditionalist Salafīs consider the other schools of thought discussed so far in this chapter to be misguided by Western influence. Al-Albānī thus calls both Abū Rayya and Muhammad al-Ghazālī 'Occidentalists (mustaghribūn)' and 'imitators of the Orientalists.'97 The most furious conflict among schools of Sunni thought in modern times has surged between the Traditionalist Salafīs and the Late Sunni Traditionalists (see below). Because Salafīs allow a scholar to break with the established rulings of the Sunni schools of law and perform ijtihād, Late Sunni Traditionalists accuse this movement of arrogantly claiming to be the equal of the great scholars of yesteryear. Muhammad Zāhid al-Kawtharī (d. 1952), a high religious official in the moribund Ottoman Empire, wrote that it was pure error and misguidance to believe that, today, 'at the end of time,' one could correct the great early scholars of Islam.98 Moreover, adherents of the schools of law accuse Traditionalist Salafīs of total ignorance of legal theory and thus of ignorantly following random hadiths instead of understanding how those hadiths fit into the process of deriving law. These factors combine to create, in the eyes of Late Sunni Traditionalists, interpretive chaos. Muhammad al-Ghazālī, for example, admits that he dislikes chauvinism towards one particular school of law. But it is 'less harmful than the childish ijtihād' of Salafī movements like Wahhābism, which he calls simplistic 'Bedouin legal thought.'99 Contrary to such polemical claims, Traditionalist Salafī scholars do advocate the study of basic books of legal theory (al-Albānī, for example, cites advanced legal principles such as 'Evidence that breaks with analogy cannot be used as the basis for another analogy').100 However, the Traditionalist Salafīs' egalitarian argument that any scholar can break with an established ruling if he feels it has not taken certain hadith evidence into account has undeniably led to a proliferation of erratic rulings. FOUR: LATE SUNNI TRADITIONALISTS All the approaches to understanding Islam in the modern period that we have discussed so far have advocated the rejection of significant components of Sunni Islam as it existed in the medieval world through the 1600s. Conversely, what we can call Late Sunni Traditionalism argues that it is precisely these institutions that are essential for properly living as a Muslim today. In other words, closely following one of the accepted Sunni schools of law, believing in the traditional Ash'arī school of theology, and participating in a Sufi brotherhood provides modern Muslims with all the legal, spiritual, and theological tools they need to succeed. Properly understood and correctly combined, these classical institutions allow Muslims to answer all the challenges of Modernity. Advocates of Late Sunni Traditionalism generally refer to their school of thought as 'Traditional Islam' or 'Sunnism in its authentic form (ahl al-sunna 'alā al-mashrib al-asīl).' Prominent representatives of this school include Muhammad Zāhid al-Kawtharī, Muhammad al-Ghazālī,i the late Syrian scholar Muhammad Sa'īd al-Būtī (d. 2013) and the former Grand Mufti of Egypt, 'Alī Jum'a. Late Sunni Traditionalism mitigates the stipulations of Islamic law that seem incompatible with Modernity by drawing on the collective diversity of the four Sunni legal schools and the rich intellectual heritage of Sunni legal theory. Although engaging in interest-bearing commercial transactions is generally prohibited in Islamic law, a minority opinion in the Hanafī school allows Muslims to take and pay interest if living in a non-Muslim country.101 A principle of Late Sunni legal theory, 'Let he who is afflicted with some need take the permissive ruling,' permits a Muslim to act on this minority ruling. As Muhammad al-Ghazālī states, 'when I am defending Islam... I must move between the opinions of all the imams and benefit from the full range of understandings.'102 As a result of this methodology, Late Sunni Traditionalism produces a manfestation of Islam that adapts to many of the stringencies of the modern world while remaining grounded in 'authentic' Islamic tradition. This school of thought also uses the relationship between law and ethics to circumvent seemingly harsh elements of Islamic law. Islamic marriage law, for example, seems to clash with modern sentiments with its legalistic requirements that a woman meet her husband's sexual needs and that a husband bear the full financial responsibilities of a family. Late Sunni Traditionalists, however, argue that the Shariah only addresses people's strict legal rights, and that a husband and wife should turn to the Sufi tradition in order to learn how to treat one another with love and compassion. Just as Traditionalist Salafīs have resurrected the approach of the ahl al-hadīth, Late Sunni Traditionalists have revived the methods of the ahl al-ra'y jurists. Late Sunni Traditionalists subordinate hadiths to the interpretive traditions of the Sunni schools of law and Sunni legal theory. Late Sunni Traditionalists affirm their total confidence in the classical method of hadith criticism; as al-Ghazālī says, 'I do not know its equal in the history of human culture in terms of establishing principles for verification.'103 They also, however, entrust jurists, not hadith scholars, with the ultimate authority in determining the authenticity and implication of a hadith. Al-Kawtharī explains that hadith scholars and jurists had divided up the duties of hadith criticism, with the latter responsible for content criticism.104 In an analogy similar to the doctors versus pharmacists comparison mentioned in chapter 5, al-Ghazālī states: The jurists have been, throughout our intellectual history, the leaders of the Muslim community... and the scholars of hadiths have been content to provide them with the reports they transmit just as raw building materials are given to the engineer who builds a structure.105 Al-Ghazālī adds that the classical criteria for a sahīh hadith require that it does not include any hidden flaw ('illa) or contradict more reliable evidence. Although hadith scholars can criticize isnāds, it is the jurists who are properly trained to spot such errors in the text of a hadith and issue the definitive ruling on its reliability. Al-Ghazālī thus declares that a hadith that al-Albānī authenticatedii saying that 'In the meat of a cow is disease' is false because the Quran notes the blessings of beef. The hadith is thus untrue 'whatever its isnād may be.'106 Late Sunni Traditionalists also circumvent hadiths that appear to be problematic in the modern world by relying on the classical juristic concept of communal practice or interpretation. Just as Mālik had ignored hadiths he acknowledged as authentic because the Muslim community had never acted on them in law, today's Late Sunni Traditionalists use the collective rulings of Muslim jurists to overrule hadiths. 'Alī Jum'a admits that numerous authentic hadiths exist that command Muslims to kill apostates, such as 'Whoever changes their religion [from Islam], kill them.'107 The fact that neither the Prophet nor the early caliphs actually implemented these rulings when individuals left Islam means that these hadiths addressed the issue of treason to the Muslim community and not a person's individual choice of belief.108 Another influential modern scholar, the Egyptian Yūsuf al-Dijwī (d. 1946), emphasized how classical Muslim scholarship had always employed reason, scriptural interpretation and the observation of nature to avoid the literal or superficial understanding of hadiths so mocked by Modernist critics. In a long-running dispute with Ridā, al-Dijwī argued that there was no need to reject the hadith of the sun prostrating because pre-modern Muslim scholars had always interpreted it figuratively and acknowledged that the sun is always shining on some parts of the earth and not visible elsewhere.109 THE CONTINUITY BETWEEN CLASSICAL AND MODERN DEBATES ON HADITHS It is worthy of note that debates over hadiths in the modern Muslim world have echoed or recast debates that occurred in the formative period of Islamic thought. Sidqī and other 'Quran only' advocates rehash the debate between early Muslim rationalists and Sunnis such as al-Shāfi'ī in the eighth century. Like al-Shāfi'ī's opponents in this debate, Sidqī argued that the Quran described itself as 'elucidating everything (tibyān li-kull shay')' (Quran 16:89). So how can one argue that Muslims need hadiths to understand their faith as well? The principal argument used by conservative Sunnis like al-Sibā'ī against the writings of 'Quran only' scholars is drawn directly from al-Shāfi'ī's rebuttal of that point: if you reject the Prophet's Sunna, how do you know how to pray or fast?110 The raging debate between Traditionalist Salafīs and Late Sunni Traditionalists parallels the eighth-century dispute between the ahl al-hadīth and the ahl al-ra'y. The principle invoked by Islamic Modernists and Modernist Salafīs that the hadith corpus should be submitted to content criticism revives the long-dormant debate between the Mu'tazilites and the early Sunnis, as does the specific call to use the Quran as the criterion of judgment. The hadith that Haykal cited as his evidence for the determinative role of the Quran – 'There will come to you many different hadiths from me, so what agrees with the Book of God, accept it, and what disagrees with it, reject it' – was used as evidence by early Mu'tazilites like al-Jāhiz. Sunni scholars, of course, universally deemed the hadith a forgery. Even the reliability and piety of Abū Hurayra was a major item of contention between the Mu'tazilites and the early Sunnis in the eighth century. In an audience before the Abbasid caliph Hārūn al-Rashīd, the early Sunni Umar b. Habīb (d. 204/819-20) responded to Mu'tazilite and ahl al-ra'y arguments that Abū Hurayra was unreliable by claiming that if one opened the door to criticizing the Companions of the Prophet, Muslims would lose the whole Shariah.111 Even before modern medicine, the Hadith of the Fly was raising skeptical eyebrows and prompting Sunni defensiveness as early as the writings of Ibn Qutayba (d. 276/889).112 Of course, modern Muslim scholars have utilized this classical heritage in unprecedented ways. Mahmūd Shaltūt used the distinction between the different levels of certainty yielded by āhād and mutawātir hadiths – a purely academic distinction in classical Islamic thought – to excuse modern Muslims from believing in 'backwards' or 'irrational' beliefs. Before Mernissi, no classical Muslim scholar had used historical reports about Abū Hurayra or Abū Bakra to claim a misogynist conspiracy at the root of Islamic law. SUGGESTIONS FOR FURTHER READING For the best introductions to the revolution of modernity, see the Conclusion of Keith Thomas' Religion and the Decline of Magic (New York: Oxford University Press, 1971) and Marshall Hodgson, The Venture of Islam (University of Chicago Press, 1974) vol. 3, pp. 163–248. The most useful books on debates over hadiths in the modern Muslim world are Daniel Brown's superb Rethinking Tradition in Modern Islamic Thought (Cambridge: Cambridge University Press, 1996) and G.H.A. Juynboll's The Authenticity of the Tradition Literature (Leiden: Brill, 1969). For more general discussions of modern Islamic thought, see Albert Hourani's Arab Thought in the Liberal Age (Cambridge: Cambridge University Press, 1983) and Aziz Ahmad's Islamic Modernism in India and Pakistan (London: Oxford University Press, 1967). The two best resources on Salafism are Henri Lauzière, The Making of Salafism (Columbia University Press, 2016) and Roel Meijer, ed., Global Salafism (Columbia University Press, 2009). A recent study on the Quran-only movement is Ali Usman Qasmi, Questioning the Authority of the Past: The Ahl al-Qur'an Movement in the Punjab (Oxford University Press, 2011). For more on the eighteenth-century movements of revival and reform, see John Voll, 'Foundations of Renewal and Reform: Islamic Movements in the Eighteenth and Nineteenth Centuries,' in The Oxford History of Islam, ed. John Esposito, pp. 509–548 (Oxford: Oxford University Press, 1999) and the initial chapters of Barbara Metcalf's Islamic Revivalism in British India: Deoband 1860–1900 (Princeton: Princeton University Press, 1982). A difficult-to-find translation of Abū Rayya's al-Adwā' 'alā al-sunna al-muhammadiyya has been published as Lights on the Muhammadan Sunna, trans. Hasan Najafi (Qum: Ansariyan Publications, 1999). Muhammad Husayn Haykal's biography of the Prophet, translated by Ismail al-Faruqi, has been published in several editions as The Life of Muhammad. Yūsuf al-Qaradāwī's influential Kayfa nata'āmalu ma'a al-sunna al-nabawiyya has been translated as Approaching the Sunna: Comprehension and Controversy, trans. Jamil Qureshi (Washington DC: International Institute of Islamic Thought, 2007). Sir Sayyid Ahmad Khan's response to William Muir's critique of the sīra has been published as A Series of Essays on the Life of Muhammad (Lahore: Premier Book House, 1968), and Shibli Numani's biography of the Prophet has been published as Sirat-un-Nabi: The Life of the Prophet, 2 vols. (Delhi: Idarat Adabiyat Deli, 1979). ENDNOTES 1 Al-San'ānī, Irshād al-nuqqād ilā taysīr al-ijtihād, p. 58. 2 Al-San'ānī, Dīwān al-Amīr al-San'ānī, p. 168. 3 'Abdallāh al-Ghumārī, Al-Khawātir al-dīniyya, vol. 1, p. 123; Ahmad b. Muhammad al-Sāwī, Hāshiyat al-Sāwī 'alā Tafsīr al-Jalālayn, vol. 3, p. 9. 4 Aziz Ahmad, Islamic Modernism in India and Pakistan, pp. 60–61. Ibn Hanbal does show extreme skepticism towards claims of consensus; 'Abdallāh b. Ahmad, Masā'il al-imām Ahmad, p. 439. 5 Aziz Ahmad, Islamic Modernism in India and Pakistan, p. 63. 6 Ibid., p. 59. 7 Daniel Brown, Rethinking Tradition in Modern Islamic Thought, pp. 38–39. 8 Ibid., p. 98. 9 Ibid., pp. 46–47. 10 Muhammad Tawfīq Sidqī, 'al-Islām huwa al-Qur'ān wahdahu,' pp. 516–517; idem, 'al-Islām huwa al-Qur'ān wahdahu: radd li-radd,' p. 912 (found in Ridā, ed., al-Manār 9, n. 7 and 12). 11 Sidqī, 'al-Islām huwa al-Qur'ān wahdahu: radd li-radd,' p. 910. 12 Sidqī, 'al-Islām huwa al-Qur'ān wahdahu,' p. 524. 13 Sidqī, 'al-Islām huwa al-Qur'ān wahdahu: radd li-radd,' p. 911. 14 Juynboll, The Authenticity of the Tradition Literature: Discussions in Modern Egypt, pp. 28–30; Brown, Rethinking Tradition, p. 89. 15 Sunan Abī Dāwūd: kitāb al-at'ima, bāb fī al-dhubāb yaqa'u fī al-ta'ām; Sahīh al-Bukhārī: kitāb al-tibb, bāb idhā waqa'a al-dhubāb fī al-inā'. 16 Juynboll, Authenticity, p. 141. 17 Brown, Rethinking Tradition, p. 47. 18 Muhammad Husayn Haykal, Hayāt Muhammad, p. 67. 19 Ibid., pp. 64–66. 20 Abū Rayya, Adwā' 'alā al-sunna al-muhammadiyya, pp. 350–351. 21 Ibid., pp. 252 ff., 278. 22 Juynboll, Authenticity, pp. 41–43; see Sahīh al-Bukhārī: kitāb al-adhān, bāb fadl al-ta'dhīn. Ibn Hajar notes that this should not be understood literally; Ibn Hajar, Fath al-bārī, vol. 2, pp. 108–109. 23 Abū Rayya, Adwā', p. 233. 24 Ibid., p. 148. 25 Ibid., pp. 151 ff. 26 Ibid., p. 169. 27 Juynboll, Authenticity, pp. 88, 133. 28 Abū Rayya, Adwā', p. 169. 29 Abū Rayya, 'Ka'b al-Ahbār huwa al-sahyūnī al-awwal,' al-Risāla wa'l-riwāya 665 (1946), pp. 360–62. 30 Abū Rayya, Adwā', pp. 140 ff. 31 Juynboll, Authenticity, pp. 30–40. 32 Brown, Rethinking Tradition, p. 57. Al-Albānī also argues that the Prophet's speech is part of the revelation God promises to protect in the Quran; al-Albānī, Adab al-zaffāf, p. 168–9. 33 Wadud does not deal with hadiths in her discussion, while Kugle avoids discussing hadiths that command the death penalty for those 'committing the sin of the people of Lot' because they are not in the Sahīhayn (they are found in the Four Sunan). See Amina Wadud, The Quran and Woman (New York: Oxford University Press, 1999) and Scott Kugle, 'Sexuality, Diversity and Ethics in the Agenda of Progressive Muslims,' in Progressive Muslims, ed. Omid Safi (Oxford: Oneworld, 2003), pp. 220–221. 34 See http://www.yuksel.org/e/books/rtq.htm (last accessed 11/1/07). 35 Fatema Mernissi, Women and Islam: An Historical and Theological Enquiry, p. 77. 36 Ibid., p. 43. 37 Sahīh Muslim: kitāb al-salāt, bāb al-i'tirād bayn yaday al-musallī; Sahih al-Bukhārī: kitāb al-fitan, bāb 18. 38 Mernissi, pp. 56 ff., 71–72. 39 Ibid., p. 60. 40 Ibid., p. 76. 41 Fazlur Rahman, Islamic Methodology in History, pp. 6, 33. 42 Ibid. p. 6, 12. 43 Ibid., pp. 15–16, 19. 44 Ibid., p. 56. 45 Ibid., pp. 72–73. 46 Ibid., p. 40. 47 Ibid., p. 72. 48 Javed Ahmad Ghamidi, Islam: A Comprehensive Introduction, pp. 61–69. 49 Ahmad, Islamic Modernism, p. 53. 50 Ibid., p. 31. 51 Ibid., p. 41. 52 Aziz Ahmad and G.E. von Grunebaum, eds., Muslim Self-Statement in India and Pakistan 1857–1968, p. 34; Ahmad, Islamic Modernism, pp. 43, 46. 53 Ahmad and von Grunebaum, p. 30. 54 Ahmad, Islamic Modernism, p. 54. 55 Christian W. Troll, Sayyid Ahmad Khan: A Reinterpretation of Muslim Theology, p. 113. 56 Ibid., pp. 134, 139–140. 57 Ahmad, Islamic Modernism, pp. 49 ff. 58 Troll, pp. 137–139. 59 Brown, Rethinking Tradition, p. 64. 60 Ahmad, Islamic Modernism, pp. 47–48. 61 Troll, p. 129. 62 Ibid., p. 141. 63 Ibid., p. 111. 64 Juynboll, Authenticity, p. 15. 65 Muhammad 'Abduh, The Theology of Unity, pp. 155–156. 66 Ridā, Al-Manār, 21, no.1, p. 67. 67 Muhammad al-Ghazālī, Turāthunā al-fikrī, p. 176. 68 Ridā, Al-Manār, 27, no. 8, p. 616. 69 Ridā, Al-Manār, 27, no. 7, pp. 539 ff., 615; ibid., 28, no. 1, p. 67. See al-Jāhiz, al-Hayawān, ed. 'Abd al-Salām Hārūn (Beirut: Dār al-Jīl, 1996), vol. 4, pp. 202–3. 70 Ridā, Al-Manār, 27, no. 8, p. 615; ibid., p. 3:620. 71 Ridā, Al-Manār, 19, no. 2, p. 100. 72 Juynboll, Authenticity, pp. 145–146; 'Abd al-Majīd Mahmūd, Abū Ja'far al-Tahāwī wa atharuhu fī al-hadīth, p. 117. 73 Ridā, Al-Manār, 27, no. 8, p. 615; Sahīh al-Bukhārī: kitāb bad' al-khalq, bāb sifat al-shams wa al-qamar. 74 Juynboll, Authenticity, p. 143. 75 Mahmūd Shaltūt, Al-Fatāwā, p. 52. 76 Ibid., pp. 61 ff., 82. 77 Ibid., p. 79. 78 Al-Ghazālī, Turāthunā al-fikrī, p. 169. 79 Ibid., p. 181. 80 Al-Ghazālī, al-Sunna al-nabawiyya, p. 190. 81 Ibid., pp. 35–36. 82 Brown, The Canonization of al-Bukhārī and Muslim, pp. 309–310. 83 Al-Albānī, 'Tarjamat al-shaykh al-Albānī – Nash'at al-Shaykh fī Dimashq.' 84 Al-Albānī, Sahīh al-Targhīb wa al-tarhīb, p. 1:60. 85 'Abdallāh al-Sa'd, 'Sharh al-Mūqiza 3.' 86 Al-Albānī, 'Tafsīr 1.' 87 Al-Albānī, 'Tafsīr 2.' 88 'Abdallāh al-Sa'd, 'Sharh Kitāb al-Tamyīz 3.' 89 Al-Albānī, Tafsīr 3.' 90 Tāhir al-Jazā'irī, Tawjīh al-nazar ilā usūl al-athar, vol. 1, pp. 331–332. 91 Al-Albānī, 'Silsilat as'ilat Abī Ishāq al-Huwaynī li'l-shaykh Muhammad Nāsir al-Dīn al-Albānī.' 92 Al-Albānī, Sahīh al-Targhīb wa al-tarhīb, vol. 1, p. 4. 93 Al-Jazā'irī, Tawjīh al-nazar ilā usūl al-athar, p. 1:320. 94 'Abdallāh al-Ghumārī, Tawjīh al-'ināya li-ta'rīf 'ilm al-hadīth riwāya wa dirāya, p. 15. 95 Ahmad al-Ghumārī, Dar' al-da'f 'an hadīth man 'ashiqa fa-'aff, p. 121. 96 'Abdallāh al-Ghumārī, Itqān al-san'a fī tahqīq ma'nā al-bid'a, p. 41; Ahmad al-Ghumārī, Ju'nat al-attār, vol. 2, p. 154. 97 Al-Albānī, Mukhtasar Sahīh al-Bukhārī, vol. 2, pp. 8–9. 98 Al-Kawtharī, Maqālāt, p. 225. 99 Al-Ghazālī, al-Sunna al-nabawiyya, pp. 14–15. 100 'Mā kāna 'alā khilāf al-qiyās fa-'alayhi ghayruhu lā yuqās,' al-Albānī, 'al-Zawāj.' 101 'Alī Jum'a, al-Bayān li-mā yushghalu bihi al-adhhān, pp. 99 ff. 102 Al-Ghazālī, Turāthunā al-fikrī, p. 153. Jum'a, al-Bayān, pp. 103–4. 103 Al-Ghazālī, al-Sunna al-nabawiyya, p. 19. 104 Al-Kawtharī, Maqālāt, p. 55. 105 Al-Ghazālī, al-Sunna al-nabawiyya, p. 32. 106 Ibid., pp. 19–20. 107 Sahīh al-Bukhārī: kitāb al-jihād, bāb 149. 108 Jum'a, al-Bayān, pp. 78–81. 109 J. Brown, 'The Rules of Matn Criticism: There are No Rules,' pp. 389–91. 110 Al-Shāfi'ī, al-Risāla, p. 177. 111 Tārīkh Baghdād, vol. 11, pp. 197–198. 112 Ibn Qutayba, Ta'wīl mukhtalif al-hadīth, p. 228. i Earlier in this chapter we referred to Muhammad al-Ghazālī as a Modernist Salafī. In terms of the structure of his thought, this is correct. But al-Ghazālī's environment, Egypt in the 1970s, 1980s and 1990s, was much more religiously conservative than that of 'Abduh or Shaltūt. As a result, in his language and positions al-Ghazālī fits into the Late Sunni Traditionalist category. ii Although al-Albānī rules that this hadith is authentic, he also notes that it cannot be interpreted literally since we know that the Prophet ate beef; al-Albānī, Silsilat al-ahādīth al-sahīha, p. 4:46. CONCLUSION We must possess a grasp of the hadith tradition and its many functions in order to understand the past and present of the Islamic world. This grasp is indispensable for comprehending Muslim debates over the future as well. When we look behind the headlines today, we see that much of the time hadiths are at the vortex of the most salient debates in Islamic thought. On controversial issues from jihad and martyrdom to women's rights under Islamic law, hadiths always provide key and often determinative evidence. As we have seen, even those Muslims who reject heeding hadiths at all in such debates face the challenge of justifying this position with evidence from the classical hadith tradition. Even if we understand the importance of hadiths in parsing complex problematics such as 'Islam and the West' or 'Islam and Women,' we must always keep history in mind. History gave birth to the complexities of the present and holds the keys to unraveling them. Debates over the necessity of hadiths, their place in articulating Islamic law and dogma, and how Muslims should know true claims about reve-lation from the false have been of perennial importance throughout Islamic history. Let us retrace some of the main thematic steps in the reasoning of Muslim scholars throughout Islamic history, specifically those regarding hadiths. If the Quran is God's manifest revelation to mankind, do we need any other source for understanding His religion? If not, then how do we know how to perform (or, perhaps, how do we justify the fact that we perform) our five daily prayers and fast during Ramadan? – these practices are not explained in the holy book. If we do need another source, then does our sense of reason alone suffice? The answer seems to be 'no,' as reason on its own cannot provide the basis or specifics for Muslim prayer and fasting, which can only be known through some form of tradition handed down from Muhammad and the early Muslim community. If we must rely to some extent on this tradition, then how do we balance it with the Quran and reason? What happens when revelation, reason, and tradition seem to conflict? Does tradition trump reason and our prima facie understanding of the Quran, or vice versa? If we are to subordinate some elements of our rational thought and understanding of the Quran to tradition, how do we know when tradition is authentic or inauthentic? How is tradition transmitted or preserved? If tradition overrules the Quran and reason, then can the principles of the Quran or reason be used to authenticate tradition? These are some of the questions that have driven Islamic intellectual history in its various streams and embodiments. In this book, we have proposed thinking about hadiths in terms of their two essential functions in Islamic civilization. First, the hadith as a text (matn) – authoritative statements by the Prophet that shape Islamic law, dogma, and worldview. Second, the hadith as a chain of transmission (isnād) – a medium of connection to the Prophet and a paradigm of constructing a relationship between the Muslim present and the Muslim past. Interestingly, in both these cases, the functions of hadiths and the questions surrounding them are common to faith traditions other than Islam. In an interpretive tradition, namely one in which meaning is developed by turning (back) towards and interpreting an authoritative source such as a revealed text or constitution, the interpreter of the source is effectively more powerful than the source itself. Using the analogy of a king or ruler, the king's interpreter is more powerful than the king himself, since the interpreter controls and shapes the king's message. Similarly, it is the lens through which we view an object that controls our perception of that object, not the object itself. Early in Islamic history, both Sunni and Shiite Muslims decided that the Quran was a source that had to be interpreted through specific lenses. It could not speak on its own ('Quran only' advocates today have challenged this). The Prophet was the first interpreter, and his Sunna was what the Muslim scholar 'Alī Jum'a has called 'an infallible application of the Book of God.'1 But who, in turn, would interpret the Prophet's Sunna? Who would provide the second interpretive layer that would translate the Sunna and apply it among the coming Muslim generations in new Muslim lands? Sunnis chose the Muslim community as a whole, represented by the ulema, as the authoritative interpreter, while Shiite Muslims selected the family of the Prophet and the scholars who followed in the footsteps of the imams. But how should the Sunna be communicated and preserved? Some Sunnis believed that the Sunna was preserved mainly in the form of communal practice (like the Mālikī school of law), others in the form of the methods of problem-solving inherited from the Prophet through his Companions and their Successors (like the Partisans of Reason). The Quran is a written text, but these approaches treated the Sunna as a living and unwritten entity. Ultimately, Sunnis accepted that the Sunna must take a written form as well, that of hadiths. Although Sunni scholars continue to debate the proper relationship between practice, interpretive method, and the text of hadiths to this day, Muslim scholars generally recognize that hadiths are a powerful, even if not the ultimate, vehicle for the Sunna. This process is common to Islam, Judaism, and Christianity. In all these traditions, a written scripture is interpreted through an oral lens that is eventually also consigned to written form. Classical rabbinic Judaism is based on the idea that Moses received two Torahs on Mount Sinai, the written revelation of the scriptures, designated collectively as the Written Torah, and an oral Torah, which transmitted the authoritative interpretations of these books. This oral tradition was inherited from Moses by subsequent leaders of the Jewish people through the biblical period and on through the time of the rabbis. Eventually, in the early third century CE it was set down in written form in the Mishna. Among Christians, a Greek translation of the Old Testament served as the community's revealed scripture during the first two centuries CE. Christians read and understood the significance of the Old Testament through the orally transmitted teachings of Jesus and the elucidations of the Christian church fathers – the stories of the Old Testament and pronouncements of Hebrew prophets like Isaiah were interpreted as referring allegorically or literally to Christ. At the same time as the Jews were setting down their oral Torah in written form, the Christians adopted as their written interpretive lens a selection of written accounts of Jesus' life and mission in the form of the New Testament gospels.2 In Islam more than in the other Abrahamic traditions, however, there arose a particular interpretive problem. From the time of the Prophet and the revelation of the Quran itself, Muslims have been self-consciously obsessed with textual authenticity. The Quran explains that previous communities had corrupted or altered the revealed books of God. Muslim scholars therefore proclaimed an enduring devotion to assuring the authenticity of their religion's teachings and its textual sources. This is most obvious in the text of the Quran itself. From the time of Muhammad's Companions, Muslim scholars have obsessively safeguarded the textual integrity of the Quran, meticulously recording any variations in wording or pronunciation. The hadith corpus, however, was not set down in writing at such an early date, so the authenticity of this interpretive lens quickly became a major matter of contention. Early Sunni Muslims developed their methods of isnād criticism in an effort to assure the textual authenticity of the Sunna without relying on the same flawed rational faculties that had led earlier nations astray. However, the tension between surrendering to the isnād and its power to authenticate versus the role of reason as a criterion for evaluating truth remains unresolved among Muslim scholars. When Sunni legal theory matured fully in the tenth and eleventh centuries CE, scholars grappled with a more philosophical problem: how can you interpret a source whose historical reliability is certain (the Quran) through a lens of questionable historical reliability (hadiths)? Classical Sunni legal theorists employed the concepts of consensus (ijmā') and the certainty produced by massive transmission (tawātur) to reach a solution to this problem, but it continues to drive the debate between Islamic modernists and traditionalists today. Interestingly, there are remarkable similarities between the Islamic tradition of hadith criticism and a genre of books in Chinese Zen Buddhism known as Ching Lu, which flourished among Chinese Buddhist scholars in the period just before and during the Tang dynasty (618–907 CE). Ching Lu books were catalogs devoted to distinguishing between writings that were thought to be authentic records of the Buddha's teachings as transmitted to China from India and books that were written by Chinese scholars and thus did not originate in the Buddhist homeland of India. With an attitude very similar to Muslim hadith critics, the authors of Ching Lu books saw themselves as sorting the 'rubies from pebbles' in a struggle to preserve the authentic teachings of the Buddha from the accretions of Chinese philosophy and superstition. Unlike Muslim hadith critics, however, Ching Lu authors depended primarily on searching for anomalous contents in the books they critiqued – teachings that resembled Chinese lore, for example, were red flags for forgery. Although identifying the authors or translators of books of Buddhist teachings served as part of the Ching Lu critical arsenal, the absence of an elaborate isnād tradition and the many anonymously written texts made such transmission criticism much less common than in the Islamic hadith tradition.3 The second function of hadiths, that of a medium of connection to the Prophet and a framework for imagining historical relationships through the isnād, is only partially concerned with authenticity. It is more than anything the foundation of a religious worldview. Although the isnād was developed as a tool for authenticating hadiths, it reflected and eventually became the embodiment of a more general conception of the transmission of authority. The isnād was the key to distinguishing between reliable and unreliable hadiths for Muslim scholars, but it was also a language for expressing connections with teachers, saints, and the Prophet himself. As a criterion for textual reliability, the strength and historical accuracy of an isnād was essential. As a medium for connection, the isnād took on a meaning far beyond and indeed in spite of its historicity. Even if only as a formality, possessing some sort of isnād back to the Prophet was the essential mark of a Muslim scholar. Short isnāds for hadiths became a means of close connection to the Prophet's blessings. Bizarre isnāds were collected like rare coins – it was the rarity and supposed shortness of an isnād that made it valuable, not the authenticity of the hadith it communicated. In Sufism, the isnād was the chain of transmission for the Prophet's blessings (baraka), ethical instruction, and esoteric knowledge. The cloak (khirqa) served as the outward manifestation of this chain, literally a means of investiture into the socially expansive class of Sufi devotees. Even in its abstract sense of a connection to the first and most authoritative interpreter of God's revelation, the Prophet, however, the isnād had practical groundings. Arabic texts, whether individual hadiths or entire treatises, were written in a script that left many vowels unwritten and that could easily be misread. Reading a book or a hadith properly thus required the presence of a teacher who had heard that text read aloud. Transmission from teacher to student, however, involved more than just this practical utility. Muslim scholars believe that this living relationship passed on the light of sacred learning and the 'living word of knowledge,' as Plato (d. 347 BCE) called it, from one generation to the next.4 Transmission creates and passes on authority. Muslims have often touted this connective function of the isnād as unique to Islamic thought. Indeed, neither Christianity nor Judaism developed a tradition as intricate or ubiquitous as the isnād. But the concept of transmission creating and controlling interpretive authority is also a common theme in other traditions.5 When the Christian philosopher and maverick theologian Peter Abelard (d. 1142 CE) dared to offer a class in which he provided his own commentary on biblical scripture, students were aghast. To innovate one's own commentary on the scriptures without having the collective commentaries of generations of church scholars painstakingly explained by a teacher, one's link to this interpretive chain, was unthinkable.6 In medieval Judaism the concept of a chain of transmission that passed on an understanding of the revealed scriptures and bequeathed authority in the process was known as 'the chain of tradition (shalshelet hakabbalah).'7 The commonalities that the Islamic hadith tradition shares with other faith traditions remind us of the supreme importance of context at the close of this study. The grand tradition of Muslim hadith criticism emphasizes the paramount place of authenticity in the Islamic religious worldview. When the great hadith scholar al-Khatīb al-Baghdādī died in 1071 CE, crowds carrying his casket through the streets of Baghdad shouted 'Make way! Make way for him who fended off lies from the Messenger of God!'8 But discussing the words attributed to Muhammad, debating their authenticity and potential meaning, has never been a discourse that has taken place in objective or neutral isolation. Always there are great consequences. Discussions of the proper place of the Prophet's Sunna began among Muslims in the shadow of unspoken assumptions about the true nature of God's message to Muhammad. Ever looming over these debates have been weighty implications for how that religion would take shape on earth. If we cannot trust a body of hadiths, Muslims have asked, or if we lose the hadith corpus to modern historical criticism, how do we know God's will and sacred law? As al-Shāfi'ī asked, how do we know how to pray?9 Torn between a commitment to critical rigor and the duty to provide answers for the masses, Muslim hadith critics have always had to balance the scholarly integrity of rigorous historians with the needs and expectations of the Muslim community as a whole. In no matter have consequences been more intimidating than in that of protecting the purity of the Prophet's message from alien influences. The study and criticism of hadiths among Muslims began as a means to protect the Muslim community from competing claims to truth, such as Greek philosophy, Christian thought, or purely rational approaches to law and worship. The Partisans of Hadith, who later formed the core of Sunni Islam, and the isnād itself arose as a conservative reaction to fears of the foreign influence that other Near Eastern faiths and philosophies might have upon the still maturing Muslim community. Later, debates over the isnāds of Sufism centered on doubts over and defenses of the Islamic authenticity of Sufi beliefs and practices. Concerns over the influence of Greek philosophy or Christianity have faded into history. But today questioning whether or not Muslims can trust the historical reliability of hadiths conjures the twin specters of Western control over defining Islam and Muslims' anxieties about how to reconcile their faith with the hegemonic power of Western science. Always there are consequences for Muslims' sense of Islamic authenticity. Difficult as it has been to achieve in reality, Muslim scholars have always clung to the ideal of freeing the historical criticism of words attributed to Muhammad from the grasp of consequence and the hopes and multiform fears that always surround us. Yet the modern world is perilous and unrelenting in its temptations and terrors. After our discussion of Muslim and Western perspectives on the hadith tradition and Islamic history, we are left with a great quandary for both Muslim and non-Muslim scholars: what forces should determine our interactions with the past? Plato's Socratic voice, a voice long heeded in Islamic civilization as intently as it has been in the West, echoes across the aeons: 'I have heard a report of the ancients, whether it is true or not only they know; although if we had found the truth ourselves, do you think that we should care much about the opinions of men?'10 Wa Allāhu a'lam (And God knows best). ENDNOTES 1 'Alī Jum'a, personal communication. 2 James A. Sanders, Canon and Community, p. 14. 3 Kyoko Tokuno, 'The Evaluation of Indigenous Scriptures in Chinese Buddhist Bibliographical Catalogues,' pp. 31–59. 4 Plato, Phaedrus, p. 276a. 5 Al-Nawawī, Sharh Sahīh Muslim, vol. 1, p. 119. 6 Peter Abelard, 'Historia Calimatatum,' p. 63. 7 See Pirkei Avot, 1.1; Martin Jaffe, Torah in the Mouth (Oxford University Press, 2001), pp. 30, 56–61. 8 Al-Dhahabī, Tadhkirat al-huffāz, vol. 3, p. 226. 9 Al-Shāfi'ī, al-Risāla, p. 177. 10 Plato, Phaedrus, p. 274c. GLOSSARY 'Adl: literally, 'justice' or 'just'; half of the qualification for being a reliable hadith transmitter (along with dabt). In the early period of hadith criticism, being 'adl simply meant generally being an honest and truthful person. In the later period of hadith criticism, 'adl meant being 'Muslim, of age, of sound mind, free of the paths of sin and flaws in honor.' This later definition included not being an extremist or proselytizing member of a non-Sunni group. Āhād: literally 'individuals'; a category of hadiths transmitted by individuals as opposed to being massively transmitted (mutawātir). Āhād hadiths were any hadiths that did not meet the requirements for massive transmission (tawātur). This categorization was introduced into Muslim hadith scholarship in the tenth and eleventh centuries CE by legal theorists. Ahl-e Quran: a twentieth-century Muslim school of thought particularly prominent in India and later Pakistan, which advocated the rejection of hadiths and a reliance on the Quran alone (see pp. 280–286). Akhbār: 'reports'; transmitted stories about historical events. Akhbār as a category includes hadiths, but akhbār often do not involve the life of the Prophet or feature isnāds. Muslim scholars such as Ibn Ishāq (d. 150/767) and al-Madā'inī (d. 228/843), who collected and compiled akhbār (Akhbāriyūn), are closer to 'historians' than 'hadith scholars.' 'Ālī: 'elevated'; a transmission of a hadith with a relatively short isnād (see pp. 48–51). Amālī: hadith dictation sessions, often occurring in major mosques, in which a scholar read out a selection of hadiths with full isnāds back to the Prophet before an audience. Ansāb: 'genealogies'; an early genre of Arab-Islamic historical writing that traced and recorded the genealogies of tribes along with stories and historical information about individuals. Ash'arī: one of the three main schools of Sunni theology, named after Abū al-Hasan al-Ash'arī (d. 324/935–6), which began as a defense of Sunni literalist theology using rationalist methods but later incorpor-ated many rationalist beliefs into Sunni Islam as well. Baraka: 'blessings' ; the spiritual benefit that one receives from proximity to God, the Prophet, or pious individuals. Bid'a: literally 'innovation'; although it is generally understood as heretical innovation in religious matters. Companions (Arabic, Sahāba): the founding generation of Muslims who knew and lived with the Prophet. In Sunni Islam, anyone who saw the Prophet and died as a Muslim is considered a Companion (see pp. 89–91). Dabt: literally 'accuracy'; or the requirement that a hadith transmitter generally be corroborated in his or her transmissions. Along with 'adāla (see 'adl), dabt was one of the two components necessary to make a transmitter 'reliable (thiqa)' – although dabt was the more important of the two. Da'īf: 'weak'; a complex term that generally denoted an unreliable hadith (see pp. 102–106). Gharīb: 'strange'; denoting a hadith with limited corroboration but not necessarily meaning that it contradicted more reliable hadiths or was unreliable (see p. 98). In the later period of hadith criticism it was used to describe a hadith that was sahīh but was only known through one chain of transmission. Hasan: 'fair'; a term describing a hadith that, while not meeting the isnād requirements to be sahīh, either did not have flaws serious enough to be considered weak or enjoyed some form of bolstering corroboration. Hasan hadiths were admissible as proofs in law but not theology (see p. 105). Idrāj: the phenomenon of the words of a hadith transmitter being mistaken for part of the hadith itself (see mudraj). Ihsān: the highest level of faith for Muslims, namely acting as if you could physically sense God watching over you (see p. 198). Ijāza: the permission to transmit a hadith or book. Ijāzas could take three forms: 1) ijāzat al-riwāya (the permission of transmission), which simply gave a student the right to transmit a hadith from a scholar; 2) ijāzat al-dirāya (the permission of knowledge), which meant that a teacher had acknowledged that a student had mastered the contents of a book and was thus qualified to teach it to others; 3) ijāzat al-tazkiya (the permission of purification), which meant that a student had spent sufficient time around a scholar to absorb that scholar's ethics and good behavior, with that chain of learning going back to the Prophet (see pp. 44–46). Ijtihād: independent interpretation; the action of a scholar returning to the Quran, Sunna, and interpretive methods of Muslim scholars to revaluate a legal ruling or find an answer to an unanswered question. 'Ilal: plural of 'illa, or 'flaw'; flaws in the isnād of a hadith that only become evident when that isnād is compared with other chains of transmission for that hadith (see pp. 98–99). Imam: in Sunni Islam, either the person leading the prayer or an exceptionally prominent scholar; in Shiite Islam, one of the descendants of the Prophet who inherited his interpretive authority. Isnād: the chain of transmission of a hadith. Isrā'īliyyāt: stories from Jewish lore, usually about biblical prophets, included in the Islamic tradition. Jinn: creatures mentioned in the Quran and hadiths who are composed of fire or hot wind and live unseen alongside human beings. Kashf: 'unveiling'; direct inspiration from God granted to a pious Muslim (see pp. 114–115). Khirqa: the shawl or cloak with which a Sufi initiate was invested when joining a Sufi order or receiving the blessings of a Sufi saint (see pp. 202–204). Late Sunni Tradition: the version of Sunni orthodoxy that emerged in the 1300s and has characterized Islamic civilization in the Middle East and South Asia until the modern period. It consists of an institutional combination of the four Sunni schools of law, the Ash'arī or Māturīdī schools of speculative theology, and Sufi brotherhoods. Madhhab: a Muslim school of law. Maghāzī: literally 'campaigns'; early collections of reports about the Prophet's battles and the early Muslim conquests. Mahdī: 'the guided one'; an apocalyptical figure descended from the Prophet whom both Sunnis and Shiites believe will return at the end of time to bring justice to the earth. Mashhūr: in the early period of hadith criticism, mashhūr meant a hadith that was well known, widely corroborated, and held to be an authentic representation of the Prophet's Sunna. With the influence of legal theorists in the tenth and eleventh centuries, it took on the meaning of a hadith that, while not reaching the technical requirements for the certainty provided by massive transmission (tawātur), had been verified by communal consensus and was thus reliable enough to inform dogma and restrict the meaning of Quranic verses. Matn: the text of a hadith. Mudraj: adjective describing a hadith in which idrāj (see above) has occurred. Mu'jam: a hadith collection in which a scholar organized hadiths around a certain theme. Munkar: 'unacceptable' or merely 'unfamiliar'; in the early period of hadith criticism it meant a hadith that was either uncorroborated or broke with other similar narrations either in its isnād or its meaning. In the later period, it came to mean a hadith that had only one chain of transmission without that isnād being strong enough to justify accepting it. Munqati': 'broken'; an isnād in which some transmitter, usually not in the early part of the isnād, cites a source whom he never actually met. Mursal: literally 'cast'; in the early period of hadith criticism it meant a hadith in which a transmitter cited someone or the Prophet without actually having met him. The term later came to mean a hadith in which a Successor quotes the Prophet without naming the intermediating Companion (see pp. 94–95). Mustakhraj: a genre of hadith collections in which a scholar used his own hadith corpus to replicate an existing hadith collection (see pp. 52–54). Mutāba'a: 'parallelism'; a narration that corroborated that a certain person had heard a hadith from a certain teacher by serving as evidence that a different student had heard the same hadith from that teacher (see pp. 95–98). Mutawātir: 'massively transmitted'; a term imported into hadith criticism from legal theory to describe a hadith that is so widely transmitted that there can be no possibility of it being forged (see p. 107). Mu'tazila: a school of Muslim rationalists that died out in Sunni Islam in the fourteenth century CE but survived in Imami and Zaydi Shiism. Muttasil: 'contiguous'; describing an isnād whose components all met and studied with one another and thus includes no breaks. Naskh: the abrogation of Quranic verses either by other verses or the Sunna. Also, it can be the abrogation of one hadith by another hadith. Nāzil: a relatively long isnād for a hadith; the opposite of 'ālī. Qudsī: adjective for hadiths in which the Prophet quotes God speaking (see p. 63–64). Sahīh: 'sound' or 'authentic'; the highest level of strength for an isnād (see pp. 104–107). Salafī: a complex and multifaceted term that came into use in the early twentieth century to describe the return to the methods and beliefs of the Salaf, 'the Righteous Forebears,' usually understood to mean the first three generations of Muslims. Sariqat al-hadīth: 'stealing a hadith,' or fitting an existing hadith with a new isnād. Shādhdh: 'anomalous'; although influential hadith critics like al-Hākim al-Naysābūrī (d. 405/1014) used the term shādhdh to mean a hadith that had only one narration, al-Shāfi'ī (d. 204/820) and the vast majority of scholars used it to mean a hadith that contradicted more reliable narrations or the Quran. Shāhid: a 'witness' narration or attestation, usually meaning a hadith narrated from a totally different isnād but containing the same meaning as the hadith in question and thus bolstering its reliability. Sharh: a commentary that a scholar composes about an existing book, such as a hadith collection or book of law. Sīra: literally 'biography'; generally referring to the biography of the Prophet. Sīra is distinct from hadith collections because it follows a chronological or narrative structure and often includes material without complete isnāds. Successors: the generation of Muslims who followed and learned from the Companions. Tadlīs: obfuscation in transmission; either intentionally or unintentionally narrating a hadith in a manner that obscures or omits transmitters in the isnād. Tafsīr: Quranic exegesis; during the first two centuries Hijrī tafsīr mainly consisted of glosses, or explanations of Quranic words. It soon developed into a genre of more expansive Quranic commentary on the linguistic contents, historical circumstances and meanings of verses. Takhrīj: 'indexing'; finding all the appearances of a hadith in various books and hadith collections. Taqlīd: 'imitation'; a term with both positive and pejorative connotations. Supporters of taqlīd define it as a non-scholar or non-specialist following the opinion of a qualified scholar. Those who reject taqlīd, especially adherents of the Salafī tradition, would translate it as 'blind imitation,' namely following scholars without any concern for proof. Taraf/Atrāf: the first part of the text of a hadith or its most well-known part. Ulema: the Arabic word for Muslim scholars. Sunna: the normative precedent of the Prophet. In the early Islamic period, Sunna meant the normative precedent of the early Islamic community (namely the Companions and the Successors) as a whole. Zawā'id: a genre of hadith books that listed all the hadiths found in books outside the hadith canon as well as any narrations of hadiths from the canonical collections found in the non-canonical works. BIBLIOGRAPHY Primary Sources 'Abdallāh b. Ahmad b. Hanbal. Kitāb al-sunna, ed. Muhammad al-Qahtānī. Dammam, Dār Ibn al-Qayyim, 1986 —— Masā'il al-imām Ahmad Ibn Hanbal riwāyat ibnihi, ed. Zuhayr al-Shāwīsh. Beirut, al-Maktab al-Islāmī, 1981 'Abduh, Muhammad. The Theology of Unity, trans. Ishaq Musa'ad and Kenneth Cragg. London, George Allen & Unwin, 1966 Abelard, Peter. 'Historia Calimatatum,' in The Letters of Abelard and Heloise. Trans. Betty Radice. London, Penguin Books, 1974 Abū Ghudda, 'Abd al-Fattāh (ed.). Arba' rasā'il fī 'ulūm al-hadīth, 6th ed. Beirut, Maktab al-Matbū'āt al-Islāmiyya, 1999 Abū Khaythama Zuhayr b. Harb. Kitāb al-'ilm, ed. Muhammad Nāsir al-Dīn al-Albānī. Beirut, al-Maktab al-Islāmī, 1983 Abū Rayya, Mahmūd. Adwā' 'alā al-sunna al-muhammadiyya. Cairo, Dār al-Ta'līf, 1958 Acton, John Lord, A Lecture on the Study of History. London, MacMillan & Co., 1905 Al-Ahdal, 'Abd al-Rahmān b. Sulaymān. Al-Nafas al-yamānī. Sanaa, Markaz al-Dirāsāt wa al-Abhāth al-Yamaniyya, 1979 Al-'Ajlūnī, Ismā'īl b. Ahmad. Kashf al-khafā', ed. Ahmad al-Qalāsh. Cairo, Dār al-Turāth, [n.d.] Al-'Alā'ī, Salāh al-Dīn. Jāmi' al-tahsīl fī ahkām al-marāsīl, ed. Hamdī 'Abd al-Majīd. Beirut, 'Ālam al-Kutub, 2005 Al-Albānī, Muhammad Nāsir al-Dīn. Mukhtasar Sahīh al-Bukhārī. Riyadh, Maktabat al-Ma'ārif, 2002 —— Adab al-zaffāf. Beirut, al-Maktab al-Islāmī, 1989 —— Da'īf Sunan Ibn Mājah. Riyadh, Maktabat al-Ma'ārif, 1998 —— Sahīh al-Jāmi' al-saghīr, ed. Zuhayr al-Shāwīsh. 3rd ed. Beirut, al-Maktab al-Islāmī, 1988 —— Sahīh al-Targhīb wa al-tarhīb. Riyadh, Maktabat al-Ma'ārif, 2000 —— Silsilat al-ahādīth al-da'īfa wa al-mawdū'a, 2nd ed. Riyadh, Maktabat al-Ma'ārif, 2000 —— Silsilat al-ahādīth al-sahīha, new ed. Riyadh, Maktabat al-Ma'ārif, 1995 —— 'Silsilat as'ilat Abī Ishāq al-Huwaynī li'l-shaykh Muhammad Nāsir al-Dīn al-Albānī,' lecture from www.islamway.com, last accessed 6/3/2004 —— 'Tafsīr,' lecture from www.islamway.com, last accessed 6/3/2004 —— 'Tarjamat al-shaykh al-Albānī – Nash'at al-Shaykh fī Dimashq,' lecture from www.islamway.com, last accessed 6/3/2004 —— 'al-Zawāj,' lecture from www.islamway.com, last accessed 6/3/2004 Al-Ash'arī, Abū al-Hasan. Maqālāt al-islāmiyyīn, ed. Helmut Ritter. Istanbul, Dar al-Funūn, [1928] Al-'Askarī, Abū Hilāl. Kitab al-awā'il, ed. Walīd Qassāb. Riyadh, Dār al-'Ulūm, 1981 Al-Baghawī, al-Husayn b. Mas'ūd. Masābīh al-sunna. Beirut, Dār al- Qalam, [197–] Al-Barbahārī, Abū Muhammad. Sharh al-sunna, ed. Khālid al-Raddādī. Beirut, Dār al-Sumay'ī, 2000 Al-Bayjūrī, Burhān al-Dīn Ibrāhīm. Hāshiyat al-imām al-Bayjūrī 'alā Jawharat al-tawhīd, ed. 'Alī Jum'a. Cairo, Dār al-Salām, 2006 Al-Buhūtī, Mansūr. Al-Rawd al-murbi', ed. Bashīr Muhammad 'Uyūn. Damascus, Maktabat Dār al-Bayān, 1999 Al-Bukhārī, Muhammad b. Ismā'īl. Kitāb al-du'afā' al-saghīr, ed. Muhammad Zāyid. Beirut, Dār al-Ma'rifa, 1986 —— Sahīh al-Bukhārī. Cited by chapter, subchapter system —— Al-Tārīkh al-awsat, ed. Muhammad al-Luhaydān. Riyadh, Dār al-Sumay'ī, 1998 Cicero, Marcus. The Nature of the Gods (De Natura Deorum), trans. Horace McGregor. New York, Penguin, 1967 Al-Dārimī, 'Abdallāh b. 'Abd al-Rahmān. Al-Sunan. Cited according to chapter, subchapter system Al-Dhahabī, Shams al-Dīn. Mīzān al-i'tidāl fī naqd al-rijāl, ed. 'Alī Muhammad al-Bijāwī. [Beirut], Dār Ihyā' al-Kutub al-'Arabiyya, n.d. Reprint of the Cairo edition published by 'Īsā al-Bābī al-Halabī, 1963–4 —— Siyar a'lām al-nubalā', ed. Shu'ayb al-Arnā'ūt et al. Beirut, Mu'assasat al-Risāla, 1992–1998 —— Tadhkirat al-huffāz, ed. Zakariyyā 'Umayrāt. Beirut, Dār al-Kutub al-'Ilmiyya, 1998 Al-Dimashqī, Abū Zur'a. Tārīkh Abī Zur'a al-Dimashqī, ed. Khālid Mansūr. Beirut, Dār al-Kutub al-'Ilmiyya, 1996 Al-Fadlī, 'Abd al-Hādī and al-Shahīd al-Thānī. Introduction to Hadīth, including Dirāyat al-Hadīth, trans. Nazmina Virjee. London, Islamic College for Advanced Studies, 2002 Al-Fārisī, 'Abd al-Ghāfir. Tārīkh Naysābūr, ed. Muhammad Kāzim al-Hamūdī. Qum, Jamā'at al-Mudarrisīn, 1983 Al-Ghazālī, Abū Hāmid. Ihyā' 'ulūm al-dīn, ed. Muhammad Wahbī Sulaymān and Usāma 'Ammūra, 5 vols. Damascus, Dār al-Fikr, 2006 —— Al-Iqtisād fī al-i'tiqād. Cairo, Mustafā al-Bābī al-Halabī, n.d. —— Al-Mankhūl min ta'līqāt al-usūl, ed. Muhammad Hasan Hītū. [Damascus], n.p., [1970] Al-Ghazālī, Muhammad. Al-Sunna al-nabawiyya bayn ahl al-fiqh wa ahl al-hadīth, 13th ed. Cairo, Dār al-Shurūq, 2005 —— Turāthunā al-fikrī, 8th ed. Cairo, Dār al-Shurūq, 2003 Al-Ghumārī, 'Abdallāh. Itqān al-san'a fī tahqīq ma'nā al-bid'a, ed. 'Abdallāh al-Minshāwī. Cairo, Maktabat al-Qāhira, 2005 —— Al-Khawātir al-dīniyya. Cairo, Maktabat al-Qāhira, 2004 ——Tawjīh al-'ināya li-ta'rīf 'ilm al-hadīth riwāya wa dirāya, ed. Safwat Jawda Ahmad. Cairo, Maktabat al-Qāhira, 2002 Al-Ghumārī, Ahmad. Al-Burhān al-jalī fī tahqīq intisāb al-sūfiyya ilā 'Alī, ed. Ahmad Mursī. Cairo, Maktabat al-Qāhira, [n.d.] —— Dar' al-da'f 'an hadīth man 'ashiqa fa-'aff, ed. 'Iyād al-Ghawj. Cairo, Dār al-Imām al-Tirmidhī, 1996 —— Ibrāz al-wahm al-maknūn min kalām Ibn Khaldūn. Damascus, Maktabat al-Taraqqī, 1928 —— Ju'nat al-attār fī taraf al-fawā'id wa nawādir al-akhbār (n.p., n.d.) —— Al-Mudāwī li-'ilal al-Jāmi' al-saghīr wa sharhayy al-Munāwī. Egypt, Dār al-Kutub, 1996 Gibbon, Edward. The Decline and Fall of the Roman Empire. New York, The Modern Library, n.d. Hammām b. Munabbih. Sahīfat Hammām b. Munabbih, ed. Rif'at Fawzī 'Abd al-Muttalib. Cairo, Maktabat al-Khānjī, 1985 Al-Hārūnī, Ahmad b. al-Husayn. Al-Amālī al-sughrā, ed. 'Abd al-Salām al-Wajīh. Sa'da, Yemen, Dār al-Turāth al-Islāmī, 1993 Haykal, Muhammad Husayn. Hayāt Muhammad, 10th ed. Cairo, Dār al-Ma'ārif, 1969 Herodotus. The Histories, trans. Aubrey De Sélincourt. London, Penguin Books, 1996 Hujvīrī, 'Alī. Kashf al-mahjūb. Tehran, Ketābkhāne-ye Tūrī, 1979 Al-Humaydī, Abdallāh b. al-Zubayr. Al-Musnad, ed. Habīb al-Rahmān al-A'zamī. Karachi, al-Majlis al-'Ilmī, 1963 Ibn 'Abd al-Barr, Yūsuf. Jāmi' bayān al-'ilm wa fadlihi, ed. 'Abd al-Rahmān Muhammad 'Uthmān. Medina, al-Maktaba al-Salafiyya, [1968] —— Kitāb al-Tamhīd, ed. Mustafā al-'Alawī and Muhammad al-Bakrī. [Rabat], Wizārat 'Umūm al-Awqāf, 1982 Ibn Abī al-'Izz al-Hanafī, Muhammad. Sharh al-'Aqīda al-Tahāwiyya, ed. Muhammad Nāsir al-Dīn al-Albānī. Amman, al-Dār al-Islāmī, 1998 Ibn Abī Ya'lā al-Hanbalī. Tabaqāt al-hanābila, ed. 'Alī Muhammad 'Umar. Cairo, Maktabat al-Thaqāfa al-Dīniyya, 1998 Ibn 'Adī, 'Abdallāh. Al-Kāmil fī du'afā' al-rijāl. Beirut, Dār al-Fikr, 1985 Ibn 'Aqīl, Muhammad. Al-'Atb al-jamīl 'alā ahl al-jarh wa al-ta'dīl, ed. Hasan al-Saqqāf. Amman, Dār al-Imām al-Nawawī, 2004 Ibn 'Asākir, 'Alī b. Hasan. Tārīkh madīnat Dimashq, ed. 'Umar al-'Amrawī. Beirut, Dār al-Fikr, 1995–1997 Ibn Bābawayh, Muhammad b. 'Alī. Amālī al-Sadūq, ed. Muhammad Mahdi al-Musawī. Najaf, al-Matba'a al-Haydariyya, 1970 —— Man lā yahduruhu al-faqīh, ed. Muhammad Ja'far Shams al-Din. Beirut, Dar al-Ta'āruf li'l-Matbū'āt, 1994 Ibn Battāl, 'Alī b. Khalaf. Sharh Sahīh al-Bukhārī, ed. Ibrāhīm Yāsir Ibrāhīm. Riyadh, Maktabat al-Rushd, 2003 Ibn al-Farrā, Abū Ya'lā. Al-'Udda fī usūl al-fiqh, ed. Ahmad Sīr al-Mubārak. Beirut, Mu'assasat al-Risāla, 1980 Ibn Hajar al-'Asqalānī. Fath al-bārī sharh Sahīh al-Bukhārī, ed. 'Abd al-'Azīz b. Bāz and Ayman Fu'ād 'Abd al-Bāqī. Beirut, Dār al-Kutub al-'Ilmiyya, 1997 —— Huda al-sārī, ed. Ayman Fu'ād 'Abd al-Bāqī and 'Abd al-'Azīz b. Bāz. Beirut, Dār al-Kutub al-'Ilmiyya, 1997 —— Hidāyat al-ruwāt ilā takhrīj ahādīth al-Misbāh wa'l-Mishkāt, ed. Muhammad Nāsir al-Dīn al-Albānī. Dammam, Dār Ibn al-Qayyim, 2001 —— Al-Matālib al-'āliya fī zawā'id al-masānīd al-thamāniya, ed. Habīb al-Rahmān al-A'zamī. Kuwait, Wizārat al-Awqāf, 1973 —— Al-Nukat 'alā kitāb Ibn al-Salāh, ed. Mas'ūd al-'Adanī and Muhammad Fāris. Beirut, Dār al-Kutub al-'Ilmiyya, 1994 —— Talkhīs al-habīr. Cairo, Sharikat al-Tibā'at al-Fanniyya, 1964 Ibn Hajar al-Haytamī, Ahmad b. Muhammad. Al-Fatāwā al-hadīthiyya, ed. Muhammad al-Mar'ashlī. Beirut, Dār Ihyā' al-Turāth al-'Arabī, 1998 Ibn Hanbal, Ahmad. Kitāb fadā'il al-sahāba, ed. Wasī Allāh Muhammad 'Abbās. Beirut, Mu'assasat al-Risāla, 1983 —— Al-Musnad. Citations are to the standard Maymaniyya print of the book Ibn Hibbān al-Bustī. Sahīh Ibn Hibbān, ed. Shu'ayb al-Arnā'ūt and Husayn Asad. Beirut, Mu'assasat al-Risāla, 1984 Ibn al-Jawzī, 'Abd al-Rahmān. Kitāb al-qussās wa al-mudhakkirīn, ed. Merlin S. Swartz. Beirut: Dar El-Machreq, 1986 —— Kitāb al-mawdū'āt, ed. 'Abd al-Rahmān 'Uthmān. Medina, al-Maktaba al-Salafiyya, 1966–1968 —— Mashyakhat Ibn al-Jawzī, ed. Muhammad Mahfūz. Beirut, Dār al-Gharb al-Islāmī, 2006 —— Talbīs Iblīs. Cairo, Matba'at Nahda, 1928 Ibn Khaldūn, 'Abd al-Rahmān. The Muqaddimah: An Introduction to History. Trans. Franz Rosenthal. Ed. N.J. Dawood. Princeton, Princeton University Press, 1967 Ibn Khuzayma, Muhammad b. Ishāq. Sahīh Ibn Khuzayma, ed. Muhammad Mustafā al-A'zamī. Beirut, al-Maktab al-Islāmī, [1970] Ibn Ma'īn, Yahyā. Kitāb al-'ilal wa ma'rifat al-rijāl, ed. Muhammad al-Jazā'irī. Beirut, Dār Ibn Hazm, 2004 Ibn Mājah, Muhammad b. Yazīd. Sunan. Cited according to chapter, subchapter system Ibn Manda, Muhammad b. Ishāq. Shurūt al-a'imma, ed. 'Abd al-Rahmān al-Farīwā'ī. Riyadh, Dār al-Muslim, 1995 Ibn al-Mubrad, Yūsuf. Tahdhīb al-nafs li'l-'ilm bi'l-'ilm, ed. Adīb al-Kamdānī. [Damascus], [n.p.], 1995 Ibn al-Murtadā, Ahmad b. Yahyā. Tabaqāt al-mu'tazila, ed. Suzanna Diwald-Wilzer. Beirut, Dār Maktabat al-Hayāt, [1980] Ibn al-Nadīm. The Fihrist, ed. and trans. Bayard Dodge. New York, Columbia University Press, 1970; Chicago, Kazi Publications, 1998 Ibn Nuqta, Muhammad b. 'Abd al-Ghanī. Kitab al-Taqyīd li-ma'rifat ruwāt al-sunan wa al-masānīd, ed. Kamāl Yūsuf al-Hūt. Beirut, Dār al-Kutub al-'Ilmiyya, 1988 Ibn Qayyim al-Jawziyya. I'lām al-muwaqqi'īn, ed. Tāhā 'Abd al-Ra'ūf Sa'd. Beirut, Dār al-Jīl, 1973 —— Kitāb al-rūh, ed. 'Ārif al-Hājj. Beirut, Dār Ihyā' al-'Ulūm, 1988 Ibn Qutayba al-Dīnawarī. Ta'wīl mukhtalif al-hadīth, ed. Muhammad Zuhrī al-Najjār. Beirut, Dār al-Jīl, 1973 Ibn Sa'd, Muhammad. Al-Tabaqāt al-kubrā. Beirut, Dār Sādir, [1968] Ibn al-Salāh, Abu 'Amr 'Uthmān. Muqaddimat Ibn al-Salāh, ed. 'Ā'isha 'Abd al-Rahmān. Cairo, Dār al-Ma'ārif, 1990 Ibn Taymiyya, Taqī al-Dīn. Majmū'at al-fatāwā, ed. Sayyid Husayn al-'Affānī and Khayrī Sa'īd. Cairo, al-Maktaba al-Tawfīqiyya, [n.d.] Ibn al-Wazīr, Muhammad. Kitāb tanqīh al-anzār fī ma'rifat 'ulūm al-āthār, ed. Muhammad Subhī Hallāq. Beirut, Dār Ibn Hazm, 1999 Al-'Irāqī, Zayn al-Dīn 'Abd al-Rahīm. Al-Bā'ith 'alā al-khalās min hawādith al-qussās, ed. Muhammad Lutfī al-Sabbāgh. Damascus, Dār al-Warrāq, 2001 —— Al-Taqyīd wa al-īdāh, ed. Muhammad 'Abbās Shāhīn. Beirut, Dār al-Kutub al-'Ilmiyya, 1999 Al-Isbahānī, Abū Nu'aym. Dhikr akhbār Isbahān, ed. Sayyid Khusrawī Hasan. Beirut, Dār al-Kutub al-'Ilmiyya, 1990 —— Hilyat al-awliyā' wa tabaqāt al-asfiyā'. Beirut, Dār al-Fikr, 2006 Al-Ishbīlī, Muhammad b. Khayr. Fahrasat mā rawāhu 'an shuyūkhihi min al-dawāwīn al-musannafa fī durūb al-'ilm wa anwā' al-ma'ārif. Beirut, al-Maktab al-Tijārī, 1963 Al-Jāhiz, Abū 'Uthmān. Rasā'il al-Jāhiz, ed. 'Abd al-Salām Muhammad Hārūn. Cairo, Maktabat al-Khānjī, 1964 Al-Jassās, Abū Bakr. Ahkām al-Qur'ān, ed. Muhammad Qamhāwī. 5 vols. Beirut, Dār Ihyā' al-Turāth al-'Arabī, 1985 —— Usūl al-Jassās, ed. Muhammad Tāhir. Beirut, Dār al-Kutub al-'Ilmiyya, 2000 Al-Jawzaqānī, al-Husayn b. Ibrāhīm. Al-Abātīl wa al-manākīr wa al-sihāh wa al-mashāhīr, ed. Muhammad Hasan Muhammad. Beirut, Dār al-Kutub al-'Ilmiyya, 2001 Al-Jazā'irī, Tāhir. Tawjīh al-nazar ilā usūl al-athar, ed. 'Abd al-Fattāh Abū Ghudda. Aleppo, Maktabat al-Matbū'āt al-Islāmiyya, 1995 Jum'a, 'Alī. Al-Bayān li-mā yushghalu bihi al-adhhān. Cairo, Muqattam, 2005 Al-Juwaynī, Imām al-Haramayn. Ghiyāth al-umam fī tiyāth al-zulam. Ed. Mustafā Hilmī and Fu'ād 'Abd al-Mun'im. Alexandria, Dār al-Da'wa, 1400/1980 Al-Kawtharī, Muhammad Zāhid. Maqālāt al-Kawtharī. Cairo, al-Maktaba al-Azhariyya, 1994 Al-Khalīlī, al-Khalīl b. 'Abdallāh. Al-Irshād fī ma'rifat 'ulamā' al-hadīth, ed. 'Āmir Ahmad Haydar. Mecca, Dār al-Fikr, 1993 Al-Khatīb al-Baghdādī. Jāmi' akhlāq al-rāwī wa ādāb al-sāmi', ed. Muhammad Sa'īd. Mansoura, Egypt, Dār al-Wafā', 2002 —— Al-Kifaya fī ma'rifat usūl 'ilm al-riwāya, ed. Abū Ishāq Ibrāhīm al-Dimyātī. Cairo, Dār al-Hudā, 2003 —— 'Nasīhat li-ahl al-hadīth.' In Majmū'at al-rasā'il fī 'ulūm al-hadīth, ed. Nasr Abū 'Atāyā, pp. 111–126. Mansoura, Egypt; Dār al-Khānī, 1994 —— Taqyīd al-'ilm, ed. Yūsuf al-'Ishsh. Aleppo, Dār al-Wa'ī, [n.d.] —— Tārīkh Baghdād, ed. Mustafā 'Abd al-Qādir 'Atā. Beirut, Dār al-Kutub al-'Ilmiyya, 1997 Al-Khattābī, Hamd. Ma'ālim al-sunan, 2nd ed. Beirut, al-Maktaba al-'Ilmiyya, 1981 Al-Kulaynī, Muhammad b. Ya'qūb. Al-Kāfī, trans. Muhammad Hasan al-Rizvani. Karachi, Islamic Research Center, 1995 —— Al-Usūl al-kāfī, ed. Muhammad Ja'far Shams al-Dīn. Beirut, Dār al-Ta'āruf li'l-Matbū'āt, 1998 Livy, Titus. The Early History of Rome. London, Penguin Books, 1960 Mālik b. Anas. Muwatta'. Cited according to the chapter, subchapter system Al-Maqdisī, Ibn Qudāma. Al-Mughnī, ed. 'Abd al-Fattāh al-Hulw and 'Abdallāh al-Turkī. Cairo, Hujr, 1986–1990 Al-Miswarī, Ahmad b. Sa'd al-Dīn. Al-Risāla al-munqidha min al-ghiwāya fī turuq al-riwāya, ed. Hamūd al-Ahnūmī. Sana'a, Maktabat Badr, 1997 Al-Munāwī, 'Abd al-Ra'ūf. Fayd al-qadīr sharh al-Jāmi' al-saghīr. Mecca: Maktabat Nizār Mustafā al-Bāz, 1998 —— Al-Jāmi' al-azhar min hadīth al-nabī al-anwar. Cairo, al-Markaz al-'Arabī li'l-Bahth wa al-Nashr, 1980 Al-Mundhirī, 'Abd al-'Azīm. Jawāb al-hāfiz Abī Muhammad 'Abd al-'Azīm al-Mundhirī'an asi'la fī al-jarh wa'l-ta'dīl, ed. 'Abd al-Fattāh Abū Ghudda. Beirut, Maktabat al-Matbū'āt al-Islāmiyya, 1990 Muslim b. al-Hajjāj. Kitāb al-tamyīz, ed. Muhammad al-A'zamī. Riyadh, Matba'at Jāmi'at Riyād, [1975] —— Sahīh Muslim. Cited according to the chapter, subchapter system Al-Najāshī, Ahmad b. 'Alī. Rijāl al-Najāshī, ed. Muhammad Jawād al-Nā'īnī. Beirut, Dār al-Adwā', 1988 Al-Nasā'ī, Ahmad b. Shu'ayb. Sunan. Cited according to the chapter, subchapter system Al-Nawawī, Muhyī al-Dīn. Al-Adhkār al-muntakhab min sayyid al-abrār. Cairo, Dār al-Manār, 1999 —— Sharh Sahīh Muslim. Beirut, Dār al-Qalam, 1987 Al-Naysābūrī, al-Hākim. Kitāb al-madkhal ilā ma'rifat kitāb al-iklīl, ed. Ahmad b. Fāris al-Sulūm. Beirut, Dār Ibn Hazm, 2003 —— Al-Mustadrak. Hyderabad, Dā'irat al-Ma'ārif al-'Uthmāniyya, 1917–1925 Petrarch, Francesco. The Secret, trans. William H. Draper. London: Chatto & Windus, 1911 Polybius. The Histories, trans. Mortimer Chambers. New York, Washington Square Press, 1966 Al-Qābisī, 'Alī b. Muhammad. Muwatta' al-imām Mālik, ed. Muhammad b. 'Alawī al-Mālikī. Abu Dhabi, al-Majma' al-Thaqāfī, 2004 Al-Qādī 'Iyād b. Mūsā. Kitāb al-shifā bi-ta'rīf huqūq al-mustafā. Beirut, Dār Ibn Hazm, 2002 Al-Qaradāwī, Yūsuf. Kayfa nata'āmalu ma'a al-sunna al-nabawiyya. Herdon, VA, International Institute for Islamic Thought, 1990 Qārī, Mullā 'Alī. Al-Asrār al-marfū'a fī al-akhbār al-mawdū'a, ed. Muhammad Lutfī Sabbāgh. Beirut, al-Maktab al-Islāmī, 1986 —— Al-Masnū' fī ma'rifat al-hadīth al-mawdū', ed. 'Abd al-Fattāh Abū Ghudda. Beirut, Dār al-Bashā'ir al-Islāmiyya, 2005 Qazvīnī, Nāsir al-Dīn. Ketāb-e naqd-e ma'refat beh ba'd-e mathāleb al-navāseb fī naqd ba'd fadā'eh al-ravāfed, ed. Jalāl al-Dīn Hosaynī Ormavī. [Tehran], Chāp-khāne-ye Sepehr, [1952] Al-Qurtubī, Muhammad b. Ahmad. Al-Jāmi' li-ahkām al-Qur'ān, ed. Muhammad Ibrāhīm al-Hifnāwī and Mahmūd Hāmid 'Uthmān. 20 vols in 10. Cairo, Dār al-Hadīth, 1994 Al-Rāfi'ī, Muhammad b. 'Abd al-Karīm. Al-Tadwīn fī akhbār Qazwīn, ed. 'Azīz Allāh al-'Utāridī. Beirut, Dār al-Kutub al-'Ilmiyya, 1987 Al-Rāzī, Abū Zur'a. Abū Zur'a al-Rāzī wa juhūduhu fī al-sunna al-nabawiyya ma'a tahqīq kitābihi al-Du'afā' wa ajwibatihi 'alā as'ilat al-Bardha'ī, ed. Sa'dī al-Hāshimī. Medina, Cairo, Dār al-Wafā' and Maktabat Ibn al-Qayyim, 1989 Al-Rāzī, Ibn Abī Hātim. 'Ilal al-hadīth. Beirut, Dār al-Ma'rifa, 1985 —— Al-Jarh wa al-ta'dīl. Hyderabad, Dā'irat al-Ma'ārif al-'Uthmāniyya, 1952–1953 —— Al-Taqdima. Hyderabad, Dā'irat al-Ma'ārif al-'Uthmāniyya, 1952 Ridā, Muhammad Rashīd. Al-Manār (journal) Al-Sa'd, 'Abdallāh. 'Sharh Kitāb al-Tamyīz,' lecture from www.islamway.com, last accessed 6/3/2004 —— 'Sharh al-Mūqiza,' lecture from www.islamway.com, last accessed 6/3/2004 Al-Sakhāwī, Shams al-Dīn. Fath al-mughīth, ed. 'Alī Husayn 'Alī. Cairo, Maktabat al-Sunna, 2003 —— Al-Maqāsid al-hasana, ed. Muhammad Khisht. Beirut: Dār al-Kitāb al-'Arabī, 2004 Al-Sam'ānī, Abū Sa'd. Adab al-imlā' wa al-istimlā'. Beirut, Dār al-Kutub al-'Ilmiyya, 1981 Al-San'ānī, 'Abd al-Razzāq. Musannaf, ed. Habīb al-Rahmān al-A'zamī. Beirut, al-Maktab al-Islāmī, 1983 Al-San'ānī, Muhammad b. Ismā'īl. Dīwān al-Amīr al-San'ānī. Beirut, Manshūrāt al-Madīna, 1986 —— Irshād al-nuqqād ilā taysīr al-ijtihād, ed. Muhammad Subhī Hasan. Beirut, Mu'assasat al-Rayyān, 1992 —— [Question and Answer], Ms. Majāmī' 1, Dār al-Awqāf, Sana'a Al-Sarakhsī, Muhammad b. Ahmad. Usūl al-Sarakhsī, ed. Abū al-Wafā' al-Afghānī. Beirut, Dār al-Kutub al-'Ilmiyya, 1993 Al-Sarraj, Abū Nasr. The Kitáb al-Luma' fi'l-Tas.awwuf, ed. Reynold Nicholson. London, Luzac & Co., 1963 Sāwī, Ahmad b. Muhammad. Hāshiyat al-Sāwī 'alā Tafsīr al-Jalālayn, ed. 'Alī Muhammad al-Dabbā'. Bombay, Surtis Sons, [1981] Al-Shāfi'ī, Muhammad b. Idrīs. Al-Risāla, ed. Ahmad Shākir. Beirut, al-Maktaba al-'Ilmiyya, [n.d.] —— Al-Umm. Cairo, Dār al-Sha'b, 1968 Shaltūt, Mahmūd. Al-Fatāwā. Cairo, Dār al-Shurūq, 1983 Al-Sha'rānī, 'Abd al-Wahhāb. Al-Mīzān al-kubrā. Cairo, Maktabat Zahrān, [n.d.] —— Al-Tabaqāt al-kubrā / Lawāmih al-anwār fī tabaqāt al-akhyār, ed. Sulaymān al-Sālih. Beirut, Dār al-Ma'rifa, 2005 Al-Sijistānī, Abū Dāwūd. 'Risālat al-imām Abī Dāwūd al-Sijistānī ilā ahl Makka fī wasf Sunanihi.' In Thalāth rasā'il fī 'ilm mustalah al-hadīth, ed. 'Abd al-Fattāh Abū Ghudda, pp. 27–54. Aleppo, Maktab al-Matbū'āt al-Islāmiyya, 1997 —— Al-Sunan. Cited according to chapter, subchapter system Spinoza, Benedict. Theological-Political Treatise, trans. Michael Silverthorne and Jonathan Israel. Cambridge: Cambridge University Press, 2007 Al-Subkī, Tāj al-Dīn. Tabaqāt al-shāfi'iyya al-kubrā, ed. Mahmūd Muhammad al-Tanāhī and 'Abd al-Fattāh Muhammad al-Hulw. [Cairo], 'Īsā al-Bābī al-Halabī, 1964 —— Al-Sayf al-saqīl fī al-radd 'alā ibn al-Zafīl, eds. Muhammad Zāhid al-Kawtharī and 'Abd al-Hafīz 'Atiyya. [Cairo], Matba'at al-Sa'āda, 1937 Al-Suhrawardī, 'Umar b. Muhammad. 'Awārif al-ma'ārif, ed. Adīb al-Kamdānī and Muhammad al-Mustafā. Mecca, al-Maktaba al-Makkiyya, 2001 Al-Sulamī, Abū 'Abd al-Rahmān. Kitāb al-arba'īn fī al-tasawwuf. Hyderabad, Dā'irat al-Ma'ārif al-'Uthmāniyya, 1950 —— Tabaqāt al-sūfiyya, ed. Nūr al-Dīn Shurayba. Cairo, Maktabat al-Khānjī, 1997 Al-Suyūtī, Jalāl al-Dīn. Al-Azhār al-mutanāthira fī al-ahādīth al- mutawātira, ed. 'Abd al-'Azīz al-Ghumārī. Cairo, Dār al-Ta'līf, [n.d.] —— Al-Hāwī li'l-fatāwī, 2nd ed. Beirut, Dār al-Kutub al-'Ilmiyya, 1975 —— Jam' al-jawāmi' al-ma'rūf bi'l-Jāmi' al-kabīr. [Cairo], Majma' al-Buhūth al-Islāmiyya, 1970 —— Al-Jāmi' al-saghīr. Beirut, Dār al-Kutub al-'Ilmiyya, 2004 —— Al-La'ālī' al-masnū'a fī al-ahādīth al-mawdū'a, ed. Sālih b. Muhammad b. 'Uwayda. Beirut, Dār al-Kutub al-'Ilmiyya, 1996 —— Al-Khasā'is al-kubrā. Beirut, Dār al-Kitāb al-'Arabī, n.d. —— 'al-Ta'zīm wa al-manna fī anna abawayh rasūl Allāh fī al-janna.' In Silsilat matbū'āt Dā'irat al-Ma'ārif al-'Uthmāniyya, 50, 1915, pp. 1–46 —— Nazm al-'iqyān fī a'yān al-a'yān, ed. Philip Hitti. Beirut, al-Maktaba al-'Ilmiyya, 1927 Al-Tabarānī, Abū al-Qāsim. Al-Mu'jam al-saghīr, ed. 'Abd al-Rahmān Muhammad 'Uthmān. Beirut, Dār al-Fikr, 1981 Al-Tabrīzī, Muhammad al-Khatīb. Miskhat al-Masabih, trans. James Robson. Lahore, Sh. Muhammad Ashraf, 1963 Al-Tirmidhī, Muhammad b. 'Īsā. Al-Jāmi'. Cited according to the chapter, subchapter system Al-Tūfī, Najm al-Dīn. Risāla fī ri'āyat al-maslaha, ed. Ahmad 'Abd al-Rahīm al-Sāyih. Cairo, al-Dār al-Misriyya al-Lubnāniyya, 1993 Al-'Uqaylī, Abū Ja'far. Kitāb al-du'afā' al-kabīr, ed. 'Abd al-Mu'tī Qal'ajī. Beirut, Dār al-Kutub al-'Ilmiyya, 1984 Voltaire. La Philosophie de l'Histoire. Utrecht, n.p., 1765 Al-Wādi'ī, Muqbil bin Hādī. Majmū' fatāwā al-Wādi'ī, ed. Sādiq al- Baydānī. n.p., 2005 —— Al-Makhraj min al-fitna, 3rd ed. Sa'da, Maktabat San'ā' al-Athariyya, 2002 Al-Wā'ilī, Abū Nasr. Risālat al-Sijzī ilā ahl Zabīd fī al-radd 'alā man ankara al-harf wa al-sawt, ed. Muhammad b. Karīm b. 'Abdallāh. Riyadh, Dār al-Rāya, 1994 Al-Wāsitī, Aslam b. Sahl Bahshal. Tārīkh Wāsit, ed. Kūrkīs 'Awwād. Baghdad, Matba'at al-Ma'ārif, 1967 Al-Wazīrī, Sārim al-Dīn Ibrāhīm. Al-Falak al-dawwār fī 'ulūm al-hadīth wa al-fiqh wa al-āthār, ed. Muhamad Yahyā 'Azzān. Sa'da, Dār al-Turāth al-Yamanī, 1994 Wolf, Friedrich August. Prolegomena to Homer, ed. and trans. Anthony Grafton, Glenn W. Most and James E.G. Zetzel. Princeton, Princeton University Press, 1985 Al-Zarkashī, Badr al-Dīn Muhammad. Al-Bahr al-muhīt fī usūl al-fiqh, ed. Muhammad Muhammad Tāmir. Beirut, Dār al-Kutub al-'Ilmiyya, 2007 —— Al-Tadhkira fī al-ahādīth al-mushtahira, ed. Mustafā 'Abd al-Qādir 'Atā. Beirut, Dār al-Kutub al-'Ilmiyya, 1406/1986 Zayd b. 'Alī. Musnad Zayd b. 'Alī. Beirut, Dār Maktabat al-Hayāt, 1966 Al-Zayla'ī, Jamāl al-Dīn. Nasb al-rāya li-ahādīth al-Hidāya, ed. Muhammad 'Awwāma. Jeddah, Mu'assasat al-Rayyān, 1997 Secondary Sources Abbott, Nabia. Studies in Arabic Literary Papyri II: Qur'ānic Commentary and Tradition. Chicago, University of Chicago Press, 1967 Abd al-Rauf, Muhammad. 'Íadīth Literature – I: The Development of the Science of H.adīth,' in The Cambridge History of Arabic Literature: Arabic Literature until the End of the Umayyad Period, eds. A.F.L. Beeston et al., pp. 271–288. London, Cambridge University Press, 1983 Abū Zahra, Muhammad. Abū Hanīfa. Cairo, Dār al-Fikr al-'Arabī, 1965 —— Ibn Hanbal. Cairo, Dār al-Fikr al-'Arabī, [1965] —— Ibn Taymiyya. Cairo, Dār al-Fikr al-'Arabī, 1964 —— Mālik. Cairo, Dār al-Fikr al-'Arabī, 2002 —— Al-Shāfi'ī. Cairo, Dār al-Fikr al-'Arabī, 1996 Ahmad, Aziz. Islamic Modernism in India and Pakistan. London, Oxford University Press, 1967 —— and G.E. von Grunebaum, eds. Muslim Self-Statement in India and Pakistan 1857–1968. Wiesbaden, Otto Harrassovitz, 1970 Amir-Moezzi, Mohammed Ali. The Divine Guide in Early Shi'ism. Trans. David Streight. Albany, SUNY Press, 1994 Anjum, Ovamir. Politics, Law, and Community in Islamic Thought. Cambridge, Cambridge University Press, 2012 Al-'Awd, Sahl. Al-Mu'īn 'alā ma'rifat kutub al-arba'īn. Beirut, 'Ālam al-Kutub, 2005 'Awwāma, Muhammad. Athar al-hadīth al-sharīf fī ikhtilāf al-a'imma al-fuqahā', 2nd ed. Cairo, Dār al-Salām, 1987 Azami, Muhammad. Studies in Early H.adīth Literature. Kuala Lumpur, Islamic Book Trust, 2000 Al-'Azzān, Muhammad Yahyā. Al-Sahāba 'ind al-zaydiyya. Sana'a, Markaz al-Turāth, 2004 Benjaminson, Peter and David Anderson. Investigative Reporting, 2nd ed. Ames, Iowa, Iowa State University Press, 1990 Bentley, Jerry. Humanists and Holy Writ. Princeton, Princeton University Press, 1983 Brooke, Rosalind and Christopher. Popular Religion in the Middle Ages: Western Europe 1000–1300. New York, Barnes and Noble, 1984 Brown, Daniel. Rethinking Tradition in Modern Islamic Thought. Cambridge, Cambridge University Press, 1996 Brown, Jonathan A.C. The Canonization of al-Bukhārī and Muslim. Leiden, Brill, 2007 —— 'Critical Rigor versus Juridical Pragmatism: How Legal Theorists and H.adīth Scholars Approached the Backgrowth of Isnāds in the Genre of 'Ilal al-H.adīth,' Islamic Law and Society 14, no. 1, 2007, pp. 1–41 —— 'A Man for All Seasons: Ibn 'Uqda and Crossing Sectarian Boundaries in the Fourth/Tenth Century,' Al-'Usul al-Wusta 24, 2016, pp. 139–144 —— 'How We Know Early H.adīth Critics Did Matn Criticism and Why It's So Hard to Find.' Islamic Law and Society 15, 2008, pp. 143–184 —— 'The Last Days of al-Ghazzālī and the Tripartite Division of the Sufi World,' The Muslim World 96, 2006, pp. 89–113 —— 'The Rules of Matn Criticism: There Are No Rules.' Islamic Law and Society 19, 2012, pp. 356–396 Brumfitt, J.H. Voltaire, Historian. Oxford, Oxford U. Press, 1958 Buckley, Ron. 'On the Origins of Shī'i Hadīth.' Muslim World, 88, no. 2, 1998, pp. 165–184 Burton, John. An Introduction to the Hadith. Edinburgh, Edinburgh University Press, 1994 Buzpinar, Tufan. 'Opposition to the Ottoman Caliphate in the Early Years of Abdülhamid II: 1877–1882,' Die Welt des Islams, 36, no. 1, 1996, pp. 59–89 Chittick, William. Imaginal Worlds: Ibn 'Arabī and the Problem of Religious Diversity. Albany, SUNY Press, 1994 —— The Sufi Path of Knowledge. Albany, SUNY Press, 1989 Cook, Michael. Early Muslim Dogma: a Source-Critical Approach. Cambridge, Cambridge University Press, 1981 —— 'Eschatology and the Dating of Traditions,' Princeton Papers in Near Eastern Studies 1, 1992, pp. 23–47 Crone, Patricia. Meccan Trade and the Rise of Islam. Princeton, Princeton University Press, 1987 —— Roman, Provincial and Islamic Law. Cambridge, Cambridge University Press, 1987 Donner, Fred. 'From Believers to Muslims: Confessional Self-identity in the Early Islamic Community,' al-Abh.āth, 50–51, 2002–3, pp. 9–53 —— Muhammad and the Believers. Cambridge, MA, Belknap Press, 2010 —— Narratives of Islamic Origins. Princeton, Darwin Press, 1998 Ehrman, Bart D. The New Testament, 2nd ed. New York, Oxford University Press, 2000 Federspiel, Howard M. Sultans, Shamans and Saints. Honolulu, University of Hawai'i Press, 2007 Frampton, Travis. Spinoza and the Rise of Historical Criticism of the Bible. New York, T&T Clark, 2006 Frei, Hans. The Eclipse of Biblical Narrative. New Haven, Yale University Press, 1974 Gay, Peter, ed. Deism: An Anthology. Princeton, D. van Nostrand Co., 1968 Ghamidi, Javed Ahmad. Islam: A Comprehensive Introduction. Trans. Shehzad Saleem. Lahore, Al Mawrid, 2014 Gilmore, Myron P. Humanists and Jurists. Cambridge, MA, Belknap Press, 1963 Gleave, Robert. 'Between Hadīth and Fiqh: The "Canonical" Imāmī Collections of Akhbār.' Islamic Law and Society 8, no. 3, 2001, pp. 350–382 Goldziher, Ignaz. Introduction to Islamic Theology and Law, trans. Andras and Ruth Hamori. Princeton, Princeton University Press, 1981 —— Muslim Studies II, trans. and ed. S.M. Stern and G.R. Barber. Chicago, Aldine Atherton, 1971 Hallaq, Wael. 'On the Authoritativeness of Sunni Consensus,' International Journal of Middle East Studies, 18, no. 4, 1986, pp. 427–454 Halm, Heinz. Shi'ism, trans. Janet Watson and Marian Hill. 2nd ed. New York, Columbia University Press, 2004 Hanioğlu, M. Şükrü. A Brief History of the Late Ottoman Empire. Princeton, Princeton University Press, 2008 Hassan, Mona. Longing for the Lost Caliphate. Princeton, Princeton University Press, 2016 Hodgson, Marshall. The Venture of Islam. Chicago, University of Chicago Press, 1974 Howard, Thomas A. Religion and the Rise of Historicism. Cambridge, Cambridge University Press, 2000 Ishaq, Muhammad. India's Contribution to Hadith Literature. Dhaka, University of Dacca, 1955 Al-'Izzī, 'Abdallāh Hamūd. 'Ilm al-hadith 'ind al-zaydiyya wa al-muhaddithīn. Sana'a, Mu'assasat al-Imām Zayd b. 'Alī, 2001 Jum'a, 'Alī. Qawl al-sahābī 'ind al-usūliyyīn. Cairo, Dār al-Risāla, 2004 Juynboll, G.H.A. The Authenticity of the Tradition Literature: Discussions in Modern Egypt. Leiden, Brill, 1969 —— Muslim Tradition: Studies in Chronology, Provenance and Authorship of Early H.adīth. London, Cambridge University Press, 1983 —— '(Re)Appraisal of some Hadith Technical Terms,' Islamic Law and Society, 8, no. 3, 2001, pp. 303–349 —— Studies on the Origins and Uses of Islamic H.adīth. Aldershot, Variorum, 1996 Karateke, Hakan and Maurus Reinkowski, eds. Legitimizing the Order: The Ottoman Rhetoric of State Power. Leiden, Brill, 2005 Kohlberg, Etan. A Medieval Muslim Scholar at Work. Leiden, Brill, 1992 —— 'Shī'ī Hadīth,' in The Cambridge History of Arabic Literature: Arabic Literature until the End of the Umayyad Period, eds Beeston, A.F.L. et al. London, Cambridge University Press, 1983, pp. 299–307 —— 'Al-Usūl al-Arba'umi'a,' Jerusalem Studies in Arabic and Islam, 10, 1987, pp. 128–166 Kramer, Martin. Islam Assembled: The Advent of the Muslim Congresses. New York, Columbia University Press, 1986 Krentz, Edgar. The Historical Critical Method. Philadelphia, Fortress Press, 1975 Al-Lahhām, Badī' al-Sayyid. Al-Imām al-hāfiz Jalāl al-Dīn al-Suyūtī wa juhūduhu fī al-hadīth wa 'ulūmihi. Damascus, Dār Qutayba, 1994 Lecker, Michael. 'Biographical Notes on Ibn Shihāb al-Zuhrī,' Journal of Semitic Studies, 41, 1996, pp. 21–63 Levtzion, Nehemia, ed. Conversion to Islam. New York, Holmes & Meier, 1979 Von Leyden, W. 'Antiquity and Authority: A Paradox in the Renaissance Theory of History,' Journal of the History of Ideas 19, no. 4, 1958, pp. 473–92 Lings, Martin. What is Sufism? Berkeley, University of California Press, 1975 Lucas, Scott. Constructive Critics: H.adīth Literature and the Articulation of Sunnī Islam. Leiden, Brill, 2004 Mahmūd, 'Abd al-Majīd. Abū Ja'far al-Tahāwī wa atharuhu fī al-hadīth. Cairo, al-Maktaba al-'Arabiyya, 1975 Marchand, Suzanne L. German Orientalism in the Age of Empire. Cambridge, Cambridge University Press, 2009 Massad, Joseph A. Islam in Liberalism. Chicago, University of Chicago Press, 2015 Melchert, Christopher. 'The Musnad of Ah.mad Ibn H.anbal: How It Was Composed and What Distinguishes It from the Six Books.' Der Islam, 82, 2005, pp. 32–51 Mernissi, Fatema. Women and Islam: An Historical and Theological Enquiry, trans. Mary Joe Lakeland. Oxford, Basil Blackwell, 1987 Modaressi, Hossein. Tradition and Survival: A Bibliographical Survey of Early Shī'ite Literature, Vol. 1. Oxford, Oneworld, 2003 Momigliano, Arnaldo. Studies in Historiography. London, Weidenfeld & Nicolson, 1966 Morgan, Robert and John Barton. Biblical Interpretation. Oxford, Oxford University Press, 1988 Motzki, Harald. 'Dating Muslim Traditions: a Survey,' Arabica, 52, no. 2, 2005, pp. 204–253 —— 'Der Fiqh des Zuhrī: die Quellenproblematik,' Der Islam, 68, 1991, pp. 1–44 —— 'The Murder of Ibn Abī Íuqayq.' In The Biography of Muh.ammad, ed. Harald Motzki, pp. 170–239. Leiden, Brill, 2000 —— 'The Mus.annaf of 'Abd al-Razzāq al-S.an'ānī as a Source of Authentic Ah.ādīth of the First Century A.H,' Journal of Near Eastern Studies, 50, 1991, pp. 1–21 —— 'Quo vadis, Ḥadīt-Forschung? Eine kritische Untersuchung von G.H.A. Juynboll: "Nāfi' the mawlā of Ibn 'Umar, and his position in Muslim Ḥadīt Literature," ' Der Islam, 73, no. 1, 1996, pp. 40–80 Muir, William. The Life of Moh.ammad. Edinburgh, John Grant, 1923 Nakissa, Aria. 'The Fiqh of Revolution and the Arab Spring: Secondary Segmentation as a Trend in Islamic Legal Doctrine,' Muslim World, 105, 2015, pp. 398–421 Nurbakhsh, Javad. Traditions of the Prophet. New York, Khaniqahi-Nimatullahi Publications, 1981 Perrin, Norman. What Is Redaction Criticism? Philadelphia, Fortress Press, 1969 Powers, David S. 'On Bequests in Early Islam,' Journal of Near Eastern Studies, 48, no. 3, 1989, pp. 185–200 Rahman, Fazlur. Islamic Methodology in History. Karachi, Central Institute for Islamic Research, 1965 Randall, John Herman Jr. The School of Padua and the Emergence of Modern Science. Padua, Editrice Antenore, 1961 Reichmuth, Stefan. 'MurtaÃā al-Zabīdī (d. 1791) in Biographical and Autobiographical Accounts: Glimpses of Islamic Scholarship in the 18th Century,' Die Welt des Islams, 39, no. 1, 1999, pp. 64–102 Rice, Eugene F. Jr. and Anthony Grafton. The Foundations of Early Modern Europe, 1460–1559. 2nd ed. New York, W.W. Norton, 1994 Rodenbeck, Max. Cairo: the City Victorious. Cairo, American University in Cairo Press, 1998 Safi, Omid, ed. Progressive Muslims. Oxford, Oneworld, 2003 Sanders, James A. Canon and Community. Philadelphia, Fortress Press, 1984 Sayeed, Asma. Women and the Transmission of Religious Knowledge in Islam. Cambridge, Cambridge University Press, 2015 Sayoud, Halim. 'Author discrimination between the Holy Quran and the Prophet's statements,' Literary and Linguistic Computing 27, no. 4, 2012, pp. 427–444 Schacht, Joseph. The Origins of Muhammadan Jurisprudence. Oxford, Clarendon Press, 1975 —— 'A Revaluation of Islamic Tradition,' Journal of the Royal Asiatic Society, 1949, pp. 143–154 Scholder, Klaus. The Birth of Modern Critical Theology, trans. John Bowden. Philadelphia, Trinity Press, 1996 Sezgin, Fuat. Geschichte des arabischen Schrifttums. Leiden, Brill, 1967–2000 Stewart, Devin. 'The Genesis of the Akhbārī Revival.' in Safavid Iran and Her Neighbors, ed. Michel Mazzaoui, pp. 169–189. Salt Lake City, University of Utah Press, 2003 Al-Tahāwī, Abū Ja'far. The Creed of Imam al-Tahāwī, trans. Hamza Yusuf. N.p., Zaytuna Institute, 2007 Tokuno, Kyoko. 'The Evaluation of Indigenous Scriptures in Chinese Buddhist Bibliographical Catalogues.' In Chinese Buddhist Apocrypha, ed. Robert Buswell, Jr., pp. 31–59. Honolulu, University of Hawaii Press, 1990 Trimingham, J. Spencer. The Sufi Orders in Islam. New York, Oxford University Press, 1971 Troeltsch, Ernst. 'Historical and Dogmatic Method in Theology.' in Religion in History, ed. and trans. James A. Luther and Walter Bense. Minneapolis, Fortress Press, 1991 Troll, Christian W. Sayyid Ahmad Khan: A Reinterpretation of Muslim Theology. New Delhi, Vikas Press, 1978 Voll, John. 'Two Biographies of Ahmad Ibn Idris al-Fasi (1760–1837),' International Journal of African Historical Studies, 6, no. 3, 1973, pp. 633–645 Wadud, Amina. The Quran and Woman. New York, Oxford University Press, 1999 Wen Fong. 'The Problem of Forgery in Chinese Painting: Part One,' Artibus Asiae, 25, no. 2/3, 1962, pp. 95–110 Woods, John. The Aqquyunlu. Salt Lake City, University of Utah Press, 1999 ACKNOWLEDGMENTS First of all, I must thank the editor of Oneworld's Foundations of Islam series, Omid Safi, whose generosity and good manners have improved my life immensely. I extend my gratitude to all the friends and colleagues whom I bothered with this book. I sincerely thank Omar Anchassi, Ovamir Anjum, Christopher Anzalone, Andrew Booso, Sarah Eltantawi, Alyssa Gabbay, Andreas Görke, Najam Haider, Majid Khan, Suheil Laher, Mohammed Rustom, Saleem Seedat, Justin Sterns, and Devin Stewart for reading the manuscript and providing me with invaluable feedback. I am very grateful to my friends Garrett Davidson, Mohamed El-Sharawi, Matthew Ingalls, and Scott Lucas, without whose insightful (and lengthy) discussions I could not have covered much of the material in this book. Garrett Davidson deserves special thanks for expanding my understanding of the isnād in later Islamic history. I am grateful to Drs. Mark Goodacre of Duke University and Martin Jaffe for discussing biblical parallels of hadith with me. I must also thank my students at the University of Washington and the esteemed UW Historians Reading Group, who helped me work out the contents of this book. Generous financial support for writing this book came from the Center for Arabic Study Abroad (CASA II), the American Institute for Yemeni Studies, and the University of Washington. As for my own contributions, I am entirely indebted to my teachers, particularly Fred Donner, John Esposito, Maysam al-Faruqi, Musa Furber, 'Alī Zayn al-'Ābidīn al-Jifrī, 'Alī Jum'a, Wadad al-Kadi, Haifaa Khalafallah, 'Imād 'Abbās Sa'īd, Sayyid Shaltūt, Barbara Stowasser, Tareq al-Suwaidan, and John Voll. The bulk of the credit goes to an exceptional scholar, Osama al-Syed Mahmoud, who opened my eyes to the study of hadith. Although I know them only through their books and recorded lectures, I must admit my inestimable debt to Muhammad Abū Zahra, 'Abdallāh al-Sa'd, Muhammad Nāsir al-Dīn al-Albānī, 'Abd al-Fattāh Abū Ghudda and the two hadith masters of our age, Ahmad and 'Abdallāh, the sons of al-Siddīq al-Ghumārī, rahimahum Allāh. Of course, any failings in this book are my own responsibility and no fault of those who instructed me. I must also thank my wonderful family, especially my mother, Dr. Ellen Brown, who remains a scholarly inspiration to me. My sisters Kate, Lucinda, and Senem, my aunt Kate and my friends Asad Naqvi and Brenden Kerr require special thanks for keeping me sane and making sure I dress decently. ILLUSTRATIONS 2.0 Leading Hadith Transmitters from the Companions 2.1 Transmission and Criticism of Hadiths from the Companions of the Prophet and Successors 2.2 Subchapter from 'Abd al-Razzāq's Musannaf Concerning Ablutions 2.3 Musnad Organization 3.0 Types of Errors and Forgery in Hadiths 3.1 Generations of Sunni Hadith Critics 3.2 Corroboration 3.3 Rating of Hadiths and Their Uses among the Early and Later Hadith Critics 3.4 Hadith Prohibiting Putting on one's Shoes while Standing: the Transmission of Abū Hurayra 3.5 Hadith Prohibiting Putting on one's Shoes while Standing: the Transmission of Anas b. Mālik 3.6 Hadith Prohibiting Putting on one's Shoes while Standing: the Transmission of Jābir b. 'Abdallāh 3.7 Hadith Prohibiting Putting on one's Shoes while Standing: the Transmission of Ibn 'Umar 3.8a Hadith 1 on the Qadarite Heresy: 'Two types...' – the Narration of Ibn 'Abbās 3.8b Hadith 1 on the Qadarite Heresy: Sundry Narrations 3.9 Hadith 2 on the Qadarite Heresy: 'The Zoroastrians of my nation ...' 4.0 The Twelve Imams 4.1 Forms of Imami Shiite Hadiths 9.0 Schacht's Common Link 9.1 Juynboll's Common Link Theory 9.2 Cook's Theory of Tadlīs and Spread of Isnāds 9.3 Isnād/Matn Analysis Oneworld Academic An imprint of Oneworld Publications First published by Oneworld Publications 2009 This ebook edition published 2017 This revised edition published by Oneworld Academic 2018 Copyright © Jonathan A. C. Brown 2009, 2018 The right of Jonathan A. C. Brown to be identified as the Author of this work has been asserted by him in accordance with the Copyright, Designs and Patents Act 1988 All rights reserved Copyright under Berne Convention A CIP record for this title is available from the British Library ISBN 978–1–78607–307–5 eISBN 978–1–78607–308–2 Typeset by Jayvee, Trivandrum, India Oneworld Publications 10 Bloomsbury Street London WC1B 3SR England
{ "redpajama_set_name": "RedPajamaBook" }
3,207
I always use the black heavy duty nail files to file any chipboard projects or to sand around photos added to wood photo blocks. So easy to hold and get into tiny areas of your project. Also Catseye inks are the best for inking edges of projects!
{ "redpajama_set_name": "RedPajamaC4" }
9,788
Q: Select Box not in line in IE Ok, didn't really want to ask this question as it should be quite a simple solution, but I've spent hours trying to resolve it to no avail. I have a web page with a text box, and then a select drop down next to each other. In Firefox and chrome they line up fine next to each other, but in IE the select box sits higher than the text box. Theres is no CSS applied to this select box, or the text box. This is an aspx page, the generate HTML source for this is: <label for="ctl00_main_primaryEmail" id="ctl00_main_primaryEmailLabel">Primary Email: </label> <input name="ctl00$main$primaryEmail" type="text" id="ctl00_main_primaryEmail" /> <select name="ctl00$main$acceptedDomainsDropDownList" id="ctl00_main_acceptedDomainsDropDownList"> <option value="domain.com">domain.com</option> <option value="doamin1.com">domain1.com</option> <option value="domain2.com">domain2.com</option> <option value="domain3.com">domain3.com</option> </select> A: Are you using any CSS to reset the margins and padding across all tags? It's quite useful to start your stylesheet with something like: *,html { margin: 0; padding: 0; } This gets rid of many rendering inconsistencies between browsers (i.e. IE) and the extra CSS needed to provide padding/margins where actually needed tends to be minimal. With this "reset" rule in place the boxes line up in IE (6 & 7 tested), though the issues of different default font-sizes remains: alt text http://www.mikrogroove.com/stackoverflow/textbox_selectbox_alignment.gif A: It turns out this issue was CSS related. It was a border setting for the select element buried deep in the IE only stylesheet of the Blueprint Library, hence not showing up in firebug. For anyone else that comes across it, its this CSS for the select element margin : 0.5em 0px A: I have tried the following code. This lines up perfectly, when testing in IE7. <input type="text"> <select> <option>option1</option> <option>option2</option> </select> My guess is that some CSS styling from parent elements (body, form, parent classes) gets applied to one or both of these elements, but without seeing the source code, this is hard to judge. A: using a table for layout might help A: I'd suggest putting your form in some surrounding markup. I commonly use definition lists, so the markup would be something like <dl> <dt> <label for="ctl00_main_primaryEmail" id="ctl00_main_primaryEmailLabel">Primary Email: </label> </dt> <dd> <input name="ctl00$main$primaryEmail" type="text" id="ctl00_main_primaryEmail" /> </dd> <dt style="display: none;"> <label for="ctl00_main_acceptedDomainsDropDownList">Accepted Domains</label> </dt> <dd> <select name="ctl00$main$acceptedDomainsDropDownList" id="ctl00_main_acceptedDomainsDropDownList"> <option value="exchange.samcogan.com">exchange.samcogan.com</option> <option value="doamin1.com">domain1.com</option> <option value="domain2.com">domain2.com</option> <option value="domain3.com">domain3.com</option> </select> </dt> </dl> Then you can float/position the dt and dd elements to appear in a single horizontal row. This approach, whether you use a dl, ul or other, gives better positioning in general.
{ "redpajama_set_name": "RedPajamaStackExchange" }
4,453
The regional group ends a record year with a victory at the BOBs January 4, 2022 by Editorial staff Receiving a 2021 Best Ottawa Business (BOB) award is an extraordinary achievement – and for the team of Regional group is one more reason to celebrate the success of the past year. Since 1958, Regional Group has helped shape real estate in Ottawa and throughout Canada's National Capital Region. From its humble beginnings, the company has grown into a real estate powerhouse that offers a multitude of services to clients and investors – with projects ranging from land and commercial development, investment arrangements and urban infill to creation and delivery of complete master plans. communities. Today, Regional is recognized as one of Ottawa's most trusted and trusted developers. The company consists of a real estate pipeline of more than $ 5.2 billion, with several projects at various stages of development in Ontario and Quebec, as well as a management portfolio of more than 2.9 million feet square meters of commercial space and 2,000 residential units. . Regional has six divisions: property and asset management, investment and leasing, business development, land development, tax advice and appraisal and production house construction through the award-winning affiliate eQ Homes. This vertical integration is a powerful differentiator that allows the company to create value for its clients throughout the lifecycle of real estate investments. In 2020, Regional Group implemented a successful succession plan, transferring leadership from longtime CEO Steve Gordon to third-generation family member and son, Sender Gordon, who took the reins, gaining confidence and respect for the industry. Although 2021 presented its challenges, the maneuvers through the pandemic played on Regional's strengths. The company – known for not being content with the status quo – has successfully adapted its strategy to find new and innovative ways to capitalize on technology and business opportunities. Despite the uncertainty of the past two years, Regional has experienced significant growth and continued to diversify its line of business, resulting in a year of record earnings and earnings. The recent creation of a new commercial and multi-family division has allowed Regional to grow and prosper in the competitive market for the development of office parks and mixed-use apartment buildings. Regional has also developed two specially constructed rental properties in Greystone Village. Milieu Modern Apartments – the first of two properties – was occupied in November 2021, providing a much anticipated high-quality rental option for hundreds of Ottawa families. eQ Homes GOHBA Awarded Best Single-Family Home (2,000-3,000 sq. ft.) Additionally, Regional's affiliate and award-winning builder eQ Homes, recorded a record year with over 350 new home and condo sales, the completion of four phases in planned communities in the greater Ottawa area and added a vast collection of industry awards 2021 to their portfolio. The company continues to be driven by a philosophy of integrity and embodies a creative, forward-thinking and innovative culture. Regional attributes its success to its growing team of industry experts and recognizes the value of investing in local talent. "Our team has grown significantly over the past few years and I am very proud of the entire regional team and flagship team," said Sender Gordon, President and CEO of Regional Group. "Nothing we do can be accomplished without the support of a full team. " Regional is thrilled to celebrate the success of the past year and is thrilled to join previous year's winners of the Best Ottawa Business Award. The team congratulates all local businesses and recipients for their accomplishments and a big thank you to the Ottawa Business Journal and the Ottawa Chamber of Commerce for this honor. Storm Crow Alehouse is critically hit and will close this month How Bruyère cut costs and increased care with Algonquin's Lean program Sharp increase in firearms arrested by TSA at DC airports in 2021 Parents speak out on 'exhausting' toll on COVID stress Men over 40 should try shoulder taps for a stronger core Why is Huel protein powder suddenly so popular?
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
1,488
\section{\@startsection {section}{1}{\z@} {-30pt \@plus -1ex \@minus -.2ex} {2.3ex \@plus.2ex} {\normalfont\normalsize\bfseries\boldmath}} \renewcommand\subsection{\@startsection{subsection}{2}{\z@} {-3.25ex\@plus -1ex \@minus -.2ex} {1.5ex \@plus .2ex} {\normalfont\normalsize\bfseries\boldmath}} \renewcommand{\@seccntformat}[1]{\csname the#1\endcsname. } \makeatother \newtheorem{theorem}{Theorem} \newtheorem{lemma}{Lemma} \newtheorem{conjecture}{Conjecture} \newtheorem{proposition}{Proposition} \newtheorem{corollary}{Corollary} \newtheorem{problem}{Problem} \newtheorem{definition}{Definition} \definecolor{mygreen}{rgb}{0,0.6,0} \definecolor{mygray}{rgb}{0.5,0.5,0.5} \definecolor{mymauve}{rgb}{0.58,0,0.82} \lstset{ % backgroundcolor=\color{white}, basicstyle=\footnotesize, breaklines=true, captionpos=b, commentstyle=\color{mygreen}, escapeinside={\%*}{*)}, keywordstyle=\color{blue}, stringstyle=\color{mymauve}, } \begin{document} \begin{center} \uppercase{\bf Crazy Sequential Representations of Numbers for Small Bases} \vskip 20pt {\bf Tim Wylie\footnote{This research was supported in part by National Science Foundation Grant CCF-1817602.}}\\ {\smallit University of Texas - Rio Grande Valley\\ Edinburg, TX 78539-2999, USA}\\ {\tt timothy.wylie@utrgv.edu}\\ \end{center} \vskip 30pt \centerline{\bf Abstract} \noindent Throughout history, recreational mathematics has always played a prominent role in advancing research. Following in this tradition, in this paper we extend some recent work with crazy sequential representations of numbers$-$ equations made of sequences of one through nine (or nine through one) that evaluate to a number. All previous work on this type of puzzle has focused only on base ten numbers and whether a solution existed. We generalize this concept and examine how this extends to arbitrary bases, the ranges of possible numbers, the combinatorial challenge of finding the numbers, efficient algorithms, and some interesting patterns across any base. For the analysis, we focus on bases three through ten. Further, we outline several interesting mathematical and algorithmic complexity problems related to this area that have yet to be considered. \pagestyle{myheadings} \markright{\smalltt \hfill} \thispagestyle{empty} \baselineskip=12.875pt \vskip 30pt \section{Introduction} One constant theme throughout the history of mathematics is the lure of and the desire to create and solve puzzles. Countless areas of research have been created and extended based on an investigation into recreational mathematics. The study of games and puzzles has become a serious area in its own right often providing insights into much deeper topics. In this paper we look at an area of recreational mathematics based in number theory and combinatorics began in 2013 by Taneja \cite{Taneja:2013:1302.1479v1} and continued in \cite{Taneja:2013:1302.1479v3,Taneja:2013:1302.1479v2,Taneja:2013:1302.1479v4,Taneja:2013:1302.1479v5}. The crazy sequential representation of a number is an arithmetic expression, equal to the value of the number, that contains the digits of a base in order (ascending or descending) such as \[ \hspace*{.9cm} 3227 = 123 + 45 \times 67+ 89 \hspace*{.3cm} \mbox{ and } \hspace*{.3cm} 3227 = 9 + 87 + 6 + 5^4 \times (3+ 2)\times 1. \] This representation is often not unique. The original work looked at expressions with only addition and multiplication as well as concatenation and exponentiation\footnote{Taneja used the term `potentiation' instead, which comes from the translated word used for exponents.}. Taneja extended this work by also allowing subtraction and division, and was able to find equations for all numbers $1-11111$ with one exception: an ascending equation for 10958. Without concatenation and exponentiation, we could look at group operations to define possible values, but these two operations do not provide closure. There are examples of this kind of representation of integers at least as far back as 1917 in a famous puzzle book by Dudeney \cite{Dudeney:1917:BOOK}, and also in another recreational book by Madachy \cite{Madachy:1966:BOOK} from 1966. Both of these works only focused on the number 100 and used other operations such as factorials and square roots, as well as decimals, etc. Taneja was unaware of these books in his original work, and discovered them later while working on the updated version. Our focus in this work is to look at possible numbers in other bases- specifically bases less than 10. We also summarize the work related to base 10 and give an exhaustive proof that under Taneja's rules, 10958 is indeed impossible. We follow previous convention and only allow addition, concatenation, exponentiation, multiplication, division, and negation\footnote{Taneja specified subtraction, but we use a broader operation, and we show that arbitrary negation is still not sufficient for 10958.} along with precedence constraints (parentheses). We can examine the limitations of specific operations, and how the possible results are affected by a change of base. Here, we focus on what is possible within a given base. As an example, Table \ref{tab:overview} shows for each base less than 10 the first positive integer that is impossible for increasing and decreasing representations as well as the first positive integer that can not be sequentially represented either increasingly or decreasingly. \begin{table}[t] \centering \footnotesize \renewcommand{\arraystretch}{1.2} \begin{tabular}{| c | c | c | c |} \hline \textbf{Base} & \textbf{Increasing} & \textbf{Decreasing} & \textbf{Neither} \\ \hline 3 & 0 & 0 & 0\\ \hline 4 & 13& 11 & 16\\ \hline 5 & 27& 17 & 27\\ \hline 6 & 67& 77 & 92\\ \hline 7 & 260 & 262 & 292\\ \hline 8 & 614 & 809 & 1192 \\ \hline 9 & 3293 & 4570 & 5414 \\ \hline 10 & 10958 & 14324 & 21212 \\ \hline \end{tabular} \caption{A brief overview of the first integers that can not be sequentially represented under the defined operations for bases $3-10$.} \label{tab:overview} \end{table} Historically, these kind of derivations were done tediously and slowly, and Taneja's work also has this flavor with only using a program to find a few of the difficult numbers \cite{Taneja:2013:1302.1479v5}. Our approach leverages modern computational power and algorithmic techniques to bring this topic squarely within computational mathematics and search all possible combinations. We discuss these techniques and upper bounds in the paper. A brute force approach to a problem like this has generally been classified as computational mathematics - there is a point for many problems at which the number of possible combinations becomes too large for a human, or humanity, to check by hand in any reasonable amount of time. This has become more common with efforts to verify and prove other long open questions in mathematics such as the Kepler Conjecture \cite{Hales:2006:DCG,flyspeck:2014:WEB,Hales:2008:CORR}, the Boolean Pythagorean Triples problem \cite{Heule:2016:LNCS}, finding Ramsey numbers \cite{Graham:1990:BOOK,Radziszowski:2014:EJOC,Radziszowski:1995:JGT}, the Happy Ending problem \cite{Morris:2000:BAMS,Szekeres:2006:ANZIAM}, the 2-PATS problem \cite{Kari:2017:A}, and many others where brute-force exhaustive-search solutions were required. Fortunately for us, this problem can also be approached with dynamic programming through calculating substrings that appear in multiple equations. This recurrence relation yields an efficient solution allowing an exhaustive examination within a reasonable amount of time. For most of the bases in our study (3-9), even basic laptops are sufficient to check the millions of combinations. For base ten, we utilized some research servers due to the high memory requirements. The program required around 20 gigabytes of memory to run, but the the time was less than two hours. In the next section we give the background and definitions necessary. We then overview the approach and algorithms used in this research in Section \ref{sec:algorithms}. We discuss the small bases 2, 3, and 4 in Section \ref{sec:toosmall}, and then the more substantial possibilities of bases 5-9 in Section \ref{sec:small}. Section \ref{sec:b10} covers what is known about base 10 and the missing number 10958. Finally, in Section \ref{sec:fun} we outline several interesting mathematical and computational open problems related to their study and conclude. \section{Preliminaries} \label{sec:preliminaries} We generalize the previous definitions with negation instead of subtraction, an explicit concatenation operator, and adding parentheses. \begin{definition}[Crazy Sequential Representation] Given a number $n \in \mathbb{R}$, an increasing crazy sequential representation of $n$ in base $b$ is an equation using the sequence of numbers $\langle 1,2,\dots ,b-1 \rangle$ (decreasing being $\langle b-1, \dots , 2, 1 \rangle$) with the following operations allowed between any two of the numbers. Given two real numbers $x,y \in \mathbb{R}$ we define the following allowable operations: \begin{itemize} \item[$+$] Addition: $x + y$ resulting in the sum of the two numbers. \item[$-$] Negation: $-x$ is allowable as well as the negation of an expression $-(\dots)$. Addition with a negative is also equivalent to subtraction in this context, so subtraction is omitted from the list of operations. \item[$\times$] Multiplication: $x \times y$ resulting in their product. \item[$/$] Division: $x/y$ giving the fraction. \item[$a^b$] Exponentiation: $x^y$ meaning $x$ to the $y^{th}$ power. \item[$xy$] Concatenation: $xy$ meaning the number $xy$ in the given base (e.g., $12_3=5_{10}$ ). There are many standard symbols used for this operation. We will use $\oplus$ when we need to explicitly show it, otherwise it will be omitted when clear by context- generally $xy$ will be preferred instead of $x\oplus y$. \item[$()$] Grouping: arbitrary parentheses are allowed with derivations following the standard rule that expressions inside parentheses are evaluated first. \end{itemize} \end{definition} One goal of Taneja's work is to minimize the number of operations used for a given representation. Thus, the original work \cite{Taneja:2013:1302.1479v1} focused on numbers derivable from simply concatenation, addition, multiplication and exponentiation. Later work to add missing numbers included division and subtraction \cite{Taneja:2013:1302.1479v3,Taneja:2013:1302.1479v2,Taneja:2013:1302.1479v4,Taneja:2013:1302.1479v5}. We have also opted to generally prefer those original operations in the expression chosen when multiple expressions exists for a given number, as well as simplicity and elegance. \para{Explicit Concatenation} An issue with the way Taneja uses concatenation is that it is only allowed before evaluating the expression. This means $12$ is allowed as twelve (or $1\oplus 2$), but $(1 + 2) \oplus 3$ is not allowed to be evaluated as 33. This is the only defined operation not allowed during evaluation. If we allow it, several other numbers are possible, including 10958 in base 10. In the results, all expressions using this deviant version are colored red and use the $\oplus$ symbol explicitly. Our approach did not consider these solutions either, and thus there may be solutions of this form to some of the values listed without a solution. \subsection{Combinatorics} In calculating an upper bound we are looking at the maximum amount of different numbers that could be represented in that base. The number of parse trees that can be generated with binary operators tells us the number of ways to distribute the operations. If we, for the moment, only consider a single operation, this is the well-known Catalan numbers. Another view more relevant is the number of ways to insert $n-1$ pairs of parentheses in a word of $n$ letters. e.g., for $n=3$ ($t(2)$) there are 2 ways: $((ab)c)$ or $(a(bc))$ \cite{Guy:1973:AMM}. The Catalan numbers can be recursively derived by the following equation with $t(0)=1$ and $t(1)=1$. \begin{equation} t(n) = \sum_{i=1}^n t(i-1)t(n-i) \end{equation} Thus, for the bases considered here, we have $t:(2, 3,\dots ,9) \implies (2, 5$, $14, 42$, $132$, $429$, $1430,$ $4862)$. This gives the number of ways to group the operands (sequential numbers), and then we must consider the number of operators allowed. We allow five distinct operations as defined above: addition, multiplication, division, exponentiation, and concatenation (subtraction will be handled later). This gives $5^{n-1}$ ways to place the operations on $n$ operands. For base $b$, we therefore have $5^{b-2}$ since we exclude 0 in the representation and only use $1, \dots, (b-1)$. The last issue to deal with is negation. If we only allow subtraction, then the number of operations is $6^{n-1}$, however, we also allow negation. Thus, expressions such as $-(-4+5)$ are also allowed. Thus, for each of the parentheses or numbers, we could negate it, which adds all possible combinations of negations over the parentheses and numbers. This means we can also reduce our operations to only 5 (since we will look at adding the negated number instead). Thus, we have the power set of $n$ possible ways to add negatives to the numbers for $n$ operands, and the power set of $\{1,2,\dots,n-1\}$ for possible ways to add negatives to the parentheses (for $n$ numbers, we need at most $n-1$ parenthesis for binary operations). Since for base $b$, we have $n=b-1$, when we include all possibilities, there is an upper bound for the combinations for $n$ numbers given base $b$. \begin{align} C(n) &= 5^{n-1} \times t(n) \times 2^{n} \times 2^{n-1} \\ &=5^{n-1} \times t(n) \times 2^{2n-1}, \mbox{ or in terms of } b\\ C(b) &= 5^{b-2} \times t(b-1) \times 2^{2b-3}. \end{align} The values for bases $3-10$ are shown in Table \ref{tab:basecomb}. Note that the vast majority of these combinations do not yield integers, however, the numbers are small enough to output all possible numbers and then check the integral ones. Many of these results are duplicates with only parenthetical differences, but the number of combinations is still well within computational power to brute force every possibility even if many are duplicates. For larger bases, an examination of the unique parse trees would reduce many of the duplicates caused by analyzing strings. \begin{table}[t] \centering \footnotesize \renewcommand{\arraystretch}{1.4} \begin{tabular}{|r| c | c |c |c |} \hline \textbf{Base $b$} & \textbf{3} & \textbf{4} & \textbf{5} & \textbf{6} \\ \hline \textbf{Combinations $C(b)$} & 80 & 4000 & $2.24 \times 10^5$ & $1.344 \times 10^7$ \\ \hline \multicolumn{5}{r}{ } \\ \hline \textbf{Base $b$} & \textbf{7} & \textbf{8} & \textbf{9} & \textbf{10} \\ \hline \textbf{Combinations} $C(b)$ & $8.448 \times 10^{8}$ & $5.4912 \times 10^{10}$ & $3.6608 \times 10^{12}$ & $2.489344 \times 10^{14}$ \\ \hline \end{tabular} \caption{The upper bound on the number of combinations for crazy sequential representations for a given base, which is the maximum amount of possible numbers that could be represented.} \label{tab:basecomb} \end{table} \section{Algorithms} \label{sec:algorithms} At a high-level, in order to find all the numbers possible for a given base, an algorithm such as Algorithm \ref{alg:finddp} can be run. List the numbers from 1 to $b-1$ (or $b-1$ down to 1), and then check for all valid expressions with the given operations. This includes both the removal of any operation (concatenation) and the possibility of precedence in operations (parentheses). There are several notes of interest related to actual implementation. These include finding all binary partitions (and how this changes with concatenation), negation of terms, evaluation in the given base, and processing such large amounts of data. We cover these in the analysis of Algorithm \ref{alg:finddp}, which is a dynamic programming solution to the problem. By utilizing a dictionary of substrings, we can exponentially reduce the number of computations necessary. \begin{algorithm}[t] \footnotesize \begin{algorithmic}[1] \Function {FindExpressions}{$base, low, high \in \mathbb{Z}^+$ \If{low $\neq$ high} \State $T = \{\}$ \State numstr $\leftarrow$ CASTSTR($low$) $\oplus \dots \oplus$ CASTSTR($high$) \State catnum $\leftarrow$ CASTNUM(numstr) \State $T \leftarrow T \cup (catnum, numstr) \cup (-catnum, $``$ - $''$\oplus numstr)$ \ForAll{$low \leq k \leq high$ } \State $L \leftarrow$ FindEpressions(base, low, k) \State $R \leftarrow$ FindEpressions(base, k+1, high) \State $\triangleright$ All ways to combine the left and right expressions \ForAll{$x \in LS$} \ForAll{$y \in RS$} \State $T \leftarrow T \cup (x+y, $`$($'$\oplus$ $L_x$ $\oplus $`$+$'$ \oplus$ $R_y$ $\oplus$`$)$'$)$ \State $T \leftarrow T \cup (x\times y, $`$($'$\oplus$ $L_x$ $\oplus $`$\times$'$ \oplus$ $R_y$ $\oplus$`$)$'$)$ \State $T \leftarrow T \cup (x/y, $`$($'$\oplus$ $L_x$ $\oplus $`$/$' $\oplus$ $R_y$ $\oplus$`$)$'$)$\Comment{if $y \neq 0$} \State $T \leftarrow T \cup (x^y, $`$($'$\oplus L_x \oplus $`\^\ '$ \oplus R_y \oplus$`$)$'$)$ \EndFor \EndFor \EndFor \Return $T$ \EndIf \EndFunction \\ $F = $FindEpressions(10, 1, 9) \end{algorithmic} \caption{A recursive algorithm looking at the possible combinations using dynamic programming that builds a dictionary or lookup table of all expressible numbers.} \label{alg:finddp} \end{algorithm} \para{Finding Possible Parentheses} The possible ways parentheses can be nested for $n$ items is a classic problem in Computer Science with the proof published by Guy and Selfridge in 1973 \cite{Guy:1973:AMM}. An example of a Python algorithm to generate these is here \cite[btilly]{web:para}. \para{Finding Negations} Given all possible nested parentheses, for each we need to find all possible negations of the numbers and the individual expressions. With negation instead of subtraction, the following are all different: $(((-1+\dots$, $-(((1+\dots$, $(-((1+\dots$, and $((-(1\dots$. \para{Coding with Bases} Another small implementation detail is the need to deal with switching between multiple bases, which python has a method within casting to do so 234 in base 7 would be float(int(237,7)). \section{Too Small Bases} \label{sec:toosmall} This is a quick overview of bases that are really too small to offer the necessary flexibility to count very high. Namely, 2, 3, and 4. Five could be in this category, but there is a massive jump between 4 and 5, so we will put it with the larger bases. \para{Base 2} For base 2, since we do not use $0$, only operations on the single digit $1$ can be performed, meaning $1$ and $-1$ are the only numbers expressible in a sequential representation. Thus, we can ignore it. \para{Base 3} In base 3, we now have 2 digits at our disposal, which allows our operations to have valid operands, however, there are not many combinations and many operations lead to the same answer. Table \ref{tab:b3} lists these values. \begin{table}[H] \centering \tiny \renewcommand{\arraystretch}{1.4} \begin{tabular}{L L} \textbf{\textrm{Increasing}} & \textbf{\textrm{Decreasing}}\\ 0_{10} = 0_{3}=~ & 0_{10}= 0_{3}= ~\\ 1_{10} = 1_{3}=1^2 & 1_{10}= 1_{3}= 2-1\\ 2_{10}= 2_{3}= -1+2 \mbox{ or } 1\times 2 & 2_{10}= 2_{3}= 2\times 1 \mbox{ or } 2^1\\ 3_{10}= 10_{3}= 1+2 & 3_{10}= 10_{3}= 2+1\\ 5_{10}= 12_{3}= 12 & 7_{10}= 21_{3}=21\\ \end{tabular} \caption{List of most of the possible base 3 numbers in increasing and decreasing sequential order.} \label{tab:b3} \end{table} \para{Base 4} Base 4 is the smallest base where anything interesting happens and we can list a significant portion of integers with the largest number being $19683_{10}$ since in base 4 it is $3^{21}_{4}$. Table \ref{tab:b4} lists the first 20 values and then a few of interest. \begin{table}[H] \centering \tiny \renewcommand{\arraystretch}{1.4} \begin{multicols}{2} \begin{tabular}{L L} \textbf{\textrm{Increasing}} & \textbf{\textrm{Decreasing}}\\ 0_{10}=0_{4}= 1+2-3 & 0_{10}=0_{4}=3-2-1 \\ 1_{10}=1_{4}= 1^{2+3} & 1_{10}=1_{4}= 3-2\times 1\\ 2_{10}=2_{4}= 1-2+3 & 2_{10}=2_{4}= 3-2+1\\ 3_{10}=3_{4}= 12-3 & 3_{10}=3_{4}= 3\times (2-1)\\ 4_{10}=10_{4}= 1^2 +3& 4_{10}=10_{4}= 3+2-1\\ 5_{10}=11_{4}= -1+2\times 3 & 5_{10}=11_{4}= 3+2\times 1\\ 6_{10}=12_{4}= 1+2+3& 6_{10}=12_{4}= 3+2+1 \\ 7_{10}=13_{4}= 1+2\times 3& 7_{10}=13_{4}= 3\times 2+1 \\ 8_{10}=20_{4}= (1\times 2)^3& 8_{10}=20_{4}= 3^2-1 \\ 9_{10}=21_{4}= 12+3& 9_{10}=21_{4}= 3\times (2+1) \\ \end{tabular} \begin{tabular}{L L} \textbf{\textrm{Increasing}} & \textbf{\textrm{Decreasing}}\\ 10_{10}=22_{4}= -1+23& 10_{10}=22_{4}= 3^2+1\\ 11_{10}=23_{4}= 1\times 23& 11_{10}=23_{4}=~ \\ 12_{10}=30_{4}= 1+23& 12_{10}=30_{4}=3+21 \\ 13_{10}=31_{4}= ~& 13_{10}=31_{4}=32-1 \\ 14_{10}=32_{4}= ~& 14_{10}=32_{4}=32\times 1 \\ 15_{10}=33_{4}= \color{red}{(1+2)\oplus 3}& 15_{10}=33_{4}=32+1 \\ 16_{10}=100_{4}= ~& 16_{10}=100_{4}=~ \\ 17_{10}=101_{4}= ~& 17_{10}=101_{4}= ~\\ 18_{10}=102_{4}= 12\times 3& 18_{10}=102_{4}= ~\\ 27_{10}=123_{4}= 123& 27_{10}=123_{4}= 3\times 21\\ 57_{10}=321_{4}= ~& 57_{10}=321_{4}= 321\\ \end{tabular} \end{multicols} \caption{List of most of the possible base 4 numbers in increasing and decreasing sequential order.} \label{tab:b4} \end{table} \section{Overview of 5-9}\label{sec:small} For organizational reasons, we overview things of interest about bases 5 through 9, and the actual listings of the expressions are omitted for space with only the first 40 numbers shown for $5-7$ and the first 20 shown for 8 and 9. All possible results were generated (negatives, decimals, etc.), and everything could be listed rather than giving just the organized list as presented. However, the sheer number of results makes it infeasible to do so. For instance, with base eight, there are over 45,000 integer results, with most of them not being consecutive. \input{base5} \para{Base 5} There are four numbers in the representation for base five, and thus there is enough variability to begin making a meaningful amount of different combinations and possible integers. Still, this may be considered a relatively small base since the first impossible integer is 27. We also filled in some of the gaps with explicit concatenation. Table \ref{tab:b5} shows a list of the positive integers $0-39$ with their representations. The missing ones are not possible. \para{Base 6} Each increase in base exponentially increases the number of possibilities and the first positive integers that can not be expressed are 67 (increasing) and 77 (decreasing), and 97 is the first one not representable by either. Table \ref{tab:b6} shows a list of the positive integers $0-39$ with their representations. \input{base6} \para{Base 7} Starting with base 7, the amount of numbers possible explodes, and thus, we will simply list the numbers without trying to fit them onto a single page. In fact, every number is expressible until 260. Curiously the first inexpressible decreasing integer is 262. Table \ref{tab:b7} shows a list of the positive integers $0-39$ with their representations. \input{base7} \vspace*{-.5cm} \para{Base 8} Table \ref{tab:b8} shows a list of the positive integers $0-19$ with their representations. Due to the length of the expressions, there is not room for more numbers. Base eight does not have an inexpressible number until 614 for an increasing sequence, and 809 for a decreasing sequence. The first positive integer that can not be expressed by either is 1192. \input{base8} \vspace*{.2cm} \para{Base 9} Similar to base eight, only representations for numbers $0-19$ are shown in Table \ref{tab:b9}. The first unrepresentable positive integers for increasing and decreasing sequential representations are 3293 and 4570, respectively. The integer 5414 is the smallest positive integer unrepresentable by either. \input{base9} \section{Base 10} \label{sec:b10} Taneja showed that crazy increasing sequential representations for base 10 numbers was possible for all numbers to 11111 with one exception \cite{Taneja:2013:1302.1479v5}. There is no known solution to 10958 with the numbers in increasing order. It is possible to get close, but not exact. We found two extremely close solutions. \begin{align} 10957.9775 &= -1+2^{(3^4)/5}/(6+7/8)+9 \\ 10958.0021 &= (1+((2-(-3^{-4})^{5/(6\times -7)})^{-8}))+9 \end{align} No closer solutions are possible. Running an exhaustive algorithm to look at all possible combinations yields no solution of 10958. Table \ref{tbl:10958} lists all values, and an expression yielding that value (there are many), that were found within the range $[10957.9, 10958.1]$. \begin{table}[t] \centering \footnotesize \renewcommand{\arraystretch}{1.3} \begin{tabular}{| L | L |}\hline \textbf{Number} & \textbf{Expression} \\ \hline 10957.90411 & -1+((2- 3\times 4)^5)/(((6-7)/8)-9) \\ 10957.92857 & -1/2\times 3\times (4^5\times (6/7-8)+9) \\ 10957.93277 & (-1/(2+3)+(4^{5-((6-7)/8)}))\times 9 \\ 10957.97006 & -(1/2)+(34+((5^{-(6/7)+8})/9)) \\ 10957.97751 & -1+2^{3^4/5}/(6+7/8)+9 \\ 10958.00206 & ((1+((2-((-3^{-4})^{5/(6\times -7)}))^{-8}))+9) \\ 10958.06611 & -1-2/3+ 4^{5-(6-7)/8}\times 9 \\ 10958.09749 & (1+234)\times (5\times (6+((7/8)^{-9}))) \\ \hline \end{tabular} \caption{List of base 10 numbers and the expressions that are close to 10958. This shows numbers within $.1$ of the desired number, and are rounded to five decimal digits due to the precision limitations in the calculations.} \label{tbl:10958} \end{table} However, the original author uses concatenation without defining it as one of the allowable operators between operands as a step. Matt Parker found a solution if concatenation is allowed to occur as a step of the calculation, which is not done for any other number in the original paper. Let $\oplus$ be the concatenation operator. Thus, $234$ would be shown as $2\oplus 3\oplus 4$ in an equation. His solution is shown in \cite[Matt Parker]{numberphile1,numberphile2} and is: \begin{equation} 10958 = 1 \times 2\oplus 3 + ((4 \times 5 \times 6)\oplus 7 + 8) \times 9. \end{equation} There are many other solutions if adding a new operator is allowed, such as factorials. Some examples are \begin{align} 10958 &= (1-2+3)\times (456+7!-8-9),\text{\cite[Emmanuel Vantieghem]{primepuzzle}},\\ 10958 &=1+2+3!!+(-4+5!+6-7)\times 89, \text{\cite[Inder J. Taneja]{primepuzzle}}, \\ 10958 &=1\times 2\times (3!!-4!\times (5+6)+7!-8-9), \text{\cite[Inder J. Taneja]{primepuzzle}}, \mbox{ and}\\ 10958 &= -(1 + 2 - 3 + 4 - ((5! + 6) \times (78 + 9))), \text{\cite[Chris Smith]{primepuzzle}}, \end{align} and it is possible if using the number $10$ as shown by Taneja, $10958=1*2^3+(4^5+6+7*8+9)*10$ \cite[Inder J. Taneja]{primepuzzle}. Our approach settles this definitively through brute force search without the use of concatenation as a later step or another operation allowed beyond the initial ones. Thus, 10958 is the smallest integer for which this is not possible. \begin{lemma} The integer 10958 is not expressible in base 10 increasing sequential representation (numbers $1-9$) with only the operations addition, multiplication, division, exponentiation, an initial concatenation of the numbers, arbitrary parentheses for operator precedence, and negation. \end{lemma} \begin{proof} The proof is the program and its output of all combinations possible and their evaluation. The source code is available, and can be viewed (albeit in shortened form) in Appendix \ref{app:source}. \end{proof} \section{Some More Fun}\label{sec:fun} Here we look at several interesting open problems or additional ways to explore this concept. \para{Fun Number Forms} Taneja gives a few in his paper for base 10, and we extend this with a few examples of numbers that are always expressible in a given base $b$. \begin{itemize} \small \setlength\itemsep{.1em} \item $0 = 1^{1\times 2 \times \dots \times (b-3)}+(b-2)-(b-1)$ \item $0 = 1^{ 2 \dots (b-3)}+(b-2)-(b-1)$ \item $1 = 1^{1\times 2 \times \dots \times (b-1)}$ \item $1 = 1^{12 \dots (b-1)}$ \item $b-1 = 1^{1\times 2 \times \dots \times (b-2)} \times (b-1)$ \item $b-1 = 1^{12\dots(b-2)}\times (b-1)$ \item $b = 1^{1\times 2 \times \dots \times (b-2)}+(b-1)$ \item $b = 1^{12\dots(b-2)}+(b-1)$ \end{itemize} If $b$ is odd, then $0 = (b-1)-(b-2)-(b-3)+(b-4)-\dots+4-3-2+1$, and similar if $b$ is even. \para{Taneja Primes} Based on his work related to these numbers, we define a Taneja prime to be any prime expressible in crazy sequential representation for a base $b$. Here, we investigate some interesting questions. \begin{itemize} \small \setlength\itemsep{.1em} \item What is the smallest prime not expressible in a given base? \item What is the largest prime expressible in a given base? \item What is the sequence of primes not expressible (or expressible) in a given base? \item What is the characteristic function for the expressible or non-expressible primes for a base? \item What is the sequence of integers (or primes) not expressible by either an increasing or decreasing representation. \item What is the smallest base a given prime (or integer) can be expressed in for increasing and decreasing? \end{itemize} Table \ref{tab:overview} lists the first prime not expressible in a given base for increasing and decreasing representations as well as the first prime not expressible by either. For an increasing representation, Table \ref{tab:sminc} is the smallest base a prime can be sequentially represented in as well as an expression giving the value. \begin{table}[t] \centering \begin{tabular}{| c | c | c | c |} \hline \textbf{Base} & \textbf{Inc Prime} & \textbf{Dec prime} & \textbf{Both prime} \\ \hline 3 & 7 & 5 & 11\\ \hline 4 & 13& 11 & 17\\ \hline 5 & 27& 17 & 27\\ \hline 6 & 67& 83 & 97\\ \hline 7 & 281 & 379 & 499 \\ \hline 8 & 1153 & 809 & 1579 \\ \hline 9 & 4597 & 5417 & 7027 \\ \hline 10 & 15971 & 18493 & 25763\\ \hline \end{tabular} \caption{A brief overview of the first primes not expressible in a given base for increasing and decreasing representations as well as the first prime not expressible by either.} \label{tab:overview} \end{table} \begin{table}[t] \centering \scriptsize \begin{multicols}{2} \begin{tabular}{L c L} \renewcommand{\arraystretch}{1.1} \textbf{$B_{10}$} & \textbf{Base} & \textbf{Increasing} \\ 2_{10} & 3 & 1 \times 2 \\ 3_{10} & 3 & 1 + 2 \\ 5_{10} & 3 & 12 \\ 7_{10} & 4 & 1 + 2 \times 3 \\ 11_{10} & 4 & 1 + 23 \\ 13_{10} & 5 & -1 + 2 + 3 \times 4 \\ 17_{10} & 5 & 1 + 2 \\ 19_{10} & 5 & -1 + (2 + 3) \times 4 \\ 23_{10} & 5 & -1 + 2 \times 3 \times 4 \\ 29_{10} & 5 & \color{red}{(1\times 2 + 3)\oplus 4} \\ 31_{10} & 5 & -1+2^3 \times 4 \\ 37_{10} & 5 & -1+2\times 34 \\ 41_{10} & 6 & (1+2)\times 3\times 4+5 \\ 43_{10} & 6 & 12+(3+4)\times 5 \\ 47_{10} & 6 & 1+2\times (3+4\times 5) \\ 53_{10} & 5 & 1+23\times 4 \\ 59_{10} & 6 & 1-2+3\times 4\times 5 \\ 61_{10} & 6 & 12\times (3+4)+5 \\ 67_{10} & 6 & \color{red}{1 \oplus(2+3)\oplus (-4 + 5 )} \\ 71_{10} & 6 & 1+2\times (3+4)\times 5v \\ 73_{10} & 6 & 1+2^{3}\times (4+5) \\ \end{tabular} \begin{tabular}{L c L} \textbf{$B_{10}$} & \textbf{Base} & \textbf{Increasing} \\ 79_{10} & 5 & -1\times 2+3^4 \\ 83_{10} & 5 & 1\times 2+3^4 \\ 89_{10} & 6 & 1+2+3^4+5 \\ 97_{10} & 7 & 12\times 3\times 4-5-6 \\ 101_{10} & 6 & 12\times 3\times 4+5 \\ 103_{10} & 6 & (1+2)^3\times 4-5 \\ 107_{10} & 6 & -1-2+34\times 5 \\ 109_{10} & 6 & 1-2+34\times 5 \\ 113_{10} & 6 & 1+2+34\times 5 \\ 127_{10} & 5 & -1+2^{3+4} \\ 131_{10} & 7 & 12+3^4+56 \\ 137_{10} & 6 & 1^2\times 345 \\ 139_{10} & 6 & 1\times 2+345 \\ 149_{10} & 7 & 12\times 3\times 4+56 \\ 151_{10} & 6 & -1+2\times (3^4-5) \\ 157_{10} & 6 & 1\times 2\times 3^4-5 \\ 163_{10} & 5 & 1+2\times 3^4 \\ 167_{10} & 6 & 1\times 2\times 3^4+5 \\ 173_{10} & 6 & 1+2\times (3^4+5) \\ \end{tabular} \end{multicols} \caption{Smallest base a prime is sequentially representable in for an increasing representation.} \label{tab:sminc} \end{table} \para{Limited Operations} The flexibility gained in sequential representations as the base gets larger is evident, and will continue for larger bases. Each new number exponentially increases the number of combinations. Of interest would be to prove some estimates about the first number not expressible for a given base under certain operations such as just addition/subtraction, just addition/multiplication, just concatenation/exponentiation, etc. \begin{itemize} \small \setlength\itemsep{.1em} \item How many unique numbers, given the operations above, can a given base generate? \item How many integers, given the operations above, can a given base generate? \item How many ways, given the operations above, can a given number be uniquely represented sequentially (ignoring parenthetical differences)? \item For $n \ge 6$, is the first missing decreasing number always greater than the first missing increasing number? Is there a way to determine if increasing or decreasing will not express a number first? \item Does a sequential representation exist with a set of operations $O$ in base $b$? \item For a given number, what bases can represent it? \end{itemize} \para{Continuing Problems} All of the listed problems so far are also open to questions about the complexity. What is the complexity of finding the smallest base that a number $N$ can be sequentially represented in? To slightly extend the question, given an $N$, what bases can it be represented in? Further, given the computational domain, what is the solution to some of these questions if limited strictly to integer arithmetic? There are many more open questions related to this problem in recreational mathematics. Such as noting that we, along with the original authors, focused solely on positive integers. All of these questions are open for rational, real, or other sets of numbers. \section*{Acknowledgements} The author would like to thank those that have already given feedback on the paper, which helped improve the quality substantially. Most notably the dynamic programming improvements. The original version was optimized for limited memory systems, but took significantly longer.
{ "redpajama_set_name": "RedPajamaArXiv" }
6,914
\section{Introduction} Discretization of latent representations via vector quantization is a method for improving the robustness and generalization of learned models \cite{oord2017neural,liu2021discrete}. Replacing a continuous representation with a discrete representation, and limiting the capacity of the discrete representation, both improve generalization guarantees \cite{liu2021discrete}. Discretization imposes a bottleneck \cite{tishby2000information} as the representation can take fewer values, and reducing capacity of the discrete representation tightens this bottleneck. Discretization can be used to bottleneck communication in modular inference models, for example in multi-agent reinforcement learning. Modular inference combines outputs across modules into new module inputs while restricting the number of modules that communicate \cite{goyal2019recurrent}. To make up for the loss in expressivity from being restricted to few communicative modules in each timestep, the model is forced to learn to perform inference in steps of specialized skill as opposed to applying all skills at once, which specializes the modules by definition since few are active in each step \cite{darwen1996automatic,goyal2019recurrent,bengio2017consciousness,lamb2021transformers}. The communication bottleneck is tightened by switching from continuous to discrete representations \cite{liu2021discrete}. Beyond improvements in generalization error from decreasing capacity, it has been hypothesized that the inductive bias of bottlenecked communication between modules improves generalization by 1) reflecting the true causal structure of data generated by sparse interactions between few variables, 2) increasing robustness when modules are recombined in novel ways, compared to unspecialized modules with all-to-all communication, 3) improving sample efficiency since specialized modules require fewer training points to learn \cite{goyal2019recurrent,bengio2017consciousness}. However, discrete bottleneck methods typically lack adaptability. This work improves on the vector quantization method of \citet{liu2021discrete} by making tightness of the bottleneck dynamic. Instead of a single discretization function that maps all inputs to a discrete space with fixed size, we use a pool of discretization functions with varying levels of output capacity, and choose the function applied for a given input using key-query attention between representations of the input and discretization functions. The hypothesis is that this improves generalization because the optimal level of discretization suggested by the bounds, which is the tightest bottleneck such that training error can still be minimized \cite{liu2021discrete}, is unlikely to be the same for all regions of a data distribution. The shortest description that captures adequate information in inputs for performing well on a task generally varies with the input, for example images contain different numbers of objects, and gameplay involves goals of varying complexity. In terms of generalization error, using a single discretization capacity is potentially wasteful for simpler inputs, because the generalization gap can be reduced by selectively imposing a tighter representation bottleneck on the former without increasing training error. To minimize the model selecting looser bottlenecks than necessary, we use an objective function that penalizes the choice of bottleneck proportional to its capacity. In summary, the contributions of our work are as follows: \begin{itemize} \item We propose a dynamic vector quantization method (DVQ) that adaptively chooses the number of discrete codes and the codebook size that control tightness of the bottleneck. \item Our theoretical analysis shows that dynamic adjustment of the bottleneck improves generalization error under the sufficient condition of tighter average bottleneck and equal training loss. \item We empirically show improvement in performance by using DVQ to discretize inter-component communication within a deep learning model and inter-agent communication between agents, compared to using VQ with fixed bottleneck capacity. \end{itemize} \section{Method} \subsection{Communication discretization} The process of converting data with continuous attributes into data with discrete attributes is called discretization \citep{chmielewski1996global}. In this study, we use discrete latent variables to quantize information communicated among different modules in a similar manner to codebooks \citep{liu2021discrete}, which is a general version of vector quantization (VQ-VAE, \citet{oord2017neural}) where the hidden representation is a list of discretized codes instead of a single discretized code. The discretization process for each vector $h \in \Hcal\subset \RR^{m}$ is described as follows. First, vector $h$ is divided into $G$ segments $s_1,s_2,\dots,s_G$ with $h=\textsc{concatenate}(s_1,s_2,\dots,s_G),$ where each segment $s_i \in \RR^{m/G}$ with $\frac{m}{G} \in \NN^+$. Second, each continuous segment $s_i$ is discretized separately by being mapped to a discrete latent space vector $e \in \RR^{L \times (m/G)}$ where $L$ is the size of the discrete latent space (i.e., an $L$-way categorical variable): $$ e_{o_i}=\textsc{discretize}(s_i), \quad \text{ where } o_i=\argmin_{j \in \{1,\dots,L\}} ||s_{i}-e_j||. $$ These discretized codes, which we call the factors of continuous representation $h$, are concatenated to obtain the final discretized vector $z$ as \begin{equation} \begin{aligned} z=\textsc{concatenate}(\textsc{discretize}(s_1),\\ \textsc{discretize}(s_2),...,\textsc{discretize}(s_G)). \end{aligned} \end{equation} The multiple steps described above can be summarized by $z=q(h,L,G)$, where $q(\cdot)$ is the whole discretization process using the codebook, $L$ is the codebook size, and $G$\ is number of segments or factors per vector. The loss for model training is $\mathcal{L} = \mathcal{L}_\mathrm{task} + \mathcal{L}_{discretization}$ where \begin{equation} \label{equation2} \begin{aligned} \mathcal{L}_{discretization} = \frac{1}{G} \bigg(\sum^{G}_{i}||\sg(s_{i})-e_{o_i}||^2_2 \\ + \beta \sum^{G}_{i}||s_{i}-\sg(e_{o_i})||^2_2 \bigg). \end{aligned} \end{equation} $\mathcal{L}_\mathrm{task}$ is the loss for the specific task, \textit{e.g.}, cross entropy loss for classification or mean square error loss for regression, $\sg$ refers to a stop-gradient operation that blocks gradients from flowing into its argument, and $\beta$ is a hyperparameter which controls the reluctance to change the code. The term $\sum^{G}_{i}||\sg(s_{i})-e_{o_i}||^2_2$ is the codebook loss, which only applies to the discrete latent vector and brings the selected $e_{o_i}$ close to the output segment $s_i$. The term $\sum^{G}_{i}||s_{i}-\sg(e_{o_i})||^2_2$ is the commitment loss, which only applies to the target segment $s_i$ and trains the module that outputs $s_i$ to make $s_i$ stay close to the chosen discrete latent vector $e_{o_i}$. Following the original codebooks and VQ-VAE papers, we found 0.25 to be a good value for $\beta$, and $e$ was initialized using $k$-means clustering on vectors $h$ with $k=L$. \subsection{Dynamic bottlenecks} Instead of a single codebook and discretization bottleneck, we use multiple bottlenecks where the tightness of each bottleneck is defined by the number of factors and codebook size. A pool of $N$ discretization functions $Q={\{q_t\}_{t \in [N]}}$ is made available to all representations being discretized, where the number of factors and codebook size for each discretization function are given by $G_t$ and $L_t$ respectively. The discretization functions in the pool do not share parameters nor codebooks with each other. Each of the discretization functions is associated with a signature key vector $k_t \in \RR^{l}$ which is randomly initialized and learned in the training process. Key-value attention is conducted between $k_t$ and query $f(h) \in \RR^{l}$ where $h$ is the continuous representation being discretized and $f$ is a single layer neural network projector. Gumbel-softmax \citep{jang2016categorical} is applied on the attention scores to make a one-hot selection of which $q_t$ to use, with categorical distribution $\pi^h$ over discretization functions for $h$ given by \begin{align} \pi^h(t) = \frac{\operatorname{exp}(k_t^\intercal f(h)) }{\sum_{j \in [N]} \operatorname{exp}( k_j^\intercal f(h))}. \end{align} \begin{figure*}[b] \centering \subfigure[Fixed bottleneck with a single discretization function \citep{liu2021discrete}.]{ \raisebox{7em}{\includegraphics[width=0.25\linewidth]{figures/orig_codebooks.png}} }\hfill \subfigure[Dynamic bottleneck with flat attention over discretization functions.]{ \includegraphics[width=0.31\linewidth]{figures/flat_dyn_codebooks.png} }\hfill \subfigure[Dynamic bottleneck with hierarchical attention over discretization functions.]{ \raisebox{3em}{\includegraphics[width=0.31\linewidth]{figures/hierarchy_dyn_codebooks.png}} } \caption{Dynamic discrete bottlenecks can be implemented as a flat function of continuous input $h$ (center), or as an iterative function that produces progressively coarser outputs (right). Bottleneck functions $q_t$ for $t \in [N]$, have different capacity and separate parameters. One bottleneck is selected for each input using key-value attention between representations of the input and discretization functions, $f(h)$ and $k_t$ respectively.} \label{fig:DynamicBottleneckingBoth} \end{figure*} \subsection{Bottleneck tightness} In order to learn a communication bottleneck with as few bits as necessary for minimizing training error, we introduce pressure to choose $q_t$ with low $G_t$ and $L_t$. This pressure is implemented with capacity penalty $\mathcal{C}_{bottlenecking}$: \begin{align} &\mathcal{C}_{bottlenecking} = G_t \ln(L_t) \\ \mathcal{L} = \mathcal{L}_{task} &+ \alpha \mathcal{L}_{discretization} +\beta \mathcal{C}_{bottlenecking} \end{align} where $\mathcal{L}$ is the overall loss for the representation being discretized, $\mathcal{L}_{task}$ is the task loss, $\mathcal{L}_{discretization}$ is the sum of commitment and codebook losses from the discretization process and $\mathcal{C}_{bottlenecking}$ is the bottlenecking cost. $\alpha$ and $\beta$ are hyperparameters that are chosen using a validation set. In our experiments, we found that including a continuous-valued function in the pool, corresponding to expressivity in the limit of codebook size $L_t \rightarrow \infty$, improved performance in some tasks. In this case $L_t$ was set to be a large number ($10^9$) in the penalty term $\mathcal{C}_{bottlenecking}$. \subsection{Architectural choices} Given continuous representation $h$, the bottleneck can be enforced in either a flat or hierarchical manner (\cref{fig:DynamicBottleneckingBoth}). In the flat case, the bottlenecked representation is the output of a single $q_t \in Q$ selected with key-value attention. In the hierarchical case, all functions $\{q_t\}_{t \in [N]}$ are utilized by first ordering them in order of descending $G_t$, and setting the input segments of each function to be concatenated factors produced by the previous function, with $h$ as input into the first function. Then output of a single $q_t \in Q$ is selected with key-value attention. \section{Theoretical analysis} In this section, we show that the adaptive discretization process has a potential advantage in improving the performance of the final model by better trading off the balance between the generalization and expressivity adaptively for each input. Moreover, our analysis predicts that the additional regularization, $C_{bottlenecking}$, in our algorithm plays an important role for this tradeoff, and that the number of adaptive bottlenecks $N$ cannot be arbitrarily large. To achieve this goal, we follow the abstract framework of \citet{liu2021discrete}. That is, let $\phi$ be an arbitrary function, which can refer to the composition of an evaluation criterion and the rest of the network following (adaptive) discretization bottlenecks. Given any function $\phi: \RR^{m} \rightarrow \RR$ and any family of sets $S=\{S_1,\dots,S_K\}$ with $S_1,\dots,S_K \subseteq \Hcal$, let us define the corresponding function $\phi_{k}^S$ by $\phi_{k}^S(h)=\one\{h \in S_k\}\phi(h)$ for all $k \in [K]$, where $[K]=\{1,2,\dots,K\}$. Let $e^{(t)} \in \RR^{L_t \times (m/G_t)}$ be fixed and we denote by $(Q_{k_{t}}^{(t)})_{k_{t} \in [L_{t}^{G_t}]}$ all the possible values after the discretization process for $t$-th adaptive bottleneck: i.e., $q(h,L_{t},G_{t})\in \cup_{k _{t}\in [L_{t}^{G_t}]} \{Q_{k_t}^{(t)}\}$ for all $h \in \Hcal$. We define $k_{\max}= \max_{t \in [N]} L_{t}^{G_t}$ and $Q_{k_t}^{(t)}=\emptyset$ for all $k_t > L_{t}^{G_t}$. Under this abstract setting with $t=N=1$, the previous paper \citep{liu2021discrete} proved their main theoretical result, showing that the models with non-adaptive discretization process have advantages over the continuous models without it (we present a slightly tighter version of the previous paper's results in Appendix \ref{app:proof}). Thus, in this section, we focus on the comparison of adaptive and non-adaptive discretization processes. To analyze the adaptive discretization process, we introduce the additional notation: let $q_t(h)$ be the discretization process with a particular bottleneck $t \in [N]$, and $q(h)$ be the whole discretization process as $q(h) = q_{\hat t(h)} (h)$ where $\hat t(h)$ is the result of the key-value attention. Define $I_{t}=\{i\in[n]: \hat t(h_{i})=t\}$, which is the set of the indices of training samples that end up using the $t$-th adaptive bottleneck. The following theorem extends the main theorem from \citet{liu2021discrete} to the setting of adaptive bottlenecking and shows the advantage of the adaptive version over the non-adaptive version: \begin{restatable}{theorem}{thma} \label{thm:1} Let $N \in \NN_+$ and $S_{k}=\{Q_{k}^{(t)}\}_{t=1}^N$ for all $k \in [k_{\max}]$. Then, for any $\delta>0$, with probability at least $1-\delta$ over an iid draw of $n$ examples $(h_{i})_{i=1}^n$, the following holds for any $\phi: \RR^{m} \rightarrow \RR_{+}$ and $k \in [k_{\max}]$: \begin{align} \label{eq:thm:1:1} \EE_{h}[\phi_{k}^S(q(h))] &\le\frac{1}{n}\sum_{i=1}^n\phi_{k}^S(q(h_{i}))+\alpha (\mathcal{J}_{1} +\mathcal{J}_{2}), \end{align} where $\alpha =\sup_{h \in \Hcal} \phi_k^S(h)$, \begin{align*} &\mathcal{J}_{1} =\sum_{t=1}^N \frac{|I_{t}|}{n} \sqrt{\frac{G_{t}\ln(L_{t})+\ln(N/\delta)}{2n}}, \text{ and } \\ & \mathcal{J}_{2}=\one\{N\ge 2\}\sqrt{\frac{2N \ln2 + 2 \ln(1/\delta)}{n}}. \end{align*} \end{restatable} \begin{proof} The proof is presented in Appendix \ref{app:proof}. \end{proof} Theorem \ref{thm:1} recovers the previous result of \citep{liu2021discrete} when we set $N=1$ as desired. That is, by setting $N=1$, the inequality \eqref{eq:thm:1:1} in Theorem \ref{thm:1} becomes \begin{align} \EE_{h}[\phi_{k}^S(q(h))] &\le\frac{1}{n}\sum_{i=1}^n\phi_{k}^S(q_{1}(h_{i})) \\ \nonumber & \quad + \alpha \sqrt{\frac{G_{1}\ln(L_{1})+\ln(1/\delta)}{2n}}, \end{align} which is the previous bound in Theorem 1 of \citet{liu2021discrete}. Thus, we successfully generalized the previous analysis framework to cover both the adaptive and non-adaptive versions in an unified manner. Theorem \ref{thm:1} shows that there are two ways that the adaptive version can improve the non-adaptive version; i.e., the potential improvement happens when $\sum_{t=1}^N \frac{|I_{t}|}{n}\sqrt{G_{t} \ln (L_t)} < \sqrt{G_{1} \ln(L_1)}$ or $\frac{1}{n}\sum_{i=1}^n\phi_{k}^S(q(h_{i})) <\frac{1}{n}\sum_{i=1}^n\phi_{k}^S(q_{1}(h_{i}))$. The first criterion is met when the weighted average of the adaptive bottleneck sizes $G_{t} \ln (L_t)$ is smaller than the pre-fixed bottleneck size $G \ln(L)=G_{1} \ln(L_1)$. This is indeed encouraged by the additional regularization, $C_{bottlenecking}$, in our algorithm. The second criterion is satisfied when the training loss with adaptive bottlenecks is less than that with a fixed bottleneck. Theorem \ref{thm:1} provides the insight that the benefit of the adaptive bottlenecks lies in the tradeoff between the expressivity (to minimize the training loss $\frac{1}{n}\sum_{i=1}^n\phi_{k}^S(q(h_{i}))$) and generalization (to minimize the term $\sum_{t=1}^N \frac{|I_{t}|}{n}\sqrt{G_{t} \ln (L_t)}$). For a fixed bottleneck, the training loss tends to decrease as $G_{1}$ increases because increasing $G_{1}$ improves the expressivity and trainability. However, increasing $G_{1}$ results in a worse bound on the generalization gap as the gap scales as $\sqrt{G_{1}/n}$ in Theorem 1. Thus, we have a tradeoff between the expressivity and generalization. For the adaptive bottlenecks, different values of $G_{t}$ are used for different samples. As a result, the adaptive bottlenecks can have a better tradeoff between expressivity and generalization by only using the necessary expressivity or bottleneck $G_t$ (and $L_t$) for each sample to reduce $\sum_{t=1}^N \frac{|I_{t}|}{n}\sqrt{G_{t} \ln (L_t)}$ while minimizing the training loss $\frac{1}{n}\sum_{i=1}^n\phi_{k}^S(q(h_{i}))$. For example, consider a scenario with a subset of training samples that require $G$ and $L$ to be extremely large to minimize the training loss for the subset. If we use a pre-fixed bottleneck, we need to make $G_{1}\ln(L_1)$ to be extremely large to minimize all training samples. This results in a bad generalization term $\sqrt{G_{1} \ln (L_{1})/n}$ in Theorem 1. On the other hand, if we use the adaptive bottleneck, we can minimize the training loss for all samples by using a large $G_{t} \ln (L_t)$ only for the subset while using small values of $G_{t} \ln (L_t)$ for other samples. In terms of these two criteria for the tradeoff, the adaptive version seems to be always better as we increase $N$. However, this better tradeoff comes with a cost. In Theorem \ref{thm:1}, the cost is captured by the additional term $\sqrt{\frac{2N \ln2 + 2 \ln(1/\delta)}{n}}$, which increases as $N$ increases. Thus, while the adaptive version is better in the sense of the tradeoff of the two criteria, it comes with the additional cost of $\sqrt{N/n}$ term. This predicts that $N$ cannot be arbitrarily large. \section{Related Work} \paragraph{Vector Quantization.} VQ is motivated by the fundamental result of Shannon's rate-distortion theory \citep{VQ_signal_compression,element_info}: better performance can always be achieved by coding vectors instead of scalars, even if the sequence of source symbols are independent random variables. K-means \cite{macqueen1967some} is the prime method for VQ. The K-means algorithm clusters data by trying to separate the samples into $n$ groups of equal variance, this by minimizing the intra-class inertia. Despite the performance of this algorithm, K-means based VQ has an exponential complexity in encoding (computation and memory) and decoding (memory) \cite{Tan2018DeepVQAD}. Various improvements to K-means have been proposed to address complexity issues (e.g., product quantization) \cite{6678503}, but their performance is suboptimal compared to some deep neural network (DNN) based approaches \cite{Tan2018DeepVQAD}, where the idea is to map input data from the original high dimensional space to the DNN latent space with lower dimensionality, and apply K-means to the latent codes. Because K-means in the latent space is sub-optimal for VQ, \citet{Tan2018DeepVQAD} proposed DeepVQ, a fully-DNN architecture for vector quantization, in the context of data compression. DeepVQ is an autoencoder that overcomes the complexity issue by directly mapping to the binary index of the codeword. Recent works \cite{rolfe2017discrete, maddison2017concrete} proposed novel reparameterization methods to handle the non-gradient issue for discrete random variables in VAE. VQ-VAE \cite{oord2017neural} avoids such problem by using the identity function, namely copying gradients from the decoder input to encoder output \cite{bengio2013estimating}. \paragraph{Bottlenecking inter-module communication within a model.} Many methods have been used in recent years to enable efficient communication between specialized components of machine learning models, from attention mechanisms for selectively communicating information between specialized components in machine learning models \cite{goyal2019recurrent,goyal2021coordination,goyal2021neural} and transformers \cite{vaswani2017attention,lamb2021transformers}; collective memory and shared parameters for multi-agent communication \cite{Garland1996MultiagentLT,Pesce2020}, node attributes in graph-based models \cite{10.5555/1795555,battaglia2018relational} for relational reasoning, dynamical systems simulation, multi-agent systems, and in many other areas. While most of inter-specialist communication mechanisms operates in a pairwise symmetric manner, \citet{goyal2021coordination} introduced a bandwidth limited communication channel to allow information from a limited number of modules to be broadcast globally to all modules, inspired by Global workspace theory \cite{Baars2019}. Recently, \citet{liu2021discrete} showed that replacing a continuous representation with a discrete representation, and limiting the discrete representation to a short list of codes from a small codebook, both improve generalization guarantees. Following VQ-VAE \cite{oord2017neural}, \citet{liu2021discrete} proposed discrete-valued neural communication (DVNC) to improve systematic generalization in a variety of architectures, including transformers \cite{vaswani2017attention,lamb2021transformers}, RIMs \cite{goyal2020recurrent} , and graph neural networks \cite{kipf2020contrastive}. \paragraph{Bottlenecking inter-agent communication in multi-agent RL.} A wide range of multi-agent applications have benefitted from inter-agent message passing including distributed smart grid control \cite{4840087}, consensus in networks \cite{5978201}, multi-robot control \cite{ren2008}, autonomous vehicle driving \cite{Petrillo2018}, elevators control \cite{10.1023/A:1007518724497} and for language learning in two-agent systems \cite{lazaridou2017multiagent}. An important challenge in MARL is how to facilitate communication among interacting agents, especially in tasks requiring synchronization \cite{SCARDOVI20092557, wen2012}. For example, in the multi-agent deep deterministic policy gradient \cite{lowe2020multiagent}, which extends the actor-critic algorithm \cite{degris2013offpolicy}; the input size of each critic increases linearly with the number of agents, which hinders its scalability \cite{jiang2018learning}. To overcome this, \citet{Pesce2020} provides the agents with a shared communication device that can be used to learn from their collective private observations and share relevant messages with others in the centralised learning and decentralised execution paradigm \cite{foerster2016learning, KRAEMER201682, 10.5555/1622673.1622680}. However, their approach is limited to small-scale systems. \citet{iqbal2019actorattentioncritic} proposed Multi-Actor-Attention-Critic to learn decentralised policies with centralised critics, which selects relevant information for each agent at every time-step through an attention mechanism. Many other communication mechanisms have been proposed, such as CommNet \cite{sukhbaatar2016learning}, IC3NEt \cite{singh2018learning}, BiCNet \cite{peng2017multiagent}, attention \cite{jiang2018learning} and soft-attention \cite{das2020tarmac} based, master-slave architecture \cite{kong2017revisiting}, Feudal Multiagent Hierarchies \cite{ahilan2019feudal}, Bayesian Action Decoder \cite{foerster2019bayesian}. \section{Experiments} In our experiments we test the hypothesis that imposing a dynamic bottleneck on communication facilitates modularization and improved generalization compared to a fixed bottleneck. We test our method in two settings, 1) inter-component communication among different components in the same model and 2) inter-agent communication in cooperative multi-agent reinforcment learning (MARL). \subsection{Experimental setup} \paragraph{Discretize inter-module communication within a model.} We explore the effects of using DVQ to bottleneck inter-module communication for visual reasoning tasks. The tasks are to predict object movement in a grid world (referred to as \textbf{``Shapes''}) and 7 different Atari game environments. In all of the environments, changes in each image frame depend on the previous image frame and the actions applied to different objects. Objects are captured by a convolutional neural network and are passed to a Graph neural network (GNN). Positions of objects are captured by nodes in the GNN and the relative positions among different objects are communicated through the network a discrete manner \citep{kipf2020contrastive}. In this work we apply either DVQ or VQ to discretize the vector sum of edges each node is connected to. \paragraph{Bottleneck communication among reinforcement learning agents.} To investigate the potential of using DVQ to bottleneck communication among different reinforcement learning agents, we conducted experiments in two MARL environments with cooperative tasks. Multi-Agent Particle Environment is a 2D cooperative MARL environment originally proposed in the MADDPG paper \cite{lowe2020multiagent}. There are 3 agents and 3 landmarks in a 2D space. In this study, we use the cooperative navigation task (called \textbf{``SimpleSpread''}) where agents are required to cover all landmarks while minimizing inter-agent collisions. The action space is discrete and agents can move either up, down, left or right in addition to a no-move ``action''. Each agent only has a partial view of the environment. In this work, we allow agents to encode their partial view and send it as messages to other agents. We apply discretization bottlenecks on the messages each agent receives. The second MARL environment we use is GhostRun, which is an adaptation the environment available from \citet{shuo2019maenvs}. The environment consists of multiple agents, each with a partial view of the ground below them. There are multiple ghosts (red dots) moving randomly in the environment. All the agents work as a team to escape from the ghosts. Once an agent has ghosts in its view, the team receives negative rewards which are multiplied by the total number of ghosts in the joint view of all agents. Similar to the Particle environment, we allow agents to communicate with each other by sending their encoded partial view as messages, and we discretize the messages received by each agent. \begin{figure} \centering \includegraphics[width=0.40\linewidth]{figures/Task_2Dshape.png} \includegraphics[width=0.355\linewidth]{figures/TaskAtariGame.png} \includegraphics[width=0.40\linewidth]{figures/TaskParticles.png} \includegraphics[width=0.40\linewidth]{figures/Task_ghostRun.png} \caption{Two visual reasoning tasks, grid word (top left) and 7 Atari games (top right), are used to analyze effects of bottlenecking inter-module communication within a model using DVQ. Two MARL tasks, Particles (bottom left) and GhostRun (bottom right), are used to investigate the effect of bottlecking inter-agent communication using DVQ.} \label{fig:MARLParticle} \end{figure} \subsection{Inter-module communication} The bottlenecks were applied on edges of graphs in the GNN linking nodes that represent objects in the image \cite{liu2021discrete}. The visual reasoning tasks require the model to forecast future scenes in the environments based on current state and actions if available. Out of the 8 visual reasoning tasks, DVQ outperforms fixed-bottleneck VQ in 7 tasks (figure \ref{table:result_iid}), with the adaptive hierarchical architecture best on average. \begin{table*} \label{table:result_iid} \caption{Performance of different methods in bottlenecking inter-module communication in a visual reasoning model} \centering \arrayrulecolor{black} \begin{tabular}{!{\color{black}\vrule}c!{\color{black}\vrule}c!{\color{black}\vrule}c!{\color{black}\vrule}c!{\color{black}\vrule}c!{\color{black}\vrule}} \arrayrulecolor{black}\hline Task/Model & \textbf{Original} & \textbf{Quantization} & \textbf{Adaptive Quantization} & \textbf{Adaptive Hierarchical} \\ \hline Alien & 0.130 $\pm$ 0.023 & 0.152 $\pm$ 0.026 & 0.170 $\pm$ 0.075 & \textbf{0.177 $\pm$ 0.057} \\ \hline BankHeist & 0.397 $\pm$ 0.043 & 0.371 $\pm$ 0.057 & 0.406 $\pm$ 0.037 & \textbf{0.414 $\pm$ 0.084} \\ \hline Berzerk & 0.436 $\pm$ 0.250 & 0.584 $\pm$ 0.011 & \textbf{0.630 $\pm$ 0.016} & 0.580 $\pm$ 0.021 \\ \hline Boxing & 0.873 $\pm$ 0.021 & 0.908 $\pm$ 0.068 & 0.929 $\pm$ 0.031 & \textbf{0.957 $\pm$ 0.041} \\ \hline MsPacman & \textbf{0.152 $\pm$ 0.037} & 0.135 $\pm$ 0.030 & 0.054 $\pm$ 0.002 & 0.057 $\pm$ 0.005 \\ \hline Pong & 0.169 $\pm$ 0.047 & 0.201 $\pm$ 0.035 & 0.205 $\pm$ 0.068 & \textbf{0.225 $\pm$ 0.031} \\ \hline shapes & 0.674 $\pm$ 0.055 & 0.672 $\pm$ 0.053 & 0.664 $\pm$ 0.034 & \textbf{0.692 $\pm$ 0.065} \\ \hline SpaceInvaders & 0.138 $\pm$ 0.037 & 0.199 $\pm$ 0.085 & \textbf{0.258 $\pm$ 0.103} & 0.232 $\pm$ 0.076 \\ \hline \end{tabular} \end{table*} \begin{figure*} \centering \includegraphics[width=0.45\linewidth]{figures/Berzerk_eval_eval_RR.png} \includegraphics[width=0.45\linewidth]{figures/Boxing_eval_eval_RR.png} \caption{Bottlenecking communication among components in a model in visual reasoning task. This figure shows examples of two games. Left panel: performance of different methods in Berzerk game. Right panel: performance of different methods in Boxing game } \label{fig:VisualReasoning} \end{figure*} \subsection{Inter-agent communication in cooperative MARL} Next we investigate the potential benefits of using DVQ to bottleneck information exchange among multiple agents in two cooperative MARL tasks. Agents communicate with each other in a broadcasting manner where each agent $j$ sends identical messages $m_{j,t}$, the encoded partial observation of agent $j$, to all other team members simultaneously. Each agent in the cooperative game receive $M_t=\{m_{j,t}|0\leq j < N_{agents}\}$ from all agents in the team at the same time and reads $M_t$ using an attention mechanism \mbox{$m'_{i,t} = \mathrm{softmax} \bigg( \frac{q^{m}_{i, t} \kappa_{t} }M*{t}{\sqrt{d_m}}\bigg)$} where $m'_{i,t}$ is the final message agent $i$ received from others at time step $t$ and $q^{m}_{i, t}=f_q (m_{j,t})$ and $\kappa_{t}=f_m (M*{t})$. Both $f_m$ and $f_q$ are MLP encoders. At each time step, for each agent, $m'_{i,t}$ is discretized. In DVQ, $L \in [16,64,256]$ and $G \in [1,2,4]$. In the VQ baseline, $L=16$ and $G=1$. In the Particle environment, both dynamic hierarchical quantization and dynamic quantization outperform VQ with fixed coarseness. In the GhostRun environment, dynamic hierarchical quantization outperforms the baseline and dynamic quantization ties with the baseline (Figure~\ref{fig:MARLGhostRun}). \begin{figure} \centering \includegraphics[width=0.48\linewidth]{figures/Particles_test.png} \caption{Bottlenecking communication among cooperative agents in Particles environment. } \label{fig:MARLParticle} \end{figure} \begin{figure} \centering \includegraphics[width=0.98\linewidth]{figures/GhostRun.png} \caption{The effect of applying DVQ to bottleneck communication among cooperative agents in GhostRun environment. } \label{fig:MARLGhostRun} \end{figure} \subsection{Task difficulty and bottleneck tightness} In the sections above, our experiments showed that DVQ outperforms VQ with fixed capacity in various tasks. Next, we seek to understand behaviors of DVQ. In the visual reasoning tasks, difficulty varies significantly among different games. For example, object movement in some Atari games are more unpredictable than others. In addition, even within the same game, difficulty many vary among episodes. This motivates us to ask the question of whether the tightness of bottleneck introduced by DVQ is influenced by how hard a task is. To answer this, we first quantify difficulty of the task based on the test performance of the visual reasoning model. Reciprocal Ranks (RR) is used as the performance metric where higher RR means better performance. Next, we break down the capacity penalty into the factor loss, which corresponds to penalty as a result of the number of factors, and codebook size loss, which is the term that penalizes high capacity caused by large codebook sizes. Our analysis shows that both factor loss and codebook size loss have positive correlation with RR, across the 8 tasks (Figure \ref{fig:RRCorLoss}), with stronger correlation in the case of number of factors. Depending on the direction of causality in this observation, it suggests that tighter bottlenecks are picked for hard tasks either because of difficulty of optimization (when the optimal level of bottleneck tightness is not found, the model tends to undershoot capacity) or because harder tasks call for stronger regularization from tighter bottenecks. \begin{figure} \centering \includegraphics[width=0.8\linewidth]{figures/Loss_RR_Corr.png} \caption{Tighter bottlenecks are used in difficult tasks. A positive correlation of both factor size (blue) and codebook size (red) with model performance measured by reciprocal rank (RR). The higher the RR, the better the model performs in the task.} \label{fig:RRCorLoss} \end{figure} \subsection{Discretization difficulty and bottleneck tightness} In addition to difficulty of the task itself, another dimension to consider is the difficulty of discretization, which is largely determined by distribution of the learned representation and dynamics of the model. We estimate difficulty of discretization using the discretization loss obtained during evaluation. Recall that the discretization loss is averaged over factors. We observed that DVQ tends to increase its capacity by increasing both the number of factors and codebook size when the discretization loss is high (figure \ref{fig:DisCor}), which is reasonable as high expressivity in inputs puts positive pressure on decreasing the tightness of the bottleneck. \begin{figure} \centering \includegraphics[width=0.45\linewidth]{figures/Loss_Dis_factor.png} \includegraphics[width=0.45\linewidth]{figures/Loss_Dis_CB.png} \caption{More factors and larger codebook sizes are used by DVQ when discretization is difficult.} \label{fig:DisCor} \end{figure} \section{Conclusion} Effective communication between different specialized components of a model or between different agents in a MARL system requires compatible representations and synchronized messages. Although communication via continuous, high-dimensional signals is a natural choice given the ease of optimization, recent work has shown that discretization can provide more robust communication. Creating a communication bottleneck with pressure to utilize only as few bits as possible needed to coordinate inference improves generalization and imposes disentangling of modules and specialization, which is beneficial for training (learning $N$ skills independently by $N$ experts is easier than learning an organization of knowledge where skills are entangled and all skills interact with each other). Among these works, those based on VQ depend on the number of discrete codes in the representation vector and the size of the codebook, which are fixed, limiting their adaptability and their ability to fit bottleneck behaviour tightly to data. We have shown theoretically and empirically the benefits of using a set of discretization functions with varying levels of output capacity and choosing the function applied for a given input using key-query attention, instead of using a single discretization function that maps all inputs to a discrete space of fixed size. Adaptively bottlenecking capacity makes tightness dependent on inputs, which allows the generalization gap to be decreased. The experiments show that performance is improved compared to using a fixed capacity bottleneck across a range of tasks in visual reasoning and multi-agent reinforcement learning. \clearpage \nocite{langley00}
{ "redpajama_set_name": "RedPajamaArXiv" }
360
{"url":"https:\/\/www.physicsforums.com\/threads\/approximate-uncertainty-in-area-of-circle.528404\/","text":"# Homework Help: Approximate uncertainty in area of circle\n\n1. Sep 8, 2011\n\n### chops369\n\n1. The problem statement, all variables and given\/known data\nWhat is the approximate uncertainty in the area of a circle of radius 5.3 * 104 cm? Express your answer using one significant figure.\n\n2. Relevant equations\nA = pi*r2\n\n3. The attempt at a solution\nUsing the given radius, I found the area to be 8.8 * 109 cm2.\n\nAnd since the uncertainty is not given, I'm assuming that it's 0.1 * 104 cm.\n\nUsing this, the upper limit for the radius is 5.4 * 104 cm, which makes the upper limit for the area 9.2 * 109 cm2.\n\nSubtracting 9.2 - 8.8 = 0.4 * 109 cm2. But this is apparently not the correct answer, and I can't figure out why. Unless I'm forgetting some fundamental aspect of significant figures, the only other way I can express this in one sig fig is to write out the actual number, i.e. 400000000; but this is also incorrect.\n\nWhat am I doing wrong?\n\n2. Sep 9, 2011\n\n### daveb\n\nIf the area is A = pi*r2, then the difference in area is delta-A (sorry, I forgot all my latex). Can you relate delta-A to delta-r (the radius)? If you've taken calculus, then instead of delta-A it would be dA\/dr.\n\n3. Sep 9, 2011\n\n### chops369\n\nI just figured it out.\n\nTurns out it was a rounding error on my part, so what I rounded up to 4 * 108 should have actually been rounded down to 3 * 108.\n\n4. Sep 9, 2011\n\n### Staff: Mentor\n\nThat's the upper bound, now what's the lower bound?","date":"2018-08-20 10:17:54","metadata":"{\"extraction_info\": {\"found_math\": false, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 0, \"mathjax_display_tex\": 0, \"mathjax_asciimath\": 0, \"img_math\": 0, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.8360418677330017, \"perplexity\": 935.5350731060709}, \"config\": {\"markdown_headings\": true, \"markdown_code\": true, \"boilerplate_config\": {\"ratio_threshold\": 0.18, \"absolute_threshold\": 10, \"end_threshold\": 15, \"enable\": true}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2018-34\/segments\/1534221216333.66\/warc\/CC-MAIN-20180820101554-20180820121554-00682.warc.gz\"}"}
null
null
John Goodsir (20 March 1814 – 6 March 1867) was a Scottish anatomist and a pioneer in the formulation of cell theory. Early life Goodsir was born on 20 March 1814 in Anstruther, Fife, the son of Elizabeth Dunbar Taylor and John Goodsir (1742–1848), a medical practitioner in the town. He was baptised on 17 April 1814. His younger brother, Joseph Taylor Goodsir, entered the ministry and became minister in Lower Largo. His younger brother, Harry Goodsir, perished on the Franklin expedition. Another brother, Robert, (b. 1824) qualified as a doctor and sailed twice to the Arctic searching for his brother Harry. His youngest brother, Archibald, (b. 1826) qualified as a Member of the Royal College of Surgeons of England. In December 1826, at the age of 12, Goodsir entered the University of St Andrews, where his classes included classics and mathematics. The following year he was apprenticed to the surgeon and dentist Robert Nasmyth, at 78 Great King Street in Edinburgh's New Town. This allowed him to enter the Edinburgh University Medical School and also attend classes at the Royal College of Surgeons of Edinburgh. He finished his apprenticeship with Nasmyth in 1833, and qualified as Licentiate of the Royal College of Surgeons of Edinburgh in 1835. He then moved back to Anstruther to work in his father's medical practice, which allowed him to resume his boyhood hobby of searching the local coastline along the Firth of Forth for all forms of wildlife. The specimens which he collected formed the basis of the collection he later developed as a museum conservator. In Edinburgh Goodsir had befriended Edward Forbes, who would later become Regius Professor of Natural History at the University of Edinburgh, and George Day, later Chandos Professor of Anatomy and Medicine of the University of St Andrews. Together with Goodsir's brother Joseph they rented a flat at 21 Lothian Street close to the university, which became a meeting place for scientists, writers and artists, who together called themselves the Brotherhood of the Friends of Truth. During his surgical and dental apprenticeship with Nasmyth Goodsir had started to collect human teeth. From studies of these he made the important observation that deciduous teeth were not the 'parents' of permanent teeth but developed independently. In 1839, he published a noted paper on this topic. The following year he gave a paper to the British Association for the Advancement of Science entitled "Dentition in the ruminants", with some assistance from the University of Edinburgh Professor of Natural History, Robert Jameson. Jameson lent him an Ehrenberg microscope and encouraged him to develop microscopical studies from which Goodsir would later make major contributions to understanding of cell and tissue structure and function. Goodsir joined the Wernerian Natural History Society which had been founded by Jameson. Among his teachers at Edinburgh it was the anatomist Robert Knox who made the greatest impression. Knox broadened Goodsir's idea of the importance of comparative anatomy in the scheme of life and in the medical curriculum. Knox appreciated his pupil's skill and gave him normal and pathological specimens to mount and preserve. The two kept in touch with each other for many years. Museum conservator and anatomy demonstrator On 21 April 1841, he was appointed conservator of the Museum of the Royal College of Surgeons of Edinburgh in succession to William MacGillivray, who had been appointed Professor of Natural History at Marischal College, Aberdeen. Goodsir promoted the museum collections by giving public lectures featuring its specimens. and by giving lectures to medical students. His lectures on pathology in 1841 and 1842 presented his innovative ideas on cell theory which were read and later developed by the German pathologist Rudolf Virchow. He gave the first description of the stomach parasite sarcina ventriculi which demonstrated his status as a shrewd observer and innovative thinker. Two years later, he was appointed curator of the University of Edinburgh natural history collection and he was succeeded as RCSEd Museum Conservator by his brother, Harry Goodsir, who continued in this post until 1845. In May 1844, Goodsir was appointed Anatomy Demonstrator under Alexander Monro and his lectures attracted large numbers of students and did much to restore the University of Edinburgh's reputation for anatomical teaching which had suffered under Monro. The following year he published, jointly with his brother Harry, Anatomical and Pathological Observations based on his earlier lectures at the RCSEd. This book brought international recognition for his ideas on cell structure and function. The Anatomical Memoirs also contain a biography by Henry Lonsdale. Goodsir also improved the quality of the instruction in the anatomy department by extending and improving the dissecting rooms, recruiting additional staff, and giving microscopic demonstrations. Goodsir's microscopists were among the first to use the achromatic microscope. Cell theory On the basis of his studies using the compound microscope Goodsir developed his theory about the nature and structure of cellular life and organisation. He concluded that all living organisms are formed of microscopic units, cells. Goodsir was not alone in postulating such a concept and the theory that cells form the basic structure of tissues in all plants and animals has been attributed to Matthias Jakob Schleiden and to Theodor Schwann. Goodsir posed and then answered the questions "What is a cell with its walls, contents, nucleus and nucleolus? How is a cell formed? How do cells multiply?" The theory which he developed from these studies was original and won the extravagant praise of Rudolf Virchow (1821–1902), who dedicated his masterpiece Cellular Pathology to Goodsir, describing him as "one of the earliest and most acute observers of cell-life both physiological and pathological." In 1842, Goodsir was elected a Fellow of the Royal Society of Edinburgh his proposer being James Syme. He was elected a Fellow of the Royal Society in 1846. In 1849, he was elected as a member of the American Philosophical Society. Professor of anatomy When Alexander Monro tertius retired in 1846, Goodsir was appointed Professor of Anatomy at the University of Edinburgh. In 1848 he was elected a Fellow of the Royal College of Surgeons of Edinburgh (FRCSEd), applied for the position of Assistant Surgeon to the Royal Infirmary of Edinburgh, but was not appointed. He moved into Edward Forbes's South Cottage at Wardie in north Edinburgh where he spent the last ten years of his life. Such was the improvement that he brought about in anatomy teaching that by 1860–1861 the size of the anatomy class had grown to 354. Later years From 1850, Goodsir became unwell, showing the features of the chronic wasting illness which would eventually prove fatal. It made slow and insidious progress and assumed the characters of locomotor ataxia. Yet despite this, after the death of his friend Edward Forbes in 1854, he took on Forbes's lectures in addition to his own. In 1863, he was invited to assist Sir David Brewster with an article for the North British Review on Faivre's analysis of Goethe's studies. Brewster, a distinguished physicist and mathematician and now Principal of the University of Edinburgh, had known Goodsir from 1839, when both were members of the Literary and Philosophical Society of St Andrews. Goodsir died at South Cottage, Wardie, Edinburgh on 6 March 1867, at the age of 52. He is buried alongside one of the central paths in Dean Cemetery, Edinburgh, next to his friend Forbes. References External links 1814 births 1867 deaths Academics of the University of Edinburgh Alumni of the University of Edinburgh Alumni of the University of St Andrews Fellows of the Royal Society Fellows of the Royal Society of Edinburgh People from Anstruther Scottish anatomists Scottish curators
{ "redpajama_set_name": "RedPajamaWikipedia" }
7,338
Rocanville Airport formerly was a registered aerodrome located north-east of Rocanville, Saskatchewan, Canada. See also List of airports in Saskatchewan List of defunct airports in Canada References Defunct airports in Saskatchewan Rocanville No. 151, Saskatchewan
{ "redpajama_set_name": "RedPajamaWikipedia" }
2,673
By Chris Evans FM20 Project, The Coaches: Episode 4 The Football Manager Project is back. A new manager, a new team and a new challenge. Editor of The Set Pieces, Chris Evans, has entered a fantasy draft competition with six real-life coaches and managers. But can Tromsgodset Pieces upset the odds and bring the inaugural TSP Conference home? Episode 1; Episode 2; Episode 3; Episode 4; Episode 5; Episode 6; Episode 7; Episode 8; Episode 9; Episode 10; Episode 11; The Squads The guide to becoming a successful football manager tells me I should remain positive at all times. But, quite frankly, after suffering a humiliating 6-0 loss in my first match, I think I'm already past that. It was one of the most abject displays I've been responsible for. We'd struggled to keep the ball, we had fewer shots on target than goals we'd conceded and I reckon a line-up of training dummies might have done a better job of defending set pieces than my lot. It was fucking awful. I don't mind admitting that as the fifth and sixth goals went in, I started trying to think of creative ways to quit. I mean, the old reload and replay trick doesn't work so well when there are six real-life coaches playing too. Especially when you've announced the game to a watching audience as well. After deciding it was a disproportionate reaction to board a boat and hide out in the Hebrides (where I'm sure they still have internet anyway) to avoid further humiliation, I turn to the tactics screen. Personnel-wise, I'm only going to make one change. After Gabriel's lead-footed display against Flaymond FC, he'll make way for Chris Smalling in central defence. Me and Basic Billy haven't got off to the best start, but the stage is set for him to prove his worth. The relative security Francis Coquelin gave the team from a deeper role during the middle portion of the match against Flaymond was one of few glints of hope, so I decide to do the same here. While I'm concerned about our virtual non-entity of an attack in the opener, I want to ensure we have a stable base to build from. If we can avoid being dominated early on, then my plan is to become more positive as the game progresses and release Martin Odegaard into a more offensive number 10 position. I also move to a more cautious mentality and decide not to ask my players to take such an aggressive pressing approach for fear of being pulled out of position too easily. I don't want to give off the impression that I'm frightened of another heavy defeat but, if I'm honest, I'm petrified of it happening again. My next opponent is Athletico Ashton, who scored two late goals to snatch a 2-1 victory against Killie FC in their opening match. Managed by West Ham coach Luke Hirst, they're set with a 5-2-1-2 formation, with a solid foundation supporting a fearsome front three of Erling Haaland, João Félix and Paulo Dybala. There are no cloggers at the back either, with a host of names that once more make me question my own draft picks. I'm particularly jealous of Hirst picking up Trent Alexander-Arnold, Aymeric Laporte and Sergej Milinkovic-Savic. Alas, I've made my bed and I'll have to lie in it. I tell the lads I expect to see a much better performance and they seem to be motivated by my words. So motivated, in fact, that we start the game in impressive fashion, forcing Athletico back into their own half and not letting them anywhere near our goal. What's more, we seem to be carrying some threat ourselves. As Odegaard stands over a free kick deep on the left flank, I'm filled with hope. And the Norwegian doesn't disappoint. He whips in a dangerous set piece into the six-yard box and Stefan de Vrij gets in front of his marker to head in the first goal of the Tromsgodset Pieces era. I can't tell you how relieved I am. The game is tight and littered with fouls, but that suits me down to the ground. If we can stifle the opposition, then I'm confident we've got enough quality to conjure up something ourselves. And I'm nearly proved right on the half-hour mark, as a fluent passing move starting from a David Soria goal kick ends up with Junior getting in down the left and picking out Harry Kane in the centre. I take in a sharp breath as I expect to see Kane plunder in from close range, but Matija Nastasic gets across to thwart him in the nick of time. My disappointment intensifies within minutes, as Mo Salah presents possession back to Athletico as we look to defend a throw-in deep in our own half. All of a sudden, Alexander-Arnold is in acres of space on the opposite flank and plays in Félix, who clips the ball past Soria. It's the first real chance they've created and we've been pulled back level. Salah almost makes up for his mistake immediately as he tees up Kane, but Miguel Moya manages to turn the England striker's effort wide. Despite Kane's profligacy, it's been a pleasing first half and I see no reason to change anything at half-time. Hirst clearly does though and takes off Dybala to be replaced by Jack Grealish. Watch the highlights from all of the round's games My game plan appears to be working, although we're starting to be forced deeper. Milinkovic-Savic fires in an effort from the edge of the area that looks to beat Soria but, thankfully, slams back off the post. I'm too slow to react to the danger and moments later, Alexander-Arnold picks out Grealish in the box to head home for 2-1. Another header and we're behind again. I don't want to be too reactive, so leave things as they are. Alas, a tame Jordan Henderson sighter is the best I can muster in terms of a fightback and decide I need to take action. As planned, I tweak my formation by bringing Coquelin forward to create a number 10 role. But it won't be Odegaard who fills it as I bring him off for Gerard Deulofeu and move Marco Asensio into a more central position. I also decide to make a change at left back by introducing Marvin Plattenhardt in place of Junior. While I'm now posing more of a threat going forward, I'm open to be exploited at the back with Grealish the main beneficiary of the new-found space. As I begin to worry a third goal could be coming, Plattenhardt and Asensio combine to produce a dangerous cross in from the left that Salah manages to get on the end of. GOOOOOOAL! It's 2-2! My previously conservative approach is history and I have no intention of accepting a point, so I continue to press forward. Chances keep coming at both ends as a result, with Soria denying Wissam Ben Yedder and then Plattenhardt coming to the rescue to clear a Willy Boly header off the line. Do I see this as a warning? Do I heck. I choose that attack is the best form of defence and chuck on Tammy Abraham to support Kane up front – if I'm going down, I'm going down fighting. Abraham goes close as the clock runs down and just as though it looks as if we're set for a draw, another Plattenhardt cross picks out Salah and the Egyptian converts. GOAL! I'm mid-knee slide before I realise the goal has been ruled out. I'm devastated. The replay shows it was the correct decision by the slightest of margins (watch the highlights), but I'm still as aggrieved as only a true competitor can be. Because that's what I am now, a true competitor. After being so well-beaten in my first game, I've got a point and arguably could have taken all three. I'm also off the bottom of the table and have genuinely seen enough within my ranks to start believing we're not so hopeless as first thought. At least that's what I'm clinging on to. Played a blinder – Adam Cooper (AJCFC 2-0 win v Stoneham AFC) "Despite not winning my first match, I thought the performance was very good. We dominated possession and had a lot of clear opportunities, so there was no real need to change much. "My only swap was on the bench, where I included Cesc Fàbregas instead of Sofiane Boufal. I felt Asier lllarramendi and Matteo Guendouzi looked a little weak at times in the first game, so that provided a little more strength available to me if I needed to change anything mid-game. "Being at home, I decided we could continue with a similar mentality but was disappointed by the lack of possession. Even so, we created a significant number of good and key opportunities to help us win. "I felt we controlled the game from early on, with Memphis Depay and Nabil Fekir in particular putting in strong performances. And with Virgil van Dijk at the back, I'm confident we'll keep more clean sheets. "My only current worry is the form of Sadio Mané, who is one of my key attacking players but has been the worst performer so far. My main aim in coming games is to continue, perhaps be a little more clinical and get Mané up to speed." Had a shocker – Craig Clark (KillieFC 2-1 loss v BC) "A second consecutive defeat and another after I'd taken the lead. The roots of my problems so far are that I'm not good enough in possession or as good at creating chances as I'd hoped. In hindsight, I probably recruited too many individuals, hence why Zlatan Ibrahimovic has scored my only goals. In the first game, I lost a last-minute goal to a free kick from the edge of the area, so maybe I should have been more conservative in the defensive third in the final few moments of the game. "I lost the first two matches as I was too focused on how I wanted to play, rather than just winning the game. So I need to manage the game better in the phases. A couple of changes to personnel and shape will get me off the mark, I'm sure of that." Want to see more? You can watch all the key action from each game week in our FM20 Project, The Coaches highlights post.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
8,089
using System; using System.Collections.Generic; using System.Data.Entity.Core.Metadata.Edm; using System.Data.Entity.Infrastructure; using System.Linq; using System.Linq.Expressions; using Vstack.Common.Extensions; using Vstack.Services.Data.EntityFramework; using Vstack.Services.Data.General; using Vstack.Services.Data.Generator.Procedures; using Vstack.Services.Domain; using Vstack.Services.Filters; using Vstack.Services.General; namespace Vstack.Services.Mappers { public abstract class BaseEfAndCacheMapper<TContext, TDmn> : BaseEfAndStoredProcMapper<TContext, TDmn> where TContext : VstackDbContext where TDmn : class, IDataDomain { protected BaseEfAndCacheMapper(TContext context, ICacheHelper cacheHelper) : base(context) { context.ValidateNotNull(); this.CacheHelper = cacheHelper; this.CacheHelper.SetContext(context); } private ICacheHelper CacheHelper { get; } public override IEnumerable<ActionResult<int>> DeleteAll(IEnumerable<TDmn> domains) { domains.ValidateNotNull(); List<TDmn> domainsList = domains.ToList(); List<UpdatedDomain<TDmn>> updatedDomains = domainsList .ConvertAll(dmn => UpdatedDomain<TDmn>.FromEntry(this.Context.Entry(dmn))); IEnumerable<ActionResult<int>> result = base.DeleteAll(domainsList); this.UpdateCache(updatedDomains); return result; } public override IEnumerable<ActionResult<TDmn>> SaveAll(IEnumerable<TDmn> domains) { domains.ValidateNotNull(); List<TDmn> domainsList = domains.ToList(); List<UpdatedDomain<TDmn>> updatedDomains = domainsList .ConvertAll(dmn => UpdatedDomain<TDmn>.FromEntry(this.Context.Entry(dmn))); IEnumerable<ActionResult<TDmn>> result = base.SaveAll(domainsList); this.UpdateCache(updatedDomains); return result; } protected override IEnumerable<int> GetIdsFromGetAll(DeletedState deletedState) { if (deletedState == DeletedState.Undeleted) { string getAllProcName = Naming.GetGetAllProcName(typeof(TDmn).Name, deletedState); IEnumerable<int> ids = this.CacheHelper.GetList(getAllProcName, null); if (ids == null) { ids = base.GetIdsFromGetAll(deletedState); this.CacheHelper.SetList(getAllProcName, null, ids); } return ids; } else { return base.GetIdsFromGetAll(deletedState); } } protected override IQueryable<object> BulkGetByIds(Type domainType, IEnumerable<int> ids) { ids.ValidateNotNull(); List<int> idsNotInCache = new List<int>(); List<object> domains = new List<object>(); foreach (int id in ids) { object domain = this.CacheHelper.GetDomain(domainType, id); if (domain != null) { domains.Add(domain); } else { idsNotInCache.Add(id); } } if (idsNotInCache.Any()) { List<object> domainsFromDb = base.BulkGetByIds(domainType, idsNotInCache).ToList(); this.CacheHelper.AddDomains(domainsFromDb); domains.AddRange(domainsFromDb); } return domains.AsQueryable(); } protected override IEnumerable<int> GetIdsFromForeignKeyProcedure(ReferentialConstraint constraint, IEnumerable<int> ids) { ids.ValidateNotNull(); string procName = Naming.GetForeignKeyProcName(constraint, DeletedState.Undeleted); List<int> idsNotInCache = new List<int>(); List<int> allChildIds = new List<int>(); foreach (int id in ids) { IEnumerable<int> childIds = this.CacheHelper.GetList(procName, new object[] { id }); if (childIds != null) { allChildIds.AddRange(childIds); } else { idsNotInCache.Add(id); } } if (idsNotInCache.Any()) { List<ForeignKeyProcOutputRow> outputRowsFromDb = this.GetForeignKeyProcOutput(constraint, idsNotInCache).ToList(); foreach (int id in idsNotInCache) { IEnumerable<int> childIds = outputRowsFromDb .Where(k => k.ParentId == id) .Select(k => k.ChildId); this.CacheHelper.SetList(procName, new object[] { id }, childIds); } allChildIds.AddRange(outputRowsFromDb.Select(i => i.ChildId)); } return allChildIds; } protected override IEnumerable<int> GetIdsFromFilter(IEntityEqualityStoredProcedurePrimaryFilter filter, DeletedState deletedState) { filter.ValidateNotNull(); if (deletedState == DeletedState.Undeleted) { string procName = Naming.GetFilterProcName(filter, deletedState); object[] parameters = filter.GetParameters(); IEnumerable<int> ids = this.CacheHelper.GetList(procName, parameters); if (ids == null) { ids = base.GetIdsFromFilter(filter, deletedState); this.CacheHelper.SetList(procName, parameters, ids); } return ids; } else { return base.GetIdsFromFilter(filter, deletedState); } } protected override IEnumerable<int> GetIdsFromFilter(IEntityCustomStoredProcedurePrimaryFilter filter) { filter.ValidateNotNull(); string procName = filter.ProcedureName; object[] parameters = filter.GetParameters(); IEnumerable<int> ids = this.CacheHelper.GetList(procName, parameters); if (ids == null) { ids = base.GetIdsFromFilter(filter); this.CacheHelper.SetList(procName, parameters, ids); } return ids; } private void UpdateCache(IEnumerable<UpdatedDomain<TDmn>> updatedDomains) { updatedDomains.ValidateNotNull(); if (updatedDomains.Any()) { string getAllProcName = Naming.GetGetAllProcName(typeof(TDmn).Name, DeletedState.Undeleted); IEnumerable<TDmn> domains = updatedDomains.Select(i => i.Domain).ToList(); IEnumerable<TDmn> nonDeletedDomains = domains.Where(dmn => !dmn.UtcDateDeleted.HasValue).ToList(); if (nonDeletedDomains.Any()) { this.CacheHelper.AddDomains(nonDeletedDomains); this.CacheHelper.AddToListIfExists(getAllProcName, null, nonDeletedDomains.Select(dmn => dmn.Id)); } IEnumerable<TDmn> deletedDomains = domains.Where(dmn => dmn.UtcDateDeleted.HasValue).ToList(); if (deletedDomains.Any()) { this.CacheHelper.RemoveDomains(typeof(TDmn), deletedDomains.Select(dmn => dmn.Id)); this.CacheHelper.RemoveFromListIfExists(getAllProcName, null, deletedDomains.Select(dmn => dmn.Id)); } this.UpdateContraintCachedLists(updatedDomains); this.UpdateEqualityFilterCachedLists(updatedDomains); this.UpdateCustomProcFilterCaches(updatedDomains); } } private void UpdateContraintCachedLists(IEnumerable<UpdatedDomain<TDmn>> updatedDomains) { updatedDomains.ValidateNotNull(); IEnumerable<ReferentialConstraint> constraints = this.Context.Constraints .Where(c => c.ToRole.GetEntityType().Name == typeof(TDmn).Name); foreach (ReferentialConstraint constraint in constraints) { string procName = Naming.GetForeignKeyProcName(constraint, DeletedState.Undeleted); string propertyName = constraint.GetPrimaryToProperty().Name; foreach (UpdatedDomain<TDmn> updatedDomain in updatedDomains) { TDmn domain = updatedDomain.Domain; DbPropertyValues originalValues = updatedDomain.OriginalValues; int? originalParameter = originalValues != null ? originalValues.GetValue<int>(propertyName) : (int?)null; DbPropertyValues currentValues = this.Context.Entry(domain).CurrentValues; int? currentParemeter = !domain.UtcDateDeleted.HasValue ? currentValues.GetValue<int>(propertyName) : (int?)null; if (originalParameter != currentParemeter) { if (originalParameter != null) { this.CacheHelper.RemoveFromListIfExists(procName, new object[] { originalParameter }, new int[] { domain.Id }); } if (currentParemeter != null) { this.CacheHelper.AddToListIfExists(procName, new object[] { currentParemeter }, new int[] { domain.Id }); } } } } } private void UpdateEqualityFilterCachedLists(IEnumerable<UpdatedDomain<TDmn>> updatedDomains) { updatedDomains.ValidateNotNull(); IEnumerable<IEntityEqualityStoredProcedurePrimaryFilter> filters = this.Context.EqualityFilters .Where(f => f.GetType().IsPrimaryFilterForDomain<TDmn>()); foreach (IEntityEqualityStoredProcedurePrimaryFilter filter in filters) { string procName = Naming.GetFilterProcName(filter, DeletedState.Undeleted); IEnumerable<string> parameterNames = filter.Expressions.Select(i => (i.Body as MemberExpression).Member.Name); foreach (UpdatedDomain<TDmn> updatedDomain in updatedDomains) { TDmn domain = updatedDomain.Domain; DbPropertyValues originalValues = updatedDomain.OriginalValues; IEnumerable<object> originalParameters = originalValues != null ? parameterNames.Select(p => originalValues.GetValue<object>(p)) : null; DbPropertyValues currentValues = this.Context.Entry(domain).CurrentValues; IEnumerable<object> currentParameters = !domain.UtcDateDeleted.HasValue ? parameterNames.Select(p => currentValues?.GetValue<object>(p)) : null; if ((originalParameters == null || currentParameters == null) || !originalParameters.SequenceEqual(currentParameters)) { if (originalParameters != null) { this.CacheHelper.RemoveFromListIfExists(procName, originalParameters, new int[] { domain.Id }); } if (currentParameters != null) { this.CacheHelper.AddToListIfExists(procName, currentParameters, new int[] { domain.Id }); } } } } } private void UpdateCustomProcFilterCaches(IEnumerable<UpdatedDomain<TDmn>> updatedDomains) { updatedDomains.ValidateNotNull(); IEnumerable<UpdatedDomain> updatedDomainsNonGeneric = updatedDomains .Select(i => i.ToNonGeneric()) .ToList(); IEnumerable<IEntityCustomStoredProcedurePrimaryFilter> filters = this.Context.CustomProcFilters .Where(f => f.GetType().IsPrimaryFilterForDomain<TDmn>()); foreach (IEntityCustomStoredProcedurePrimaryFilter filter in filters) { filter.UpdateCache(this.CacheHelper, updatedDomainsNonGeneric); } } } }
{ "redpajama_set_name": "RedPajamaGithub" }
31
6. The position of his legs (one resting on the ground and one raised) indicate the importance of living and participating in the material world as well as in the spiritual world, the ability to live in the world without being of the world. 9. Ganesha Symbolism – Ganpati Symbolism: The third hand, turned towards the devotee, is in a pose of blessing, refuge and protection (abhaya); The fourth hand holds a lotus flower (padma), and it symbolizes the highest goal of human evolution, the sweetness of the realised inner self.
{ "redpajama_set_name": "RedPajamaC4" }
1,446
\section*{1. Introduction} \par Generalized exclusion statistics (GES) \cite{hal} has attracted much interest in recent papers [2 -- 8] A typical example of the application of generalized exclusion statistics is the Cologero-Sutherland model \cite{cal,suth,ha}. D. Bernard and Y.-S. Wu \cite{ber} studied the GES in the thermodynamic Bethe ansatz (TBA) using equivalence of the Bethe ansatz (BA) equations and the ones obtained by the Haldane principle \cite{ha}. M. Wadati has shown \cite{wad} that a change in the statistics is determined by an appropriate choice of the phase shift of the scattering matrix. The generalization of exclusion statistics for multicomponent systems was provide in the paper \cite{fu}. \par The goal of this paper is to consider the exclusion statistics of excitations in the Kondo problem. To solve this problem we have applied the TBA for a multicomponent system of particles obeying the GES. We have found the universal behavior of the statistical matrix in high- and low-temperature limits. In these limits the statistical matrix is proportional to the Cartan matrix for the $A_{n}$-algebra. \par The paper is organized as follows. In the second section we provide the main equations of the exclusion statistics theory to complete the discussion. In this section we have also derived the relation between the derivative of phase shift (DPS) of the scattering matrix and the statistical matrix in the framework of the TBA equations for the multicomponent system of particles. The third section deals with the application of this result to the Kondo problem. We show that distribution function and statistical matrix in this problem have the universal form in high and low temperature limits. \section*{2. Exclusion Statistics Equations} \par A change in the number $D_{\alpha i}$ of the vacant states due to the addition of the number $N_{\beta j}$ of the particles, according to Haldane \cite{hal} is defined as \begin{equation} \frac{\partial D_{\alpha i}}{\partial N_{\beta j}} = -g_{\alpha i,\beta j}\, . \label{E1} \end{equation} Here $g_{\alpha i,\beta j}$ is the matrix of statistical interaction. The indices $\alpha$ $(\alpha = 1,2,...M)$ and $i$ correspond to the internal and the dynamical degrees of freedom, respectively. The solution of Eq.(\ref{E1}) has the form: \begin{equation} D_{\alpha i} = -\sum_{\beta j} g_{\alpha i,\beta j} N_{\beta j} + D^{0}_{\alpha i}\, , \label{E2} \end{equation} where $D^{0}_{\alpha i}$ is the number of vacant states of the $\alpha i$-th type without particles. The number of holes $D_{\alpha i}$ determines the statistical weights $W$ as follows \begin{equation} W = \prod_{\alpha,i}\frac{(N_{\alpha i}-1+D_{\alpha i}(\{N_{\beta j}\}) +\sum_{\beta j} g_{\alpha i,\beta j}\delta_{\alpha\beta}\delta_{ij})!} {(N_{\alpha i})!(D_{\alpha i}(\{N_{\beta j}\})-1+\sum_{\beta j} g_{\alpha i,\beta j}\delta_{\alpha\beta}\delta_{ij})!}\, . \label{E3} \end{equation} In the specific cases of $g_{\alpha i,\beta j}=0$ and $g_{\alpha i,\beta j}= \delta_{\alpha\beta}\delta_{ij}$ Eq.(\ref{E3}) yields the well-known expression for the statistical weights of Bose and Fermi particles. \par The distribution function $n_{\alpha i}$ is defined usually \cite{wu,ber,isak} in the following way $n_{\alpha i}=N_{\alpha i}/G_{\alpha i}^{0}$. This is not convenient for systems with internal degrees of freedom. For example, in the hierarchical basis of the states in the fractional quantum Hall effect $n_{\alpha i}=\infty $ if $\alpha = 2,3,...$ because $G_{\alpha i}^{0}=0$ for spin degrees of freedom. The definition of the distribution function in the form \begin{equation} n_{\alpha i} = \frac{N_{\alpha i}}{G_{\alpha i}} \label{E4} \end{equation} with \begin{equation} G_{\alpha i} = G^{0}_{\alpha i} + N_{\alpha i}-\sum_{\beta j} g_{\alpha i,\beta j}N_{\beta j} \label{E5} \end{equation} is more convenient because it takes into account the influence of the statistical interaction on the number of the states. The equilibrium distribution function $ n_{\alpha i}$ can be found in this case from the extremum of the grand partition function as a solution of the following equations: \begin{equation} \frac{1}{n_{\alpha i}}\prod_{\beta j}\left[ 1-n_{\beta j}\right]^ {g_{\beta j,\alpha i}} = \exp\{(\epsilon_{\alpha i}-\mu_{\alpha})/T\}\, . \label{E6} \end{equation} Here $\epsilon_{\alpha i}$ is the energy and $\mu_{\alpha}$ is the chemical potential for the particles of type $\alpha$. The distribution function $n_{\alpha i}$ determines the free energy \begin{equation} F = \sum_{\alpha}\mu_{\alpha}N_{\alpha} - T\sum_{\alpha i} G^{0}_{\alpha i}\ln \left[ \frac{1}{1+n_{\alpha i}}\right] \label{E7} \end{equation} as well as the value of the entropy $S=\ln W$. \par The interection between quasiparticles from the TBA point of view is encoded in the phases $\Theta_{\alpha i,\beta j}$ of the dynamical scattering matrix $S_{\alpha i,\beta j}=-\exp(-i\Theta_{\alpha i,\beta j})$. The statistical properties expressed by the statistical matrix $g_{\alpha i,\beta j}$ depend on the DPS of the scattering matrix \cite{ber,wad}. \par Let us consider the TBA equations for the set of multicomponent particles obeying the GES. Quantizing a gas of such particles on a circle of length $L$ requires that the momentum $k_{\alpha i}$ of the $\alpha i$-th particle satisfies the following condition: \begin{equation} \exp \{ik_{\alpha}(\theta_{i})L\}\sum_{\beta j}^{N}S_{\alpha ,\beta } (\theta_{i}-\theta_{j}) = 1\, . \label{E8} \end{equation} The momentum and the energy of the particles are parametrized by the rapidity $\theta$. Going to the limits $L\rightarrow\infty$ and $N\rightarrow\infty$ with the finite value of $N/L$ and taking the derivative of the $\log$ of Eq.(\ref{E8}) yield \begin{equation} 2\pi q_{\alpha}(\theta) = \frac{dk_{\alpha }(\theta)}{d\theta} + \sum_ {\beta =1}^{M}\int_{-\infty}^{\infty}\Phi_{\alpha \beta}(\theta-\theta') \rho_{\beta}(\theta')d\theta'\, , \label{E9} \end{equation} where \begin{equation} \Phi_{\alpha\beta}(\theta)=\frac{1}{i}\frac{d}{d\theta}\ln S_{\alpha\beta} (\theta)\; \label{E10} \end{equation} is DPS. The function $\rho_{\beta}(\theta)$ in Eq.(\ref{E9}) is the density of the particles of $\beta$-type, $q_{\alpha}(\theta)$ is the density of the states. \par The information about the statistical properties of the system is contained in the distribution functions $n_{\alpha i}$ and in the entropy $S$. In the framework of the thermodynamic Bethe ansatz \cite{zam}, we have neither information about the ground state energy, nor about the structure of low-lying excitations with the energy $\epsilon_{\alpha}^{0}(\theta)$. They are the objects of the traditional Bethe ansatz approach. The equilibrium state at temperature $T$ is obtained by minimizing the free energy $F=E-TS$, where the energy of the system is \begin{equation} E = \sum_{\alpha = 1}^{M}\int\epsilon_{\alpha}^{0}(\theta)\rho_{\alpha} (\theta)d\theta\, . \label{E11} \end{equation} The variation of $F$ with respect to $\rho_{\alpha}$ yields the following equations for the dressed energy $\epsilon_{\alpha}(\theta)$: \begin{equation} \epsilon_{\alpha}(\theta) = \epsilon_{\alpha}^{0}(\theta) +\mu_{\alpha} - \frac{T}{2\pi}\sum_{\beta=1}^{M}\int \Phi_{\beta\alpha}(\theta-\theta') \ln \left[\frac{1}{1-n_{\beta}(\theta')}\right]d\theta'\, . \label{E12} \end{equation} Here the function $n_{\alpha}$ relates to the functions $\rho_{\alpha}$ and $q_{\alpha}$ in Eq.(\ref{E9}) as follows: $n_{\alpha}=\rho_{\alpha}/ q_{\alpha}$. \par Let us assume that the particles are fermions, i.e., $g_{\beta j,\alpha i}=\delta_{\alpha\beta}\delta_{ij}$. We see from Eq.(\ref{E6}) that \begin{equation} n_{\alpha} =\frac{1}{1+ \exp \left[(\epsilon_{\alpha}^{f}(\theta) -\mu_{\alpha})/T\right]}\, . \label{E13} \end{equation} After substituting this expression into Eq.(\ref{E12}), we have the standard TBA equations \begin{equation} \epsilon_{\alpha}^{f}(\theta) = \epsilon_{\alpha}^{0}(\theta) +\mu_{\alpha} - \frac{T}{2\pi}\sum_{\beta=1}^{M}\int\Phi_{\beta\alpha}^{f}(\theta-\theta') \ln \left[1+\exp \left(-\frac{\epsilon_{\beta}^{f}(\theta')- \mu_{\beta}}{T}\right)\right]d\theta' \label{E14} \end{equation} for fermions (superscript $"f"$ denotes the Fermi statistics). \par Each statistics corresponds to the specific value of DPS $\Phi_{\alpha\beta}(\theta)$ in Eq.(\ref{E12}). The transition to the Fermi statistics leads to the new value $\Phi_{\alpha\beta}^{f}(\theta)$ of this function. Assuming that the function $n_{\beta}(\theta)$ in Eq.(\ref{E12}) coincides with Eq.(\ref{E13}) we can find from Eqs.(\ref{E12}), (\ref{E14}) the relation between DPS $\Phi_{\alpha\beta}(\theta)$ for the arbitrary statistics and for the Fermi statistics. This relation has the form \begin{equation} \Phi(\theta-\theta') = \Phi^{f}(\theta-\theta') -2\pi\delta(\theta-\theta')[\cal I-\cal G]\, , \label{E15} \end{equation} where $\cal I$ is the unit matrix and \begin{equation} \cal G = \left( \matrix {g_{11} & g_{12} & g_{13} & ... \cr g_{21} & g_{22} & g_{23} & ... \cr g_{31} & g_{32} & g_{33} & ... \cr \vdots &\vdots & \vdots & \ddots \cr} \right) \, . \label{E16} \end{equation} is the statistical matrix. It is easy to see from Eq.(\ref{E15}) that for models with the function $\Phi_{s\alpha}^{f}(\theta-\theta')\sim \delta (\theta-\theta')$ one can find such statistical matrix $\cal G$ which gives a zero value of the r.h.s. in this equation. In these models the phase of the scattering matrix has the structure of the step function. From the TBA point of view these systems look like a gas of non-interacting particles having the GES. This case is known \cite{ber,mur} as the ideal exclusion statistics. In these models the correlations between particles can be transformed to the statistical interaction. The distribution function of excitations in the systems with the ideal exclusion statistics can be obtained from Eq.(\ref{E6}) where the statistical matrix is now $g_{\alpha,\beta}=\delta_{\alpha,\beta}-\frac{1}{2\pi}\Phi_{\alpha\beta}^{f}$ and the dressed energy of excitations coincides with bare energy $\epsilon_{\alpha}^{0}$. Note that the structure of Eq.(\ref{E6}) looks like that for Eq.(\ref{E15}) (after some simple transformation) because the function $n_{\alpha}$ satisfies Eq.(\ref{E13}). \section*{2. Generalized exclusion statistics in the Kondo problem.} \par Let us consider the Kondo problem from the GES point of view. Bethe-ansatz equations for the isotropic $s-d$ exchange model \cite{tz3} in the Kondo problem are \begin{equation} \exp (ik_{j}L) = \exp \left(\frac{iIS}{2}\right)\prod_{\gamma}^{P} \left(\frac{\lambda_{\gamma}+i/2}{\lambda_{\gamma}-i/2}\right)\, , \label{E17} \end{equation} \begin{equation} \left(\frac{\lambda_{\gamma}+i/2}{\lambda_{\gamma}-i/2}\right)^{N} \left(\frac{\lambda_{\gamma}+1/g+iS}{\lambda_{\gamma}+1/g-iS}\right) = -\prod_{\beta}^{M}\left(\frac{\lambda_{\gamma}-\lambda_{\beta}+i} {\lambda_{\gamma}-\lambda_{\beta}-i}\right)\, . \label{E18} \end{equation} These equations solve the problem of diagonalization of the $s-d$ exchange hamiltonian with the impurity spin $S$ and with the coupling constant $I$. Here the total number of (up-spin) electrons is denoted as $N (P)$. The general solutions of Eqs.(\ref{E17}), (\ref{E18}) have the form of $n$-strings according to the string hypothesis \cite{yang}. The $n$-string is a set of $n$ solutions given by \begin{equation} \lambda_{\gamma}^{(n,j)} = \lambda_{\gamma}^{n} + i\left(\frac{n+1}{2}-j\right),\qquad j=1,...,n\, . \label{E19} \end{equation} Here $\lambda_{\gamma}^{n}$ is the real number and $n$ is the order of the string. The distribution of the $n$-type particles (holes) density in the thermodynamic limit is $\rho_{n}(\lambda)$ ($\rho_{n}^{(h)}(\lambda)$). Assuming that the particles obey the Fermi statistics, the TBA equations for the function $\epsilon_{n}(\lambda)$ have the form \begin{eqnarray} \epsilon_{n}(\lambda) &=& -\frac{2\epsilon_{F}}{\pi}\tan^{-1}\exp (\pi \lambda)\delta_{n1} + \frac{T}{2\pi}\int_{-\infty}^{\infty} \frac{1}{\cosh (\lambda-\lambda')} \nonumber \\ & &\left[\ln\left(1+e^{\epsilon_{n-1}(\lambda')/T}\right)+ \ln\left(1+e^{\epsilon_{n+1}(\lambda')/T}\right)\right]d\lambda'\, . \label{E20} \end{eqnarray} Here and below the dressed energy is $\epsilon_{n}(\lambda)=T\ln [\rho_{n}^{(h)} (\lambda)/\rho_{n}(\lambda)]$. \par The solutions of these nonlinear integral equations describe the thermodynamic properties of the $s-d$-model. The external magnetic field $H$ of the problem enters in the boundary condition as follows: \begin{equation} \lim_{n\rightarrow\infty}\frac{\epsilon_{n}(\lambda)}{n} - H = 0\, . \label{E21} \end{equation} Note that this boundary condition means the condition of compensation of the internal magnetic field $h~=~\lim\limits_{n\to\infty} (~\epsilon_{n}~/~n)$ by external magnetic field $H$. This situation takes place as well for some phase states in $(2~+~1)~D$ systems. \par The spin free energy \begin{eqnarray} F^{sp} &=&-NT\int_{-\infty}^{\infty}\frac{1}{2\cosh (\pi\lambda)} \ln\left(1+e^{\epsilon_{1}(\lambda)/T}\right)d\lambda \nonumber \\ & &-T\int_{-\infty}^{\infty}\frac{1}{2\cosh (\pi\lambda+1/g)} \ln\left(1+e^{\epsilon_{2S}(\lambda)/T}\right)d\lambda \label{E22} \end{eqnarray} is expressed by the functions $\epsilon_{n}(\lambda)$. The first term in the r.h.s. of Eq.(\ref{E22}) corresponds to the spin free energy in the absence of impurity. The second term is the impurity contribution to the free energy. We will focus on the universal properties of the solutions of Eqs.(\ref{E20}) in the limits $T\to\infty$ and $T\to 0$. \par Comparing BA Eqs.(\ref{E20}) and TBA Eqs.(\ref{E14}) one can see that the relation between them exists if \begin{equation} \epsilon_{n}^{f}(\lambda) = - \epsilon_{n}(\lambda)\, . \label{E23} \end{equation} In other words, the energy of the particles in TBA Eqs.(\ref{E14}) corresponds to the energy of the holes in BA Eqs.(\ref{E20}) of the Kondo problem. The $\alpha$-type particle in the TBA equations is made corresponding to the $n$-th string solution of Eqs.(\ref{E20}). By changing the index $n$ by $\alpha$ we can rewrite Eqs.(\ref{E20}) in the new notations as follows \begin{eqnarray} \epsilon_{\alpha}^{f}(\lambda) &=& \frac{2\epsilon_{F}}{\pi}\tan^{-1}\exp (\pi \lambda)\delta_{\alpha 1} - \frac{T}{2\pi}\int_{-\infty}^{\infty} \frac{1}{\cosh (\lambda-\lambda')} \nonumber \\ & &\left[\ln\left(1+e^{-\epsilon_{\alpha -1}^{f}(\lambda')/T}\right)+ \ln\left(1+e^{-\epsilon_{\alpha +1}^{f}(\lambda')/T}\right)\right]d\lambda'\, . \label{E24} \end{eqnarray} The boundary conditions have now the form $\epsilon_{0}^{f}=\infty$ and $\lim\limits_{\alpha\to\infty}\epsilon_{\alpha}^{f}/\alpha=-H$. From Eqs.(\ref{E24}) and Eqs.(\ref{E14}) we have \begin{equation} \Phi^{f}(\lambda-\lambda') = \frac{1}{\cosh (\lambda-\lambda')} \cal L \label{E25} \end{equation} and \begin{equation} \epsilon_{\alpha}^{0}(\lambda) = \frac{2\epsilon_{F}}{\pi}\tan^{-1}\exp (\pi \lambda)\delta_{\alpha 1} \, , \label{E26} \end{equation} where \begin{equation} {\cal L}= \left( \matrix { 0 & 1 & \null & \smash{\lower1.7ex\hbox{\LARGE 0}} \cr 1 & 0 & \ddots & \null \cr \null & \ddots & \ddots & 1 \cr \smash{\hbox{\LARGE 0}} & \null & 1 & 0 \cr} \right) \, . \label{E27} \end{equation} Unlike in the TBA Eqs.(\ref{E14}), we know the function $\epsilon_{\alpha}^{0} (\lambda)$ in Eqs.(\ref{E26}) because it was found by the BA method. \par Let us assume now that the particles have the GES with any statistical matrix $\cal G$. In this case the matrix $\Phi$ in Eqs.(\ref{E15}) for the Kondo problem is \begin{equation} \Phi(\lambda-\lambda') = \frac{1}{\cosh (\lambda-\lambda')} {\cal L} - 2\pi\delta(\lambda-\lambda')\left[\cal I-\cal G\right]\, . \label{E28} \end{equation} It is easy to see from the last expression that in the general case we cannot find a matrix $\cal G$ to set the matrix $\Phi$ to zero. However, it is possible to consider the particular cases of high- and low-temperature limits. The asymptotic behavior of the spin free energy determines the different values of the rapidity range required for the consideration of the high- and low-temperature limits. When $T\to\infty$ (weak coupling limit), the impurity free energy is given by \begin{equation} F_{imp} = -\frac{T}{2}\ln\left( 1+\exp \left(-\frac{\epsilon_{2S}^{f} (-\infty)} {T}\right)\right)\, . \label{E29} \end{equation} When $T\to 0$ (strong coupling limit), \begin{equation} F_{imp} = -\frac{T}{2}\ln\left( 1+\exp\left(-\frac{\epsilon_{2S}^{f} (+\infty)} {T}\right)\right)\, . \label{E30} \end{equation} Therefore, in these temperature limits we have to consider $\epsilon_{2S}^ {f}(\lambda)$ at $\vert\lambda\vert\to\infty$. Taking the limit $\vert\lambda\vert\to\infty$ in Eqs.(\ref{E24}) we have the equations for $\epsilon_{\alpha}^{f}(\pm\infty)$: \begin{equation} \epsilon_{\alpha}^{f}(\pm\infty) = -\frac{T}{2}\ln\left[\left(1+ \exp \left( -\frac{\epsilon_{\alpha -1}^{f}(\pm\infty)}{T} \right)\right) \left(1+\exp\left( -\frac{\epsilon_{\alpha +1}^{f}(\pm\infty)} {T}\right)\right) \right]\, . \label{E31} \end{equation} The boundary conditions are: $\lim\limits_{\alpha\to\infty} \epsilon_{\alpha}^{f} (\pm\infty)/\alpha =-H$, $\epsilon_{0}^{f}(-\infty)=\infty$ and $\epsilon_{1}^ {f}(+\infty)=\infty$. The solution of these equations is \cite{tz3} \begin{equation} \epsilon_{\alpha}^{f}(+\infty) = \epsilon_{\alpha +1}^{f}(-\infty) = -T\ln\left[\left(\frac{\sinh\left[ \frac{H}{2T}(\alpha +1)\right] } {\sinh (\frac{H}{2T})}\right)^{2}-1\right]\, . \label{E32} \end{equation} \par This result will be the same if we assume that the matrix $\Phi^{f}(\lambda)$ in Eqs.(\ref{E24}) is proportional to the $\delta$-function, i.e., \begin{equation} \lim_{\vert\lambda\vert\to\infty}\Phi^{f}(\lambda-\lambda') = \pi\delta(\lambda-\lambda')\cal L \, . \label{E33} \end{equation} It is clear because the function $\lim\limits_{\lambda\to\infty}1/ [\cosh (\lambda-\lambda')]=2/[\exp (\infty-\lambda')]$ acts as the $\delta$-function at $\lambda'=\infty$. Therefore, in the GES case the matrix $\Phi(\lambda)$ has the following form \begin{equation} \Phi(\lambda-\lambda') = \pi\delta(\lambda-\lambda') \left[{\cal L} - 2 {\cal I} + 2 {\cal G}\right] \label{E34} \end{equation} for these temperature limits. From the condition $\Phi=0$ of the ideal statistics we have the following form of the statistical matrix: \begin{equation} {\cal G}=\frac{1}{2} \left( \matrix {2 & -1 & \null & \smash{\lower1.7ex\hbox{\LARGE 0}} \cr -1 & 2 & \ddots & \null \cr \null & \ddots & \ddots & -1 \cr \smash{\hbox{\LARGE 0}} & \null & -1 & 2 \cr} \right) \, . \label{E35} \end{equation} We see that it is proportional to the Cartan matrix for algebra, $A_{n}$. \par To find the distribution function $n_{\alpha}$ we need to know the structure of the low-lying excitations. It follows from Eq.(\ref{E24}) that $\epsilon_{\alpha}(\lambda)=0$ for all $\alpha\ne 0$ when $\lambda=-\infty$ and for all $\alpha\ne 1$ when $\lambda=+\infty$. The structure of the equations for the distribution function of particles $n_{\alpha}$, which can be obtained from Eq.(\ref{E6}) with the statistical matrix (\ref{E35}), resembles that of the equations for $\epsilon_{\alpha}(\vert\lambda\vert = \infty)$ (\ref{E31}): \begin{equation} \left( \frac{1}{n_{\alpha}}-1\right)^2 = \left( 1- n_{\alpha+1}\right)\left( 1-n_{\alpha-1} \right)\, . \label{E36} \end{equation} The solution of Eqs.(\ref{E36}) (with the boundary condition $\lim\limits_{\alpha\to\infty}\left(\frac{1}{n_{\alpha}}-1\right) \to\exp (-\alpha H/T)$) coincides with the solutions (\ref{E32}) : \begin{equation} \left( \frac{1}{n_{\alpha}}-1\right) = e^{\epsilon_{\alpha}^{f}/T} = \left[\left(\frac{\sinh (\frac{H}{2T}(\alpha+1)}{\sinh (\frac{H}{2T})} \right)^{2}-1\right] \label{E37} \end{equation} at $T\to 0$ and \begin{equation} \left( \frac{1}{n_{\alpha}}-1\right) = e^{\epsilon_{\alpha}^{f}/T} = \left[\left(\frac{\sinh (\frac{H}{2T}\alpha )}{\sinh (\frac{H}{2T})} \right)^{2}-1\right] \label{E38} \end{equation} at $T\to\infty$. The spin free energy does not vary when we change the particle statistics. \par The function $\Phi^{f}$ does not change in the TBA equations for multichannel Kondo effect \cite{noz,ts1,ts2}. But the function $\epsilon_{\alpha}^{0}(\lambda)$ is changed. It depends on the number of channels, $k$, as \begin{equation} \epsilon_{\alpha}^{0} = \delta_{\alpha k}\exp{\pi\lambda}\, . \label{E39} \end{equation} This leads to the new solutions for $\epsilon_{n}^{f}(\lambda)$ in the low-temperature limit $(~\lambda~\to ~+~\infty~)$: \begin{eqnarray} \epsilon_{\alpha}^{f}(+\infty) = \cases{ -T\ln\left[\left(\frac{\sin (\pi (\alpha +1)/(k+2)}{\sin (\pi /(k+2))} \right)^{2}-1\right] \qquad \alpha <k \cr -T\ln\left[\left(\frac{\sinh (\frac{H}{2T}(\alpha +1-k)}{\sinh (\frac{H}{2T})} \right)^{2}-1\right] \qquad \alpha\geq k\cr }\, . \label{E40} \end{eqnarray} The solutions for the higher-temperature limit $(\lambda\to -\infty)$ are not changed. To find the solution (\ref{E40}) using the statistical matrix (\ref{E35}) we have to impose the additional boundary condition $n_{\alpha}=1$ at $\alpha=k$. \section*{Conclusion} \par Let us discuss in conclusion what new insights into the thermodynamics of integrable systems (the Kondo problem in particular) are gained by considering these systems in terms of the GES. \par Using the GES principle we introduce an additional "parameter", that is, particle statistics determined by the form of the statistical matrix. If we suppose that the statistical matrix is arbitrary, we can write the TBA equations for a system of particles with any statistics. Each form of the statistical matrix in this case has a corresponding distribution- and the DPS-function. Therefore, we can write the TBA equations in a more convenient form. A successful choice of the statistical matrix may lead to a simpler form of the coupled equations for the dressed energy and for the distribution function. In particular, in the case of ideal statistics one can find a statistical matrix such that the solution of the TBA equations for the dressed energy coincides with the bare energies, and the equations for the distribution function repeat (up to transformation) the TBA equations for Fermi particles. \par Let us focus on the features of the Kondo problem which are studied using the GES principle. The consideration of spin excitations as quasiparticles in the Kondo problem leads to the conclusion that spin excitations correspond to the holes in the TBA approach. To find the distribution function in the system of particles with internal degrees of freedom we need additional information besides the statistical matrix. We should know the detailed structures of the ground state \cite{fu}. The energy of the ground state shows itself as the boundary conditions for the equations determining the distribution function. The boundary conditions include the external magnetic field which compensates the internal "conformal" magnetic field of the system. \par The solution for the distribution function in high and low-temperature regions has the universal form. It is determined by the $q$-deformed dimension $[~\alpha~+~1~]~_{q}$ of irreducible representations of the quantum group $U_{q}(sl_{2})$. Here $[~x~]_{~q~}~=~(q^{x}-q^{-x})/(q-q^{-1})$. In the case of the single channel Kondo problem, the deformation parameter $q~=~\exp ~(~H~/~2~T~)$ is real. It depends on the external magnetic field and the temperature. In the multichannel Kondo problem (at $\alpha < k$), the deformation parameter $q= \exp [i\pi /(k+2)]$ being the root of unity, is determined by the number, $k$ of the channels. \par In summary, we used the TBA equations for a system of particles with internal degrees of freedom to consider the features of the GES in the Kondo problem. It is shown that the statistical matrix and the distribution function in the Kondo problem have a universal form in high- and low-temperature limits. \section*{Acknowledgments} This work was supported in part by the Russian Foundation for Basic Research under Grants Nos. 95-02-05620 and 96-02-19272. \newpage
{ "redpajama_set_name": "RedPajamaArXiv" }
2,189
\section{Introduction} LS I $+61 \, 303$ is a Be/X-ray binary that presents unusually strong and variable radio emission (Gregory \& Taylor 1978). The X-ray emission is weaker than in other objects of the same class (e.g. Greiner \& Rau 2001) and shows a modulation with the radio period (Paredes et al. 1997). The most recent determination of the orbital parameters (Casares et al. 2005) indicates that the eccentricity of the system is $0.72\pm0.15$ and that the orbital inclination is $\sim 30^{\circ}\pm 20^{\circ}$. The best determination of the orbital period ($P=26.4960\pm0.0028$) comes from radio data (Gregory 2002). The primary star is a B0 V with a dense equatorial wind. Its distance is $\sim 2$ kpc. The X-ray/radio ourtbursts are triggered 2.5-4 days after the periastron passage of the compact object, usually thought to be a neutron star. These outbursts can last until well beyond the apastron passage. Recently, Massi et al. (2001) have detected the existence of relativistic radio jets in LS I $+61 \, 303$, which makes of it a member of the microquasar class. Microquasars are thought to be potential gamma-ray sources (Paredes et al. 2000, Kaufman Bernad\'o et al. 2002, Bosch-Ramon et al. 2005a) and, in fact, LS I $+61 \, 303$ has long been associated with a gamma-ray source. First with the COS-B source CG135+01, and later on with 3EG J0241+6103 (Gregory \& Taylor 1978, Kniffen et al 1997). The gamma-ray emission is clearly variable (Tavani et al. 1998) and has been recently shown that the peak of the gamma-ray lightcurve is consistent with the periastron passage (Massi 2004), contrary to what happens with the radio/X-ray emission, which peaks {\sl after} the passage. The matter content of microquasars jets is unknown, although in the case of SS 433 iron X-ray line observations have proved the presence of ions in the jets (Kotani et al. 1994, 1996; Migliari et al. 2002). In the present paper we will assume that relativistic protons are part of the content of the observed jets in LS I $+61 \, 303$ and we will develop a simple model for the high-energy gamma-ray production in this system, with specific predictions for Cherenkov telescopes like MAGIC. We emphasize that our model is not opposed, but rather complementary to pure leptonic models as those presented by Bosch-Ramon \& Paredes (2004) and Bosch-Ramon et al. (2005a), since the leptonic contribution might dominate at lower gamma-ray energies and after the periastron passage. In the next section we will describe the basic features of the model, and then we will present the calculations and results. \section{General picture} A hadronic model for the gamma-ray emission in microquasars with early-type companions has been already developed by Romero et al. (2003). This model, however, is limited to the simple case of a massive star with a spherically symmetric wind and a compact object in a circular orbit. Here we will consider a B-type primary with a wind that forms a circumstellar outflowing disk of density $\rho_{\rm w}(r)=\rho_0({r}/{R_*})^{-n}$ (Gregory \& Neish, 2002). The continuity equation implies a wind velocity of the type $v_{\rm w} = v_0 (r/R_*)^{n-2}$. We will consider that the wind remains mainly near to the equatorial plane, confined in a disk with half-opening angle $\phi=15^\circ$, with $n=3.2$, $\rho_0=10^{-11}$ g cm$^{-3}$, and $v_0=5$ km s$^{-1}$ (Mart\'{\i} and Paredes 1995). The modeled properties of the system will be expressed in terms of the orbital phase $\psi$ ($\psi=0.23$ at the periastron passage according to the latest determination by Casares et al. 2005) which is related to the separation between the stars by $r(\psi)=a (1-e^2)/[1-e \cos (2\pi (\psi+0.73))]$, where $a$ is the semi-major axis of the orbit and $e$ the eccentricity. The wind accretion rate onto the compact object of mass $M_{\rm c}$ can be estimated as: \begin{equation} \dot{M}_{\rm c}=\frac{4 \pi (G\,M_{\rm c})^2 \rho_w(r)}{v_{\rm rel}^3}, \label{macc} \end{equation} where $v_{\rm rel}$ is the relative velocity between the neutron star (moving in a Keplerian orbit) and the circumstellar wind, assumed to be flowing radially on the equatorial plane. Following the basic assumption of the jet-disk symbiosis model (Falcke \& Biermann 1995) we will assume that the accretion rate is coupled to the kinetic jet power by: \begin{equation} Q_{\rm j}=q_{\rm j} \dot{M}_{\rm c} c^2, \end{equation} where $q_{\rm j}\sim 0.1$ is the coupling constant. Most of this power will consist of cool protons that are ejected with a macroscopic Lorentz factor $\Gamma\sim 1.25$ (Massi et al. 2001). Only a small fraction $q^{\rm rel}_{\rm j}\sim 10^{-3}$ is in the form of relativistic hadrons. The relativistic jet is confined by the pressure of the cold particles ($P_{\rm cold}>P_{\rm rel}$), which expand laterally at the local sound speed. The jet axis, $z$, will be assumed normal to the orbital plane. The jet will be conical, with a radius $R_{\rm j}(z)= z (R_0/z_0)$, where $z_0$ is the injection point and $R_0$ is the initial radius of the jet. We will adopt $z_0= 10^7$ cm and $R_0=z_0/10$ as reasonable values (see Romero et al. 2003 and Bosch-Ramon et al. 2005a, who deals with similar jets for additional details). The relativistic proton spectrum will be a power law $N'_{p}(E'_{p})= K_p\; {E'}_{p}^{-\alpha}$, valid for $ {E'_{p}}^{\rm min}\leq E'_{p} \leq {E'_{p}}^{\rm max}$ (in the jet frame). The corresponding relativistic proton flux will be $J'_{p}( E'_{p})= (c/4\pi) N'_{p}(E'_{p})$. Since the jet expands in a conical way, the proton flux evolves with $z$ as: \begin{equation} J'_p(E'_p)=\frac{c}{4 \pi} K_0 \left(\frac{z_0}{z}\right)^2 {E'_p}^{-\alpha}, \label{Jp} \end{equation} where it is implicit the assumption of the conservation of the number of particles (see Ghisellini et al. 1985), and a prime refers to the jet frame. Using relativistic invariants, it can be shown that the proton flux, in the lab (observer) frame, becomes (e.g. Purmohammad \& Samimi 2001): \begin{equation} J_p(E_p,\theta)=\frac{c K_0}{4 \pi} \left(\frac{z_0}{z}\right)^ 2 \frac{\Gamma^{-\alpha+1} \left(E_p-\beta_{\rm b} \sqrt{E_p^2-m_p^2c^4} \cos \theta\right)^{-\alpha}}{\left[\sin ^2 \theta + \Gamma^2 \left( \cos \theta - \frac{\beta_{\rm b} E_p}{\sqrt{E_p^2-m_p^2 c^4}}\right)^2\right]^{1/2}}. \label{Jp_lab} \end{equation} In this expression, $\Gamma$ is the jet Lorentz factor, $\theta$ is the angle subtended by the proton velocity direction (which will be roughly the same as that of the emerging photon) and the jet axis (notice that then $\theta \approx \theta_{\rm obs}$), and $\beta_{\rm b}$ is the bulk velocity in units of $c$. We will make all calculations in the lab frame, where the cross sections for $pp$ interactions have suitable parametrizations. The number density ${n_0}'$ of particles flowing in the jet at $R_0$, and the normalization constant $K_0$ can be determined as in Romero et al. (2003). In the numerical calculations of the next section we have considered ${E'}_p^{\rm max}=100$ TeV, ${E'}_p^{\rm min}=1$ GeV, $\Gamma=1.25$, and, $\alpha=2.2$ (see the list of the assumed parameters in Table 1). The assumed maximum energy is consistent with the jet size and shock acceleration with an efficiency $\sim0.01-0.1$. The matter from the wind can penetrate the jet from the side, diffusing into it as long as the particle gyro-radius is smaller than the radius of the jet. This imposes a constraint onto the value of the magnetic field in the jet: $B_{\rm jet}\geq E_k/(e R_0)$, where $E_k= m_p\,v_{\rm rel}^2/2$. For the periastron passage ($E_k$ maximum) results $B_{\rm jet}\geq 2.8\,10^{-6}$ G, which is surely satisfied. However, some effects, like shock formation on the boundary layers, could prevent some particles from entering into the jet. Given our ignorance of the microphysics involved, we adopt a parameter $f_{\rm p}$ that takes into account particle rejection from the boundary in a phenomenological way. In a conservative approach, we will adopt $f_{\rm p}\sim 0.1$ . Some of the particles entering the jet flow would be immediately accelerated to the jet velocity (by Coloumb interactions or wave-particle interactions). As a consequence, the jet should be slowed down during its motion through the equatorial wind. However, it is a fact that the jet survives this interaction since it is seen at radio wavelengths far beyond the wind region, up to distances of $\sim400$ AU (Massi et al. 2001, 2004). Since the bulk velocity seems not to be very high (Massi et al. 2001) and hence its change does not affect seriously the calculations of the gamma-ray emissivity, we will neglect, in what follows, the effects of a macroscopic deceleration. The reader interested in the case of the hadronic gamma-ray emission of a jet slowed down to rest by the effects of the wind and the resulting standing shock wave as the major source of radiation is referred to the recent treatment presented by Romero \& Orellana (2005). In Figure \ref{esquema} we show a sketch of the general situation and in Figure \ref{orbita} we show the orbit of the system and the corresponding phases. \section{Gamma-ray emission} Relativistic protons in the jet will interact with target protons in the wind through the reaction channel $p+p\rightarrow p+p+ \xi_{\pi^{0}} \pi^{0} + \xi_{\pi^{\pm}} (\pi^{+} + \pi^{-})$, where $\xi_{\pi}$ is the corresponding multiplicity. Then pion decay chains will lead to gamma-ray and neutrino emission. The differential gamma-ray emissivity from $\pi^0$-decays can be expressed as (e.g. Aharonian \& Atoyan 1996): \begin{equation} q_{\gamma}(E_{\gamma},\theta)= 4 \pi \sigma_{pp}(E_p) \frac{2Z^{(\alpha)}_{p\rightarrow\pi^0}}{\alpha}\;J_p(E_{\gamma},\theta) \,\eta_{\rm A}, \label{q} \end{equation} where $Z^{(\alpha)}_{p\rightarrow\pi^0}$ is the so-called spectrum-weighted moment of the inclusive cross-section (see, for instance, Gaisser 1990). $J_p(E_{\gamma})$ is the proton flux distribution (\ref{Jp_lab}) evaluated at $E=E_{\gamma}$. The cross section $\sigma_{pp}(E_p)$ for inelastic $p-p$ interactions at energy $E_p\approx 6 \xi_{\pi^{0}} E_{\gamma}/K$, where $K\sim0.5$ is the inelasticity coefficient and $\xi_{\pi^{0}}=1.1 (E_p/\rm GeV)^{1/4}$, can be represented for $E_{p}\geq 1$ GeV by $$\sigma_{pp}(E_p)\approx 30 \times [0.95 + 0.06 \log \;(E_p/{\rm GeV})]\;\; (\rm mb).$$ Finally, the parameter $\eta_{\rm A}$ takes into account the contribution from different nuclei in the wind and in the jet (for standard composition of cosmic rays and interstellar medium $\eta_{\rm A}\sim1.4$). The spectral energy distribution is: \begin{equation} L_{\gamma}(E_{\gamma},\theta)= E_\gamma^2 \int_V n(\vec{r'})\,q_{\gamma}(E_\gamma,\theta)\, d^3\vec{r'}, \label{Lum} \end{equation} where $V$ is the interaction volume between the jet and the circumstellar disk. The particle density of the wind that penetrates the jet is $n(r)\approx f_{\rm p} \rho_w(r)/m_p$. In our calculations, we adopt a viewing angle of $\theta = 30^\circ$ in accordance with the average value given by Casares et al. (2005). In Figure \ref{Lum} we show a 3-D plot that shows the evolution of the gamma-ray spectral energy distribution as a function of the orbital phase. Other two plots in this figure show cuts at both the periastron and apastron, and the luminosity evolution with the orbital phase at 100 GeV. In both cases we show the unabsorbed (dashed lines) and the absorbed (continuum lines) curves. This absorption is discussed in the next section. At the periastron passage the unattenuated luminosity is $\sim 10^{33}$ erg s$^{-1}$. We can make a simple order-of-magnitude estimate of this value. The accretion rate at the periastron is $\sim 3\times 10^{17}$ g s$^{-1}$. This means that the total power in relativistic protons should be $Q^{\rm rel}_{\rm j}=10^{-3} \dot{M}_{\rm c} c^2 \sim 2.8 \times 10^{35}$ erg s$^{-1}$. The density of the stellar wind at the injection point of the jet is $n\sim 4\times 10^{11}$ cm$^{-2}$ and the cross section for protons of $E_p\sim 1$ TeV, $\sigma_{pp}\sim 34$ mb. Hence, the mean free path of the protons results $\lambda_{pp}\sim 8.3 \times 10^{13}$ cm. The thickness of the region of the disk traversed by the jet is $\Delta z \sim r_{\rm perias} \tan 15^{\circ}\sim 4.4 \times 10^{11}$ cm. Consequently, we can approximate the gamma-ray luminosity by: \begin{equation} L_{\gamma}=2 f_{\pi} Q^{\rm rel}_{\rm j} \left(1-e^{-\Delta z/\lambda_{pp}}\right),\label{L} \end{equation} where $f_{\pi}\sim 0.2$ is the fraction of the energy of the leading proton that goes into neutral pions and hence into gamma-rays. With a simple substitution into Eq. (\ref{L}) we get $L_{\gamma}\sim 6.6 \times 10^{32}$ erg s$^{-1}$, in good agreement with the detailed numerical calculations presented in Fig. \ref{Lum}. \section{Opacity} The optical depth for a photon with energy $E_{\gamma}$, which in this case depends upon the direction observed, can be estimated as \begin{equation} \tau(\rho,\,E_{\gamma})=\int_{E_{\rm min}(E_{\gamma})}^\infty\int_{\rho}^\infty\,n_{\rm ph}(E_{\rm ph},\rho')\sigma_{e^-e^+}(E_{\rm ph},E_{\gamma})d\rho'\,dE_{\rm ph}, \label{tauXg} \end{equation} where $E_{\rm ph}$ is the energy of the ambient photons, $n_{\rm ph}(E_{\rm ph},\rho)$ is their density at a distance $\rho$ from the neutron star, and $\sigma_{e^-e^+}(E_{\rm ph},E_{\gamma})$ is the photon-photon pair creation cross section given by: \begin{equation} \sigma_{e^+e^-}(E_{\rm ph}, \;E_{\gamma})=\frac{\pi r_0^2}{2}(1-\xi^2)\left[2\xi(\xi^2- 2)+(3-\xi^4)\ln\left(\frac{1+\xi}{1-\xi}\right) \right], \end{equation} where $r_0$ is the classical radius of the electron and \begin{equation} \xi=\left[1-\frac{(m_e c^2)^2}{E_{\rm ph} E_{\gamma}}\right]^{1/2}. \end{equation} In Eq. (\ref{tauXg}), $E_{\rm min}$ is the threshold energy for pair creation in the ambient photon field. This field can be considered as formed by two components, one from the Be star and the other from the hot accreting matter impacting onto the neutron star: $n_{\rm ph}=n_{\rm ph,1}+ n_{\rm ph,2}$. Here, \begin{equation} n_{\rm ph,1}(E_{\rm ph},\rho)= \left(\frac{\pi B(E_{\rm ph})}{hc\,E_{\rm ph}}\right)\frac{R_\star ^2}{\rho^2+r^2-2\rho r \sin\theta}\;, \end{equation} is the black body emission from the star, with \begin{equation} B(E_{\rm ph})= \frac{2 E_{\rm ph}^3}{(hc)^2\,(e^{E_{\rm ph}/kT_{\rm eff}}-1)} \end{equation} and $T_{\rm eff}=22500$ K (Mart\'{\i} \& Paredes 1995). The separation $r$ between the stars is again variable with the phase angle $\psi$. The emission from the heated matter can be approximated by a Bremsstrahlung spectrum: \begin{equation} n_{\rm ph,2}(E_{\rm ph},\rho)=\frac{L_X\,E_{\rm ph}^{-2}}{4\pi c\,\rho^2\,e^{E_{\rm ph}/E_{\rm cut-off}}}\mbox{ for $E_{\rm ph}\geq 1$ keV}, \end{equation} where $L_X$ is the total luminosity in hard X-rays and $E_{\rm cut-off}\sim 100$ keV. The photon index of the hard X-rays is taken to be within the range published by Greiner \& Rau (2001), which was observationally determined. $L_X$ is also constrained by observations, being $L_X\sim 10^{34}$ erg s$^{-1}$ (Paredes et al. 1997). Notice that no bump due to a putative accretion disk has been observed at X-rays, so we neglect this contribution. As an example, Figure \ref{tau} shows the dependence of the optical depth $\tau$ with the energy of the $\gamma$-rays and its variation along the $z$ axis for the observer at $\theta_{\rm obs}=30^\circ$. From detailed versions of this plot, we find that for photons of $E_\gamma=100$ GeV significant absorption occurs mostly between $\psi=0.1$ and $\psi=0.5$. The optical depth remains well below the unity along the whole orbit for photons of energies $E_\gamma\la 30$ GeV and $E_\gamma\ga 2$ TeV. \section{Secondary electron-positron pairs and synchrotron emission} Secondary pairs are produced by the decays of charged pions and muons, as well as by photon-photon interactions. The main reactions that lead to charged pions are: \begin{eqnarray} p+p &\rightarrow& p+p+ \xi_{\pi^{0}} \pi^{0} + \xi_{\pi^{\pm}} (\pi^{+} + \pi^{-}) \label{pi0}\\ p+p &\rightarrow& p+ n+\pi^+ +X \label{n}\\ p+p &\rightarrow& 2n + 2\pi^+ +X \label{2n} \end{eqnarray} where $n$ is a neutron, $X$ stands for anything (neutral) else, and the charged pion multiplicity is $\xi_{\pi^{\pm}}\approx 2 (E_p/\rm GeV)^{1/4}$. The neutrons have a proper lifetime of $886\pm1$ s and since they move at ultrarelativistic speed can escape from the source, decaying at considerable distances (Eichler \& Wiita 1978). On the contrary, pions decay into the jet trough $\pi^{\pm}\rightarrow\mu^{\pm}+\nu$ and $\mu^{\pm}\rightarrow e^{\pm}+\nu+\overline{\nu}$. For an injection proton spectrum given by Eq. (\ref{Jp}) with $\alpha=2.2$, we have that the pion spectrum (in the jet's system) will be a power-law $J'_{\pi^{\pm}}(E'_{\pi^{\pm}})=K_{\pi^{\pm}}\; {E'}_{\pi^{\pm}}^{-\alpha_{\pi}}$, with $\alpha_{\pi}\sim 2.3$. The electron-positron distribution mimics this power law (Ginzburg \& Syrovatskii 1964, Dermer 1986): \begin{equation} {J'}_{e^{\pm}}({E'}_{e^{\pm}})= K_{\pi\rightarrow e^{\pm}} {E'}_{e^{\pm}}^{-\alpha_{\pm}}, \end{equation} with \begin{equation} K_{\pi\rightarrow e^{\pm}}=\left(\frac{m_{\mu}}{m_{e}}\right)^{\alpha_{\pm}-1} \frac{2(\alpha_{\pm}+5)}{\alpha_{\pm}(\alpha_{\pm}+2)(\alpha_{\pm}+3)} \; K_{\pi^{\pm}}, \end{equation} and $\alpha_{\pm}=\alpha_{\pi}$. The energy density of pion-generated pairs along the jet at the periastron passage can be calculated as: \begin{equation} w_{\pi\rightarrow e^{\pm}}= \int (4\pi/c) {E'}_{e^{\pm}} {J'}_{e^{\pm}}({E'}_{e^{\pm}}) d{E'}_{e^{\pm}}, \end{equation} where ${J'}_{e^{\pm}}({E'}_{e^{\pm}})$ takes into account all the contributions from $z_0$ to $z_{\rm max}$. Integrating we get $w_{\pi\rightarrow e^{\pm}}\approx 3 \times 10^{9}$ erg cm$^{-3}$. We can compare the energy density of pairs from the charged pion decays with that of the pairs produced by direct gamma-ray absorption. The total luminosity of these pairs is: \begin{equation} L_{e^{\pm}}= L_{\gamma}^{0}(1-e^{-\tau}). \end{equation} Then, using the opacity calculated in the previous section, the pair energy density results \begin{equation} w_{\gamma\gamma\rightarrow e^{\pm}}\sim \frac{L_{e^{\pm}}}{4\pi R_0^2 c}. \end{equation} At the periastron passage, we get $w_{\gamma\gamma\rightarrow e^{\pm}}\approx 3.7 \times 10^{9}$ erg cm$^{-3}$. Hence, the pair injection from the photon-photon annihilation is similar to that of pion decay. In what follows we will evaluate the spectrum of these particles using the approximation derived by Aharonian et al. (1983), which is in excellent agreement with the more detailed calculations (exact to 2nd order QED) presented by B$\ddot{\rm o}$ttcher \& Schlickeiser (1997). The differential pair injection rate is given by (B$\ddot{\rm o}$ttcher \& Schlickeiser 1997): \begin{eqnarray} \dot{n}_{e^{\pm}}(\gamma)&=& \frac{3}{32}c \sigma_{\rm _T} \int^{\infty}_{\gamma} d\epsilon_{\gamma} \frac{N_{\gamma}(\epsilon_{\gamma})}{\epsilon^{3}_{\gamma}} \int^{\infty}_{\frac{\epsilon_{\gamma}}{4\gamma(\epsilon_{\gamma}-\gamma)}} d\epsilon_{\rm ph} \frac{n_{\rm ph}(\epsilon_{\rm ph})}{\epsilon^{2}_{\rm ph}} \times \nonumber \\ & & [\;\; \frac{4\epsilon^{2}_{\gamma}}{\gamma (\epsilon_{\gamma}-\gamma)} \ln \left(\frac{4 \epsilon_{\rm ph} \gamma (\epsilon_{\gamma}-\gamma)}{\epsilon_{\gamma}} \right) -8 \epsilon_{\gamma}\epsilon_{\rm ph}+ \frac{2(2\epsilon_{\gamma}\epsilon_{\rm ph}-1)\epsilon^{2}_{\gamma}}{\gamma(\epsilon_{\gamma}-\gamma)} - \nonumber \\ && \left( 1- \frac{1}{\epsilon_{\gamma}\epsilon_{\rm ph}} \right) \frac{\epsilon^{4}_{\gamma}}{\gamma^{2}(\epsilon_{\gamma}-\gamma)^{2}}\;\;], \end{eqnarray} where $\gamma=E_{e^{\pm}}/m_{\rm e} c^2$, $\epsilon_{\gamma}=E_{\gamma}/m_{\rm e} c^2$, and $\epsilon_{\rm ph}=E_{\rm ph}/m_{\rm e} c^2$. A numerical integration yields a pair spectrum that can be well fitted by a power law $N_{e^{\pm}}\propto E^{-1.9}_{e^{\pm}}$. The proportionality constant $K_{\gamma\gamma\rightarrow e^{\pm}}$ can be obtained from the absorbed gamma-ray luminosity. The presence of a magnetic field in the jet will imply that all these secondary pairs will produce synchrotron emission. Following Bosch-Ramon et al. (2005b) we assume that the magnetic field is entangled to cold protons in such a way it has random directions and hence the synchrotron emission is isotropic in the jet's frame. To calculate the synchrotron luminosity we estimate the specific emission ($j_{\epsilon}(z)$) and absorption ($k_{\epsilon}(z)$) coefficients from the secondary particle distribution (see Pacholczyk 1970 for the detailed formulae), in such a way that: \begin{equation} \frac{dL_{\epsilon}(z)}{dz}=2\pi R_{\rm j} \frac{j_{\epsilon}(z)}{k_{\epsilon}(z)}\times [1-\exp(-l_{\rm j}k_{\epsilon}(z))], \label{eq:syncem} \end{equation} where to simplify the notation we are not using now primes to indicate that the calculation is in the jet's frame. In Eq. (\ref{eq:syncem}) $l_{\rm j}\sim R_{\rm j}$ is the typical size of the synchrotron emitting plasma and $\epsilon$ is the photon energy in units of $m_{\rm e}c^2$. Integrating over the jet length we get the spectral energy distribution as: \begin{equation} L^{\rm obs}_{\rm syn}=\epsilon \int^{z_{\rm max}}_{z_0} \delta^2 \frac{dL_{\epsilon}}{dz}dz \label{eq:L}, \end{equation} where $\delta$ is the Doppler boosting factor defined as: \begin{equation} \delta=\frac{1}{\Gamma (1-\beta_{\rm b}\cos\theta_{\rm obs})}. \label{eq:dopb} \end{equation} To calculate the specific emission $j_{\epsilon}(z)$ we adopt different values of the magnetic field at $z_0$: $B_0=1$, 10, and 100 Gauss (Bosch-Ramon \& Paredes 2004). In Figure \ref{f5} we show the spectral energy distribution of the synchrotron radiation of all secondary pairs for the 3 different values of $B_0$. The radio emission is quite negligible in comparison to the observed values, which at the minimum imply a luminosity of $\sim 10^{31}$ erg s$^{-1}$ (e.g. Rib\'o et al. 2005). \section{Discussion} The predicted gamma-ray luminosity is clearly at its maximum during the periastron passage, when the neutron star travels through the densest parts of the wind. This is in accordance with the fact noticed by Massi (2004) that the peaks of the EGRET flux are coincident with the periastron and not with the radio maxima. The radio outbursts are the result of particle injection in the jet that occurs after some relaxation time from the periastron passage, when the accretion rate is increased (Paredes et al. 1991). Any purely leptonic model for the gamma-ray emission would have to explain why the radio and gamma-ray peaks are not observed in similar orbital phases. Other specific feature of the gamma-ray emission predicted by our model is the presence of a local, secondary maximum at $\psi\sim 0.65$ when the accretion rate, given by (\ref{macc}), has also a local maximum due to the fact that the wind velocity is roughly parallel to the neutron star orbital velocity, hence reducing $v_{\rm rel}$ and increasing $\dot{M}_{\rm c}$, as noticed by Mart\'{\i} \& Paredes (1995). The effects of the opacity of the ambient photon fields to gamma-ray propagation produces a ``valley'' in the spectral energy distribution, between a few tens of GeV and a few TeV, with a local minimum at around 100 GeV, during the periastron passage. The predicted luminosity is within the detection possibilities of an instrument like MAGIC, which, integrating over several periastron passages, could build up a SED which can be compared with that presented in Fig. \ref{Lum}. Upper limits obtained with the Whipple telescope (Hall et al. 2003, Fegan et al. 2005) are indicated in the figure. The source is too weak for the sensitivity of this instrument according to our model. \section{Concluding remarks} We have presented a hadronic model for the high-energy gamma-ray production in the microquasar LS I $+61 \, 303$. The model is based on the interaction of a mildly relativistic jet with a small content of relativistic hadrons with the dense equatorial disk of the companion B0 V star. Gamma-rays are the result of the decay of neutral pions produced by $pp$ collisions. Charged pion decay will lead to neutrino production, that will be discussed elsewhere. The model takes into account the opacity of the ambient photon fields to the propagation of the gamma-rays. The predictions include a peak of gamma-ray flux in the periastron passage, with a secondary maximum at phase $\psi\sim 0.65$. The spectral energy distribution presents a minimum around 100 GeV due to absorption. The spectral features should be detectable by an instrument like MAGIC through exposures $\sim 50$ hr, integrated along different periastron passages. \section*{Acknowledgments} We thank J.M. Paredes and V. Bosch-Ramon for careful readings of the manuscript and comments. The latter gave us useful support on calculations for the secondary emission. We also thank constructive suggestions by an anonymous referee. This work has been supported by the Argentinian agencies CONICET and ANPCyT (PICT 03-13291). HRC thanks support from FUNCAP and CNPq (Brazil).
{ "redpajama_set_name": "RedPajamaArXiv" }
410
Kevin Robert Is New Church Growth and Evangelism Director Kevin Robert Is New Church Growth and Evangelism Director https://nccsda.com/wp-content/uploads/2021/12/Kevin-and-Tanya-Robert.jpg 720 540 Julie Lorenz Julie Lorenz https://secure.gravatar.com/avatar/002a07232e8f3faf045c0eac8820b7a7?s=96&d=mm&r=g December 9, 2021 December 21, 2021 On Dec. 1, 2021, the Northern California Conference Executive Committee voted to invite Kevin Robert to serve as NCC church growth and evangelism director. He plans to begin his new role in January. "We feel blessed to welcome Kevin to the NCC," said President Marc Woodson. "God has certainly answered our prayers because Kevin's skillset, passion, and experience match our conference's needs!" A pastor and church planter, Robert comes from the Southern New England Conference, where he has served the Merrimack Valley and Billerica churches since 2017. During the last few years, he planted One Connection Academy and One Connection Community church—both in Wakefield, Mass. Robert is also a facilitator and coordinator for the North American Division Evangelism Institute's ACTS Church Planting Support System. He is currently coaching church planters in Massachusetts, Florida, the Philippines, Albania, and Mozambique. His passion is growing missional communities—modeled by the New Testament church—to reach people for Christ. "In a missional community, the believers eat together, study together, go on missions together," he said. "The whole group has a desire to change the community where they live for the gospel." The high school he planted was an intentional part of this type of evangelism. "We planted a core missional community team to use the school as a center of influence," he said. Robert didn't always plan to be a pastor. A native of Massachusetts, he graduated from Atlantic Union College with a bachelor's degree in physical education. He spent a number of years as a sleep lab manager before answering the Lord's calling to the ministry. As a young married couple, he and his wife, Tanya, were part of a church plant in Massachusetts, where Robert got involved in preaching and evangelism. With his wife's encouragement, he began working on a Master of Arts in Pastoral Ministry from the SDA Theological Seminary at Andrews University, which he finished in 2016. In the midst of his studies, he was called to the Pennsylvania Conference, where he served in a four-church district until called back to Massachusetts. He was ordained in 2019. The Robert family will soon be moving to Angwin, where Tanya will teach nursing at Pacific Union College. The couple has three daughters: Gianna, a college freshman; Carmela, a high school freshman; and Analia, a third grader. Robert is excited to join the NCC team. "I'm looking forward to working with all the pastors and administrators, collaborating together, letting creativity flow," he said. "We want to focus on multiplication, rather than addition—growing disciples that make disciples and churches that plant churches." Resilience in the Classroom: When Students Take Ownership of Their Learning Panorama of Prophecy Reaches Thousands
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
8,953
Emballonura monticola is een zoogdier uit de familie van de schedestaartvleermuizen (Emballonuridae). De wetenschappelijke naam van de soort werd voor het eerst geldig gepubliceerd door Temminck in 1838. Schedestaartvleermuizen IUCN-status niet bedreigd
{ "redpajama_set_name": "RedPajamaWikipedia" }
3,286
Q: What are Invoke & InvokeAsync methods? What is Invoke methods? Below here is my viewcomponent() method. public IViewComponentResult Invoke() { ViewBag.SelectedCategory = RouteData?.Values["category"]; return View(repository.Products.Select(x=>x.Category).Distinct().OrderBy(x=>x)); } Is this is the anonymous function? what is the name of this function ? I tried to change "Invoke" with "func" but there is no syntax error but run-time error Occurred. Is it Possible to have multiple methods with "Invoke" name and receiving different parameters In a single view component class. I Know that view component use to render partial views for this we use helper which is this @await Component.InvokeAsync("Here is the name of your view component") "component.InvokeAsynk" Goes to your component class and finds The Invoke method and then follows this method A: The Invoke and InvokeAsync methods on a ViewComponent are the methods that define the logic of the view component. These are not anonymous functions. They are regular c# methods that simply have the names Invoke and InvokeAsync. You don't need to define both of them in your view component. On the contrary you can only define one method. Let us say you named it Invoke and then you rename it to func then you have changed the name of the method: * *you won't get a compiler error, but *a runtime error will occur. This is because the Asp.Net Core framework code that calls your view component expects it to have either a Invoke or InvokeAsync method and your ViewComponent now has neither. You can name your view component anything you like but the name of the method which gets called to invoke it must be called Invoke or InvokeAsync. A ViewComponent can only have one Invoke or InvokeAsync method. A ViewComponent can't have both and it can't multiples of either one (with different parameters). Attempting to do so will produce the following runtime error: View component 'ViewComponents.NameOfComponent' must have exactly one public method named 'InvokeAsync' or 'Invoke'.
{ "redpajama_set_name": "RedPajamaStackExchange" }
1,606
Tasmarubrius pioneer är en spindelart som beskrevs av Davies 1998. Tasmarubrius pioneer ingår i släktet Tasmarubrius och familjen Amphinectidae. Artens utbredningsområde är Tasmanien. Inga underarter finns listade i Catalogue of Life. Källor Spindlar pioneer
{ "redpajama_set_name": "RedPajamaWikipedia" }
4,633
{"url":"https:\/\/grishchenko.org\/","text":"# Recent Posts\n\n### Talk of Nikita Doikov\n\nHello everyone, On Monday, $23^{\\text{rd}}$ September Nikita Doikov will give a talk about some recent results on accelerated proximal \u2026\n\n# Recent & Upcoming Talks\n\n### Identification-Based First-Order Algorithms for Distributed Learning\n\nIn this talk, we present a first-order optimization algorithm for distributed learning problems. We propose an efficient sparsification \u2026\n\n### Distributed First-Order Optimization with Tamed Communications\n\nMany machine learning and signal processing applications involve high-dimensional nonsmooth optimization problems. The nonsmoothness is \u2026\n\n### Identify and Sparsify$:$ Distributed Optimization with Asynchronous Moderate Communications\n\nWe present an asynchronous optimization algorithm for distributed learning, that efficiently reduces the communications between a \u2026\n\n### Identify and Sparsify$:$ Distributed Optimization with Asynchronous Moderate Communications\n\nWe present an asynchronous optimization algorithm for distributed learning, that efficiently reduces the communications between a \u2026\n\n### Distributed Optimization with Sparse Communications and Structure Identification\n\nWe propose an efficient distributed algorithm for solving regularized learning problems. In a distributed framework with a master \u2026\n\n# Recent Publications\n\n### Asynchronous Distributed Learning with Sparse Communications and Identification\n\nIn this paper, we present an asynchronous optimization algorithm for distributed learning, that efficiently reduces the communications \u2026\n\n### A Privacy Preserving Randomized Gossip Algorithm via Controlled Noise Insertion\n\nIn this work we present a randomized gossip algorithm for solving the average consensus problem while at the same time protecting the \u2026\n\n### Privacy preserving randomized gossip algorithms\n\nIn this work we present a randomized gossip algorithm for solving the average consensus problem while at the same time protecting the \u2026\n\n### Origami: What One Can Get via Paper Folding (Rus)\n\nIn this work we study the set of origami numbers, more precisely the set of coordinates of points that could be reached via paper \u2026\n\n# Teaching\n\n#### Refresher course$:$ Numerical Matrix Analysis and Optimization\n\nThis short course focuses on matrix analysis and optimization\n\n#### Optimisation Num\u00e9rique\n\nBasic course on numerical optimization (theory and implementation)\n\n#### Convex and Distributed Optimization\n\nIncremental and Stochastic Optimization for Learning, Spark, Distributed Optimization.\n\n#### Refresher course$:$ Numerical Matrix Analysis and Optimization\n\nThis short course focuses on matrix analysis and optimization\n\n# Experience\n\n#### Universit\u00e9 Grenoble Alpes\n\nSep 2018 \u2013 Present Grenoble, France\n\n2018 - 2019\n\n\u2022 Matrix Analysis and Numerical Optimization\n\n\u2022 Convex and Distributed Optimization\n\n\u2022 Numerical Optimization\n\n#### Altium\n\nJan 2016 \u2013 Sep 2017 Moscow, Russia\n\n#### Citibank\n\nJul 2014 \u2013 Feb 2015 Moscow, Russia\n\n#### Higher School of Economics\n\nSep 2013 \u2013 Jun 2015 Moscow, Russia\n\u2022 Calculus","date":"2019-10-14 11:03:34","metadata":"{\"extraction_info\": {\"found_math\": true, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 1, \"mathjax_display_tex\": 0, \"mathjax_asciimath\": 0, \"img_math\": 0, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.2563660442829132, \"perplexity\": 3535.2642832037436}, \"config\": {\"markdown_headings\": true, \"markdown_code\": true, \"boilerplate_config\": {\"ratio_threshold\": 0.18, \"absolute_threshold\": 10, \"end_threshold\": 15, \"enable\": true}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2019-43\/segments\/1570986653216.3\/warc\/CC-MAIN-20191014101303-20191014124303-00116.warc.gz\"}"}
null
null
\section{Introduction} Initial state density fluctuations and the pressure gradient of the strongly interacting medium in transverse plane result in azimuthal anisotropies of the emitted particles in the final state. These can be characterized by a Fourier expansion with magnitudes given by prefactors v$_{\rm n}$ \cite{1,2}. The longitudinal structure of the initial state, particularly at RHIC energies, remains largely unexplored. The density fluctuations can be studied in terms of correlations of particles in the longitudinal direction, {\it i.e.} in (pseudo)rapidity \cite{3,4}. Long-range rapidity correlations, and other ``short range" mechanisms such as resonance decays, jet fragmentation, and quantum statistical effects, appear in specific ways in the correlation functions \cite{4}. The shape of the longitudinal correlations can be characterized by Chebyshev \cite{3} or Legendre polynomials \cite{4} with magnitudes given by prefactors $a_{nm}$. Recently, the ATLAS collaboration has studied \cite{5} the longitudinal fluctuations in terms of $a_{nm}$ and provided information on the early time dynamics in different collision systems. A relativistic hydrodynamical calculation \cite{6} has also been used to show that the rapidity correlations are sensitive to the number of particle-producing sources and the transport properties of the medium. The importance of doing this analysis at RHIC was also emphasized in Ref\cite{6}. In this work, rapidity correlations were studied with STAR for Au$+$Au collisions at eight different beam energies from 7.7 to 200~$\mathrm{GeV}$ for the BES-I program at RHIC. The calculated Legendre coefficients $\langle a_{nm}\rangle$ from experimental data are also compared with the results from the UrQMD model \cite{6b}. \section{Analysis Method} Two-particle rapidity correlation function is defined as \cite{7}: \begin{equation} R_{2}(y_{1},y_{2}) =\frac{\langle\rho_{2}(y_{1},y_{2})\rangle}{\langle\rho_{1}(y_{1})\rangle\langle\rho_{1}(y_{2})\rangle}-1 ; \label{formula1} \end{equation} where $\langle\rho_{2}(y_{1},y_{2})\rangle$ and $\langle\rho_{1}(y_{1,2})\rangle$ are two particle, and single particle, multiplicity density distributions in rapidity, respectively; averaged over events within a narrow centrality class. In order to study the purely dynamical fluctuations, a normalization is used to decouple the residual centrality dependence from the rapidity correlation function, $C(y_{1},y_{2})$=$R_{2}(y_{1},y_{2})$+1 \cite{4,5}. This normalized correlation function is given by: \begin{equation} C_{N}(y_{1},y_{2}) =\frac{R_{2}(y_{1},y_{2})+1}{C_{p}(y_{1})C_{p}(y_{2})} ; \label{formula2} \end{equation} where $C_{p}$ is the projection of the correlation function along the rapidity axis of each particle. The correlation function $C_{N}(y_{1},y_{2})$ can be decomposed onto a basis set of normalized Legendre polynomials $T_{n}(y)=\sqrt{n+\frac{1}{2}}P_{n}(y/Y)$ in the (pseudo)rapidity range of $[-Y,Y]$ as \cite{4,5}: \begin{equation} C_{N}(y_{1},y_{2}) =1+\sum\limits_{n,m=1}^{\infty}\langle a_{nm}\rangle\frac{T_{n}(y_{1})T_{m}(y_{2})+T_{n}(y_{2})T_{m}(y_{1})}{2} . \label{formula3} \end{equation} The first diagonal coefficient $\langle a_{11}\rangle$ represents the contribution from the forward-backward asymmetry of the participating nucleons, $\langle a_{22}\rangle$ reflects the fluctuations in the width of the single particle density distribution, and $\langle a_{nm}\rangle$ coefficients with m$=$n+2 and larger quantify the strength of shorter range correlations \cite{4}. Two-particle correlation functions for the most central (0-5\%) Au$+$Au events were calculated as the ratio of the same-event and mixed-event pairs, where the mixed event pairs were formed by sampling from the single particle distributions in (y, $\varphi$, p$_{\rm T}$). Charged pions, kaons (0.2$<$p$_{\rm T}$$<$2~GeV/c) and protons (0.4$<$p$_{\rm T}$$<$2 GeV/c) were studied in this analysis. The reconstructed tracks with $|$y$|$$<$0.5 (0.7 for protons), and $|\Delta y|$$<$1.0 (1.4 for protons) were used. Every track used in the analysis was directly identified as either $\pi$, K, or p by requiring correct values of both the ionization energy loss and time of flight in the STAR TPC and TOF, respectively. Thus, ``charged hadrons" in this analysis, labelled h$^\pm$, are not simply all reconstructed TPC tracks but are doubly directly-identified $\pi$, K, or p particles. Pseudo-correlations caused by the experimental effects of z-vertex smearing were corrected. The systematic uncertainties were estimated by varying the track selection cuts. In addition, track crossing effects \cite{7b} were corrected by p$_{\rm T}$-ordering the particles in each pair and then removing the pairs with $|\Delta y|$$<$0.05 and $-$60$^{\circ}$$<$$|\Delta\varphi|$$<$0$^{\circ}$ from both the same-event and mixed-event pairs. In this analysis, the three-dimensional correlation function $R_{2}(y_{1},y_{2},\Delta\varphi)$ was formed to allow the study of both R$_{2}$(y$_{1}$,y$_{2}$), ({\it i.e.} Eq. \ref{formula1}) and R$_{2}$($\Delta$y,$\Delta\varphi$) correlations. The averaged one-dimensional correlation function $\langle$$R_{2}(\Delta y)$$\rangle$ was obtained by projecting the two or three-dimensional correlation function. The same analysis was also done for events from the UrQMD model \cite{6b}, version 3.4. \section{Results} Figure \ref{Fig1} shows the most significant diagonal Legendre coefficients $\langle a_{nm}\rangle$ for charged hadrons, pions, kaons and protons for 0-5\% centrality and for each of eight beam energies from 7.7 to 200~GeV. \begin{figure}[h] \centering \includegraphics[trim= 0cm 0.25cm 0cm 1.5cm,clip,width=.57\textheight,height=.33\textheight]{Fig1.pdf} \caption{\small Legendre coefficients $\langle a_{11}\rangle$ (left), $\langle a_{22}\rangle$ (middle) and $\langle a_{13}\rangle$ (right) calculated from the two-particle rapidity correlation function for charged hadrons and pions (top), and kaons and protons (bottom), at 8 different beam energies in Au$+$Au collisions. Here, charged hadrons are directly-identified pions, kaons, and protons. The statistical uncertainties are shown as the vertical lines, while the horizontal caps indicate the systematic uncertainties.} \label{Fig1} \end{figure} The magnitude of the coefficients decreases with increasing beam energy, indicating decreased two-particle correlations per pair as $\sqrt{s_{NN}}$ increases. The first diagonal coefficient $\langle a_{11}\rangle$ is positive for charged hadrons, pions, and kaons. This is expected from wounded nucleon model arguments \cite{3}. However, the $\langle a_{11}\rangle$ coefficient is negative for protons at all eight energies. This results from the relative anti-correlation of $\langle$$R_{2}(\Delta y)$$\rangle$ at $\Delta$y$=$0 that is seen in Figure \ref{Fig2}. Such an anti-correlation for protons has also been observed in p$+$p collisions at 7~TeV by ALICE \cite{8} and in $e^{+}e^{-}$ collisions at 29~GeV by the TPC/Two-Gamma collaboration \cite{9}. \par A significant increase in the magnitude of the $\langle a_{nm}\rangle$ coefficients for pions at 19.6 and 27.0~$\mathrm{GeV}$ was observed and shown in Figure \ref{Fig1}. A further investigation shows that there is a strong correlation structure in pions around $\Delta$y$\sim$0 that is elongated in the $\Delta\varphi$ direction. This structure only appears for pions and is similar in shape to those observed in cluster emission models applied to p$+$p collisions at RHIC and the LHC \cite{10,11}.\par In order to further understand the observed structure, the averaged correlation functions for pions versus $\Delta y$ were calculated in three different ranges of the azimuthal angle $\Delta\varphi$: near-side (-30$^{\circ}$$<$$\Delta\varphi$$<$30$^{\circ}$), far-side (150$^{\circ}$$<$$\Delta\varphi$$<$210$^{\circ}$) and transverse $\Delta\varphi$ (30$^{\circ}$$<$$\Delta\varphi$$<$150$^{\circ}$ \& 210$^{\circ}$$<$$\Delta\varphi$$<$330$^{\circ}$) for 19.6 and 27~GeV and their neighboring energies (14.5 and 39~GeV) as shown in Figure \ref{Fig3}. In the near-side projection there is a peak around $\Delta$y$\sim$0 which is stronger in unlike-sign pions than like-sign pions. This is an expected feature of the short-range correlation mechanisms \cite{5} that are dominant in this $\Delta\varphi$ range. There is no significant structure in the far-side projection of both like-sign and unlike-sign pions at these energies. However, the transverse projection shows a significant peak around $\Delta$y$\sim$0 at 19.6 and 27~GeV. This structure has the same magnitude for both like-sign and unlike-sign pions. The UrQMD model does not reproduce this observation (see Figure~\ref{Fig2}). \begin{figure}[h] \centering \includegraphics[trim= 0.1cm 0.22cm 0.1cm 6.2cm,clip,width=.41\textheight,height=.16\textheight]{Fig2.pdf} \caption{\small The averaged rapidity correlation function for pions (left) and protons (right) over the full $\Delta\varphi$ range at 19.6~$\mathrm{GeV}$. The solid histograms depict the UrQMD results. The middle point at $\Delta$y$=$0 for protons has large fluctuations due to the track crossing effects which exist solely in this bin. } \label{Fig2} \end{figure} \begin{figure}[h] \centering \includegraphics[trim= 2cm 0.45cm 2cm 0.3cm,width=.45\textheight,height=.39\textheight]{Fig3.pdf} \caption{\small The averaged correlation function for pions as a function of $\Delta y$ for 14.5, 19.6, 27, and 39~GeV (from left to right respectively) beam energies in 0-5\% central Au$+$Au collisions. Averages were taken over three different ranges of $\Delta\varphi$: (top) near-side, (middle) far-side and (bottom) transverse region. See the text for the definition of the different $\Delta\varphi$ ranges.} \label{Fig3} \end{figure} \section{Conclusions} Two-particle rapidity correlations have been studied for like-sign and unlike-sign charged hadrons and directly-identified particles ($\pi, K$, and $p$) in 0-5\% central Au$+$Au collisions at $\sqrt{s_{NN}}$$=$7.7-200~GeV. The shape of the rapidity correlations has been quantified by decomposing the correlation functions onto a basis set of Legendre polynomials. The $\langle a_{11}\rangle$ coefficients have been observed to be positive for pions and kaons, and they are negative for protons at all eight beam energies. The positive or negative values of $\langle a_{11}\rangle$ are indicative of correlations or anti-correlations, respectively. A charge-independent structure has been observed in the correlation function for pions. This structure is very localized in beam-energy (19.6 and 27~GeV) and at $\Delta$y$\sim$0 and extends as a ridge in the $\Delta\varphi$ direction. Further studies are needed to understand the underlying physical mechanisms for this structure. \bibliographystyle{elsarticle-num}
{ "redpajama_set_name": "RedPajamaArXiv" }
2,997
Another bankrupt print media company may be getting a buyout. A white knight has emerged for the bankrupt parent of the Chicago Sun-Times, the rival Chicago Tribune reported Friday. For the last few years, we have watched the world around us changing, but within the industry's walls, we have seen just glimmers of change surfacing along the horizon. Now, we are going to watch this industry evolve around us in a massive blaze. As I write this, the Book Business Extra e-newsletter reported developments in mobile content, MP3 audiobooks and free book downloads. The fi rst story covered digital book distributor OverDrive's new offering of downloadable audiobooks (for retailers, libraries and schools) in MP3 format that will be compatible with nearly every mobile phone and MP3 player, including the iPod. Borders will be the fi rst to offer the audiobooks at Audiobooks. Borders.com and at Digital Centers inside select Borders stores. Spending on advertising in the U.S. fell 15.4% in the first half of 2009, compared with the same period a year earlier, according to an annual report released Tuesday by The Nielsen Company. For the six-month period, ad spending plummeted more than $10.3 billion to $56.9 billion. National newspapers saw ad spending decline 22.8%. Local newspapers dropped 13.2%. National magazines, outdoor media and network radio similarly fell 21.2%, 14.9% and 9%, respectively. Even the Web took a hit. Ad spending declined 1% through the first six months of the year. He Said the Magic Word! Can high-power corporate executives run a local newspaper like a local newspaper? At least one of Star Tribune's potential new board members (who was once president of the UK Starbucks Coffee Co.), thinks so. The Star Tribune said Monday that unless another buyer emerges, its board of directors will include L. Gordon Crovitz, former Wall Street Journal publisher; Michael T. Sweeney, managing partner of the Minneapolis private equity firm of Goldner Hawn Johnson & Morrison; former banker and investor William F. Farley of Minneapolis; and Michael E. Reed, head of GateHouse Media Inc. of Fairport, N.Y. Two additional board members are expected to be named later. "I think a local newspaper company like the Star Tribune is the epitome of a local business," said Sweeney, who previously served as president of Starbucks Coffee Co. (UK) in London. "So it's a pleasure to be involved in such a local business." Click "Read more" for the rest. Faced with plunging ad and circulation revenue and heavy debt, the Star Tribune filed for bankruptcy protection last January. The Chapter 11 filing came less than two years after Avista Capital Partners, a private equity firm, bought the Star Tribune for $530 million from The McClatchy Co. WASHINGTON (AFP) – Freedom Communications, owner of the Orange County Register and 30 other US newspapers, is expected to file for bankruptcy protection this week, according to published reports. The Wall Street Journal and The New York Times quoted unidentified sources as saying that the bankruptcy filing would lead to Freedom's lenders taking over the company, which is owned by the Hoiles family. The Times said the Chapter 11 bankruptcy filing, which protects a company from its creditors while it restructures, could come as early as Tuesday. Should Newspapers Really be Saved? Some months ago I was invited (about a dozen times) to join the "Don't Let Newspapers Die" cause on Facebook. Most of the well-meaning folks who invited me to the cause were, in fact, people in the newspaper industry with whom I have worked for many, many years. As a nearly 20-year veteran of the business, I can forgive my Facebook friends for assuming that I would be interested in preserving the newspaper industry as it exists today, and as it has existed for the bulk of my career. It was with a not-so-heavy heart that I silently ignored the pleas for my participation in this particular cause. Why? Because information gathering and reporting, like any other human industry, must be allowed to change and evolve with the technologies and the demands of the times. We no longer live in an era when the common man, he who puts his nose to the grindstone every day just to feed his family, is restricted to digesting a filtered, dumbed-down hashing of the day's events with his breakfast bagel or his evening meal. News delivery today is consumer-participatory. We read it, we digest it, we "tweet" it, and we do not necessarily glean what we regurgitate from traditional sources. The print newspaper business must evolve if it is to remain a viable information utility. To date, it has been the slowest overall of the more traditional news reporting sources to successfully leverage the Internet in the daily lives of news junkies. Granted, it's had more to overcome. Flipping on the television or radio and sponging the news in spoken or visual form is still easier than putting it together yourself from various blogs, feeds, and editorial content online, even with technologies like RSS and social media sites. Let's look at it this way: no one hires a scribe to manually copy, translate, and distribute documents anymore. Why? Because Johannes Gutenberg invented movable type printing and the printing press. Even as far back as the 1400s, technology was changing the way news was delivered. And then there were newsboys, who are famous in American history for shouting headlines on street corners in the late 19th and early 20th centuries in order to sell papers. Word-of-mouth, in fact, was one way newspapers managed to attract readers and subscribers throughout the ages. "Did you read that story in the…?" was most often the phrase that led to more eyeballs on a particular column. These days, there's nary a newsboy to be found and no one uses movable type printing anymore. Why? Because we have desktop publishing applications that make it simple to put words on a page, and we have television, radio, blogs, advertising, social media, and a host of other means of spreading word-of-mouth. Now fast-forward to 1997, when Matt Drudge "revolutionized" online newsgathering by becoming one of the first aggregated news sites on the Web to both make news and break major political scandal. Suddenly, people were turning to the Internet in droves to read news from sources that were not ABC, NBC, CBS, New York Times, or Wall Street Journal. What Drudge did was successfully break a Newsweek work-in-progress on the Internet. Although it wasn't Drudge who uncovered the story, his action on it was the very beginning of what would become the medium accused of destroying the newspaper. For years, I've heard that craigslist is killing print media because of free online classifieds, and that bloggers are killing print media because they have become the new, true "community" journalists, that they are performing original local reporting rather than just spilling something from the Associated Press into an empty hole every day. In the end, though, it is up to the newspaper to maintain (and build) its readership, and not up to craiglist, bloggers, twitterers, or whatever the next generation of newsgatherer becomes, to protect the old gray print media from wasting away to nothing. Should traditional print media go the way of the dinosaur? Absolutely. It should evolve. Creditors will extend for two months the company's exclusive right to present a reorganization plan. Their plan proposes the auction and posts a starting bid of $37 million in cash plus real estate and bankruptcy costs. The company values the plan at $92 million. The debtors propose to keep $60 million in debt on the books, in contrast to the company's plan to emerge debt-free. "We believe that it achieves the highest and best value for estate assets for the benefit of creditors," said lawyer Larry McMichael, who represents Philadelphia Newspapers. "We believe that because we haven't been able to find anybody else to put money in." Ailing newspapers in Boston, Minneapolis and other U.S. cities have all struggled to raise capital or find new buyers, he noted. Today's publishing reality is that approximately 4% of manuscripts submitted to publishers ever become books. If you have written a book you need to face the truth. The odds of getting your book published through traditional methods are slim to none. Recently a self-publishing author of my acquaintance inked a deal with a major publishing company for some very large bucks, maybe the largest in history for a new author. How did he do it? I'll tell you.
{ "redpajama_set_name": "RedPajamaC4" }
6,258
(RTTNews) - Germany's investor confidence rose sharply in March, reversing a steep fall in the previous month, to its highest level in a year, survey data from the ZEW - Leibniz Centre for European Economic Research showed on Tuesday. The latest reading was the highest since March last year, when the score was 5.1. "The significant increase in the ZEW Indicator of Economic Sentiment shows that major economic risks are considered to be less dramatic than before," ZEW President Achim Wambach said. "The possible delay in the Brexit process as well as the renewed hope for a deal on the UK's withdrawal from the EU seem to have given rise to more optimism among financial market experts." The current situation index of the survey fell to 11.1 from 15. Economists had expected the index to ease to 13. The expectations for the medium-term economic development are less pessimistic than they were a month or two ago, the ZEW said. Survey data also showed that Eurozone investor confidence improved sharply with the relevant index rising 14.1 points to minus 2.5. However, the current conditions index for the euro area survey decreased further, by 3.6 points to minus 6.6. On Monday, the Bundesbank said in its monthly report that the German economy is unlikely to rebound in the first quarter as the manufacturing slowdown continued. The group forecast 1.7 percent expansion for next year. Christoph Schmidt, the chairman of the panel, said the boom for the German economy is over now, but a recession is unlikely, thanks to the robust domestic economy.
{ "redpajama_set_name": "RedPajamaC4" }
8,822
package org.apache.ignite.internal.processors.hadoop; import java.io.File; import java.io.FilenameFilter; import java.io.IOException; import java.net.MalformedURLException; import java.net.URL; import java.nio.file.Files; import java.nio.file.Path; import java.nio.file.Paths; import java.util.ArrayList; import java.util.Collection; import java.util.LinkedList; import java.util.List; /** * Hadoop classpath utilities. */ public class HadoopClasspathUtils { /** Prefix directory. */ public static final String PREFIX = "HADOOP_PREFIX"; /** Hadoop home directory. */ public static final String HOME = "HADOOP_HOME"; /** Hadoop common directory. */ public static final String COMMON_HOME = "HADOOP_COMMON_HOME"; /** Hadoop HDFS directory. */ public static final String HDFS_HOME = "HADOOP_HDFS_HOME"; /** Hadoop mapred directory. */ public static final String MAPRED_HOME = "HADOOP_MAPRED_HOME"; /** Arbitrary additional dependencies. Compliant with standard Java classpath resolution. */ public static final String HADOOP_USER_LIBS = "HADOOP_USER_LIBS"; /** Empty string. */ private static final String EMPTY_STR = ""; /** * Gets Hadoop class path as a list of URLs (for in-process class loader usage). * * @return List of class path URLs. * @throws IOException If failed. */ public static List<URL> classpathForClassLoader() throws IOException { List<URL> res = new ArrayList<>(); for (SearchDirectory dir : classpathDirectories()) { for (File file : dir.files()) { try { res.add(file.toURI().toURL()); } catch (MalformedURLException e) { throw new IOException("Failed to convert file path to URL: " + file.getPath()); } } } return res; } /** * Gets Hadoop locations. * * @return The locations as determined from the environment. */ public static HadoopLocations locations() throws IOException { // Query environment. String hadoopHome = systemOrEnv(PREFIX, systemOrEnv(HOME, EMPTY_STR)); String commonHome = systemOrEnv(COMMON_HOME, EMPTY_STR); String hdfsHome = systemOrEnv(HDFS_HOME, EMPTY_STR); String mapredHome = systemOrEnv(MAPRED_HOME, EMPTY_STR); // If any composite location is defined, use only them. if (!isEmpty(commonHome) || !isEmpty(hdfsHome) || !isEmpty(mapredHome)) { HadoopLocations res = new HadoopLocations(hadoopHome, commonHome, hdfsHome, mapredHome); if (res.valid()) return res; else throw new IOException("Failed to resolve Hadoop classpath because some environment variables are " + "either undefined or point to nonexistent directories [" + "[env=" + COMMON_HOME + ", value=" + commonHome + ", exists=" + res.commonExists() + "], " + "[env=" + HDFS_HOME + ", value=" + hdfsHome + ", exists=" + res.hdfsExists() + "], " + "[env=" + MAPRED_HOME + ", value=" + mapredHome + ", exists=" + res.mapredExists() + "]]"); } else if (!isEmpty(hadoopHome)) { // All further checks will be based on HADOOP_HOME, so check for it's existence. if (!exists(hadoopHome)) throw new IOException("Failed to resolve Hadoop classpath because " + HOME + " environment " + "variable points to nonexistent directory: " + hadoopHome); // Probe Apache Hadoop. HadoopLocations res = new HadoopLocations( hadoopHome, hadoopHome + "/share/hadoop/common", hadoopHome + "/share/hadoop/hdfs", hadoopHome + "/share/hadoop/mapreduce" ); if (res.valid()) return res; // Probe CDH. res = new HadoopLocations( hadoopHome, hadoopHome, hadoopHome + "/../hadoop-hdfs", hadoopHome + "/../hadoop-mapreduce" ); if (res.valid()) return res; // Probe HDP. res = new HadoopLocations( hadoopHome, hadoopHome, hadoopHome + "/../hadoop-hdfs-client", hadoopHome + "/../hadoop-mapreduce-client" ); if (res.valid()) return res; // Failed. throw new IOException("Failed to resolve Hadoop classpath because " + HOME + " environment variable " + "is either invalid or points to non-standard Hadoop distribution: " + hadoopHome); } else { // Advise to set HADOOP_HOME only as this is preferred way to configure classpath. throw new IOException("Failed to resolve Hadoop classpath (please define " + HOME + " environment " + "variable and point it to your Hadoop distribution)."); } } /** * Gets base directories to discover classpath elements in. * * @return Collection of directory and mask pairs. * @throws IOException if a mandatory classpath location is not found. */ private static Collection<SearchDirectory> classpathDirectories() throws IOException { HadoopLocations loc = locations(); Collection<SearchDirectory> res = new ArrayList<>(); // Add libraries from Hadoop distribution: res.add(new SearchDirectory(new File(loc.common(), "lib"), AcceptAllDirectoryFilter.INSTANCE)); res.add(new SearchDirectory(new File(loc.hdfs(), "lib"), AcceptAllDirectoryFilter.INSTANCE)); res.add(new SearchDirectory(new File(loc.mapred(), "lib"), AcceptAllDirectoryFilter.INSTANCE)); res.add(new SearchDirectory(new File(loc.common()), new PrefixDirectoryFilter("hadoop-common-"))); res.add(new SearchDirectory(new File(loc.common()), new PrefixDirectoryFilter("hadoop-auth-"))); res.add(new SearchDirectory(new File(loc.hdfs()), new PrefixDirectoryFilter("hadoop-hdfs-"))); res.add(new SearchDirectory(new File(loc.mapred()), new PrefixDirectoryFilter("hadoop-mapreduce-client-common"))); res.add(new SearchDirectory(new File(loc.mapred()), new PrefixDirectoryFilter("hadoop-mapreduce-client-core"))); // Add user provided libs: res.addAll(parseUserLibs()); return res; } /** * Parse user libs. * * @return Parsed libs search patterns. * @throws IOException If failed. */ public static Collection<SearchDirectory> parseUserLibs() throws IOException { return parseUserLibs(systemOrEnv(HADOOP_USER_LIBS, null)); } /** * Parse user libs. * * @param str String. * @return Result. * @throws IOException If failed. */ public static Collection<SearchDirectory> parseUserLibs(String str) throws IOException { Collection<SearchDirectory> res = new LinkedList<>(); if (!isEmpty(str)) { String[] tokens = normalize(str).split(File.pathSeparator); for (String token : tokens) { // Skip empty tokens. if (isEmpty(token)) continue; File file = new File(token); File dir = file.getParentFile(); if (token.endsWith("*")) { assert dir != null; res.add(new SearchDirectory(dir, AcceptAllDirectoryFilter.INSTANCE, false)); } else { // Met "/" or "C:\" pattern, nothing to do with it. if (dir == null) continue; res.add(new SearchDirectory(dir, new ExactDirectoryFilter(file.getName()), false)); } } } return res; } /** * Get system property or environment variable with the given name. * * @param name Variable name. * @param dflt Default value. * @return Value. */ private static String systemOrEnv(String name, String dflt) { String res = System.getProperty(name); if (res == null) res = System.getenv(name); return res != null ? res : dflt; } /** * Answers if the given path denotes existing directory. * * @param path The directory path. * @return {@code True} if the given path denotes an existing directory. */ public static boolean exists(String path) { if (path == null) return false; Path p = Paths.get(path); return Files.exists(p) && Files.isDirectory(p) && Files.isReadable(p); } /** * Check if string is empty. * * @param val Value. * @return {@code True} if empty. */ private static boolean isEmpty(String val) { return val == null || val.isEmpty(); } /** * NOramlize the string. * * @param str String. * @return Normalized string. */ private static String normalize(String str) { assert str != null; return str.trim().toLowerCase(); } /** * Simple pair-like structure to hold directory name and a mask assigned to it. */ public static class SearchDirectory { /** File. */ private final File dir; /** Filter. */ private final DirectoryFilter filter; /** Whether directory must exist. */ private final boolean strict; /** * Constructor for directory search with strict rule. * * @param dir Directory. * @param filter Filter. * @throws IOException If failed. */ private SearchDirectory(File dir, DirectoryFilter filter) throws IOException { this(dir, filter, true); } /** * Constructor. * * @param dir Directory. * @param filter Filter. * @param strict Whether directory must exist. * @throws IOException If failed. */ private SearchDirectory(File dir, DirectoryFilter filter, boolean strict) throws IOException { this.dir = dir; this.filter = filter; this.strict = strict; if (strict && !exists(dir.getAbsolutePath())) throw new IOException("Directory cannot be read: " + dir.getAbsolutePath()); } /** * @return Child files. */ public File[] files() throws IOException { File[] files = dir.listFiles(new FilenameFilter() { @Override public boolean accept(File dir, String name) { return filter.test(name); } }); if (files == null) { if (strict) throw new IOException("Failed to get directory files [dir=" + dir + ']'); else return new File[0]; } else return files; } } /** * Directory filter interface. */ public static interface DirectoryFilter { /** * Test if file with this name should be included. * * @param name File name. * @return {@code True} if passed. */ public boolean test(String name); } /** * Filter to accept all files. */ public static class AcceptAllDirectoryFilter implements DirectoryFilter { /** Singleton instance. */ public static final AcceptAllDirectoryFilter INSTANCE = new AcceptAllDirectoryFilter(); /** {@inheritDoc} */ @Override public boolean test(String name) { return true; } } /** * Filter which uses prefix to filter files. */ public static class PrefixDirectoryFilter implements DirectoryFilter { /** Prefix. */ private final String prefix; /** * Constructor. * * @param prefix Prefix. */ public PrefixDirectoryFilter(String prefix) { assert prefix != null; this.prefix = normalize(prefix); } /** {@inheritDoc} */ @Override public boolean test(String name) { return normalize(name).startsWith(prefix); } } /** * Filter which uses exact comparison. */ public static class ExactDirectoryFilter implements DirectoryFilter { /** Name. */ private final String name; /** * Constructor. * * @param name Name. */ public ExactDirectoryFilter(String name) { this.name = normalize(name); } /** {@inheritDoc} */ @Override public boolean test(String name) { return normalize(name).equals(this.name); } } }
{ "redpajama_set_name": "RedPajamaGithub" }
6,689
{"url":"https:\/\/jhaberstro.blogspot.com\/","text":"## Thursday, September 14, 2017\n\n### Learning vs Inference\n\nIn machine learning, the terms \"learning\" and \"inference\" are used often and it's not always clear what is meant. For example, is \"variational inference\" and neural network \"inferencing\" the same thing? Usually not!\n\nWhen the deep learning crowd says \"inference\", what they mean is \"perform a prediction.\" When the bayesian crowd says \"inference\", what they really mean is \"compute the posterior distribution of a latent variable model\"; e.g., for a model p(x, z) = p(x | z)p(z) and data x, compute p(z | x).\n\nWhen someone says learning, they mean their model has a set of parameters and they need to find a good setting of those parameters; e.g. their model is actually p(x, z) = p(x | z; theta)p(z) and they want to find theta. For frequentists, this means finding a point estimate of the parameters. For a bayesian, learning is inference because the parameters are treated as latent, random variables, so they can use normal variational inference or MCMC to compute a distribution over the parameters. Note that for 99% of deep learning practitioners, training is synonymous with learning as the practitioner will likely only be computing a single set of values (aka point estimate) for their weights.\n\n## Sunday, September 10, 2017\n\n### Why is the ELBO difficult to optimize?\n\nThe task of bayesian inference is to compute the posterior p(z | x) of the model p(x, z) = p(x|z)p(z) where z is a latent variable. This is often intractable, so a bayesian may resort to approximating it with some easier distribution q(z) \u2014 this method is called variational inference . Usually the approximating distribution is chosen from a parameterized family of distributions. Thus q(z) is really the variational distribution q(z; lambda) for some chosen value lambda. How is this parameter lambda chosen?\n\nA common method is to minimize the KL-divergence between the variational distribution and the true posterior, KL[q(z; lambda) || p(z | x)]. Of course, the posterior isn\u2019t actually known, but if we break down this KL divergence, we see the following:\n\nKL[q(z) || p(z | x)] = E_q(z)[log(q(z)) - log(p(z|x))]\n= E_q(z)[log(q(z)) - log(p(x, z)\/p(x))]\n= E_q(z)[log(q(z)) - log(p(x, z)) + log(p(x))]\n= E_q(z)[log(q(z)) - log(p(x, z))] + log(p(x))\n= E_q(z)[log(q(z)) - log(p(x|z)) - log(p(z))] + log(p(x))\n\nThe KL divergence can be minimized up to a constant (the marginal likelihood) wrt the variational parameters since we know how to compute p(x, z) per the model\u2019s definition. This term that we want to minimize \u2014 E_q(z)[log(q(z)) - log(p(x|z)) - log(p(z))] \u2014 is the negative evidence lower bound (ELBO). So, back to the original title question \u2014 why is the ELBO difficult (but not impossible) to optimize?\n\nIt actually isn\u2019t difficult to optimize for certain classes of models. If all the latent variables are chosen to be independent in the variational distribution (i.e. the mean-field assumption) and the model is conditionally conjugate, then one can use coordinate ascent variational inference. \u00a0This method is fast to compute. Unfortunately, the restrictions it places on the model are also quite limiting. It is when the model is unconstrained is optimizing the ELBO difficult. But again, why?\n\nIf nothing is known about the model p(x|y)p(y) except a method to evaluate it, we are relegated to optimizing the ELBO by gradient descent. This entails computing the gradient of the ELBO (excuse my abuse of notation):\n\nGradient of E_q(z)[log(q(z)) - log(p(x|z)) - log(p(z))]\n= gradient of (integral of q(z)*(log(q(z)) - log(p(x|z)) - log(p(z)))dz)\n= gradient of (integral of q(z)*log(q(z))*dz) - (integral of q(z)*(log(p(x|z)) - log(p(z))*dz))\n= integral of (gradient of q(z)*log(q(z))*dz)) - (integral of (gradient of q(z))*(log(p(x|z)) - log(p(z))*dz))\n\nwhere the I've shortened q(z; lambda) to q(z) and the gradient is wrt lambda.\n\nWhen I first saw this equation, I wasn\u2019t sure what the big deal was. This is because I wasn\u2019t accustom to staring at math equations all day, but to any (applied) mathematician it should be obvious. I\u2019ll put in bold font: computing the gradient of the ELBO *requires computing some likely high-dimensional, likely intractable integral.* Why is it intractable? Well, you may get lucky and the integral has an analytic solution, but in general that won\u2019t be true. Also, because \u00a0this quantity no longer takes the form of an expectation, it can\u2019t easily be estimated by Monte Carlo. It may be possible to do so if z is discrete and its sample space is small (as you could exhaustively evaluate the integrand at all z), but that implies z is very low dimensional which may not be true either.\n\nLuckily there exist some methods to side-step these issues by placing mild(ish) \u00a0constraints on either the variational family of distributions or both the variational family and the model. These methods are the score function gradient and reparameterization gradient, but I won\u2019t be discussing them in this post \u2014 they\u2019re best left to be explained another day (or by Google)..\n\n## Thursday, September 7, 2017\n\n### Expectation Maximization vs Variational Bayes\n\nI constantly find myself forgetting the details of the EM algorithm, variational bayes, and what exactly the difference is between the two. To avoid confusion in the future, I wrote the following note.\n\nQ: What is the difference between EM and Variational Bayes (aka \"Variational Bayesian EM\")?\nA:\u00a0Both are iterative methods for learning about the parameters theta and the posterior p(z | x, theta) in a latent variable model p(x, z | theta) by trying to a maximize a lower bound to the marginal likelihood p(x) (or p(x | theta) when using EM). The difference between the two techniques lies in following:\n\n1. VB assumes that, even when given a setting of the parameters theta, it is not tractable to compute the posterior p(z | x, theta). Thus, it must be approximated by some variational distribution q(z). On the other hand, EM makes the opposite assumption - given a setting of the parameters theta, it will compute the exact posterior p(z | x, theta). In this sense, VB is a relaxation of EM.\n2. VB is a bayesian technique while EM is a frequentist technique. As such, VB treats theta as a latent, random variable and computes a distribution q(theta) that approximates the posterior distribution p(theta | x). EM, a maximum likelihood technique, computes a point estimate to the parameters theta instead of a full distribution.\nWith these differences in mind, we can describe the two algorithms using a similar framework.\n\nObjective:\nEM\u2019s objective is to maximize a lower bound to p(x | theta), \u00a0E_q(z)[log(p(x, z | theta))].\nVB\u2019s objective is to maximize a lower bound to p(x), E_q(z, theta)[log(p(x, z, theta))].\n\nE-step:\nEM first maximizes the objective by fixing theta and then finding an optimal setting of q(z). This optimal setting is always calculated to be the posterior p(z | x, theta).\nVM first maximizes the objective by fixing q(theta) and finding a better\u00a0setting of q(z) \u00a0(often by some gradient method).\n\nM-step:\nEM maximizes the objective by fixing q(z) to the posterior from the previous E-step, and then calculates a maximum likelihood point estimate of the parameters theta.\nVM maximizes the objective by fixing q(z) and then finding a better setting of q(theta) (again, often by some gradient method).\n\nThe E and M step are then repeated until convergence (i.e. until the point at which the log marginal likelihood no longer improves).\n\nOne last point: there is another algorithm called \"Variational EM\". This algorithm is just the E-step of VB combined with the M-step of EM. Since parameters are not treated as random variables, it is not a bayesian technique.\n\n## Monday, May 2, 2016\n\n### Frequentists vs Bayesians\n\nA really wonderful aspect of learning about machine learning is that you can't help but learn about the field statistics as well. As a computer scientist (or really, a software engineer -- I have a hard time calling myself a computer scientist), one of the joys of the field is that many interesting problems require expertise from other fields and so computer scientists tend to be exposed to a great many of ideas (even if only in a shallow sense)!\n\nOne of the major divides among statisticians is in the philosophy of probability. On one hand there are frequentists who like to place probabilities only on data; there is some underlying process that the data describes, but one doesn't have knowledge of all data, so there only exists uncertainty about what unknown data the process could generate. On the other hand there are bayesians who, like the frequentists, place probabilities on data for the same reason, but who also place probabilities on the models they use to describe the underlying process and on the parameters of these models. They allow themselves to do this because they concede that, although there does exist one true model that could perfectly describe the underlying process, as the modeler they have their own uncertainty about what that model may be.\n\nI think this is an interesting divide because it highlights two different sources of uncertainty. Some uncertainty exists because there exists true randomness in the world (or so physicists believe), while other uncertainty exists solely due to our own ignorance -- the quantity in question may be completely determined! We are just forced to work with incomplete information. I think it is fascinating that there exists a unified framework that allows us to manage both sources of uncertainty, but it does make me wonder: do these two sources of uncertainty warrant their own frameworks?\n\n## Saturday, April 2, 2016\n\n### An intuition of Newton's method\n\nDuring my lazy weekend afternoons (and all the other days of the week) I've been going through Nando de Freitas' undergraduate machine learning course on youtube. In lecture 26 he introduces gradient descent, an iterative algorithm for optimizing (potentially non-convex) functions. I'll refrain from explaining gradient descent more than that as there are many good explanations on the internet (including Professor de Freitas'), but I do want to discuss gradient descent's learning rate parameter and why intuitively Newton's method, also introduced in lecture 26, is able to side-step the learning rate.\n\nAs described in the video lecture, a common difficulty with gradient descent is picking the learning rate hyper-parameter. Pick too small of a learning rate and gradient descent will come to crawl and make very little progress or even eventually stop making progress due to floating point underflow. Pick too large of a learning rate and gradient descent will oscillate around the minimum\/maximum, bouncing around, very slowly making progress. In an ideal world, as the gradient vanishes, the gradient descent algorithm would be able to compensate by adjusting the learning rate so to avoid both underflow and oscillation. This is exactly what Newton's method does.\n\n$$\\boldsymbol\\theta _{k+1} = \\boldsymbol\\theta _{k} - \\eta_{k}\\nabla f(\\boldsymbol\\theta_{k})$$\nto Newton's method\n$$\\boldsymbol\\theta _{k+1} = \\boldsymbol\\theta _{k} - H_{k}^{-1}\\nabla f(\\boldsymbol\\theta_{k})$$\n\nThe only difference is that Newton's method has replaced the learning rate with the inverse of the Hessian matrix. The lecture derived Newton's method by showing that $f(\\boldsymbol\\theta)$ can be approximated by a second-order Taylor series expansion around $\\boldsymbol\\theta_{k}$. If you're familiar with Taylor series, then this explanation may be sufficient, but I prefer to think about it differently.\n\nWhat is this Hessian matrix we've replace the learning rate with? Just as the gradient vector is the multi-dimensional equivalent of the derivative, the Hessian matrix is the multi-dimensional equivalent of the second-derivative. If $\\boldsymbol\\theta_{k}$ is our position on the surface of the function we're optimizing at time step $k$, then the gradient vector, $\\nabla f(\\boldsymbol\\theta_{k})$, is our velocity at which we're descending towards the optimum, and the Hessian matrix, $H$, is our acceleration.\n\nLet's think back to the original problem of choosing the learning rate hyper-parameter. It is often too small, causing underflow, or it is too big, causing oscillation, and in an ideal world we could pick just the right the learning rate at any time step, most likely in relation to the rate at which the gradient vector vanishes, to avoid both these problems. But wait, now we have this thing called the Hessian matrix that measures the rate at which the gradient vanishes!\n\nWhen starting the algorithm's descent we will quickly gain acceleration as we starting going downhill along the function's surface (i.e. the Hessian matrix will \"increase\"). We don't want to gain too much velocity else we'll overshoot the minimum and start oscillating, so we'd want to choose a smaller learning rate. As the algorithm nears the optimum, the geometry of the function will flatten out and we will eventually lose acceleration. We don't want to lose too much velocity else we'll underflow and stop making progress. It is precisely when we lose acceleration (i.e. the Hessian matrix \"decreases\") that we want to increase our learning parameter.\n\nSo we have observed that heir is an inverse relationship between the magnitude of the acceleration at which we descend towards the minimum and the magnitude of the most desirable learning parameter. That is to say, at greater accelerations we want smaller learning rates and at smaller accelerations we want larger learning rates. It is precisely for this reason why Newton's method multiplies the gradient vector (the \"velocity\") by the inverse Hessian matrix (\"the inverse acceleration\")! At least, this is how I intuitively think about Newton's method. The derivation involving Taylor series expansions is probably the actual precise reason, but I like thinking about it in terms of velocities and accelerations.\n\nFinally, I'd like to end with one cautionary note. I'm an amateur mathematician. I like to think my intuition is correct, but it may not be. By sharing my intuition, I hope to help others who are looking to gain intuition, but if you need anything more\u00a0than an intuitional understanding of Newton's method or gradient descent (because perhaps you're an actual mathematician in training), please consult a textbook or your favourite professor :-).\n\n## Wednesday, December 9, 2015\n\n### On optimizing high-dimensional non-convex functions\n\nExcuse me for the (in)completeness of this post. What follows is merely a thought, inspired by two independent statements, about a domain of science (or math, really) with which I am barely initiated. Let me give you these two statements first.\n\nIn the book Foundations of Data Science, the very first paragraph of the book says\nIf one generates n points at random in the unit d-dimensional ball, for sufficiently large d, with high probability the distances between all pairs of points will be essentially the same. Also the volume of the unit ball in d-dimensions goes to zero as the dimension goes to infinity.\nThat is statement one. Statement two is an assertion given in this year's Deep Learning Tutorial at the Neural Information Processing Systems (NIPS) conference. They claim that \"most local minima are close to the bottom (global minimum error).\"\n\nThe second statement is significant for training (deep) neural networks. Training a neural network always uses a variant of a gradient descent, a method for minimizing the neural network's error by iteratively solving for when the gradient (i.e. the derivative) of the function that gives the error is 0. Ideally gradient descent will approach the global minimum error (the point where the neural network will give the most desirable approximations of the training data), but that is only guaranteed when the error function is convex (there are no hills when the function is plotted). Unfortunately, a neural network almost never has a convex error function. Hence, during gradient descent, one might find a local minimum that is nowhere near as low as the global minimum. The second statement however says we shouldn't be so concerned -- all local minima will be close to the global minimum!\n\nBut why?\n\nMy thought is that somehow the first statement can be used to prove the second statement. The training data of modern neural networks is high dimensional. It will also often be normalized as part of feature scaling. Given those two properties, the high-dimensional hills and valleys of a neural network's error function then (roughly) form unit hemispheres. This (possibly) implies that that local minima are close to the global minimum because the volumes of every valley nears zero, making all the valleys increasing similar to each other as the dimensionality of the training data increases.\n\nI want to stress though, this is a half-baked idea. It's probably rubbish. It might also be redundant! Perhaps the second statement already has a proof and I've missed it. Either way, I would love to see if others find my intuition plausible or, even better, to be pointed in the direction of a proof for the second statement.\n\n## Saturday, October 3, 2015\n\n### TIL: premultiplied-alpha colors\n\nAlpha is the measure of how translucent an object is. An alpha of 0.0 means the object is entirely transparent, an alpha of 1.0 means the object is entirely opaque, and an alpha in the middle means a fraction of the total light may passthrough the object. Traditionally, a color is represented by 4 constituent components: a red contribution, a green contribution, a blue contribution, and the alpha. When compositing two colors together, one on top of the other, the alpha acts as a modulus of the colors, indicating how much of the top color and how much of the bottom color contribute to the new composited color. The traditional compositing operation is as follows, where A\u00a0is being composited over top B:\n\nAlternatively, we may wish to premultiply the red, green, and blue\u00a0components by the alpha:\n\nWith this representation we get a new compositing equation:\n\nThis new form is interesting for a couple reasons.\n1. It is computationally more efficient. It requires one less vector multiplication.\n2. It is a closed form. Compositing a premultiplied-alpha color over top a premultiplied-alpha color yields another premultiplied-alpha color. The same cannot be said of non-premultiplied-alpha colors. Compositing two non-premultiplied-alpha colors yields, interestingly, a premultiplied-alpha color.\n3. When filtering (aka\u00a0downsampling), it produces more visually accurate results. A picture is worth a thousands words.\nAnd that's it. Premutliplied-alpha colors are nifty.","date":"2022-08-16 02:09:32","metadata":"{\"extraction_info\": {\"found_math\": true, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 1, \"mathjax_display_tex\": 1, \"mathjax_asciimath\": 0, \"img_math\": 0, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.7951117753982544, \"perplexity\": 801.1930300259957}, \"config\": {\"markdown_headings\": true, \"markdown_code\": true, \"boilerplate_config\": {\"ratio_threshold\": 0.18, \"absolute_threshold\": 10, \"end_threshold\": 15, \"enable\": true}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2022-33\/segments\/1659882572215.27\/warc\/CC-MAIN-20220815235954-20220816025954-00132.warc.gz\"}"}
null
null
<?php namespace Elixir\Security; use Elixir\HTTP\ServerRequestFactory; use Elixir\Session\Session; use Psr\Http\Message\ServerRequestInterface; use function Elixir\STDLib\array_get; use function Elixir\STDLib\array_remove; use function Elixir\STDLib\array_set; /** * @author Cédric Tanghe <ced.tanghe@gmail.com> */ class CSRF { /** * @var int */ const DEFAULT_TIME = 3600; /** * @var string */ const TOKEN_KEY = '___CSRF___'; /** * @var ServerRequestInterface */ protected $request; /** * @var array|\ArrayAccess */ protected $storage; /** * @param ServerRequestInterface $request * @param array|\ArrayAccess $storage */ public function __construct(ServerRequestInterface $request = null, $storage = null) { $this->request = $request ?: ServerRequestFactory::createFromGlobals(); $this->storage = $storage ?: Session::instance(); } /** * @return ServerRequestInterface */ public function getRequest() { return $this->request; } /** * @return array|\ArrayAccess */ public function getStorage() { return $this->storage; } /** * @param string $name * @param array $config * * @return string */ public function create($name, array $config = []) { $config += [ 'time' => self::DEFAULT_TIME, 'regenerate' => false, ]; $time = time(); if ($config['time'] instanceof \DateTime) { $config['time'] = $config['time']->format('U') - $time; } elseif (version_compare(phpversion(), '5.5', '>=') && $config['time'] instanceof \DateInterval) { $config['time'] = $config['time']->format('U'); } elseif (!is_numeric($config['time'])) { $config['time'] = strtotime($config['time']); } $token = uniqid(rand(), true); array_set( [self::TOKEN_KEY, $name.$token], [ 'expire' => $time + $config['time'], 'time' => $config['time'], 'regenerate' => $config['regenerate'], ], $this->storage ); return $token; } /** * @param string $name * @param array $options * * @return bool */ public function isValid($name, array $options = []) { $options += [ 'referer' => null, 'token' => null, ]; if (null === $options['token']) { $params = $this->request->getParsedBody(); if (!isset($params[$name])) { $this->invalidate(); return false; } else { $options['token'] = $params[$name]; } } $error = false; $name .= $options['token']; $config = array_get([self::TOKEN_KEY, $name], $this->storage, []); $time = isset($config['expire']) ? $config['expire'] : 0; if (time() > $time) { $error = true; } if (!$error && null !== $options['referer']) { $params = $this->request->getServerParams(); if (!isset($params['HTTP_REFERER']) || $params['HTTP_REFERER'] !== $options['referer']) { $error = true; } } $regenerate = array_key_exists('regenerate', $config) ? $config['regenerate'] : false; if ($error || !$regenerate) { array_remove([self::TOKEN_KEY, $name], $this->storage); } elseif ($regenerate) { $config['expire'] = time() + $config['time']; array_set([self::TOKEN_KEY, $name], $config, $this->storage); } $this->invalidate(); return !$error; } public function invalidate() { $tokens = array_get(self::TOKEN_KEY, $this->storage, []); $time = time(); foreach ($tokens as $key => $config) { $expire = isset($config['expire']) ? $config['expire'] : 0; if ($time > $value) { unset($tokens[$key]); } } array_set(self::TOKEN_KEY, $tokens, $this->storage); } }
{ "redpajama_set_name": "RedPajamaGithub" }
856
Gordon Dann (born 2 August 1944) is a former Australian rules footballer who played with South Melbourne in the Victorian Football League (VFL). Notes External links Living people 1944 births Australian rules footballers from Victoria (Australia) Sydney Swans players
{ "redpajama_set_name": "RedPajamaWikipedia" }
2,167
Produced by Katie Hernandez, sp1nd and the Online Distributed Proofreading Team at http://www.pgdp.net (This file was produced from images generously made available by The Internet Archive) THE GREEN HAND THE GREEN HAND Adventures of a Naval Lieutenant BY GEORGE CUPPLES AUTHOR OF "THE TWO FRIGATES" [Illustration] SANDS & COMPANY 23 BEDFORD STREET, LONDON, W.C. AND EDINBURGH. LIFE OF GEORGE CUPPLES (AUTHOR OF "THE GREEN HAND") Excepting for one short episode--that, indeed, to which we owe "The Green Hand"--the life of George Cupples was almost devoid of those external incidents and vicissitudes which lend the interest of romance to biographical narrative. It is therefore possible, even within the narrow limits assigned to the present sketch, to satisfy reasonable curiosity regarding the mere facts of this distinguished author's career. Cupples was, by virtue of two or three generations, a son of the manse. His grandfather, the Rev. George Cupples, was the minister of Swinton; and his father, who bore the same name, was also a minister. The George Cupples with whom we have to do was born at Legerwood, in Berwickshire, on the 2nd of August 1822. He was the eldest of the family, which consisted, including George, of three sons and one daughter. The father was a clergyman of orthodox views, and from the descriptions of him that have been left we may infer that the severity of his Calvinism had imparted a decided severity to his character. "He was much respected," says his son Joseph, "and, indeed, a good deal feared." The children were accordingly treated by him with rigid strictness, modified by their mother's greater leniency. This stern master was George's only teacher during the first ten years of his life. His books were an Arithmetic, Cordery, Ruddiman's Rudiments, and Cornelius Nepos. In his tenth year he and his brother Joseph went to school at Earlston, "walking daily a weary four and a half miles and back again--to lessons at home!" George was in his twelfth year when his father was "translated" to Stirling. While the family was settled here, the wish to go to sea seems to have grown in the boy's mind to a settled determination, fostered, it appears, by his reading of novels, of which he was extremely fond. He was sixteen years of age when his father, probably much against his will, allowed him to be apprenticed as a sailor. So it came about that the minister's son, nurtured on the classics and Calvinism with quite different purposes in view, made a voyage to India and back--an eighteen months' affair it turned out--as a ship's boy. On the nature of his experiences we need not speak here, for whoever reads "The Green Hand" will understand it without further aid. As his biographer strikingly says: "It had a physical effect on him ... made him quiet and still in every expression, in every externality of life afterwards." At all events, the young adventurer returned home perfectly cured of his taste for the sea, petitioned his father to get his indentures cancelled, and declared he would content himself for the future on land. Resuming his interrupted studies, he proceeded to Edinburgh University, where he took the Arts course. One of the professors was Wilson, the famous "Christopher North," for whom Cupples felt an admiration scarcely short of hero-worship, and of whom he afterwards wrote a "Memorial Sketch." Later on he went through the Divinity course, and had the privilege of sitting at the feet of the great Chalmers, of whom he always writes with enthusiasm. But though prepared and equipped for the paternal calling, Cupples "recoiled from the stairs of the pulpit," more, it would seem, from a growing inclination to literature than from any heterodoxy in his religious views. He became a contributor to _Blackwood's Magazine_, where his essay on Emerson appeared in 1848. In _Maga_ also was first published "The Green Hand," that magnificent story of the sea which we are now sending forth, to delight and enthral, we feel sure, a new generation of readers. Two opinions may here be quoted of the story, to which each of our readers may afterwards add his own. George MacDonald pronounced it "the best sea-novel I have ever read"; and Clark Russell, whose right to speak on such a subject will scarcely be disputed, declares "it is the colours of 'The Green Hand' that I have nailed to my mast." Cupples was a constant and unwearied writer. Much of his work was done for newspapers and periodicals, but even the most ephemeral of his productions bore testimony to the earnest and solid qualities of the man. That these qualities were duly appreciated is proved by the frequent kindly mention of him by men of the highest literary repute. He was married, in 1858, to Ann Jane Douglas, an Edinburgh lady, who, though much younger than her husband, was singularly congenial in her tastes and pursuits. She has written a large number of books, mostly for children. Even before the time of his marriage, Cupples suffered from the _sequelae_ of hip-joint disease, and all the remainder of his life he seems never to have been quite free from the burden of ill-health. His home during his literary career was in different parts of Edinburgh or its vicinity, latterly in Newhaven, where he succumbed to heart-disease on the 17th of October 1891. His tombstone testifies to the admiration of his friends for his "varied literary gifts, and his simple, upright, and reverent character." One of the literary projects which Cupples had long cherished has been happily carried out since his death in the publication, by Messrs Blackwood, of a splendid volume on "Scotch Deerhounds and their Masters." This volume contains a fine portrait of the author, and also an interesting memoir, written by Dr. Hutchison Stirling, which is in itself at once a tribute and a testimony to the lasting impression which both the works and the character of George Cupples made upon cultured and critical minds. AUTHOR'S PREFACE The popularity of "The Green Hand," both among seamen and others, as being true to life, has been wide. It has, however, been thought desirable to issue a revised edition, freed from various expressions now to a certain extent obsolete or otherwise unsuitable, so as to make it more thoroughly fit for juvenile readers. Some considerable time has now elapsed since the period to which these adventures refer, not without producing a good deal of alteration in much that goes on at sea, most especially in the outward accessories of nautical life. The spanking frigate of former days, for instance, is now no more; her place being, to the eye at any rate, ill taken up by the ironclad screw-steamer. The mechanical appliances have been improved, particularly in the merchant service, as, for example, by the Patent-Reefing-Topsail, which is only one of the countless new helps to the seaman. In navigation, instead of now taking five, six, or seven months to reach Australia from this country, the captain of any clipper-line sailing ship would be ashamed of himself if he did not do it within three. Not to multiply cases, Jack himself has, as a rule, added the moustache to his exuberance of whisker; he thinks better than he used to do of these excellent institutions, the Sailors' Homes; he is frequently a temperance man, and has even been known to take the chair at a meeting for vindication of sailors' rights. But the state of the case, from a plain practical point of view, is pretty well illustrated by an anecdote current at sea among forecastle story-tellers. According to them, a singular discovery was made, some forty years or so back, in Portsmouth harbour, aboard no less conspicuous a craft than that immortal three-decker hulk, H.M.S. _Victory_ herself, when some alterations were being made down in her lower decks. There certain of the dock-yard people, having occasion to lift a small out-of-the-way lazarette hatch, down on the after-part of the orlop, which had been long covered with old coils of hawsers or the like, were surprised to find a man lying beneath, who rubbed his eyes, stretched himself as if waking out of sleep, and was finally brought up on deck. From undoubted evidence, it turned out that he had been shut down in joke, under the effect of some strange potion, his rough messmates having, of course, intended to release him before long; but a sudden commotion of a more important nature had arisen, owing to which they had forgotten him until too late, being themselves appointed on active service abroad. Hence it occurred that he had been left there, fast enclosed and asleep, ever since shortly after Trafalgar, when the _Victory_ had come home with Nelson's body, and been paid off, dismantled, and moored in her place as a hulk. From a young reefer, this gentleman had meanwhile grown into a grizzled oldster, on midshipman's half-pay, not likely to have his services further required, seeing that the French had long ceased to offer battle afloat. He was, however, freely invited into professional society, where his opinions on the changes that had taken place were naturally much looked to. The things he is said to have principally remarked as new, were that pigtails had gone out of fashion; the midshipmen's messes were supplied with silver forks; boatswains--in stimulating the men at work--put more force into their language, less into their rattans, and that the leading-blocks of the mizzen-topsail-reef-tackles hung at the slings of the yard instead of being as formerly at the rim of the round-top; nor did he ever feel sure that such changes were for the better. This yarn, with a good moral tacked on at the end, in one form or another, still affords entertainment to many a tarry audience in ships outward bound, at second dog-watch time, when rolling down the Trades; particularly if spun by some fluent ex-man-o'-war's-man from any of Her Majesty's iron-clads. The said moral generally being to the effect, that little difference is made in essentials at sea by progress in the mere shoregoing world. In the following story no great amount of correction requires to be made in bringing it up to date; and, except in a few minor points, I have left this to be done by each juvenile reader for himself, supposing the case that he should ever find reason in his own professional experience. The terms _larboard_ and _starboard_ are both left in use throughout the book, although the former has long been replaced by the word port--which, in my time, was chiefly confined to the helm, when the resemblance of sound would always have been dangerous at a sudden emergency. The cry "All larbowlins ahoy!" no longer is added to the summons that rouses the sleepy watch below. But after everything is said, the main realities of sea-life continue to be what they were. There is constant truth in those grand words known to us all: Thy shores are empires, changed in all save Thee-- * * * * * Unchangeable, save to thy wild waves' play, Time writes no wrinkle on thine azure brow. The strangeness of foreign sights and tropical wonders has not altered; nor the thrill of excitement amid tempest; wind and weather are no-way different; the sailor feels as much pride as ever in his ship's good qualities; the occasion of danger still brings out his manhood; hearts-of-oak will always be ready to man our floating bulwarks so long as Britain remains. If it were only in order to express a hearty belief in this, I am glad to have had the opportunity afforded by the few words prefixed to a fresh edition of "The Green Hand." And to all you young readers who must ere long embark upon the troubled sea of life, success and a good voyage to you is the cordial wish of your sincere friend, THE AUTHOR. _Edinburgh, August 31, 1878._ CONTENTS PAGE CHAPTER I 1 CHAPTER II 19 CHAPTER III 38 CHAPTER IV 58 CHAPTER V 69 CHAPTER VI 79 CHAPTER VII 89 CHAPTER VIII 98 CHAPTER IX 109 CHAPTER X 125 CHAPTER XI 135 CHAPTER XII 162 CHAPTER XIII 170 CHAPTER XIV 188 CHAPTER XV 203 CHAPTER XVI 218 CHAPTER XVII 234 CHAPTER XVIII 248 CHAPTER XI 260 CHAPTER XX 270 CHAPTER XXI 290 CHAPTER XXII 310 CHAPTER XXIII 328 CHAPTER XXIV 346 CHAPTER XXV 357 CHAPTER XXVI 372 CHAPTER XXVII 390 CHAPTER XXVIII 401 CHAPTER XXIX 413 CHAPTER XXX 420 CHAPTER XXXI 429 CHAPTER XXXII 436 THE GREEN HAND CHAPTER I "Ah! Come, old ship, give us a yarn!" said the younger forecastlemen to an old one, on board of an Indiaman then swiftly cleaving the waves of the western Atlantic before the trade-wind, and outward-bound, with a hearty crew and a number of passengers. It was the second of the two dog-watches; and, the ship being still in the region of evening twilights, her men, in a good humour and with leisure, were then usually disposed, as on this occasion, to make fast their roaming thoughts by help of a good yarn, when it could be got. There were plenty of individuals, amongst a crew of forty, calculated by their experience, or else by their flow of spirits and fancy, to spin it. Each watch into which they were divided had its especial story-teller, with whose merits it twitted the other, and on opportunity of a general reunion, they were pitted against one another like two fighting-cocks. The one was a grave, solemn, old North-Sea whaler, with one eye, who professed to look down with contempt upon all raw head-work, on navigation compared with seamanship, and fiction against fact. As for himself, he rested all his fame upon actual experience, and told long dry narratives of old shipmates, of his voyages and adventures, and sometimes of the most incredible incidents, with a genuine briny gusto, which pleased the veteran stagers beyond expression. They were full of points of seamanship--expedients for nice emergencies, tacks, knots, and splices; he gave the very conversation of his characters, with all the "says he" and "says I"; and one long recital of the old fellow's turned upon the question between himself and a new-fangled second-mate, about the right way to set up back-stays, in which he, the sailor, was proved correct by the loss of the ship. The other story-teller, again, was a Wapping man; a lively, impudent young Cockney, who had the most miraculous faculty of telling lies--not only palpable lies, but lies absolutely impossible; yet they were so sublimely told often, and he contrived to lug into them such a quantity of gorgeous tinsel ornament, as, in his happier efforts, decidedly to carry the day against his opponent. The London hand had seen _life_ too, of which, with respect to what is called the world, his competitor was as ignorant as a child. He had his sentimental vein, accordingly, in which he took the last love-tale out of some "Penny Story-Teller" or fashionable novel he had spelled over below, and made of it a parody that would have thrown its unfortunate author into convulsions of horror, and his critics into shrieks of laughter. The fine language of lords and ladies, of romantic heroines, or of foreign counts and bandits, was gravely retailed, and gravely listened to by a throng of admiring jack-tars; while the old whaler smoked his pipe sulkily apart, gave now and then a scornful glance out of his weather-eye, and called it "all _high-dic'_ and soger's gammon." On this occasion, however, the group for'ard did not solicit the services of either candidate, as they happened to have present among them a shipmate who, by general confession, "took the shine" out of both, although it was rarely they could get hold of him. "Old Jack," the captain's private steward, was the oldest seaman on board, and having known the captain when the latter went to sea, had sailed with him almost ever since he commanded a ship, as well as lived in his house on shore. He did not now keep his watch, nor take his "trick at the helm," except when he chose, and was altogether a privileged sort of person, or one of "the idlers." His name was Jacobs, which afforded a pretext for calling him "Old Jack," with the sailor's fondness for that Christian cognomen, which it is difficult to account for, unless because Jonah and St John were seafaring characters, and the Roman Catholic holy clerk St Nicholas was baptised "Davy Jones," with sundry other reasons good at sea. But Old Jack was, at any rate, the best hand for a yarn in the _Gloucester_ Indiaman, and had been once or twice called upon to spin one to the ladies and gentlemen in the cuddy. It was partly because of his inexhaustible fund of good-humour, and partly from that love of the sea which looked out through all that the old tar had seen and undergone, and which made him still follow the bowsprit, although able to live comfortably ashore. In his blue jacket, his white canvas trousers edged with blue, and glazed hat, coming forward to the galley to light his pipe, after serving the captain's tea of an evening, Old Jack looked out over the bulwarks, sniffed the sharp sea-air, and stood with his shirt-sleeve fluttering as he put his finger in his pipe, the very embodiment of the scene--the model of a prime old salt who had ceased to "rough it," but could do so yet if needful. "Come, old ship!" said the men near the windlass, as soon as Old Jack came forward, "give us a yarn, will ye?" "Yarn!" said Jack, smiling--"what yarn, mates? 'Tis a fine night, though, for that same--the clouds flies high, and she's balling off a good ten knots sin' eight bells." "That she is, bo'--so give us a yarn now, like a reg'lar old A1, as you are!" said one. "'Vast there, mate," said a man-o'-war's-man, winking to the rest--"you're always a-cargo-puddling, Bill! D'ye think Old Jack answers to any other hail nor the Queen's? I say, old three-decker in or'nary, we all wants one o' your close-laid yarns this good night. Whaling Jim here rubs his down with a thought overmuch o' the tar, an' young Joe dips 'em in yallow varnish--so if you says nay, why, we'll all save our grog, and get slewed as soon as may be." "Well, well, mates," said Jack, endeavouring to conceal his flattered feelings, "what's it to be, though?" "Let's see," said the man-o'-war's-man--"ay, give us the Green Hand!" "Ay, ay, the Green Hand!" exclaimed one and all. This "Green Hand" was a story Old Jack had already related several times, but always with such amusing variations, that it seemed on each repetition a new one--the listeners testifying their satisfaction by growls of rough laughter, and by the emphatic way in which, during a pause, they squirted their tobacco-juice on the deck. What gave additional zest to this particular yarn, too, was the fact of its hero being no less than the captain himself, who was at this moment on the poop quarter-deck of the ship, pointing out something to a group of ladies by the round-house--a tall good-looking man of about forty, with all the mingled gravity and frank good-humour of a sailor in his firm weather-tinted countenance. To have the power of secretly contrasting his present position and manners with those delineated by Old Jack's episode from the "skipper's" previous biography, was the _acme_ of comic delight to these rude sons of Neptune, and the narrator just hit this point. "Ye see," began he, "'tis about six-an'-twenty year gone since I was an able seaman before the mast, in a small Indyman they called the _Chester Castle_, lying at that time behind the Isle of Dogs in sight of Grennidge Hospital. She was full laden, but there was a strong breeze blowing up that wouldn't let us get under weigh; and, besides, we waited for the most part of our hands. I had sailed with the same ship two voyages before; so, says the captain to me one day, 'Jacobs, there's a lady over at Greenwich yonder wants to send her boy to sea in the ship--for a sickening I s'pose. I'm a-going up to town myself,' says he, 'so take the small quarter-boat and two of the boys, and go ashore with this letter, and see the young fool. From what I've heard,' says the skipper, 'he's a jackanapes as will give us more trouble than thanks. However, if you find the lady's bent on it, why she may send him aboard to-morrow if she likes. Only we don't carry no young gentlemen, and if he slings his hammock here, you must lick him into shape. I'll make a sailor of him, or else a cabin boy.' 'Ay, ay, sir,' says I, shoving the letter into my hat; so in half-an-hour's time I knocks at the door of the lady's house, rigged out in my best, and hands over the screed to a fat fellow with red breeches and yaller swabs on his shoulders, like a captain of marines, that looked frightened at my hail, for I thou't he'd been deaf by the long spell he took before he opened the door. In five minutes I hears a woman's v'ice ask at the footman if there was a sailor a-waiting below. 'Yes, marm,' says he; and 'show him up,' says she. Well, I gives a scrape with my larboard foot, and a tug to my hair, when I gets to the door of _sich_ a fine room above decks as ever you see, all full o' tables, an' chairs, an' sofers, an' piangers, an' them sort o' high-flying consarns. There was a lady all in silks and satins on one of the sofers, dressed out like a widow, with a pretty little girl as was playing music out of a large portmankey--and a picter of a man upon the wall, which I at once logged it down for his as she'd parted company from. 'Sarvint, marm,' says I. 'Come in, my good man,' says the lady. 'You're a sailor?' says she--asking, like, to be sure if I warn't the cook's mate in dish-guise, I fancy. 'Well, marm' I raps out, 'I make bould to say as I hopes I am!'--an' I catches a sight o' myself in a big looking-glass behind the lady, as large as our sky-sail--and, being a young fellow in them days, thinks I, 'Blow me, if Betsy Brown axed me that now, I'd up an' hax her if _she_ war a _woman_!' 'Well,' says she, 'Captain Steel tells me, in this here letter, he's a-going to take my son. Now,' says she, 'I'm sore against it----couldn't you say some'at to turn his mind?' 'The best way for that, yer ladyship,' says I, 'is for to let him go, if it was only the length of the Nore. The sea'll turn his stomich for him, marm,' I says, 'an' then we can send him home by the pilot.' 'He wanted for to go into the navy,' says the lady again, 'but I couldn't think on that for a moment, on account of this here fearful war; an', after all, he'll be safer in sailing at sea nor in the army or navy--doesn't you think so, my good man?' 'It's all you knows about it,' thinks I; hows'ever, I said there wasn't a doubt on it. 'Is Captain Steel a rash man?' says she. 'How so, marm?' says I, some'at taken aback. 'I hope he does not sail at night, or in storms, like too many of his profession, I'm afeard,' says she; 'I hope he always weighs the anchor in such cases, very careful.' 'Oh, in course,' says I, not knowin', for the life of me, what she meant. I didn't like to come the rig over the poor lady, seein' her so anxious like; but it was no use, we was on such different tacks, ye see. 'Oh yes, marm,' I says, 'Captain Steel al'ays reefs taups'ls at sight of a squall brewing to wind'rd; and then we're as safe as a church, ye know, with a man at the wheel as knows his duty.' 'This relieves my mind,' the lady says, 'wery much'; but I couldn't think why she kept sniffing all the time at her smelling-bottle, as she wor agoin' to faint. 'Don't take it to heart so, yer ladyship,' I says at last; 'I'll look after the young gentleman till he finds his sea-legs.' 'Thank you,' says she; 'but I beg your parding, would ye be kind enough for to open the winder, and look out if you see Edward? I think he's in the garding--I feel sich a smell of pitch and tar!' I hears her say to the girl! and says she to me again, 'Do you see Edward there?--give a call to him, please. Accordently, I couldn't miss sight of three or four young slips alongside, for they made plenty of noise--one of 'em on top of a water-barrel smoking a sea-gar; another singing out inside of it for mercy; and the rest roaring round about it, like so many Bedlamites. 'No wonder the young scamp wants off to sea,' thinks I, 'he's got nothin' arthly to do but mischief.' 'Which be's the young gentleman, marm?' says I, lookin' back into the room--'is it him with the sea-gar and the red skull-cap?' 'Yes,' says the lady--'call him up, please.' 'Hallo!' I sings out, and all runs off but him on the barrel, and 'Hallo!' says he. 'You're wanted on deck here, sir,' I says; and in five minutes in comes my young gemman, as grave as you please. 'Edward,' says his mother, 'this is one of Captain Steel's men.' 'Is he going to take me?' says the young fellow, with his hands in his pockets. 'Well, sir,' I says, ''tis a very bad look-out, is the sea, for them as don't like it. You'll be sorry ten times over you've left sich a berth as this here, afore you're down Channel.' The young chap looks me all over from clue to earing, and says he, 'My mother told you to say that!' 'No, sir,' says I, 'I says it on my own hook.' 'Why did you go yourself, then?' says he. 'I couldn't help it,' answers I. 'Oh,' says the impertinent little beggar, 'but you're only one of the common sailors, ain't you?' 'Split me!' thinks I, 'if I doesn't show you the odds betwixt a common sailor, as ye call it, and a lubber of a boy, before long!' But I wasn't goin' to let him take the jaw out o' me, so I only laughed, an' says I, 'Why, I'm captain of the foretop at sea, anyhow.' 'Where's your huniform, then?' says the boy, lowering his tone a bit. 'Oh,' I says, 'we doesn't al'ays wear huniform, ye know, sir. This here's what we call ondress.' 'I'm sorry, sir,' says the lady, 'I didn't ax you to sit down.' 'No offence at all, marm,' I says, but I took a couple o' glasses of brandy as was brought in. I saw 'twas no use goin' against the young chap; so, when he asked what he'd have to do aboard, I told him nothing to speak of, except count the sails now and then, look over the bows to see how the ship went, and go aloft with a spy-glass. 'Oh,' says his mother at this, 'I hope Captain Steel won't never allow Edward to go up those dangerous ladders! It is my pertic'lar request he should be punished if he does.' 'Sartinly, marm, I'll mention it to the captain,' I says, 'an' no doubt he'll give them orders as you speak on. The captain desired me to say the young gentleman could come aboard as soon as he likes,' says I before goin' out of the door. 'Very well, sir,' says the lady, 'I shall see the tailor this same arternoon, and get his clothes, if so be it must.' The last word I said was, I puts my head half in again to tell 'em, 'There was no use gettin' any huniforms at present, seein' the ship's sailmaker could do all as was wanted arterwards, when we got to sea.' "Well, two or three days after, the captain sent word to say the ship would drop down with the morning tide, and Master Collins had better be aboard by six o'clock. I went ashore with the boat, but the young gemman's clothes warn't ready yet; so it was reg'lar made up he was to come on board from Gravesend the day after. But his mother and an old lady, a friend of theirs, would have it they'd go and see his bedroom, and take a look at the ship. There was a bit of a breeze with the tide, and the old Indyman bobbed up and down on it in the cold morning; you could hear the wash of the water a-poppling on to her counter, with her running-gear blown out in a bend; and Missus Collins thought they'd never get up the dirty black sides of the vessel, as she called 'em. The other said her husband had been a captain, an' she laid claim to a snatch of knowledge. 'Sailor,' says she to me, as we got under the quarter, 'that there tall mast is the main-bowsprit, ain't it? and that other is the gallant bowling you call it, don't you?' says she. 'No doubt, marm,' says I, winking to the boys not to laugh. 'It's all right,' I says. Howsoever, as to the bedroom, the captain showed 'em over the cabin, and put 'em off by saying the ship was so out of order he couldn't say which rooms was to be which yet, though they needn't fear Master Ned would get all comfortable; so ashore the poor woman went, pretty well pleased, considerin' her heart was against the whole consarn. "Well, the next afternoon, lying off Gravesend, out comes a wherry with young master. One of the men said there was a midshipman in it. 'Midshipman be blowed!' says I; 'did ye ever see a reefer in a wherry, or sitting anywheres out o' the starn-sheets? It's neither more nor less nor this precious greenhorn as we've got.' 'Why don't the bo'sun pipe to man side-ropes for him?' says t'other; but, 'my eye, Bob,' says he to me, 'what a sight of traps the chap's got in the boat!--'twill be enough to heel the _Chester Castle_ to the side he berths upon, on an even keel. Do he mean to have the captain's cabin, I wonder!' Up the side he scrambles, with the help of a side-ladder, all togged out to the nines in a span-new blue jacket and anchor buttons, a cap with a gould band, and white ducks made to fit--as jemmy-jessamy a looking fellow as you'd see of a cruise along London parks--with the waterman singing out alongside to send down a tackle for the dunnage, which it took a pair of purchase-blocks to hoist them out on board. 'What's all this?' says the mate, coming for'ard from the quarter-deck. ''Tis the young gemman's traps, sir,' I says. Says the mate, 'D'ye think we've got spare room to stow all this lumber? Strike it down into the fore-hold, Jacobs--and get out a old blue shirt or two, and a Scotch cap, for the young whelp first, if he wants to save that smooth toggery of his for his mammy. You're as green as cabbage, I'm feared, my lad!' says he. By this time the boy was struck all of a heap, an' didn't know what to say when he saw the boat pulling for shore, except he wanted to have a sight of his bedroom. 'Jacobs,' says the mate, laughing like an old bear, 'take him below, and show him his bedroom, as he calls it!' So down we went to the half-deck, where the carpenter, bo'sun, and three or four of the 'prentices, had their hammocks slung. There I leaves him to overhaul his big donkey of a chest, which his mother had stowed it with clothes enough for a lord ambassador, but not a blessed thing fit to use--I wouldn't 'a given my bit of a black locker for the whole on it, ten times over. There was another choke-full of gingerbread, pots o' presarves, pickles, and bottles; and, thinks I, 'The old lady didn't know what _shares_ is at sea I reckon. 'Twill all be gone for footing, my boy, before you've seen blue water, or I'm a Dutchman.' "In a short time we was up anchor, going down with a fast breeze for the Nore; and we stood out to sea that night, having to join a convoy off Spithead. My gentleman was turned in all standing, on top o' some sails below; and next day he was as sick as a greenhorn could be, cleaning out his land-ballast where he lay, nor I didn't see him till he'd got better. 'Twas blowing a strong breeze, with light canvas all in aloft, and a single reef in the tops'ls; but fine enough for the Channel, except the rain--when what does I see but the 'Green Hand' on the weather quarter-deck, holding on by the belaying pins, with a yumbereller over his head. The men for'ard was all in a roar, but none of the officers was on deck save the third mate. The mate goes up to him, and looks in his face. 'Why,' says he, 'you confounded longshore, picked-up son of a greengrocer, what _are_ you after?' an' he takes the article a slap with his larboard-flipper, as sent it flying to leeward like a puff of smoke. 'Keep off the quarter-deck, you lubber,' says he, giving him a wheel down into the lee-scuppers--'it's well the captain didn't catch ye! Come aft here, some of ye,' sings out the third mate again, 'to brace up the main-yard; and you, ye lazy beggar, clap on this moment and pull!' At this the greenhorn looks round doubtful, like, then at last he takes out a pair o' double gloves, shoves his fingers into 'em, and tails on to the rope behind. 'Well!' says the mate, 'if I ever see the likes o' that! Jacobs, get a tar-bucket and dip his fists in it; larn him what his hands were made for! I never could a-bear to see a fellow ashore with his flippers shoed like his feet; but at sea, confound me, it would make a man green-sick over again.' If you'd only seen how Master Collins looked when I shoved his missy fingers into the tar, and chucked them gloves o'board! The next moment he ups fist and made a slap at me, when in goes the brush in his mouth; the mate gives him a kick astarn; and the young chap went sprawling down into the half-deck ladder, where the carpenter had his shavin'-glass rigged to crop his chin--and there he gets another clip across the jaws from Chips. 'Now,' says the mate, 'the chap'll be liker a sailor to-morrow. He's got some spunk in him, though, by the way he let drive at you, my lad,' says he; 'that fellow'll either catch the cat or spoil the monkey. Look after him, Jacobs, my lad,' says the third mate; 'he's in my watch, and the captain wants him to rough it out; so show him the ropes, and let him taste an end now an' then. Ha, ha, ha!' says he, again, laughing, ''tis the first time I ever see a embrella loosed out at sea, and but the second I've seen brought aboard even. He's the greenest hand, sure enough, it's been my luck to come across! But green they say's nigh to blue, so look out if I don't try to make a sailor of the young spark!' "Well, for the next three or four days the poor fellow was knocked about on all hands; he'd got to go aloft to the 'gallant cross-trees, and out on the yard foot-ropes the next morning, before breakfast; and, coming down, in course, ye know, the men made him fast till he sent down the key of his bottle-chest to pay his footing. If he closed his eyes a moment in the watch, slash comes a bucketful o' Channel water over him. The third mate would keep him two hours on end, larnin' to rig out a sterns'l boom, or grease a royal mast. He led a dog's life of it, likewise, in the half-deck; bein' last come, in course, he had al'ays to go and fill the bread-barge, scrub the planks, an' do all the dirty jobs. Them _owners' 'prentices_, sich as he had for messmates, is always worse to their own kind by far nor the '_comming sailors_,' as the longshore folks calls a foremast-man. I couldn't help takin' pity on the poor lad, bein' the only one as had known the way of his upbringing, and I feels a sort of a charge of him like; so one night I gets a quiet spell with him in the watch, an' as soon 's I fell to speak kind-ways, there I seed the water stand i' the boy's eyes. 'It's a good thing,' says he, tryin' to gulp it down--'it's a goo--good thing mother don't see all this!' 'Ho, ho!' says I, 'my lad, 'tis all but another way of bein' sea-sick! You doesn't get the land cleared out, and sniff the blue breeze nat'ral like, all at once! Hows'ever, my lad,' says I, 'take my advice--bring your hammock an' chest into the foc'sle; swap half your fine clothes for blue shirts and canvas trousers; turn to, ready and willing, an' do all that's asked you--you'll soon find the differings betwixt the men and a few petty officers an' 'prentices half out their time. The men'll soon make a sailor of you; you'll see what a seaman is; you'll larn ten times the knowledge; an', add to that, you'll not be browbeat and looked jealous on!' "Well, next night, what does he do but follers what I said, and afore long most of his troubles was naterally over; nor there wasn't a willin'er nor a readier hand aboard, and every man was glad to put Ned through anything he'd got to do. The mates began to take note on him; and though the 'prentices never left off calling him the Green Hand, before we rounded the Cape he could take his wheel with the best of them, and clear away a sternsail out of the top in handsome style. We were out ten months, and Ned Collins stuck to the foc'sle throughout. When we got up the Thames, he went ashore to see his mother in a check shirt and canvas trousers made out of an old royal, with a tarpaulin hat I built for him myself. He would have me to come the next day over to the house for to have a supper; so, havin' took a kindness to the young chap, why, I couldn't say nay. There I finds him in the midst of a lot o' soft-faced slips and young ladies, a spinning the wonderfullest yarns about the sea and the East Ingees, makin' em swallow all sorts of horse-marines' nonsense, about marmaids, sea-serpents, and sich like. 'Hallo, my hearty!' says he, as soon as he saw me, 'heave a-head here, and bring to an anchor in this here blessed chair. Young ladies,' says he, 'this is Bob Jacobs, as I told you kissed a marmaid hisself. He's a wonderful hand, is Bob, for the fair ones!' You may fancy how flabbergasted I was at this, though the young scamp was as cool as you please, and wouldn't ha' needed much to make him kiss 'em all round; but I was al'ays milk-and-water alongside of women, if they topped at all above my rating. 'Well,' thinks I, 'my lad, I wouldn't ha' said five minutes agone, there was anything of the green about ye yet, but I see 'twill take another voy'ge to wash it all out.' For to my thinkin', mates, 'tis more of a land-lubber to come the rig over a few poor creaters that never saw blue water, than not to know the ropes you warn't told. 'Oh, Mister Jacobs!' says Missus Collins to me that night, before I went off, 'd'ye think Edward is tired of that 'ere horridsome sea yet?' 'Well, marm,' I says, 'I'm afeared not. But I'll tell ye, marm,' says I, 'if you wants to make him cut the consarn, the only thing ye can do is to get him bound apprentice to it. From what I've seen of him, he's a lad that won't bear aught again his liberty; an' I do believe, if he thought he couldn't get free, he'd run the next day!' Well, after that, ye see, I didn't know what more turned up of it; for I went round to Hull, myself, and ships in a timber-craft for the Baltic, just to see som'at new. "Now, one day, the third voy'ge from that time, no sooner does we get up to Blackwall than we hears of a strong press from the men-o'-war; and as I'd got a desperate mislike to the sarvice, there was a lot of us marchantmen kept stowed away close in holes an' corners till we could suit ourselves. At last we got well tired, and a shipmate o' mine and I wanted to go and see our sweethearts over in the town. So we hired the slops from a Jew, and makes ourselves out to be a couple o' watermen, with badges to suit, a-carrying of a large parcile and a ticket on it. In the afternoon we came back again within sight of the Tower, where we saw the coast was clear, and makes a fair wind along Rosemary Lane and Cable Street. Just then we saw a tall young fellow, in a brown coat, an' a broad-brim hat, a-standing in the door of a shop, with a paper under his arm, on the look-out for someone. 'Twig the Quaker, Bob!' my shipmate says to me. As soon as he saw us, out the Quaker steps, and says he to Bill, in a sleepy sort of a v'ice, 'Friend, thou'rt a waterman, I b'lieve?' 'Yes,' says Bill, with an oath, 'that's what we hails for. D'ye want a boat, master?' 'Swear not, friend,' says the broad-brim; 'but what I want is this, you see. We have a large vessel, belonging to our house, for to send to Havannah, and willin' to give double wages, but we can't find any marineers at this present time for to navigate. Now,' says he, 'I s'pose this onfortunate state o' things is on account of the sinful war as is a-goin' on--they're afraid of the riskses. Hows'ever, my friends,' says he, 'perhaps, as you knows the river, thee could put us upon a way of engagin' twenty or more bold marineers, as is not afeared of venturing for good pay?' and with this he looks into his papers; and says Bill, 'Well, sir, I don't know any myself--do you, Bob?' and he gives me a shove, and says under the rose, 'No fear, mate,' says Bill, 'he's all over green--don't slip the chance for all hands of us at Jobson's.' 'Why, master,' I says, 'what 'ud ye give them marineers you speaks on, now?' 'Four pound a month, friend,' says he, looking up; 'but we gives tea in place of spirits, and we must have steady men. We can't wait, neither,' says he, 'more nor three days, or the vessel won't sail at all.' 'My eye!' says Bill, ''twon't do to miss, Bob!--stick to him, that's all.' 'Well, sir,' I says, 'I thinks I does have a notion of some'at of the sort. If you sends your papers to Jobson's Tavern to-night, second lane 'twixt Barnaby Street and the Blue Anchor Road, over the water, why, I might get ye as many hands for to sign as you wants.' 'Thanks, friend,' says the young broad-brim, 'I will attend to thine advice.' So he bids us good-day, and stepped into his door again. 'Bill,' says I, as we went off, 'now I think on it, I can't help a notion I've seen that chap's face afore.' 'Very like,' says Bill; 'for the matter o' that, 'tis the same with me--them broad-brims is so much of a piece. But that 'ere fellow don't know nothin' of ships, sure enough, or he wouldn't offer what he did, and the crimps' houses all of a swarm with hands!' "'Take my word, mate,' says I, 'it's a paying trip, or he wouldn't do it--leave a Quaker alone for that. Why, the chap's a parfit youngster, but I am blessed if he don't look as starched as if he'd sat over a dask for twenty year!' "Well, strike me lucky, mates all, if the whole affair warn't a complete trap! Down comes a clerk with the papers, sure enough; but in ten minutes more the whole blessed lot of us was puckalowed, and hard an' fast, by a strong press-gang. They put us into a cutter off Redriff Stairs, and the next noon all hands was aboard of the _Pandora_ frigate at Sheerness. The first time of being mustered on deck, says Bill to me, 'Cuss my eyes, Bob, if there isn't the 'farnal Quaker!' I looked, and sees a midshipman in uniform like the rest, and so it was. 'The sly, soft-sawderin' beggar!' says I. 'All fair in war, and a press, mate!' says one o' the frigate's men. All the while I kept looking and looking at the midshipman; and at last I says to Bill when we got below, giving a slap to my thigh, 'Blessed if it ain't! It's the _Green Hand_ himself!' 'Green Hand!' says Bill, sulky enough, 'who's the Green Hand? Blow me, Bob, if I don't think we're the green hands ourselves, if that's what you're upon!' So I told him the story about Ned Collins. 'Well,' says he, 'if a fellow was green as Chinee rice, cuss me if the reefers' mess wouldn't take it all out on him in a dozen watches. The softest thing I know, as you say, Bob, just now, it's to come the smart hand when you're a lubber; but to sham green after that style, ye know, why, it is a mark or two above either you or I, messmate. So, for my part, I forgives the young scamp, 'cause I ought to ha' known better.' "By the time the frigate got to sea the story was blowed over the whole main-deck; many a good laugh it gived the different messes; and Bill, the midshipman, and me, got the name of the 'Three Green Hands.' "One middle-watch Mister Ned comes for'ard by the booms to me, and says he, 'Well, Bob Jacobs, you don't bear a grudge, I hope?' 'Why,' says I, 'Mister Collins, 'twould be mutiny now, I fancy, you being my officer.' So I gave a laugh; but I couldn't help feelin' hurt a little, 'twas so like a son turnin' against his father, as 'twere. 'Why, Bob,' says he, 'did ye think me so green as not to know a seaman when I saw him? I was afeared you'd know me that time.' 'Not I, sir,' I answers; 'why, if we hadn't sailed so long in company, I wouldn't know ye now!' So Master Ned gived me to understand it was all for old times he wanted to ship me in the same craft; but he knew my misliking to the sarvice, though he said he'd rather ha' lost the whole haul of 'em nor myself. So many a yarn we had together of a dark night, and for a couple of years we saw no small sarvice in the _Pandora_. But if ye'd seen Ned, the smartest reefer aboard, and the best liked by the men, in the fore-tops'l bunt in a gale, or over the main-deck hatch, with an enemy's frigate to leeward, or on a spree ashore at Lisbon or Naples, you wouldn't ha' said there was anything green in his eye, I warrant ye! He was made acting-leftenant of a prize he cut out near Chairboorg, before he passed examination; so he took me for his prize-bo'sun, and carried her into Plymouth. Soon after that the war was ended, and all hands of the _Pandora_ paid off. Master Ned got passed with flying colours, and confirmed leftenant besides, but he had to wait for a ship. He made me say where I'd be found, and we parted company for about a year. "Well, I was come home from a short trip, and one day Leftenant Collins hunts me up at Wapping Docks, where I'd had myself spliced, six years before, to Betsy Brown, an' was laid up for a spell, having seen a good deal of the sea. Ye must know the young leftenant was fell deep in love with a rich Indy naboob's daughter, which had come over to take her back to the East Ingees. The old fellow was hard close-hauled again the match, notwithstanding of the young folks makin' it all up; so he'd taken out berths aboard of a large company's ship, and bought over the captain on no account to let any king's navy man within the gangways, nor not a shoulder with a swab upon it, red or blue, beyond the ship's company. But, above all, the old tyrant wouldn't have a blue-jacket, from stem to starn, if so be he'd got nothing ado but talk sweet; I s'pose he fancied his girl was mad after the whole blessed cloth. The leftenant turns over this here log to me, and, says he, 'I'll follow her to the world's end, if need be, Bob, and cheat the old villain!' 'Quite right, too, sir,' says I. 'Bob,' says he,' I'll tell you what I wants you for to do. Go you and enter for the _Seringapatam_ at Blackwall, if you're for sea just now; I'm goin' for to s'cure my passage myself, an' no doubt doorin' the voy'ge something'll turn up to set all square; at any rate, I'll stand by for a rope to pull!' 'Why, here's a rum go!' thinks I to myself. 'Is Ned Collins got so green again, spite of all that's come and gone, for to think the waves is a-goin' to work wonders, or ould Neptune under the line's to play the parson and splice all!' 'Well, sir,' I says, 'but don't you think the skipper will smoke your weather-roll, sir, at sea, as you did Bill Pikes an' me, you know, sir?' says I. 'Oh, Bob, my lad,' says the leftenant, 'leave you that to me. The fellow most onlikest to a sailor on the Indyman's poop will be me, and that's the way you'll know me.' "Well, ship I does with the _Seringapatam_ for Bombay--plenty of passengers she had; but only clerks, naboobs, old half-pay fellows, and ladies, not to speak o' children and nurses, black and white. She sailed without my seein' Leftenant Collins, so I thought I was to hear no more on it. When the passengers began to muster on the poop, by the time we got out o' Channel, I takes a look over the ladies, in coilin' up the ropes aft, or at the wheel; I knowed the said girl at once by her good looks, and the old fellow by his grumpy, yallow frontispiece. All on a sudden I takes a note of a figger coming up from the cuddy, which I made out at once for my Master Ned, spite of his wig and a pair o' high-heeled boots, as gave him the walk of a chap a-treading amongst eggs. When I hears him lisp out to the skipper at the round-house if there was any fear of wind, 'twas all I could do to keep the juice in my cheek. Away he goes up to windward, holding on by everything, to look over the bulwarks behind his sweetheart, givin' me a glance over his shoulder. At night I see the two hold a sort of collogue abaft the wheel, when I was on my trick at the helm. After awhile there was a row got up amongst the passengers, with the old naboob and the skipper, to find out who it was that kept a-singing every still night in the first watch, alongside of the ladies' cabin, under the poop. It couldn't be cleared up, hows'ever, who it was. All sorts o' places they said it comed from--mizzen-chains, quarter-galleries, lower-deck ports, and davit-boats. But what put the old hunks most in a rage was, the songs was every one on 'em such as 'Rule Britannia,' 'Bay of Biscay,' 'Britannia's Bulwarks,' and 'All in the Downs.' The captain was all at sea about it, and none of the men would say anything, for by all accounts 'twas the best pipe at a sea-song as was to be heard. For my part, I knowed pretty well what was afloat. One night a man comed for'ard from the wheel, after steering his dog-watch out, and 'Well, I'm blessed, mates,' says he on the foc'sle, 'but that chap aft yonder with the lady--he's about the greenest hand I've chanced to come across. What d'ye think I hears him say to old Yallow-chops an hour agone?' 'What was it, mate?' I says. 'Says he, "Do you know, Sar Chawls, is the hoshun reelly green at the line--_green_ ye know, Sar Chawls, _reelly_ green?" "No, sir," says the old naboob, "'tis blue." "Whoy, ye don't sa--ay so!" says the young chap, pullin' a long face.' 'Why, Jim,' another hand drops in, 'that's the very chap as sings them first-rate sea-songs of a night. I seed him myself come out o' the mizzen-chains!' 'Hallo!' says another at this, 'then there's some'at queer i' the wind! I _thought_ he gave rather a weather-look aloft, comin' on deck i' the morning. I'll bet a week's grog that chap's desarted from the king's flag, mates!' Well, ye know, hereupon I couldn't do no less nor shove in my oar, so I takes word from all hands not to blow the gaff,[1] an' then gives 'em the whole yarn to the very day, about the Green Hand--for somehow or another I was al'ays a yarning sort of a customer. As soon as they heard it was a love consarn, not a man but swore to keep a stopper on his jaw; only, at findin' out he was a leftenant in the Royal Navy, all hands was for touching hats when they went past. [1] Let out the secret. "Hows'ever, things went on till we'd crossed the line a good while; the leftenant was making his way with the girl at every chance. But, as for the old fellow, I didn't see he was a fathom the nearer with _him_; though, as the naboob had never clapped eyes on him to know him like, 'twan't much matter before heaving in sight o' port. The captain of the Indyman was a rum, old-fashioned codger, all for plain sailing and old ways--I shouldn't say overmuch of a smart seaman. He read the sarvice every Sunday, rigged the church an' all that, if it was anything short of a reef-taups'l breeze. 'Twas queer enough, ye may think, to hear the old boy drawling out, 'As 'twas in the beginning--'then, in the one key, 'Haul aft the mainsheet----' 'is now, and ever shall be----' 'Small pull with the weather brace----' 'Amen----' 'Well the main-yard----' 'The Lord be with you----' 'Taups'l yard well!' As for the first orficer, he was a dandy, know-nothing young blade, as wanted to show off before the ladies; and the second was afraid to call the nose on his face his own, except in his watch; the third was a good seaman, but ye may well fancy the craft stood often a poor chance of being rightly handled. "'Twas one arternoon watch, off the west coast of Africay, as hot a day as I ever mind on, we lost the breeze with a swell, and just as it got down smooth, land was made out, low upon the starboard bow, about south-east-and-by-sou', as near as may be. The captain was turned in sick below, and the first orficer on deck. I was at the wheel myself, and I hears him say to the second as how the land breeze would come off at night. A little after, up comes Leftenant Collins, in his black wig and his 'long-shore hat, an' he begins to squint over the starn to nor'west'ard. 'Jacobs, my lad,' whispers he to me, 'how do ye like the looks o' things?' 'Not overmuch, sir,' says I; 'small enough sea-room, leastways for a sky like that 'ere.' Up goes he to the first officer, after a bit. 'Sir,' says he, 'do ye notice how we've risen the land within the last hour and a half?' 'No, sir,' says the first mate. 'What d'ye mean?' 'Why, there's a current here, takin' us inside the point,' says he. 'Sir,' says the Company's man, 'if I didn't know what's what, d'ye think I'd learn it off a gentleman as is so confounded green? There's nothing of the sort,' he says. 'Look on the starboard quarter, then,' says the leftenant, 'at the man-o'-war bird afloat yonder with its wings spread. Take three minutes' look!' says he. Well, the mate did take a minute or two's squint through the mizzen-shroud, and pretty blue he got, for the bird came abreast of the ship by that time. "'It's a underdrift,' says the leftenant, wonderful knowing-like--'though it's nothing on the surfage, look ye, why, with the draught the ship has it's a-taking her along like a tideway, below! Now, d'ye think you'd weather that there point two hours after this, if a gale come on from the nor'-west, sir?' 'Well,' says the first mate, 'I dare say we shouldn't--but what of that?' 'Why, if you'd cruised for six months off the coast of Africa, as I've done,' says the leftenant, 'you'd think there was something ticklish about that white spot in the sky, to nor'-west! But on top o' that, the weather-glass is fell a good bit since four bells.' 'Weather-glass!' the mate says, 'why, that don't matter much in respect of a gale, I fancy.' Ye must understand, weather-glasses wan't come so much in fashion at that time, except in the Royal Navy. 'Sir,' says the mate again, 'mind _your_ business, if you've got any, and I'll mind mine!' 'If I was you,' the leftenant says, 'I'd call the captain.' 'Thank ye,' says the mate--'call the captain for nothing!' Well, in an hour more the land was quite plain on the starboard bow, and the mate comes aft again to Leftenant Collins. The clouds was beginning to grow out of the clear sky astarn too. 'Why, sir,' says the mate, 'I'd no notion you was a _seaman_ at all! What would you do yourself now, supposin' the case you put a little ago?' 'Well, sir,' says Mr Collins, 'if you'll do the thing, I'll put ye up to it at once----'" At this point of Old Jack's story, however, a cabin-boy came from aft, to say that the captain wanted him. The old seaman knocked the ashes out of his pipe, which he had smoked at intervals in short puffs, put it in his jacket pocket, and got up off the windlass end. "Why, old ship!" said the man-o'-war's-man, "are ye goin' to leave us in the lurch with a _short yarn_ again?" "Can't help it, bo'," said old Jack; "orders must be obeyed, ye know," and away he went. "Well, mates," said one, "if the yarn's been overhauled before, what was the upshot of it? I didn't hear it myself." "Blessed if I know," said several--"Old Jack didn't get the length last time he's got now." "More luck!" said the man-o'-war's-man; "'tis to be hoped he'll finish it next time!" CHAPTER II We left the forecastle group of the _Gloucester_ disappointed by the abrupt departure of their story-teller, Old Jack, at so critical a thread of his yarn. As old Jacobs went aft on the quarter-deck, where the binnacle-lamp before her wheel was newly-lighted, he looked in with a seaman's instinct upon the compass-boxes, to see how the ship headed; ere ascending to the poop, he bestowed an approving nod upon his friend the steersman, hitched up his trousers, wiped his mouth with the back of his hand in a proper deference to female society, and then proceeded to answer the captain's summons. The passengers, in a body, had left the grand cabin to the bustling steward and his boys, previously to assembling there again for tea--not even excepting the little coterie of inveterate whist-players, and the pairs of inseparable chess-men, to whom an Indian voyage is so appropriately the school for future nice practice in etiquette, war, and commerce. Everybody had at last got rid of sea-sickness, and mustered for a promenade; so that the lofty poop of the Indiaman, dusky as it was, and exposed to the breeze, fluttered with gay dresses like the midway battlement of a castle by the waves, upon which its inmates have stolen out from some hot festivity. But the long heave from below, raising her stern-end slowly against the western space of clear-obscure, in the manner characteristic of a sea abaft the beam, and rolling her to either hand, exhibited to the eyes on the forecastle a sort of _alto relievo_ of figures, amongst whom the male, in their blank attempts to appear nautical before the ladies, were distinguished from every other object by their variety of ridiculous postures. Under care of one or two bluff, good-humoured young mates--officers polished by previous opportunities of a kind unknown either to Navy-men or mere "cargo-fenders," along with several roguish little quasi-midshipmen--the ladies were supported against the poop-rail, or seated on the after-gratings, where their contented dependence not only saved them from the ludicrous failures of their fellow-passengers, but gained them, especially the young ones, the credit of being better sailors. An accompaniment was contributed to this lively exercise on the part of the gentlemen promenaders, which otherwise in the glimmering sea-twilight, would have been striking in a different sense; by the efforts, namely, of a little band of amateur musicians under the break of the poop, who, with flute, clarionet, bugles, trombone, and violin, after sundry practisings by stealth, had for the first time assembled to play "Rule Britannia." What, indeed, with the occasional abrupt checks, wild flourishes, and fantastic variations caused by the ship's roll; and what with the attitudes overhead, of holding on refractory hats and caps, of intensely resisting and staggering legs, or of sudden pausing above the <DW72> which one moment before was an ascent, there was additional force in the designation quaintly given to such an aspect of things by the foremast Jacks--that of a "cuddy jig." As the still increasing motion, however, shook into side-places this central group of cadets, civilians, and planters adrift, the grander features of the scene predominated: the broad mass of the ship's hull--looming now across and now athwart the streak of sinking light behind--drawn out by the weltering outline of the waters; the entire length of her white decks ever and anon exposed to view, with their parallel lines, their nautical appurtenances, the cluster of hardy men about the windlass, the two or three "old salts" rolling to and fro along the gangway, and the variety of forms blending into both railings of the poop. High out of, and over all, rose the lofty upper outline of the noble ship, statelier and statelier as the dusk closed in about her--the expanse of canvas whitening with sharper edge upon the gloom; the hauled-up clues of the main-course, with their huge blocks, swelling and lifting to the fair wind--and the breasts of the topsails divided by their tightened buntlines, like the shape of some full-bosomed maiden, on which the reef-points heaved like silken fringes, as if three sisters, shadowy and goddess-like, trod in each other's steps towards the deeper solitude of the ocean; while the tall spars, the interlacing complicated tracery, and the dark top-hamper showing between gave graceful unity to her figure; and her three white trucks, far overhead, kept describing a small clear arc upon the deep blue zenith as she rolled: the man at the wheel midway before the doors of the poop-cabin, with the light of the binnacle upon his broad throat and bearded chin, was looking aloft at a single star that had come out beyond the clue of the main-topsail. The last stroke of "six bells," or seven o'clock, which had begun to be struck on the ship's bell when Old Jack broke off his story, still lingered on the ear as he brought up close to the starboard quarter-gallery, where a little green shed or pent-house afforded support and shelter to the ladies with the captain. The erect figure of the latter, as he lightly held one of his fair guests by the arm, while pointing out to her some object astern, still retained the attitude which had last caught the eyes of the forecastle group. The musical cadets had just begun to pass from "Rule Britannia" to "Shades of Evening"; and the old sailor, with his glazed hat in his hand, stood waiting respectfully for the captain's notice. The ladies, however, were gazing intently down upon the vessel's wake, where the vast shapes of the waves now sank down into a hollow, now rose seething up into the rudder-trunk, but all marked throughout with one broad winding track, where the huge body of the ship had swiftly passed. From foaming whiteness it melted into yesty green, that became in the hollow a path of soft light, where the sparks mingled like golden seed; the wave-tops glimmered beyond; star-like figures floated up or sank in their long undulations; and the broad swell that heaped itself on a sudden under the mounting stern bore its bells, and bubbles, and flashes upwards to the eye. When the ship rose high and steady upon it, and one saw down her massy taffrail, it looked to a terrestrial eye rather like some mystic current issuing from the archway under a tall tower, whose foundations rocked and heaved; and so said the romantic girl beside the captain, shuddering at the vividness of an image which so incongruously brought together the fathomless deep and the distant shores of solid old England. The eye of the seaman, however, suggested to him an image more akin to the profession, as he directed his fair companion's attention to the trough of the ship's furrow, where, against the last low gleam of twilight, and by the luminous wake, could be seen a little flock of black petrels, apparently running along it to catch what the mighty ploughshare had turned up; while a grey gull or two hovered aslant over them in the blue haze. As he looked round, too, to aloft, he exchanged glances with the old sailor who had listened--an expression which even the ladies understood. "Ah! Jacobs," said the captain, "get the lamp lighted in my cabin, and the tea-kettle aft. With the roll she has on her, 'twill be more ship-shape there than in the cuddy." "Ay, ay, sir," said the old seaman. "How does she head just now, Jacobs?" "Sou'-west-and-by-south, sir." "She'd lie easier for the ladies though," said the captain, knowing his steward was a favourite with them, "were the wind a point or two less fair. Our old acquaintance, Captain Williamson of the _Seringapatam_ now, Jacobs, old-fashioned as he was, would have braced in his lee-yard only to steady a lady's tea-cup." "Ay, your honour," replied Jacobs, and his weather-eye twinkled, "and washed the foc'sle under, too! But ye know, sir, he'd got a reg'lar-built naboob aboard, and a beauty besides!" "Ah, Mr Jacobs!" exclaimed the romantic young lady, "what was that? Is it one of your stories?" "Well, your ladyship, 'tis a bit of a yarn, no doubt, and some'at of a cur'ous one." "Oh!" said another of the captain's fair _protegees_, "I _do_ love these 'yarns,' as you call them; they are so expressive, so--and all that sort of thing." "Nonsense, my love," said her mother; "you don't understand them, and 'tis better you should not--they are low, and contain a great many bad words, I fear." "But think of the imaginative feeling, aunt," rejoined the other girl, "and the adventures! Oh, the ocean of all places for that! Were it not for sea-sickness, I should dote upon it! As for the _storm_ just now, look how safe we are, and see how the dear old ship rises up from the billows, with all her sails so delightfully mysterious one over another!" "Bless your heart, marm, yes," responded Old Jack, chuckling; "you talks just like a seaman, beggin' your pardon. As consarns the tea, sir, I make bold to expect the'll be a shift o' wind directly, and a slant deck, as soon as we get fair into the stream, rid o' this bit of a bubble the tail of it kicks up hereabouts." "Bear a hand then, Jacobs," said the captain, "and see all right below for the party in the cabin--we shall be down in a few minutes." The captain stood up on the quarter-gallery, to peer round into the dusk and watch the lifting of the main-royal; but the next minute he called to the ladies, and their next neighbours, to look towards the larboard bow, and see the moon rise. A long edge of gray haze lay around the eastern horizon, on which the dark rim of the sea was defined beyond the roll of the waves, as with the sweep of a soft brush dipped in indigo; while to westward it heaved up, weltering in its own watery light against the gloom. From behind this low fringe of vapour was silently diffusing, as it were, a pool of faint radiance, like a brook bubbling from under ice; a thread of silver ran along the line of haze, growing keener at one point, until the arch of the moon shot slowly up, broad and fair: the wave-heads rising between were crested here and there with light; the bow of the ship, the bellies of her fore-canvas, her bowsprit with the jibs hanging idly over it, and the figure-head beneath, were tinged by a gentle lustre, while the hollow shadows stole out behind. The distant horizon, meanwhile, still lay in an obscure streak, which blended into the dark side of the low fog-bank, so as to give sea and cloud united the momentary appearance of one of those long rollers that turn over on a beach, with their glittering crest: you would expect to see next instant what actually seemed to take place--the whole outline plashing over in foam, and spreading itself clearly forward, as soon as the moon was free. With the airy space that flowed from her came out the whole eastern seaboard liquid and distinct, as if beyond either bow of the lifting Indiaman one sharp finger of a pair of compasses had flashed round, drawing a semi-circle upon the dull background, still cloudy, glimmering, and obscure. From the waves that undulated towards her stern, the ship was apparently entering upon a smoother zone, where the small surges leapt up and danced in moonshine, resembling more the current of some estuary in a full tide. To north-westward, just on the skirts of the dark, one wing of a large, soft-grey vapour was newly smitten by the moon-gleam; and over against it on the south-east, where the long fog-bank sank away, there stretched an expanse of ocean which, on its farthest verge, gave out a tint of the most delicate opal blue. The ship, to the south-westward of the Azores, and going large before the trade-wind, was now passing into the great Gulf Stream, which there runs to the south-east; even the passengers on deck were sensible of the rapid transition with which the lately cold breeze became warmer and fitful, and the motion of the vessel easier. They were surprised, on looking into the waves alongside, to perceive them struggling, as it were, under a trailing network of seaweed; which, as far as one could distinctly see, appeared to keep down the masses of water, like so much oil--flattening their crests, neutralising the force of the wind, and communicating a strangely sombre green to the heaving element. In the winding track of the ship's wake the eddies now absolutely blazed; the weeds she had crushed down rose to the surface again in gurgling circles of flames, and the showers of sparks came up seething on either side amongst the stalks and leaves; but as the moonlight grew more equally diffused, it was evident that she was only piercing an arm of that local weed-bed here formed, like an island, in the _bight_ of the stream. Farther ahead were scattered patches and bunches of the true Florida Gulf-weed, white and moss-like; which, shining crisp in the level moonlight, and tipping the surges as it floated past, gave them the aspect of hoary-bearded waves, or the garlanded horses of Neptune. The sight still detained the captain's party on deck, and some of the ladies innocently thought these phenomena indicative of the proximity of land. "I have seldom seen the Stream so distinct hereabouts," said Captain Collins to his first officer, who stood near, having charge of the watch. "Nor I, sir," replied the chief mate; "but it no doubt narrows with different seasons. There goes a flap of the fore-topsail, though! The wind fails, sir." "'Tis only drawing ahead, I think," said the captain; "the stream _sucks_ the wind with its heat, and we shall have it pretty near from due nor'-west immediately." "Shall we round in on the starboard hand, then, sir, and keep both wind and current _aft_?" "I think not, Mr Wood," said the captain. "'Twould give us a good three knots more every hour of the next twenty-four, sir," persisted the officer eagerly--and chief mates generally confine their theories to mere immediate progress. "Yes," rejoined the captain, "but we should lose hold of the 'trade' on getting out of the stream again. I intend driving her across, with the nor'-wester on her starboard beam, so as to lie well up afterwards. Get the yards braced to larboard as you catch the breeze, Mr Wood, and make her course south-west by west." "Very well, sir." "Ladies," said the captain, "will you allow me to hand you below, where I fear Jacobs will be impatient with the tea?" "What a pity, Captain Collins," remarked the romantic Miss Alicia, looking up as they descended the companion--"what a pity that you cannot have that delicious moonlight to shine in at your cabin windows just now; the sailors yonder have it all to themselves." "There is no favour in these things at sea, Miss Alicia," said the captain, smiling. "Jack shares the chance there, at least, with his betters; but I can promise those who honour my poor suite of apartments this evening both fine moonshine and a steadier floor." On reaching the snug little after-cabin, with its swinging lamp and barometer, its side "state-room," seven feet long, and its two stern-windows showing a dark glimpse of the rolling waters, they found the tea-things set, nautical style, on the hard-a-weather, boxed-up table--the surgeon and one or two elderly gentlemen waiting, and old Jacobs still trimming up the sperm-oil lights. Mrs St Clair, presiding in virtue of relationship to their host, was still cautiously pouring out the requisite half-cups, when, above all the bustle and clatter in the cuddy, could be heard the sounds of ropes thrown down on deck, of the trampling watch, and the stentorian voice of the first officer. "Jacobs!" said the captain, a minute or two afterwards; and that worthy factotum instantly appeared from his pantry alongside of the door--from whence, by-the-way, the old seaman might be privy to the whole conversation--"stand by to _dowse_ the lamp when she heels," an order purposely mysterious to all else but the doctor. Everyone soon felt a change in the movement of their wave-born habitation; the rolling lift of her stern ceased; those who were looking into their cups saw the tea apparently take a decided inclination to larboard--as the facetious doctor observed, a "tendency to _port_." The floor gradually sloped down to the same hand, and a long, wild, gurgling wash was suddenly heard to run careering past the timbers of the starboard side. "Dear me!" fervently exclaimed every lady at once; when the very next moment the lamps went out, and all was darkness. Captain Collins felt a little hand clutch his arm in nervous terror, but the fair owner of it said nothing; until, with still more startling effect than before, in a few seconds there shot through both stern windows the full rays of the moon, pouring their radiance into the cabin, shining on the backs of the books in the hanging shelves by the bulkhead, on the faces of the party, and the bald forehead of old Jacobs "standing by" the lamp--lastly, too, revealing the pretty little Alicia with her hand on the captain's arm, and her pale, terrified face. "Don't be alarmed, ladies!" said the surgeon, "she's only hauled on the starboard tack!" "And her counter to the east," said the captain. "But who put out the lamp?" rejoined the doctor. "Ah, I see, sir!--'But when the moon, refulgent lamp of night.'" "Such a surprise!" exclaimed the ladies, laughing, although as much frightened for a moment by the magical illumination as by the previous circumstances. "You see," said the captain, "we are not like a house--we can bring round our scenery to any window we choose." "Very prettily imagined it was, too, I declare!" observed a stout old Bombay officer, "and a fine compliment to the ladies, by Jingo, sir!" "If we had any of your pompous Bengal '_Quy hies_' here though, colonel," said the doctor, "they wouldn't stand being choused so unceremoniously out of the weather side, I suspect." "As to the agreeable little surprise I meant for the ladies," said Captain Collins, "I fear it was done awkwardly, never having commanded an Indiaman before, and laid up ashore these half-a-dozen years. But one's old feelings get freshened up, and without knowing the old _Gloucester's_ points, I can't help reckoning her as a lady too--a very particular old 'Begum,' that won't let anyone else be humoured before herself--especially as I took charge of her to oblige a friend." "How easily she goes now!" said the doctor, "and a gallant sight at this moment, I assure you, to anyone who chooses to put his head up the companion." "Ah, mamma!" said one of the girls, "couldn't you almost think this was our own little parlour at home with the moonlight coming through the window on both sides of the old elm, where we were sitting a month ago hearing about India and papa?" "Ah!" responded her cousin, standing up, "but there was no track of moonshine dancing beyond the track of the ship yonder! How blue the water is, and how much warmer it has grown of a sudden!" "We are crossing the great Gulf Stream," said the captain--"Jacobs! open one of the stern-ports." "'Tis the very place and time, this is," remarked a good-humoured cotton-grower from the Deccan, "for one of the colonel's tiger-hunts, now!" "Sir!" answered the old officer, rather testily, "I am not accustomed to thrust my _tiger-hunts_, as you choose to call my humble experiences, under people's noses!" "Certainly not, my dear sir," said the planter--"but what do you say, ladies, to one of the captain's sea-yarns, then? Nothing better, I'm sure, here now, sir--eh?" Captain Collins smiled, and said he had never spun a yarn in his life, except when a boy, out of matter-of-fact old junk and tar. "Here is my steward, however," continued he, "who is the best hand at it I know, and I daresay he'll give you one." "Charming!" exclaimed the young ladies; and "What was that adventure, Mr Jacobs," said Miss Alicia, "with a beauty and a nabob in it, that you alluded to a short time ago?" "I didn't to say disactly include upon it, your ladyship," replied old Jacobs, with a tug of his hair, and a bow not just _a la maitre_; "but the captain can give you it better nor I can, seeing as his honour were the Nero on it, as one may say." "Oh!" said the surgeon, rubbing his hands, "a lady and a rupee-eater in the case!" "There seems something curious about this said adventure of yours, my dear captain," said Mrs St Clair, archly, "and a beauty too! It makes me positively inquisitive, but I hope your own fair lady has heard the story?" "Why, not exactly, ma'am," replied Captain Collins, laughing as he caught the doctor looking preternaturally solemn, after a sly lee-wink to the colonel, who, having his back to the moonlight, stretched out his legs and indulged in a grim, silent chuckle, until his royal-tiger countenance was unhappily brought so far _flush_[2] in the rays as to betray a singular daguerreotype, resembling one of those cut-paper phantasmagoria thrown on a drawing-room wall, unmistakably black and white, and in the character of Malicious Watchfulness. The rubicund, fidgety little cotton-grower twiddled his thumbs, and looked modestly down on the deck, with half-shut eyes, as if expecting some bold revelation of nautical depravity; while the romantic Miss Alicia and was silent. "However," said the captain, coolly, "it is no matrimonial secret, at any rate! We both talk of it sometimes when we read the Church Service of a Sunday night at home, with Jacobs for the clerk." "Do, Mr Jacobs, oblige us!" requested the younger of the girls. "Well, miss," said he, smoothing down his hair in the doorway, and hemming, "'tain't neither for the likes o' me to refuse a lady, nor accordin' to rules for to give such a yarn in presence of a supperior officer, much less the captain; with a midship helm, ye know, marm, ye carn't haul upon one tack nor the other. Not to say but next forenoon watch----" "I see, Jacobs, my man," interrupted Captain Collins, "there's nothing for it but to fore-reach upon you, or else you'll be 'Green-Handing' me aft as well as forward; so I must just make the best of it, and take the _winch_ in my own fashion at once!" "Ay, ay, sir--ay, ay, your honour!" said Old Jack demurely, and concealing his gratification as he turned off into the pantry, with the idea of for the first time hearing the captain relate the incidents in question. "My old shipmate," said the latter, "is so fond of having trained his future captain, that it is his utmost delight to spin out everything we ever met with together into one endless yarn, which would go on from our first acquaintance to the present day, although no ship's company ever heard the last of it. Without falling knowingly to leeward of the truth, he makes out every lucky coincidence almost to have been a feat of mine, and puts in little fancies of his own, so as to give the whole thing more and more of a marvellous air the farther it goes. The most amusing thing is, that he almost always begins each time, I believe, at the very beginning, like a capstan without a paul--sticking in one thing he had forgot before, and forgetting another; sometimes dwelling longer on one part--a good deal like a ship making the same voyages over again. I knew, now, this evening, when I heard the men laughing, and saw Old Jack on the forecastle, what must be in the wind. However, we have shared so many chances, and I respect the old man so much, not to speak of his having dandled my little girls on his knee, and being butler, steward, and flower-gardener at home, that I can't really be angry at him, in spite of the sort of every man's rope he makes of me!" "How very amusing a character he is!" said one young lady. "A thought too tarry, perhaps?" suggested the surgeon. "So very original and like a--a seaman!" remarked Miss Alicia, quietly, but as if some other word that crossed her mind had been rejected, as descriptive of a different variety, probably higher. "_Original_, by Jove!" exclaimed the colonel; "if my _Khansa-man_, or my _Abdar_,[3] were to make such a dancing dervish and _tumasha_[4] of me behind back, by the holy Vishnu, sir, I'd rattan him myself within an inch of his life!" [2] _Flush_--_i.e._ level. [3] Steward and butler. [4] Sport. "Not an unlikely thing, colonel," put in the planter; "I've caught the scoundrels at that trick before now." "What did you do?" inquired the colonel, speculatively. "Couldn't help laughing, for my soul, sir; the _puckree-bund_[5] rascals did it so well, and so funnily!" The irascible East-Indian almost started up in his imaginative fury, to call for his palkee, and chastise his whole verandah, when the doctor reminded him that it was a long way there. "Glorious East!" exclaimed the medico, looking out astern, "where we may cane our footmen, and whence, meanwhile, we can derive such Sanscrit-sounding adjurations, with such fine moonlight!" [5] Turban-wearing. The presence of the first officer was now added to the party, who came down for a cup of tea, fresh from duty, and flavouring strongly of a pilot cheroot. "How does she head, Mr Wood?" asked the captain. "Sou'-west-by-west, sir--a splendid night, under everything that will draw--spray up to the starboard cathead!" "But as to this story, again, Captain Collins?" said Mrs St Clair, as soon as she had poured out the chief mate's cup. "Well," said the captain, "if you choose to listen till bedtime to a plain draught of the affair, why I suppose I must tell it you; and what remains then may stand over till next fine night. It _may_ look a little romantic, being in the days when most people are such themselves, but, at any rate, we sailors--or else we should never have been at sea, you know; so you'll allow for that, and a spice to boot of what we used to call at sea 'lovemaking'; happily there were no soft speeches in it, like those in books, for then I shouldn't tell it at all. * * * * * "By the time I was twenty-four, I had been nine years at sea, and at the end of the war, was third lieutenant of a crack twenty-eight, the saucy _Iris_--as perfect a sloop-model, though over-sparred certainly, as ever was eased off the ways of Chatham, or careened to a north-easter. The Admiralty had almost learned to build by that day, and a glorious ship she was, _made_ for going after the small fry of privateers, pirates, and slavers, that swarmed about the time. Though I had roughed it in all sorts of craft, from a first-rate to a dirty French lugger prize, and been eastward, so as to see the sea in its pride at the Pacific, yet the feeling you have depends on the kind of ship you are in. I never knew so well what it was to be fond of a ship and the sea; and when I heard of the poor _Iris_, that had never been used to anything but blue water on three parts of the horizon at least, laying her bones not long after near Wicklow Head, I couldn't help a gulp in the throat. I once dreamt I had gone down in her, and risen again to the surface with the loss of my brains, such as I had had; while at the same moment, there I was, still sitting below on a locker in the wardroom, with the arms of her beautiful figure-head around me, and her mermaid's tail like the best-bower cable, with an anchor at the end of it far away out of soundings, over which I bobbed and dipped for years and years, in all weathers, like a buoy. We had no Mediterranean time of it, though, in the _Iris_, off the Guinea coast, from Cape Palmas to Cape <DW64>; looking out to windward for white squalls, and to leeward for black ones, and in-shore for Spanish cattle-dealers, as we called them, had made us all as sharp as so many marling-spikes; and our captain was a man that taught us seamanship, with a trick or two beyond. The slavers had not got to be so clever then, either, with their schooners and clippers: they built for stowage, and took the chance, so that we sent in _bale_ after bale to the West India admiral, made money, and enjoyed ourselves now and then at the Cape de Verdes. However, this kind of thing was so popular at home, as pickings after the great haul was over, that the _Iris_ had to give up her station to a post-frigate, and be paid-off. The war was over, and nobody could expect to be promoted without a friend near the blue table-cloth, although a quiet hint to a secretary's palm would work wonders, if strong enough. But most of such lucky fellows as ourselves dissipated their funds in blazing away at balls and parties, where the gold band was everything, and the ladies wore blue ribbons and anchor brooches in honour of the navy. The men spent everything in a fortnight, even to their clothes, and had little further chance of eating the king's biscuit with hopes of prize-money; I used to see knots of them, in red shirts and dirty slops, amongst the foremast Jacks in outward-bound ships, dropping past Greenwich, and waving their hats to the Hospital. You knew them at once by one of them giving the song for the topsail-halliards, instead of the merchantmen's bull's chorus; indeed, I could always pick off the dashing men-o'-war's-men, by face and eye alone, out from among the others, who looked as sober and solitary, with their serious faces and way of going about a thing, as if everyone of them was the whole crew. I once read a bit of poetry called the 'Ancient Mariner,' to old Jacobs, who by-the-by is something of a breed betwixt the two kinds, and his remark was: 'That old chap warn't used to hoisting altogether with a run, your honour! By his looks I'd say he was bred where there was few in a watch, and the watch-tackle laid out pretty often for an eke to drag down the fore-tack.' "As I was riding down to Croydon in Surrey, where my mother and sister had gone to live, I fell in with a sample of the hard shifts the men-o'-war's-men were put to in getting across from harbour to some merchant port, when all their money was chucked away. It was at a little town called Bromley, where I brought to by the door of a tavern and had a pail for the horse, with a bottle of cider for myself at the open window, the afternoon being hot. There was a crowd of townspeople at the other end of the street, country bumpkins and boys--women looking out at the windows, dogs barking, and children shouting--the whole concern bearing down upon us. "'What's all this?' said I to the ostler. "'Don't know, sir,' said he, scratching his head; ''tis very hodd, sir! That corner _is_ rather a sharp turn for the coach, sir, and she do sometimes run over a child there, or somethink. But 'tain't her time yet! Nothink else hever 'appens 'ere, sir.' "As soon as I could hear or see distinctly for the confusion, I observed the magnet of it to be a party of five or six regular blue-jackets, a good deal battered in their rig, who were roaring out sea-songs in grand style as they came along, leading what I thought at first was a bear. The chief words I heard were what I knew well. 'We'll disregard their tommy-hawks, likewise their scalping-knives--and fight alongside of our mates to save our precious lives--like British tars and sowldiers in the North Americay!' "On getting abreast of the inn door, and finding an offing with good holding-ground, I suppose, they hove to and struck up the 'Buffalo,' that finest of chants for the weather forecastle with a spanking breeze, outward bound, and the pilot lately dropped: "Come, all you young men and maidens, that _wishes_ for to sail, And I will let you hear of where you must a-roam; We'll embark into a ship which her taups'ls is let fall, And all unto an ileyand where we never will go home; Especiallye you _ladies_ that's anxious for to rove-- There's _fishes_ in the sea, my love, likewise the buck an' doe, We'll lie down--on the _banks_--of yon pleasant shadye gro-ove, Through the wild woods we'll wander and we'll chase the buffalo--ho--ho-- We'll chase the buffalO! "I really couldn't help laughing to see the slapping, big-bearded fellows, like so many foretopmen, showing off in this manner--one mahogany-faced thoroughbred leading, the rest thundering in at the chorus, with a tremendous stress on the 'Lo--ho--ho,' that made the good Bromley folks gape. As to singing for money, however, I knew no true tar with his members whole would do it; and I supposed it to be merely some 'spree ashore,' until the curious-looking object from behind was lugged forward by a couple of ropes, proving to be a human figure above six feet high, with a rough canvas cover as far as the knees. What with three holes at the face, and the strange colour of the legs, which were bare--with a pair of turned-up India shoes, and the whole shape like a walking smoke-funnel over a ship's caboose--I was puzzled what they would be at. The leading tar immediately took off his hat, waved it round for a clear space, and gave a hem! while he pointed to the mysterious creature. 'Now my lads!' said he, 'this here wonderful bein' is a savitch we brought aboard of us from the Andyman Isles, where he was caught one mornin' paddling round the ship in a canoe made out of the bark of a sartain tree. Bein' the ownly spice of the sort brought to this country as yet is, and we havin' run short of the needful to take us to the next port, we expects every lady and gemman as has the wherewithal will give us a lift by consideration of this same cur'ous sight, and doesn't----' 'Heave ahead, Tom, lad!' said another encouragingly, as the sailor brought up fairly out of breath. 'Doesn't want no man's money for nou't d' ye see, but all fair an' above board. We're not agoin' to show this ere sight excep' you makes up half-a-guinea amongst ye--arter that all hands may see shotfree--them's the articles!' 'Ay, ay, Tom, well said, old ship!' observed the rest; and, after a considerable clinking of coin amongst the crowd, the required sum was poured, in pence and sixpences, into Tom's hat. 'All right!' said he, as soon as he had counted it--'hoist away the tarpaulin, mates!' For my part, I was rather surprised at the rare appearance of this said savage, when his cover was off--his legs and arms naked, his face streaked with yellow, and both parts the colour of red boom-varnish; his red hair done up in a tuft, with feathers all round it, and a bright feather tippet over his shoulders, as he stood, six feet in his yellow slippers, and looking sulkily enough at the people. 'Bobbery puckalow!' said the nautical head-showman, and all at once up jumped the Andaman islander, dancing furiously, holding a little Indian _punkah_ over his head, and flourishing with the other hand what reminded me strongly of a ship's top-maul--shouting 'Goor--goor--gooree!' while two of the sailors held on by the ropes. The crowd made plenty of room, and Tom proceeded to explain to them very civilly, that 'in them parts 'twas so hot the natives wouldn't fight, save under a portiable awning.' Having exhibited the points of their extraordinary savage, he was calmed again by another uncouth word of command, when the man-o'-war's-man attempted a further _traverse_ on the good Bromley folks, for which I gave him great credit. 'Now, my lads and lasses,' said he, taking off his hat again, 'I s'pose you're all British subjects and Englishmen!' at which there was a murmur of applause. 'Very good, mates all!' continued the foretopman, approvingly. 'Then, in course, ye knows as how whatsomever touches British ground is _free_!' 'Britons never, never shall be slaves!' sung out a boy, and the screaming and hurrahing was universal. Tom stuck his tongue in his cheek to his messmates, and went on: 'Though we was all pressed ourselves, and has knocked about in sarvice of our king and country, an' bein' poor men, we honours the flag, my lads!' 'Hoorah! hoorah! hoor-r-ray!' 'So you see, gemmen, my shipmates an' me has come to the resolve of lettin' this here wild savidge go free into the woods--though bein' poor men, d' ye see, we hopes ye'll make it up to us a bit first! What d' ye say, all hands?--slump together for the other guinea, will ye, and off he goes this minute, and--Eh? what d' ye say, shipmates?' 'Ay, ay, Tom, sink the damage, too!' said his comrades; 'we'll always get a berth at Blackwall, again!' "'Stand by to ease off his tow-lines, then,' said Tom--'now look sharp with the shiners there, my lads--ownly a guinea!' 'No, no!' murmured the townspeople, 'send for the constable--we'll all be scalped and murdered in our beds!--no, no, for God's sake, mister sailors!' A grocer ran out of his door to beg the tars wouldn't think of such a thing, and the village constable came shoving himself in with the beadle. 'Come, come,' said the constable, in a soothing style, while the beadle tried to look big and blustering, 'you mustn't do it, my good men--not on no desideration, _here_--in his majesty's name. Take un on to the next parish--I horder all good subjects to resist me!' '_What!_' growled the foretopman, with an air of supreme disgust, 'han't ye no feelin's for liberty hereaway? Parish be blowed! Bill, my lad, let go his moorings, and give the poor wretch his nat'ral freedom!' 'I'm right down ashamed on my country,' said Bill. 'Hullo, shipmates, cast off at once, an' never mind the loss--I hasn't slept easy myself sin' he wor cotched!' 'Nor me either,' said another; 'but I'm feared he'll play old Harry when he's loose, mate.' "I had been watching the affair all this time from inside, a good deal amused, in those days, at the trick--especially so well carried out as it was by the sailors. 'Here, my fine fellows,' said I at last, 'bring him in, if you please, and let me have a look at him.' Next minute in came the whole party, and supposing from my plain clothes I was merely some longshore traveller, they put their savage through his dance with great vigour. 'Wonderfully tame he's got, your honour!' said the topman; 'it's nothing to what he does if you freshens his nip.' 'What does he eat? 'I asked, pretending not to understand the hint. 'Why, nought to speak on, sir,' said he; 'but we wonst lost a boy doorin' the cruise, nobody know'd how--though 'twas thought he went o'board, some on us had our doubts.' 'Curiously tatooed, too,' I said; 'I should like to examine his arm.' 'A bit obstropolous he is, your honour, if you handles him.' 'Never mind,' said I, getting up and seizing the wrist of the Andaman islander, in spite of his grins; and my suspicions were immediately fulfilled by seeing a whole range of familiar devices marked in blue on the fellow's arm--amongst them an anchor with a heart transfixed by a harpoon, on one side the word 'Sal,' and on the other 'M. O., 1811.' 'Where did you steal this top-maul, you rascal?' said I, coolly looking in his face; while I noticed one of the men overhauling me suspiciously out of his weather-eye, and sliding to the door. 'I didn't stale it at all,' exclaimed the savage, giving his red head a scratch, ''twas Bill Green there--by japers! whack pillalew, mates, I'm done!' 'Lor! oh lor!' said Bill himself, quite crestfallen, 'if I didn't think 'twas him. We're all pressed again, mate, it's _the_ leftenant.' 'Pressed, bo'?' said Tom; 'more luck, I wish we was--but they wouldn't take ye now for a bounty, you know.' Here I was fain to slack down and give a hearty laugh, particularly at recognising Bill, who had been a shipmate of Jacobs and myself in the old _Pandora_, and was nicknamed 'Green'--I believe from a small adventure of ours--so I gave the men half-a-guinea a piece to carry them on. 'Long life to your honour,' said they; and said Tom, 'If I might make so bould, sir, if your honour has got a ship yet, we all knows ye, sir, and we'd enter, if 'twas for the North Pole itself.' 'No, my lad,' said I, 'I'm sorry to say I have not got so far yet. <DW18>s, my man, can you tell me where your old messmate Jacobs has got to?' 'Why, sir,' replied Bill, 'I did hear he was livin' at Wapping with his wife, where we means to give him a call too, sir.' 'Good day, your honour,' said all of them, as they put on their hats to go, and covered their curiosity again with his tarpaulin. 'I'm blessed, Bill,' said Tom, 'but we'll knock off this here carrivanning now, and put before the wind for Blackwall,' 'Won't you give your savage his freedom, then?' I asked. 'Sartinly, your honour,' replied the roguish foretopman, his eye twinkling as he saw that I enjoyed the joke. 'Now, Mick, my lad, ye must run like the devil so soon as we casts ye off.' 'Oh, by the powers, thry me!' said the Irishman; 'I'm sick tired o' this cannible minnatchery. By the holy Moses, though, I must have a dhrop o' dew in me, or I'll fall!' Mick accordingly swigged off a noggin of gin, and declared himself ready to start. 'Head due nor'-east from the sun, Mick, and we'll pick you up in the woods, and rig you out all square again,' said the captain of the gang, before presenting himself to the mob outside. 'Now, gemmen and ladies all,' said the sailor coolly, 'ye see we're bent on givin' this here poor unfort'nate his liberty--an' bein' tould we've got the law on our side, why, we means to do it. More by token, there's a leftenant in the Roy'l Navy aboard there, as has made up the little salvage-money, bein' poor men, orderin' us for to do it--so look out. If ye only gives him a clear offing, he'll not do no harm. Steady, Bill--slack off the starboard sheet, Jack--let go--all!' 'Oh! oh!--no! no!--for God's sake!' screamed the bystanders, as they scuttled off to both hands--'shame, shame--knock un down, catch un--tipstaff, beadle!' 'Hurrah!' roared the boys, and off went Mick O'Hooney in fine style, flourishing his top-maul, with a wild 'hullaloo,' right away over a fence, into a garden, and across a field towards the nearest wood. Everybody fell out of his way as he dashed on; then some running after him, dogs barking, and the whole of the seamen giving chase with their tarpaulins in their hands, as if to drive him far enough into the country. The whole thing was extremely rich, seen through the open air from the tavern window, where I sat laughing till the tears came into my eyes, at Jack-tars' roguishness and the stupefied Kent rustics, as they looked to each other; then at the sailors rolling away full speed along the edge of the plantation where the outlandish creature had disappeared; and, lastly, at the canvas cover which lay on the spot where he had stood. They were actually consulting how to guard against possible inroads from the savage at night, since he might be lurking near, when I mounted and rode off; I daresay even their hearing that I was a live and real lieutenant would cap the whole story. "Croydon used to be a pretty, retired little town, you know, so quiet and old-fashioned that I enjoyed the unusual rest of it, and the very look of the canal, the market-place, the old English trees and people--by comparison with even the _Iris's_ white decks, and her circumference of a prospect, so different every morning or hour of the day. My mother and my sister Jane were so kind--they petted me so, and were so happy to have me down to breakfast and out walking, even to feel the smell of my cigar--that I hardly knew where I was. I gave them an account of the places I had seen, with a few tremendous storms and a frigate-fight or two, instead of the horse-marine stories about mermaids and flying Dutchmen I used to pass upon them when a conceited youngster. Jane, the little gipsy, would listen with her ear to a large shell, when we were upon sea matters, and shut her eyes, saying she could fancy the things so well that way. Or was it about India, there was a painted sandal-wood fan carved in open-work like the finest lace, which she would spread over her face, because the seeing through it, and its scent, made her feel as if she were in the tropics. As for my mother, good simple woman, she was always between astonishment and horror, never having believed that lieutenants would be so heartless as to mast-head a midshipman for the drunkenness of a boat's crew, nor being able to understand why, with a gale brewing to seaward, a captain tried to get his ship as far as he could from land. The idea of my going to sea again never entered her head, the terrible war being over, and the rank I had gained being invariably explained to visitors as at least equal to that of a captain amongst soldiers. To the present day, this is the point with respect to seafaring matters on which my venerated and worthy parent is clearest: she will take off her gold spectacles, smoothing down her silver hair with the other hand, and lay down the law as to reform in naval titles, showing that my captain's commission puts me on a level with a military colonel. However, as usual, I got tired by little and little of this sort of thing; I fancy there's some peculiar disease gets into a sailor's brain that makes him uneasy with a firm floor and no offing beyond; certainly the country about Croydon was to my mind, at that time, the worst possible--all shut in, narrow lanes, high hedges and orchards, no sky except overhead, and no horizon. If I could only have got a hill, there would have been some relief in having a look-out from it. Money I had no want of; and as for fame or rank, I neither had the ambition, nor did I ever fancy myself intended for an admiral or a Nelson; all my wish was to be up and driving about, on account of something that was _in_ me. I always enjoyed a good breeze as some do champagne; and the very perfection of glory, to my thinking, was to be the soul of a gallant ship in a regular Atlantic howler: or to play at long bowls with one's match to leeward, off the ridges of a sea, with both weather and the enemy to manage. Accordingly, I wasn't at all inclined to go jogging along in one of your easy merchantmen, where you have nothing new to find out; and I only waited to hear, from some friends who were bestirring themselves with the Board, of a ship where there might be something to do. These were my notions in those days, before getting sobered down, which I tell you for the sake of not seeming such a fool in this said adventure. CHAPTER III "Well, one evening my sister Jane and I went to a race-ball at Epsom, where, of course, we saw all the 'beauty and fashion,' as they say, of the country round, with plenty of the army men, who were in all their glory, with Waterloo and all that; we two or three poor nauticals being quite looked down upon in comparison, since Nelson was dead, and we had left ourselves nothing at the end to fight with. I even heard one belle ask a dragoon 'what uniform that was--was it the horse-artillery corps?' 'Haw!' said the dragoon, squinting at me through an eyeglass, and then looking with one eye at his spurs, and with the other at his partner, 'not at all sure! I _do_ think, after all, Miss----, 'tis the--the marine body--a sort of amphibious animals! They weren't with _us_, though, you know--_couldn't_ be, indeed, though it _was Water_loo! Haw! haw! you'll excuse the joke, Miss----?' 'Ha! ha! how extremely witty, Captain----!' said the young lady, and they whirled away towards the other end of the hall. I never felt more inclined to pull a fellow's nose, till all of a sudden my head turned, and I forgot there was such a thing as a dragoon in the world, for I saw what I thought the loveliest young creature ever crossed my eyes, coming out of the refreshment-room with two ladies, an old and an elderly one. The first was finely dressed out, and I set her down for an aunt, she was so unlike; the other for a governess. The young lady was near sixteen to appearance, all in white. There were many beauties in the ball-room you would have called handsomer; but there was something about her altogether I could compare to nothing else but the white figure-head of the _Iris_, sliding gently along in the first curl of a breeze, with the morning sky far out on the bow--curious as you may think it, ladies! Her hair was brown, and her complexion remarkably pale notwithstanding; while her eyes were as dark blue, too, as--as the ocean near the line, that sometimes, in a clear calm, gets to melt till you scarcely know it from the sky. 'Look, Edward!' whispered my sister, 'what a pretty creature! She can't be English, she looks so different from everybody in the room. And such pearls in her hair! such a beautifully large diamond in that brooch! Who can she be, I wonder?' I was so taken up, however, that I never recollected at all what Jane said till at night, in thinking the matter over; and then a whole breeze of whisperings seemingly came from every corner of the cloakroom, of 'Who is she?' 'Who can she be?' 'Who's her father?' and so on, which I remembered to have heard. I only noticed at the time that somebody said she was the daughter of some rich East India nabob or other, just come home. A post-captain who was present--one of Collingwood's flag-lieutenants--went up to the old _chaperon_, whom he seemed to know, and got into talk with her: I found afterwards she was an admiral's widow. In a little I saw him introduced to the young lady, and ask her to dance; I fancied she hung back for a moment, but the next she bowed, gave a slight smile to the captain's gallant sea-fashion of deep respect to the sex, and they were soon swimming away in the first set. Her dancing was more like walking with spread wings upon air than upon planks with one's arms out, as the captain did. I'd have given my eyes, not to speak of my commission and chances to come, to have gone through that figure with _her_. When the captain had handed her to her seat again, two or three of the dragoons sauntered up to Lady Somers's sofa: it was plain they were taken; and after conversing with the old lady, one of them, Lord Somebody, as I understood, got introduced, in his turn, to the young beauty. As may be supposed, I kept a look-out for his asking her to dance, seeing that, if she had done so with one of the embroidered crew, and their clattering gear, I'd have gone out that instant, found out the Waterloo fellow next day, and, if not shot myself, have drilled him with an anchor button for a bullet, and run off in the first craft I could get. The cool, easy, impertinent way this second man made his request, though--just as if he couldn't be refused, and didn't care about it--it was as different from the captain of the _Diomede's_ as red from blue! My heart went like the main-tack blocks thrashing when you luff too much; so you may guess what I felt to see the young lady, who was leaning back on the sofa, give her head a pettish sort of turn to the old one, without a word, as much as to say she didn't want to. 'My love!' I heard the old lady say, 'I fear you are tired! My Lord, your lordship must excuse Miss Hyde on this occasion, as she is in delicate health!' The dragoon was a polite nobleman, according to his cloth; so he kept on talking and smiling, till he could walk off without seeming as if he'd got his sabre betwixt his feet; but I fancied him a little down by the head when he did go. All the time the young beauty was sitting with her face as quiet and indifferent as may be, only there was a sparkle in her blue eyes, and in nothing else but the pearls in her hair, as she looked on at the dancing; and, to my eye, there was a touch of the rose came out on her pale cheek, clear though it was before the dragoon spoke to her. Not long after, an oldish gentleman came out with a grey-haired old general from the refreshment-room: a thin yellow-complexioned man he was, with no whiskers and bald forehead, and a bilious eye, but handsome, and his face as pompous and solemn-looking as if he'd been First Lord, or had got a whole court-martial on his shoulders for next day. I should have known him from a thousand for a man that had lived in the East, were it nothing but the quick way he looked over his shoulder for a servant or two, when he wanted his carriage called--no doubt just as one feels when he forgets he's ashore, like I did every now and then, looking up out to windward, and getting a garden-wall or a wood slap into one's eyesight, as 'twere. I laid down the old gentleman at once for this said nabob; in fact, as soon as a footman told him his carriage was waiting, he walked up to the young lady and her companions, and went off with them, a steward and a lady patroness convoying them to the break of the steps. The only notion that ran in my head, on the way home that night with my sister, was, 'By heavens! I might just as well be in love with the bit of sky at the end of the flying-jibboom!' and all the while the confounded wheels kept droning it into me, till I was as dizzy as the first time I looked over the fore-royal-yard. The whole night long I dreamt I was mad after the figure-head of the _Iris_, and asked her to dance with me, on which she turned round with a look as cold as water, or plain 'No.' At last I caught firm hold of her and jumped overboard; and next moment we were heaving on the blue swell in sight of the black old Guinea coast--when round turned the figure and changed into Miss Hyde; and the old nabob hauled us ashore upon a beautiful island, where I woke and thought I was wanted on deck, although it was only my mother calling me. "All I had found out about them was, that Sir Charles Hyde was the name of the East Indian, and how he was a Bengal judge newly come home; where they lived, nobody at the ball seemed to know. At home, of course, it was so absurd to think of getting acquainted with a rich Indian judge and his daughter, that I said no more of the matter; although I looked so foolish and care-about-nothing, I suppose, that my mother said to Jane she was sure I wanted to go to sea again, and even urged me to 'take a trip to the Downs, perhaps.' As for going to sea, however, I felt I could no more stir, _then_, from where I was, than with a best bower down, and all hands drunk but the captain. There was a favourite lazy spot of mine near the house, where I used to lie after dinner, and puff away amongst the grass, at the back of a high garden-wall with two doors in it, and a plank across a little brook running close under them. All round was a green paddock for cows; there was a tall tree at hand, which I climbed now and then half-mast high, to get a look down a long lane that ran level to the sky, and gave you a sharp gush of blue from the far end. Being a luxurious dog in those days, like the cloth in general when hung up ashore, I used to call it 'The Idler's Walk,' and 'The Lazy Watch,' where I did duty somewhat like the famous bo'sun that told his boy to call him every night and say the captain wanted him, when he turned over with a polite message, and no good to the old tyrant's eyes. "Well, one afternoon I was stretched on the softest bit of this retreat, feeling unhappy all over, and trying to think of nothing in particular, as I looked at the wall and smoked my cheroot. Excuse me if I think that, so far as I remember, there is nothing so consolatory, though it can't of course cure one, as a fine Manilla for the 'green sickness,' as our foremast fellows would say. My main idea was that nothing on earth could turn up to get me out of this scrape, but I should stick eternally, with my head sails shivering aback, or flapping in a sickening dead calm. It was a beautiful hot summer afternoon, as quiet as possible, and I was weary to death of seeing that shadow of the branch lying against the white wall, down to the keyhole of the nearest door. All of a sudden I heard the sweetest voice imaginable, coming down the garden as it were, singing a verse of a Hindostanee song I had heard the Bengal girls chant with their pitchers on their heads at the well, of an evening: La li ta la, ta perisi, La na comalay ah sahm-re, Madna, ca--rahm Ram li ta, co-ca-la lir jhi! La li ta la, vanga-la ta perisi. 'Coc-coka-cokatoo!' screamed a harsh voice, which I certainly could distinguish from the first. 'Pretty cockatoo!' said the other coaxingly; and the next minute the large pink-flushed bird itself popped his head over the top-stones above the door, floundering about with his throat foul of the silver chain fast to his leg, till he hung by his beak on my side of the wall, half-choked, and trying to croak out--'Pretty--pretty cocky!' Before I had time to think, the door opened, and, by heavens! there was my very charmer herself, with the shade of the green leaves showered over her distressed face. She had scarcely seen me before I sprang up and caught the cockatoo, which bit me like an imp incarnate, till the blood ran down my fingers as I handed it to its mistress, my heart in my mouth, and more than a quarter-deck bow in my cap. The young lady looked at me first in surprise, as may be supposed, and then, with a smile of thanks that set my brain all afloat, 'Oh, dear me!' exclaimed she, 'you are hurt!' '_Hurt!_' I said, looking so bewildered, I suppose, that she couldn't help laughing. 'Tippoo is very stupid,' continued she, smiling, 'because he is out of his own country, I think. You shall have no sugar to-night, mister cockatoo, for biting your friends.' "'Were you--ever in India--madam?' I stammered out. 'Not since I was a child,' she answered; but just then I saw the figure of the nabob sauntering down the garden, and said I had particular business and must be off. 'You are very busy here, sir?' said the charming young creature archly. 'You are longing till you go to sea, I daresay--like Tippoo and me.' 'You?' said I, staring at the keyhole whilst she caught my eye, and blushed a little, as I thought 'Yes, we are going--I long to see India again, and _I_ remember the sea, too, like a dream.' "Oh, heavens! thought I, when I heard the old gentleman call out--'Lota! Lota, _beebee-lee_! _Kabultah, meetoowah?_'[6] and away she vanished behind the door, with a smile dropped to myself. The tone of the judge's voice, and his speaking Hindoo, showed he was fond of his daughter at any rate. Off I went, too, as much confused as before, only for the new thought in my head. 'The sea, the sea!' I shouted, as soon as out of hearing, and felt the wind, as 'twere, coming from aft at last, like the first ripple. 'Yes, by George!' said I, 'outward bound for a thousand. I'll go, if it was before the mast.' All at once I remembered I didn't know the ship's name, or when. Next day, and the next again, I was skulking about my old place, but nobody appeared--not so much as a shadow inside the keyhole. At last one evening, just as I was going away, the door opened; I strolled slowly along, when, instead of the charming Lota, out came the flat brown turban of an ugly _kitmagar_, with a moustache, looking round to see who was there. '_Salaam_, sah'b,' said the brown fellow, holding the door behind him with one paw. '_Burra judge sahib bhote bhote salaam_ send uppiser[7] sah'b--'ope not _dekhe_[8] after sahib cook-maid.' '_Joot baht, hurkut-jee_,'[9] said I, laughing. 'Sah'b been _my_ coontree?' inquired the Bengalee more politely. '_Jee_, yes,' I said, wishing to draw him out 'I Inglitsh can is-peek,' continued the dark footman, conceitedly; 'ver well sah'b, but one misfortune us for come i-here. Baud _carry_ make--plenty too much _poork_--too much graug drink. Termeric--chili--banana not got--not coco-tree got--pah! Baud coontree, too much i-cold, sah'b?' 'Curse the rascal's impudence,' I thought, but I asked him if he wasn't going back. 'Yis, sah'b, _such baht_[10] Al-il alah? Mohummud _burra Meer-kea_. Bote too much i-smell, _my_ coontree.' 'When are you going?' I asked, carelessly. 'Two day this time, sah'b.' 'Can you tell me the name of the ship?' I went on. The _kitmagar_ looked at me slyly, stroked his moustache, and meditated; after which he squinted at me again, and his lips opened so as to form the magic word, _Buckshish_? '_Jee_,' said I, holding out a crown piece, 'the ship's name and the harbour?' 'Se,' began he; the coin touched his palm--'ring'; his fingers closed on it, and 'patahm,' dropped from his leathery lips. 'The _Seringapatam_?' I said. '_Ahn_, sah'b.' 'London, eh?' I added; to which he returned another reluctant assent, as if it wasn't paid for, and I walked off. However, I had not got round the corner before I noticed the figure of the old gentleman himself looking after me from the doorway; his worthy _kitmagar_ salaaming to the ground, and no doubt giving information how the 'cheep uppiser' had tried to pump him to no purpose. The nabob looked plainly as suspicious as if I had wanted to break into his house, since he held his hand over his eyes to watch me out of sight. [6] Little girl! Do you hear, sweet one? [7] Officer. [8] Look. [9] 'Tis a lie, you scoundrel. [10] That is true. "At night, I told my mother and sister I should be off to London next day for sea. What betwixt their vexation at losing me, and their satisfaction to see me more cheerful, with talking over matters, we sat up half the night. I was so ashamed, though, to tell them what I intended, considering what a fool's chase it would seem to anyone but myself, that I kept all close; and, I am sorry to say, I was so full of my love-affair, with the wild adventure of it, the sea, and everything besides, as not to feel their anxiety enough. How it was to turn out I didn't know; but somehow or other I was resolved I'd contrive to make a rope if I couldn't find one; at the worst, I might carry the ship, gain over the men, or turn pirate and discover an island. Early in the morning I packed my traps, drew a cheque for my prize-money, got the coach, and bowled off for London, to knock up Bob Jacobs, my sea godfather; this being the very first step, as it seemed to me, in making the plan feasible. Rough sort of confidant as he may look, there was no man living I would have trusted before him for keeping a secret. Bob was true as the topsail sheets; and if you only gave him the course to steer, without any of the 'puzzlement,' as he called the calculating part, he would stick to it, blow high, blow low. He was just the fellow I wanted for the lee brace, as it were, to give my weather one a purchase, even if I had altogether liked the notion of setting off all alone on what I couldn't help suspecting was a sufficiently harebrained scheme as it stood; and, to tell the truth, it was only to a straightforward, simple-hearted tar like Jacobs that I could have plucked up courage to make it known. I knew he would enter into it like a reefer volunteering for a cutting out, and make nothing of the difficulties--especially when a love matter was at the bottom of it: the chief question was how to discover his whereabouts, as Wapping is rather a wide word. I adopted the expedient of going into all the tobacco-shops to inquire after Jacobs, knowing him to be a more than commonly hard smoker, and no great drinker ashore. I was beginning to be tired out, however, and give up the quest, when, at the corner of a lane near the docks, I caught sight of a little door adorned with what had apparently been part of a ship's figure-head--the face of a nymph or nereid, four times as large as life, with tarnished gilding, and a long wooden pipe in her mouth that had all the effect of a bowsprit, being stayed up by a piece of marline to a hook in the wall, probably in order to keep clear of people's heads. The words painted on its two head-boards, as under a ship's bow, were 'Betsy Jacobs,' and 'licensed' on the top of the door; the window was stowed full of cakes of cavendish, twists of negrohead, and coils of pigtail; so that, having heard my old shipmate speak of a certain Betsy, both as sweetheart and partner, I made at once pretty sure of having lighted, by chance, on his very dry-dock, and went in without more ado. I found nobody in the little shop, but a rough voice, as like as possible to Jacobs' own, was chanting the sea-song of 'Come, cheer up, my lads, 'tis to glory we steer,' in the back-room, in a curious sleepy kind of drone, interrupted every now and then by the suck of his pipe, and a mysterious thumping sound, which I could only account for by the supposition that the poor fellow was mangling clothes, or gone mad. I was obliged to kick on the counter with all my might, in competition, before an eye was applied from inside to the little window; after which, as I expected, the head of Jacobs was thrust out of the door, his hair rough, three days' beard on his chin, and he in his shirt and trousers. '_Hisht!_' said he, in a low voice, not seeing me distinctly for the light, 'you're not calling the watch, my lad! Hold on a bit, and I'll serve your orders directly.' After another stave of 'Hearts of oak are our ships,' etc., in the same drawl, and a still more vigorous thumping than before, next minute out came Bob again; with a wonderful air of importance, though, and drawing in one hand, to my great surprise, the slack of a line of 'half-inch,' on which he gave now and then a tug and an ease off, as he came forward, like a fellow humouring a newly-hooked fish. 'Now, then, my hearty!' said he, shading his eyes with the other hand, 'bear a----' 'Why, Jacobs, old ship,' I said, 'what's this you're after? Don't you know your old apprentice, eh?' "Jacobs looked at my cap and epaulette, and gave out his breath in a whistle, the only other sign of astonishment being that he let go his unaccountable-looking piece of cord. 'Lord bless me, Master Ned!' said he--'I axes pardon, Lieutenant Collins, your honour!' 'Glad you know me this time, Bob, my lad, 'said I, looking round--'and a comfortable berth you've got of it, I daresay. But what the deuce _are_ you about in there? _You_ haven't a savage, _too_, like some friends of yours I fell in with a short time ago! Or perhaps a lion or a tiger, eh, Jacobs?' 'No, no, your honour--lions be blowed!' replied he, laughing, but fiddling with his hands all the while, and standing between me and the room, as if half-ashamed. ''Tis ownly the tiller-ropes of a small craft I am left in charge of, sir. But won't ye sit down, your honour, till such time as my old 'ooman comes aboard to relieve me, sir? Here's a _cheer_, and may be you'd make so free for to take a pipe of prime Americane, your honour?' 'Let's have a look into your cabin though, Bob, my man,' said I, curious to know what was the secret; when all at once a tremendous squall from within let me sufficiently into it. The old salt had been rocking the cradle, with a fine little fellow of a baby in it, and a line made fast to keep it in play when he served the shop. 'All the pitch is in the fire now, your honour,' said he, looking terribly nonplussed; 'I've broached him to, and he's all aback till his mammy gets a hold of him.' 'A good pipe the little rogue's got though,' said I; 'and a fine child he is, Jacobs--do for a bo'sun yet.' 'Why, yes, sir,' said he, rubbing his chin with a gratified smile, as the urchin kicked, threw out his arms, and roared like to break his heart; 'I'm thinking he's a sailor all over, by natur', as one may say. He don't like a calm no more nor myself; but that's the odds of being ashore, where you needs to keep swinging the hammocks by hand, instead of havin' it done for you, sir.' In the midst of the noise, however, we were caught by the sudden appearance of Mistress Jacobs herself--a good-looking young woman, with a market-basket full of bacon and greens, and a chubby little boy holding by her apron, who came through the shop. The first thing she did was to catch up the baby out of the cradle, and begin hushing it, after one or two side-glances of reproach at her husband, who attempted to cover his disgrace by saying, 'Betsy, my girl, where's your manners? why don't you off hats to the leftenant?--it's my wife, your honour.' Mrs Jacobs curtsied twice very respectfully, though not particularly fond of the profession, as I found afterwards; and I soon quite gained her smiles and good graces by praising her child, with the remark that he was too pretty ever to turn out a sailor; for, sharp as mothers are to detect this sort of flattery to anybody else's bantling, you always find it take wonderfully with respect to their own. Whenever Jacobs and I were left to ourselves, I struck at once into my scheme--the more readily for feeling I had the weather hand of him in regard of his late appearance. It was too ridiculous, the notion of one of the best foretopmen that ever passed a weather-earing staying at home to rock his wife's cradle and attend the shop; and he was evidently aware of it as I went on. It was a little selfish, I daresay, and Mrs Jacobs would perhaps have liked me none the better for it; but I proposed to him to get a berth in the Indiaman, sail with me for Bombay, and stand by for a foul hitch in something or other. 'Why, sir,' said he,' it shan't be said of Bob Jacobs he were ever the man to hang back where a matter was to be done that must be done. I doesn't see the whole bearings of it as yet, but ownly you give the orders, sir, and I'll stick to 'em.' ''Tis a long stretch between this and Bombay, Jacobs,' said I, 'and plenty of room for chances.' 'Ay, ay, sir, no doubt,' said he, 'your honour can _talk_ the length of the best bower cable.' 'More than that, Bob, my lad,' said I, 'I know these Company men; if they once get out of their regular jog, they're as helpless as a pig adrift on a grating; and before they grow used to sailing out of convoy, with no frigates to whip them in, depend upon it Mother Carey will have to teach them a new trick or two.' 'Mayhap, sir,' put in Jacobs, doubtfully, 'the best thing 'ud be if they cast the ship away altogether, as I've seen done myself for the matter of an insurance. Ye know, sir, they lets it pass at Lloyd's now the war's over, seein' it brings customers to the underwriters, if so be ownly it don't come over often for the profits. Hows'ever it needs a good seaman to choose his lee-shore well, no doubt.' 'Oh!' answered I, laughing, 'but the chances are, all hands would want to be Robinson Crusoe at once! No, no--only let's get aboard, and take things as they come.' 'What's the ship's name, sir?' inquired Jacobs, sinking his voice, and looking cautiously over his shoulder toward the door. 'The _Seringapatam_--do you know her?' I said. 'Ay, ay, sir, well enough,' said he, readily--'a lump of a ship she is, down off Blackwall in the stream, with two more--country-built, and tumbles home rather much from below the plank-sheer for a sightly craft, besides being flat in the eyes of her, and round in the counter, just where she shouldn't, sir. Them Par_chee_ Bombay shipwrights _does_ clap on a lot of onchristien flummeries and gilt mouldings, let alone quarter-galleries fit for the king's castle!' 'In short, she's tea-waggon all over,' said I, 'and just as slow and as leewardly, to boot, as teak can make her?' 'Her lines is not that bad, though, your honour,' continued Jacobs, 'if you just knocked off her poop--and she'd bear a deal o' beating for a sea-boat. They've got a smart young mate, too; for I seed him t'other day a-sending up the yards, and now she's as square as a frigate, all ready to drop down river.' The short and long of it was, that I arranged with my old shipmate, who was fully bent on the cruise, whether Mrs Jacobs should approve or not, that, somehow or other, we should both ship our hammocks on board of the _Seringapatam_--he before the mast, and I wherever I could get. On going to the agent's, however--which I did as soon as I could change my uniform for plain clothes--I found, to my great disappointment, from a plan of the accommodations, that not only were the whole of the poop-cabins taken, but those on the main-deck also. Most of the passengers, I ascertained, were ladies, with their children and nurses, going back to India, and raw young cadets, with a few commercial and civilian nondescripts; there were no troops or officers, and room enough, except for one gentleman having engaged the entire poop, at an immense expense, for his own use. This I, of course, supposed was the nabob, but the clerk was too close to inform me. 'You must try another ship, sir,' said he, coolly, as he shut the book. 'Sorry for it, but we have another booked to sail in a fortnight. A1, sir; far finer vessel--couple of hundred tons larger--and sails faster.' 'You be hanged!' muttered I, walking out; and a short time after I was on board. The stewards told me as much again; but on my slipping a guinea into the fingers of one, he suddenly recollected there was a gentleman in state-room No. 14, starboard side of the main skylight, who, being alone, might perhaps be inclined to take a chum, if I dealt with him privately. 'Yankee, sir, he is,' said the steward, by way of a useful hint. However, I didn't need the warning, at sight of the individual's long nose, thin lips, and sallow jaw-bones, without a whisker on his face, and his shirt-collar turned down, as he sat overhauling his traps beside the carronade, which was tethered in the state-room, with its muzzle through the port. He looked a good deal like a jockey beside his horse; or, as a wit of a schoolboy cadet said afterwards, the Boston gentleman, calling himself Daniel C. Snout, Esquire--like Daniel praying in the lion's den, and afraid it might turn round and roar. I must say the idea didn't quite delight me, nor the sight of a fearful quantity of baggage which was stowed up against the bulkhead; but after introducing myself and objecting to the first few offers, I at last concluded a bargain with the American for a hundred guineas, provisions exclusive, which, he remarked, was 'considerable low, I prognosticate, mister!' 'However,' said he, 'I expect you're a conversationable individual a little: I allowed for that, you know, mister. One can't do much of a trade at sea--that's a fact; and I calculate we'll swap information by the way. I'm water-pruff, I tell you, as all our nation is. You'll not _settle_ at Bumbay, I reckon, mister?' But though I meant to pay my new messmate in my own coin at leisure afterwards, and be as frank and open as day with him--the only way to meet a Yankee--I made off at present as fast as possible to bring my things aboard, resolving to sleep at Blackwall, and then to stow myself out of sight for sick, until there was somebody to take off the edge of his confounded talk. "Next afternoon, accordingly, I found myself once more afloat, the Indiaman dropping down with the first breeze. The day after, she was running through the Downs with it pretty strong from north-east, a fair wind--the pilot-boat snoring off close-hauled to windward, with a white spray over her nose; and the three _dungaree_ topsails of the _Seringapatam_ lifting and swelling, as yellow as gold, over her white courses in the blue Channel haze. The breeze freshened till she rolled before it, and everything being topsyturvy on deck, the lumber in the way, the men as busy as bees setting her ship-shape--it would have been as much as a passenger's toes were worth to show them from below; so that I was able to keep by myself, just troubling my seamanship so much as to stand clear of the work. Enjoy it I did, too; the first sniff of the weather was almost enough to make me forget what I was there for. I was every now and then on the point of fisting a rope, and singing out to the men; till at length I thought it more comfortable, even for me, to run up the mizzen shrouds when everybody was forward, where I stowed myself out of sight in the cross-trees. "About dusk, while I was waiting to slip down, a stronger puff than ordinary made them clue up the mizzen-royal from deck, which I took upon myself to furl offhand--quick enough to puzzle a couple of boys that came aloft for the purpose, especially as, in the meantime, I had got down upon the topsail-yard-arm out of their notice. When they got on deck again, I heard the little fellows telling some of the men, in a terrified sort of way, how the mizzen-royal had either stowed itself, or else it was Dick Wilson's ghost, that fell off the same yard last voyage--more by token, he used always to make fast the gaskets just that fashion. At night, however, the wind having got lighter, with half moonlight, there was a muster of some passengers on deck, all sick and miserable, as they tried to keep their feet, and have the benefit of air--the Yankee being as bad as the worst. I thought it wouldn't do for me to be altogether free, and accordingly stuck fast by Mr Snout, with my head over the quarter-deck bulwarks, looking into his face, and talking away to him, asking all sorts of questions about what was good for sea-sickness, then giving a groan to prevent myself laughing, when the spray splashed up upon his 'water-pruff' face, he responding to it as Sancho Panza did to Don Quixote, when the one examined the other's mouth after a potion. All he could falter out was, how he wondered I could speak at all when sick. 'Oh! oh dear!' said I with another howl. 'Yes--'tis merely because I can't _think_! And I daresay you are thinking so much you can't _talk_--the sea is so full of meditation, as Lord Byron----oh--oh--this water will be the death of me!' 'I feel as if--the whole--tarnation Atlantic was--inside of my bowels!' gasped he through his nostrils. 'Oh!' I could not help putting in, as the ship and Mr Snout both gave a heave up, 'and coming out of you!' "During all this time I had felt so sure of my ground as scarcely to trouble myself about the Bengal judge and his treasure of a daughter; only in the midst of the high spirits brought up by the breeze, I hugged myself now and then at the thought of their turning out by degrees as things got settled. Nobody would suspect the raw chap I looked, with smooth hair and a high collar, of any particular cue: I must say there was a little vanity at the bottom of it, but I kept thinking more and more how snug and quietly I'd enjoy all that went on, sailing on one tack with the passengers and the old nabob himself, and slipping off upon the other when I could come near the charming young Lota. The notion looks more like what some scamp of a reefer, cruising ashore, would have hit upon, than suits my taste nowadays; but the cockpit had put a spice of the imp in me, which I never got clear of till this very voyage, as you'll see, if we get through the log of it. "The first time I went down into the cuddy was that evening to tea, where all was at sixes and sevens like the decks; the lamps ill-trimmed, stewards out of the way, and a few lads trying to bear up against their stomachs by the help of brandy and biscuits. The main figure was a jolly-looking East Indian, an indigo-planter, as he turned out, with a bald forehead, a hook nose, and his gills covered with white whiskers that gave him all the cut of a cockatoo. He had his brown servant running about on every hand, and being an old stager, did his best to cheer up the rest; but nothing I saw showed the least sign of the party I looked after. I was sure I ought to have made out something of them by this time, considering the stir such a grandee as Sir Charles Hyde would cause aboard; in fact, there didn't seem to be many passengers in her, and I began to curse the lying scoundrel of a _kitmagar_ for working 'Tom Cox's traverse' on me, and myself for being a greater ass than I'd fancied. Indeed, I heard the planter mention by chance that Sir Charles Hyde, the district judge, had come home last voyage from India in this very _Seringapatam_, which, no doubt, I thought, put the Mahommedan rascal up to his trick. "I was making up my mind to an Indian trip, and the pure pleasure of Daniel Catoson Snout, Esquire's, company for two blessed months, when all of a sudden I felt the ship bring her wind a-quarter, with a furious plunge of the Channel water along her bends, that made every landman's bowels yearn as if he felt it gurgle through him. One young fellow, more drunk than sick, gave a wild bolt right over the cuddy table, striking out with both arms and legs as if afloat, so as to sweep half of the glasses down on the floor. The planter, who was three cloths in the wind himself, looked down upon him with a comical air of pity as soon as he had got cushioned upon the wreck. 'My dear fellow,' said he, 'what do you feel--eh?' 'Feel, you--old blackguard!' stammered the griffin, 'I feel _everything_! Goes through--through my vitals as if--I was a con--founded _whale_! C--can't stand it!' 'You've drunk yourself aground, my boy!' sung out the indigo-man; 'stuck fast on the coral--eh? Never mind, we'll float you off, only don't flounder that way with your tail!--by George, you scamp, you've ruined my toe--oh dear!' I left the planter hopping round on one pin, and holding the gouty one in his hand, betwixt laughing and crying; on deck I found the floating Nab Light bearing broad on our lee-bow, with Cumberland Fort glimmering to windward, and the half-moon setting over the Isle of Wight, while we stood up for Portsmouth Harbour. The old captain, and most of the officers, were on the poop for the first time, though as stiff and uncomfortable from the sort of land-sickness and lumber-qualms that sailors feel till things are _in_ their places, as the landsmen did until things were _out_ of them. The skipper walked the weather side by himself and said nothing; the smart chief officer sent two men, one after another, from the wheel for 'cows' that didn't know where their tails were; and as for the middies, they seemed to know when to keep out of the way. In a little, the spars of the men-of-war at Spithead were to be seen as we rose on a sea; before the end of the first watch, we were running outside the Spit Buoy, which was nodding and plashing with the tide in the last slant of moonshine, till at last we rounded to, and down went the anchor in five fathoms, off the Motherbank. What the Indiaman wanted at Portsmouth I didn't know; but, meantime, I had given up all hopes of the nabob being in her, and the only question with me was, whether I should take the opportunity of giving all hands the slip here, even though I left my Yankee friend disconsolate, and a clear gainer by dollars beyond count. "Early next morning there were plenty of wherries looking out for fares; so, as the Indiaman was not to sail before the night-ebb, when the breeze would probably spring up fair again, I hailed one of them to go ashore at the point, for a quiet stroll over Southsea Common, where I meant to overhaul the whole bearings of the case, and think if it weren't better to go home, and wait the Admiralty's pleasure for a ship. I hadn't even seen anything of Jacobs, and the whole hotel-keeping ways of the Indiaman began to disgust me, or else I should have at once decided to take the chance of seeing Lota Hyde somehow or other in India; but, again, one could scarcely endure the notion of droning on in a frigate without so much as a Brest lugger to let drive at. It was about six o'clock; the morning-gun from the guard-ship off the dock-yard came booming down through the harbour, the blue offing shone like silver, and the green tideway sparkled on every surge, up to where they were flashing and poppling on the copper of the frigates at Spithead. I noticed them crossing yards and squaring; the farthest out hove up anchor, loosed fore-topsail, cast her head to starboard, and fired a gun as she stood slowly out to sea under all sail, with a light air freshening abeam. The noble look of her almost reconciled me of itself to the service, were it for the mere sake of having a share in driving such a craft between wind and water. Just then, however, an incident turned up in spite of me, which I certainly didn't expect, and which had more, even than I reckoned at the time, to do with my other adventure; seeing that it made me, both then and afterwards, do the direct opposite of what I meant to do, and both times put a new spoke in my wheel, as we say at sea here. "I had observed a seventy-four, the _Stratton_, lying opposite the Spit Buoy, on board of which, as the waterman told me, a court-martial had been held the day before, where they broke a first lieutenant for insulting his captain. Both belonged to one of the frigates: the captain I had seen, and heard of as the worst tyrant in the navy; his ship was called a 'perfect hell afloat'; that same week one of the boys had tried to drown himself alongside, and a corporal of marines, after coming ashore and drinking a glass with his sweetheart, had coolly walked down to the point, jumped in between two boats and the jetty, and kept himself under water till he was dead. The lieutenant had been dismissed the service, and as I recognised the name, I wondered whether it could actually be my schoolfellow, Tom Westwood, as gallant a fellow and as merry as ever broke biscuit. Two sail-boats, one from around the _Stratton's_ quarter, and the other from over by Gosport, steering on the same tack for Southsea, turned my attention as I sauntered down to the beach. The bow of the nearest wherry grounded on the stones as I began to walk quicker towards the town-gates, chiefly because I was pretty ready for an early breakfast at the old Blue Posts, and also because I had a slight notion of what these gentlemen wanted on Southsea Beach at odd hours. Out they jumped, however--one man in naval undress, another a captain in full fig, the third a surgeon--coming right athwart my course to bring me to. The first I almost at once remembered for the notorious captain of the _Orestes_, or _N'Oreste_, as the midshipmen called her, from her French build and her character altogether. 'Hallo, you sir!' said the other captain, decidedly, 'you must stand still.' 'Indeed,' said I; 'and why so, if you please?' 'Since you _are_ here, we don't intend allowing you to pass for some few minutes.' 'And what if I should do as I choose, sir?' I asked. 'If you stir two steps, sir, I shall shoot you,' replied the captain, who was one of the bullying school. 'Oh, very well,' I said, rather confounded by his impertinence, 'then I shall stay'; and I accordingly stood stock-still, with my arms folded, until the other boat landed a party of two. They were in plain clothes; nor did I give them any particular heed till the seconds had stationed their men, when the captain of the _Orestes_ had his back to me, and his antagonist stood directly facing. As his pale resolved features came out before me with the morning sun on them, his lips together, and his nostrils large, I recognised my old friend Westwood. The captain had broke him the day before, and now had accepted his challenge, being a known dead shot, while the lieutenant had never fired a bullet in cold blood; there was, no doubt, a settled purpose in the tyrant to crush the first man that had dared to thwart his will. Westwood's second came forward and mentioned to the other that his friend was still willing to withdraw the words spoken in first heat, and would accordingly fire in the air. 'Coward!' shouted the captain of the _Orestes_ immediately, 'I shall shoot you through the heart!' 'Sir,' said I to his second, 'I _will not_ look on; and if that gentleman is shot, I will be witness against you both as murderers.' I dropped down behind a stone out of the line of fire, and to keep my eyes off the devilish piece of work, though my blood boiled to knock the fellow down that I was speaking to. Another minute, and the suspense was too great for me to help looking up. Just at that moment I saw how _set_ Westwood's face was; he was watching his enemy with an eye that showed to me what the other's must be--seeking for his life. The seconds gave the word to each other in the middle, and dropped two white handkerchiefs at once with their hands together; I caught the flash of Westwood's pistol, when, to my astonishment, I saw the captain of the _Orestes_ next moment jerk up his arm betwixt me and the sky, fire in the air, and slowly fall back--he was dead!--shot through the heart. One glance at his face gave you a notion of the devilish meaning he had had; but what was my surprise when his second walked up to Westwood, and said to him, 'Sir, you are the murderer of Captain Duncombe--my friend fired in the air as you proposed.' 'You are mistaken, sir,' answered Westwood, coldly; 'Captain Duncombe sought my life, and I have used the privilege of self-defence.' 'The surgeon is of my opinion,' said the other; 'and I am sorry to say that we cannot allow you to depart.' 'I shall give myself up to the authorities at once,' said Westwood. 'We have only your word for that, which I must be permitted, in such a case, to doubt,' replied the captain, whose evident wish it was to detain Westwood by force or threats while he sent off his surgeon. The worst of it was, as I now found, that since the court-martial and the challenge, an Admiralty order had arrived, in consideration of several gallant acts during the war, as well as private representation, restoring him to the service; so that he had, in fact, called out and shot his superior officer. As for the charge now brought forward, it was too absurd for any to believe it, unless from rage or prejudice; the case was bad enough, at any rate, without it. "In the meantime I had exchanged a word or two with Westwood's friend; after which, lifting a second pistol which lay on the sand, I went up to the captain. 'Sir,' said I, 'you used the freedom, a little ago, of forcing me into your concerns, and I have seen the end of it. I have now got to tell you, having watched your conduct, that either you must submit to be made fast here for a bit, else, by the God that made me, I'll shoot you through the head.' The captain looked at me, his surgeon sidled up to him; and being a man near my own size, he suddenly tried to wrench the pistol out of my hands. However, I had him the next moment under my knee, while Westwood's second secured the little surgeon, and took a few round sea-turns about his wrists and ankles with a neckerchief. My companion then gave me a hand to do the same with his superior officer--the medico all the time singing out like a bull, and the captain threatening--while the dead body lay stark and stiff behind us, the eyes wide, the head down, and the breast up, the hand clenching a pistol, just as he had fallen. Westwood stood quite unconscious of everything we did, only he seemed to be watching the knees drawn up as they stiffened, and the sand-flies gathering about the mouth. 'Shall we clap a stopper between their teeth?' said the second to me--he had been at sea, but who he was I never knew--'the surgeon will be heard on the walls, he bellows so!' 'Never mind,' said I, 'we'll just drop them beyond tide-mark--the lee of the stones yonder.' In fact, from the noise the tide was making, I question if the shots could have been heard even by the watermen, who had prudently sheered out of sight round a point. I couldn't help looking, when we had done this, from the captain's body to his own frigate, as she was sluing round head on to us, at single anchor, to the turn of tide, with her buoy dancing on the brisk blue sweep of water, and her figure-head shining in the sunlight. As soon as we had covered over the corpse with tangle, Westwood started as if we had taken something away from him, or freed him of a spell. 'Westwood!' said I, laying my hand on his shoulder, 'you _must_ come along with me.' He said nothing, but followed us quietly round to the wherries, where I told the watermen that the other party had gone a different way to keep clear, and we wanted them to pull for Gosport. At Gosport we had Westwood rigged out in black clothes, his hair cropped, and whiskers shaved off--as I thought it the fittest thing for his case, and what he could best carry out, to go aboard of the Indiaman with me as if he were a missionary. Poor fellow! he didn't well know _what_ he was. So, having waited till dusk, to let the watermen lose our track, and his friend having posted off for Dover, he and I both got safe over to the _Seringapatam_, where I had him stowed in the first convenient state-room I could find. I had actually forgot, through the excitement, all about having missed my first chase; from one hour to another I kept watching the tide-marks ashore, and the dog-vane on the ship's quarter, all impatience to hear the word given for 'all hands up anchor,' and hoping our worthy friends on Southsea Beach were still lying within hearing of the Channel flood. At last the order did come; round went the capstan merrily enough, till she had hove short and up with fore-topsail set; the anchor was catted, and off went the lumbering old craft through the Solent about midnight, before a fine rattling breeze, in company with six or seven others, all running for the Needles. They were loosing the Indiaman's royals when I heard a gun from the guard-ship in harbour; and a little after up went a rocket, signalling to some frigate or other at Spithead; away they kept at it, with lights from the telegraph to her mast-head, for several minutes. 'All's up!' thought I, 'and both Westwood and myself are in for it!' "Next morning at daybreak, accordingly, no sooner did the dawn serve to show us Portland Light going out on the weather quarter, with a whole fleet of Channel craft and Mediterranean brigs about us, we surging through it as fast as the Indiaman could go--than _there_ was a fine forty-four standing off and on right in our course, in fact the very identical _Orestes_ herself! She picked us out in a moment--bore up, stood across our weather-bow, and hailed. 'What ship's that?' said the first luff in her mizzen rigging. "'The _Seringapatam_, Honourable Company's ship, Captain Williamson!' sung out our first officer, with his cap off. 'Heave to, till I send a boat aboard of you,' hailed the naval man, and there we bobbed to each other with mainyards backed. In a few minutes a master's mate with gig's crew was under our lee-quarter, and the mate came on deck. 'Sir,' said he, 'the Port Admiral will thank you to deliver these despatches for Sir Charles Hyde, who I believe is aboard.' 'Certainly, sir,' said the first officer, 'they shall be given to him in an hour's time.' "'Good morning, and a fine voyage,' said the master's mate politely; and I took the occasion of asking if Captain Duncombe were on board the _Orestes_. 'No, sir,' answered the midshipman, 'he happens to be ashore at present.' I have seldom felt so relieved as when I saw the frigate haul round her main-yard, and go sweeping off to leeward, while we resumed our course. By noon we had sunk the land about Start Point, with a breeze which it was no use wasting at that season to take 'departures'; and as the afternoon set in hazy, we were soon out of sight of old England for good. For my part, I was bound eastward at last with a witness, and, like a young bear again, 'all my troubles before me.' "There is two bells though," interrupted the narrator, starting. "Let us see what sort of night it is before the ladies retire." CHAPTER IV The evening after that on which the commander of the _Gloucester_ Indiaman introduced his adventures, nearly the same party met on the poop to hear them continued. "Well then," began Captain Collins, leaning back against a stanchion of the quarter-rail, with folded arms, legs crossed, and his eyes fixed on the weather-leech of the mizzen-topsail to collect his thoughts; "well then, try to fancy the _Seringapatam_ in chase of the _Gloucester_; and if I _do_ use a few extra seaterms, I consider the ladies good enough sailors for them already. At any rate, just throw a glance aloft now and then, and our good old lady will explain herself; to her own sex, she ought to be as good as a dictionary, with signs for the hard words! "The second day out we had the wind more from seaward, which broke up the haze into bales of cloud, and away they went rolling in for the Bay of Biscay; with a longer wave and darker water, and the big old Indiaman surged over it as easily as might be, the blue breeze gushing right into her main-tack through the heave of the following seas, and the tail of the trade-wind flying high above her trucks in shreds and patches. Things got more ship-shape on deck; anchor-flukes brought in-board on the head-rail, and cables stowed away--the very best sign you can have of being clear of the land. The first officer, as they called him, was a good-looking fellow, that thought no small-beer of himself, with his glossy blue jacket and Company's buttons, white trousers, and a gold thread round his cap; he had it stuck askew to show how his hair was brushed; and changed his boots every time he came on deck. Still he looked like a sailor, if but for the East-India brown on his face, and there was no mistake about his knowing how to set a sail, trim yards, or put the ship about; so that the stiff old skipper left a great deal to him, besides trusting him for a first-rate navigator that had learned head-work at a naval school. The crew were to be seen all mustering before tea-time in the dog-watch, with their feet just seen under the foot mat of the fore-course, like actors behind a playhouse curtain--men that I warrant you had seen every country under heaven amongst them--as private as possible, and ready to enjoy their pots of tea upon the forecastle, as well as their talk. "However, all this was nothing to me, as I saw no sign of the passengers I had counted on. I could do little for poor Westwood but leave him to mope below, over his own thoughts. "If the Indian judge really chanced to be on board after all, he evidently fought shy of company, and perhaps meant to have his own mess-table under the poop as long as the voyage lasted; scarcely any of the ladies had apparently got their sea-qualms over yet, and, for all I knew, _she_ might not be with him, even if he were there; or, if she were, her father seemed quite Turk enough to keep her boxed up with jalousie-blinds, Calcutta fashion, and give her a walk in the middle watch, with the poop tabooed till morning. The jolly, red-faced indigo-planter was the only one that tried to get up anything like spirit at the table; indeed, he would have scraped acquaintance with me, if I had been in a mood for it; all I did was to say 'Yes' and 'No,' and to take wine with him. 'Poor fellow!' said he, turning to three or four of the cadets, that stuck by him like pilot-fish to an old shark, 'he's thinking of his mother at home, I daresay.' The fools thought this was meant for a joke, and began to laugh. 'Why, you unfledged griffins you,' said the planter, 'what d'ye see to nicker at, like so many jackals in a trap? D'ye suppose one thinks the less of a man for having a heart to be sick in, as well as a stomach--eh?' 'Oh, don't speak of it, Mr Rollock!' said one. 'Come, come, old boy,' said another, with a white moustache on his lip, ''twon't do for you to go the sentimental, you know.' 'Capsize my main-spanker, 'tis too funny, though,' put in a fellow who wore a glazed hat on deck, and put down all the ropes with numbers on paper, as soon as he had done being sick. The planter leant back in his chair, looked at them coolly, and burst out a-laughing. 'Catch me ever "going home" again,' said he. 'Of all the absurd occasions for impudence with the egg-shell on its head coming out, hang me if these fifteen thousand miles of infernal sea-water ain't the worst. India for ever!--that's the place to _try_ a man. He's either sobered or gets room to work there; and just wait, my fine fellows, till I see _you_ on the Custom-house _Bunda_ at Bombay, or setting off up country--you're all of you the very food for _sircars_ and _coolies_. That quiet lad there, now, soft as he looks'--meaning me--'I can tell by his eye he won't be long a griff--he'll do something. I tell you what, as soon as he's tasted his first mango-fish, he'll _understand_ the country. Why, sir,' said he again, smacking his lips, ''tis worth the voyage of itself--you begin a new existence so to speak. I'll be bound all this lot o' water don't contain one single mango-fish. Remember, boys, I promised you all a regular blow-out of mango-fish, and _florican_ with bread-sauce, whenever you can get across to Chuckbully Factory.' 'Blow, good breeze, then; blow away the main jib!' said the nautical young gentleman; 'I'll join you, old fellow!' 'Not the best way to bring it about, though,' said the indigo-planter, good-naturedly, not knowing but there _was_ such a sail on the ship. "The yellow setting sun was striking over the starboard quarter-boat, and the Bay of Biscay lay broad down to leeward for a view--a couple of large craft, with all studding-sails set before the wind, making for land, far enough off to bring their canvas in a piece, and begin to look blue with the air--one like a milk-woman with pitchers and a hoop; the other like a girl carrying a big bucketful of water, and leaning the opposite way to steady herself. There was one far to north-east, too, no more than a white speck in the grey sky; and the land-cloud went up over it into so many sea-lions' heads, all looking out of their manes. The children clapped their hands and laughed; and the ladies talked about the vessels, and thought they saw land--Spain or the Pyrenees, perhaps. However, it wasn't long before my American friend Snout caught sight of me in the midst of his meditations, as he turned bolt round on his toes to hurry aft again. 'The fact is, mister,' said he, '_I'm_ riled a little at _the_ tarnation pride of you Britishers. There now,' said he, pointing at the blaze of the sun to westward, with his chin, 'there's _a_ consolation. I calculate the sun's just over Noo-York, which I expect to give you old country folks considerable pain.' "'No doubt,' said I, with a sigh; 'one can't help thinking of a banker run off with ever so much English gold.' 'You're a sensible chap, you are. It's _a_ right-down asylum _for_ oppressed Eur_o_pains--that can't be denied.' 'And Africans, too,' I put in. 'Indy, now,' said he; 'I reckon there's a sight of dollars made in that country--you don't s'pose I'm goin' out there for _nothing_? We'll just take it out o' your hands yet, mister. I don't ought to let you into the schim till I know you better, you see; but I expect to want a sort o' company got up before we land. There's one of your nabobs now came into the ship at Possmouth, with a whole tail of niggurs dressed up----' 'And a lady with him, I think?' said I, as coolly as I could. 'I'll somehow open on that chap about British tyranny, I guess, after gettin' a little knowledge out of him. We'd just _rise_ the niggurs, if they had _not_ such a right-down cur'ous _my_thullogy--but I tell you now, mister, that's one of the very p'ints I expect to meet. Miss'naries won't do it so slick off in two thousand years, I kinder think, as this identical specoolation will in _ten_--besides payin' like Peruvain mines, which the miss'nary line don't. I'm a regoolar down-easter, ye see--kinder piercin' into a subject, like our nation in gin'ral--and the whull schim hangs together a little, I calculate, mister?' 'So I should think, Mr Snout, indeed,' I said. Here the American gave another chuckle, and turned to again on his walk, double quick, till you'd have thought the whole length of the poop shook, when who should I see with the tail of my eye but my friend the _kitmagar_ salaaming to Mr Snout by the break of the quarter-deck. The Yankee seemed rather taken aback at first, and didn't know what to make of him. 'S'laam sah'b,' said the dark servant with an impudent look, and loud enough for me to hear, as I stepped from aft. 'Judge sahib i-send genteeman salaam--say too much hivvy boot he get--all same as _illimphant_. S'pose master not so much loud walk _this_ side?' '_Well!_' broke out the American, looking at the Bengalee's flat turban and moustache, as if he were too great a curiosity to be angry with, then turning on his heel to proceed with his walk. 'Now, mister,' said he to me, 'that's what I call an incalculable imp_u_dent black; but he's the first I ever saw with hair on his lip, it's a fact.' 'Master not _mind_?' said the _kitmagar_, raising his key next time Mr Snout wheeled round. 'Judge sahib burra burra buhadoorkea!--ver' great man!' 'Low niggur!' said Mr Snout, tramping away aft; 'there's your British regoolations, I say, young man--niggurs baaing on the quarter-deck, and free-born citizens put off it!' '_Bhote khoob_, mistree!' squeaked out the native again; 'burra judge sahib not to i-sleep apter he dine, eh? Veri well; I tell the sahib, passiger mistree moor stamp-i-stamp all the moor I can say!' So off he went to report in the poop-cabin. A little after up shot a head wrapped in a yellow bandana, just on the level of the poop-deck, looking through the breast-rail; and the next thing I saw was the great East-Indian himself, with a broad-flapped Manilla hat over his topgear, and a red-flowered dressing-gown, standing beside the binnacle with Captain Williamson. 'What the deuce, Captain Williamson,' said the judge, with an angry glance up to the poop,' cannot I close my eyelids after dinner for one instant--in my own private apartments, sir--for his hideous noise? Who the deuce _is_ that person there--eh, eh?' 'He's an American gentleman, I believe, Sir Charles,' replied the captain. '_Believe_, sir,' said the judge; 'you ought to _know_ every individual, I think, Captain Williamson, whom you admitted into this vessel. I expressly stipulated for quiet, sir--I understood that no suspicious or exceptionable persons should travel in the same conveyance with _my_ suwarry. I'd have taken the whole ship, sir!' 'I've no more to do than tell him the regulations aboard, Sir Charles,' said the captain, 'and the annoyance will cease.' '_Tell_ him, indeed!' said the judge, a little more good-humouredly. 'Why, captain, the man looks like a sea-pirate. You should have taken only such raw griffins as that young lad on the other side. Ho, _kitmagar_!' '_Maharaj?_' said the footman, bowing down to the deck. '_Slippers lao!_' '_Jee khodabund_,' answered the native, and immediately after he reappeared from the round-house door, with a pair of turned-up yellow slippers. 'Take them up with my salaam to that gentleman there,' said Sir Charles, in Hindoostanee, 'and ask him to use them.' 'Hullo!' sung out Mr Snout, on being hove-to by the _kitmagar_, with one hand on his breast, and the other holding the slippers, 'this won't do! You'd better not _rile_ me again, you cussed niggur you. Out o' my way!' There they went at it along the poop together, Mr Snout striding right forward with his long legs, and the _kitmagar_ hopping backward out of his way, as he tried to make himself understood; till, all at once, the poor darkey lost his balance at the ladderhead, and over he went with a smash fit to have broken his neck, if the captain's broad back hadn't fortunately been there to receive it. The rage of Sir Charles at this was quite beyond joking; nothing else would satisfy him but the unlucky Yankee's being shoved off the poop by main force, and taken below--the one stamping and roaring like an old buffalo, and the other testifying against all 'aristocratycal t_y_ranny.' "At eight bells again I found it a fine, breezy night, the two upper mates walking the weather quarter-deck in blue-water style, six steps and a look to windward, then a wheel round, and, now and then, a glance into the binnacle. I went aft and leant over the _Seringapatam's_ lee quarter, looking at the white back-wash running aft from her bows, in green sparks, into the smooth alongside, and the surge coming round her counter to meet it. Everything was set aloft that could draw, even to a starboard main-topmast stunsail; the high Indiaman being lighter than if homeward-bound, and the breeze strong abeam, she had a good heel-over to port; but she went easily through the water, and it was only at the other side you heard it rattling both ways along the bends. The shadow of her went far to leeward, except where a gleam came on the top of a wave or two between the sails and under their foot. Just below the sheer of the hull, aft, it was as dark as night, though now and then the light from a port struck on it and went in again; but every time she sank, the bight of her wake from astern swelled up away round the counter, with its black side as smooth as a looking-glass. I kept peering into it, and expecting to see my own face, while all the time I was very naturally thinking of one quite different, and felt uneasy till I should actually see her. 'Confound it,' I thought, 'were it only a house, one might walk round and round it till he found out the window.' I fancied her bewitching face through the garden-door, as clearly as if I saw it in the dark head of the swell; but I'd have given more only to hear that imp of a cockatoo scream once--whereas there was nothing but the water working up into the rudder-case; the pintles creaking, and the tiller-ropes cheeping as they traversed; and the long welter of the sea when the ship eased down, with the surgeon and his friends walking about and laughing up to windward. From that again, I ran on putting things together, till, in fact, Jacobs' notion of a shipwreck seemed by far the best. No doubt Jacobs and Westwood, with a few others, would be saved, while I didn't even object much to the old nabob himself, for respectability's sake, and to spare crape. But, by Jove, wouldn't one bring him to his bearings soon enough there? Every sailor gets hold of this notion some night-watch or other, leaning over the side, with pretty creatures aboard he can scarce speak to otherwise; and I was coiling it down so fast myself, at the moment, that I had just begun to pitch into the nabob about our all being Adam's sons and daughters, under a knot of green palm-trees, at the door of a wooden house, half thatched with leaves, when I was brought up with a round turn by seeing a light shining through the hazy bull's-eye in the deck where I stood. No doubt the sweet girl I had been thinking of was actually there, and going to bed; I stretched over the quarter, but the heavy mouldings were in the way against seeing more than the green bars of the after window--all turned edgeways to the water, where the gallery hung out like a corner turret from the ship's side. Now and then, however, when she careened a little more than ordinary, and the smooth lee swell went heaping up opposite, I could notice the light through the venetians from the state-room come out upon the dark water in broad bright lines, like the grate across a fire, then disappearing in a ripple, till it was gone again, or somebody's shadow moved inside. It was the only lighted window in the gallery, and I looked every time it came as if I could see in; when at last, you may fancy my satisfaction, as, all of a sudden, one long slow heave over of the ship showed me the whole bright opening of the port, squared out of her shadow, where it shone upon the glassy round of the swell. 'Twas as plain as from a mirror in a closet--the lighted gallery window with its frame swung in, a bit of the deck-roof I was standing on, and two female figures at the window--mere dark shapes against the lamp. I almost started back at the notion of their seeing me, but away lengthened the light on the breast of the swell, and it sank slowly down into a black hollow, as the Indiaman eased up to windward. Minute by minute, quite breathless, did I watch for such another chance; but next time she leant over as much, the port had been closed, and all was dark; although those few moments were enough to send the heart into my mouth with sheer delight. The figure I had seen, holding with one hand by the port-sill, and apparently keeping up her dress with the other, as if she were looking down steadily on the heave of the sea below--it couldn't be mistaken. The line of her head, neck, and shoulders, came out more certain than if they hadn't been filled up with nothing but a black shadow; it was just Lota Hyde's, as she sat in the ball-room amongst the crowd, I'd have bet the _Victory_ to a bumboat on it; only her hair hung loose on one side, while the girl behind seemed to be dressing the other, for it was turned back, so that I saw clear past her cheek and neck to where the lamp was, and her ear gleamed to the light. For one moment nothing could be plainer than the glimpse old Davy Jones gave me by one of his tricks; but the old fellow was quite as decorous in his way as a chamber-blind, and swallowed his pretty little bit of blab as quickly as if it had been a mermaid caught at her morning toilet. Whenever I found there was to be no more of it for the night, the best thing to calm one's feelings was to light a cigar and walk out the watch; but I took care it should rather be over the nabob's head than his daughter's, and went up to the weather side, where there was nobody else by this time, wishing her the sweetest of dreams, and not doubting I should see her next day. "I daresay I should have walked out the first watch, and the second too, if Westwood hadn't come up beside me before he turned in. "'Why, you look like the officer of the watch, Ned!' said my friend, after taking a glance round at the night. 'Yes--what?--a--a--I don't think so,' stammered I, not knowing what he said, or at least the meaning of it, though certainly it was not so deep. 'I hope not though, Tom!' said I again; ''tis the very thing I don't want to look like!' 'You seem bent on keeping it up, and coming the innocent, at any rate,' said he; 'I really didn't know you the first time I saw you in the cuddy.' 'Why, man, you never saw our theatricals in the dear old _Iris_, on the African station! I was our best female actor of tragedy there, and _did_ Desdemona so well that the black cook, who stood for Othello, actually cried. He said, "Nobody but 'ee dibble umself go for smudder Missee Dasdemoner!"' 'I daresay,' said Westwood; 'but what is the need for it _now_, even if _you_ could serve as a blind for me?' 'My dear fellow,' said I, 'not at all--you've kept it up very well so far--just go on.' 'Keep it up, Ned?' inquired he--'what do you mean? I've done nothing except keep quiet from mere want of spirits.' 'So much the better,' I said; 'I never saw a man look more like a prophet in the wilderness; it doesn't cost you the least trouble--why you'd have done for Hamlet in the _Iris_, if for nothing else! After all, though, a missionary don't wear blue pilot cloth trousers, nor tie his neckerchief as you do, Tom. You must bend a white neck-cloth to-morrow morning! I'm quite serious, Westwood, I assure you,' continued I. 'Just think of the suspicious look of two navy men being aboard an Indiaman, nobody knows how! Why, the first frigate we speak, or port we touch at, they'd hand one or both of us over at once--which I, for my part, shouldn't at all like!' 'Indeed, Collins,' said Tom, turning round, 'I really cannot understand _why_ you went out in her! It distresses me to think that here you've got yourself into this scrape on my account! At least you'll put back in the first home-bound ship we----' "'Oh!' exclaimed I, blushing a little in the dark though, both at Westwood's simplicity, and my not wishing to tell him my secret yet--'I'm tired of shore--I _want_ to see India again--I'm thinking of going into the _army_!' 'The _army_, indeed!' said Westwood, laughing for the first time, 'and you still midshipman all over. No, no--that won't do! I see your drift, you can't deceive _me_! You're a true friend, Ned, to stand by an old schoolmate so!' 'No, Tom!' said I; ''tis you yourself that has too kind a heart, and more of a sailor's, all fair and above-board, than I can manage! I _won't_ humbug _you_, at any rate--I tell you I've got a scheme of my own, and you'll know more of it soon.' Tom whistled; however I went on to tell him, 'The long and the short of it is, Westwood, you'll bring both of us down by the head if you don't keep up the missionary.' 'Missionary!' repeated he; 'you don't mean to say you and Neville intended all that long toggery you supplied my kit with, for me to sail under _missionary_ colours? I tell you what, Ned, it's not a character I like to cut jokes upon, much less to sham.' 'Jokes!' said I; 'there's no joking about it; 'tis serious enough.' 'Why,' said Westwood, '_now_ I know the reason of a person like a clergyman sighting me through his spectacles for half an hour together, these two evenings below! This very afternoon he called me his brother, and began asking me all manner of questions, which I could no more answer than the cook's mate.' 'Clergyman be hanged!' said I, 'you must steer clear of him, Tom--take care you don't bowse up your jib too much within hail of him! Mind, I gave your name, both to the head-steward and the skipper, as the Reverend Mr Thomas, going back to Bombay. There was nothing else for it, Westwood,' I said, 'when you were beyond thinking for yourself. All you've got to do with that solemn dissenting chap in the spectacles is just to look as wise as possible, and let him know you belong to the _Church_. And as for shamming, you needn't sham a bit--_take to it_, my dear fellow, if that will do you good.' I said this in joke, but Westwood seemed to ponder on it for a minute or two. 'Indeed, Collins,' said he gravely, 'I _do_ think you're right. What do we sailors do but give up everything in life for a mere schoolboy notion, and keep turning up salt water for years together like the old monks did the ground; only they grew corn and apples for their pains, and we have nothing but ever so many dull watches and wild cruises ashore to remember! How many sailors have turned preachers and missionaries, just because something, by accident, as it were, taught them to put to account what you can't help feeling now and then in the very _look_ of the sea. What does it mean in the Scriptures, Ned, about "seeing the wonders of the Lord in the deep?"' As Westwood said this, both of us stopped on the taffrail, and, somehow or other, a touch of I didn't well know _what_ went through me. I held my breath, with his hand on my arm, just at the sight I had seen a thousand times--the white wake running broad away astern, with a mark in the middle as if it had been torn, on to the green yeast of the waves, then right to their black crests plunging in the dark. It was midnight ahead, and the clouds risen aloft over where I had been looking half-an-hour before; but the long ragged split to westward was opened up, and a clear glaring glance of the sky, as pale as death, shot through it on the horizon. '_I_ can't be sorry for having gone to sea,' said Westwood again; 'but isn't it a better thing to leave home and friends, as those men do for the sake of carrying the Gospel to the heathen?' As soon as we wheeled round, with the ship before us, leaning over and mounting to the heave, and her spread of canvas looming out on the dark, my thoughts righted. 'Well,' said I, 'it may be all very well for some--everyone to his rope; but, for my part, I think if man hadn't been made for the sea, he couldn't have built a ship, and where would your missionaries be _then_? You're older than I am, Westwood, or I'd say you let some of your notions run away with you, like a Yankee ship with her short-handed crew!' 'Oh, Ned,' said he, 'of all places in the world for one's actions coming back on him the sea is the worst, especially when you're an idler, and have nothing to do but count the sails or listen to the passengers' feet on deck. These two days, now, I've thought more than I ever did in my life. I can't get that man's death out of my head; every time the sea flashes round me as I come from below, I think of him--it seems to me he is lying yet by the side of the Channel. I can't help having the notion he perhaps _fired in the air_!' ''Twas a base lie!' said I; 'if _he_ weren't _there_, you wouldn't be here, I can tell you, Westwood.' 'I don't know how I shall ever drag through this voyage,' continued he. 'If there were a French gunboat to cut out to-morrow morning, or if we were only to have a calm some day in sight of a Spanish slaver--'tis nothing but a jogging old Indiaman though! I shall never more see the flag over my head with pride--every respect I had was in the service!' CHAPTER V "Next morning was fine, and promised to be hot; the ship still with a side-wind from near south-west, which 'twas easy to see had slackened since midnight with a pour of rain, the sails being all wet, and coats hung to dry in the fore-rigging; she was going little more than five or six knots headway. The water was bluer, lifting in long waves, scarce a speck of foam except about the ship; but instead of having broke up with the sun, or sunk below the level, the long white clouds were risen high to leeward, wandering away at the top, and facing us steady below out of the sky, a pretty sure sign they had more to do. However, the Indiaman was all alive from stem to stern; decks drying as clean as a table; hens and ducks clucking in the coops at their food; pigs grunting; stewards and cabin-boys going fore and aft, below and above, and the men from aloft coming slowly down for breakfast, with an eye into the galley funnel. Most of the passengers were upon deck, in knots all along the poop-nettings, to look out for Corvo and Flores, the western-most of the Azores, which we had passed before daybreak. "'I say, Fawd!' said the warlike cadet with the moustache, all of a sudden yawning and stretching himself, as if he'd been struck with the thing himself, 'cussed dull this vessel already, ain't it?' 'No,' said Ford, the nautical man; 'that's because you're not interested in the ocean--the sea--as I am! You should study the _craft_, Bob, my boy! I'll teach you to go aloft. I only wish it would blow harder--not a mere capful of wind, you know, but a tempest!' 'By Jove! Fawd,' said the other, '_how_ we _shall_ enjoy India--even that breakfast with old Rollock! By-the-by, ain't breakfast ready yet?' These two fellows, for my part, I took for a joint-model, just trying to hit a mid-helm betwixt them, else I couldn't have got through it; accordingly they both patronised me. 'Haw, Cawlins!' said one, nodding to me. 'Is that you, my boy?' said the other; 'now, you're a fellow _never_ would make a sailor!' 'I daresay not,' I said gravely, 'if they have all to commence as horse-marines.' 'Now, such ignorance!' said Ford; 'marines don't ride horses, Collins, you fellow!--how d'you think they could be _fed_ at sea, eh?' 'Well--now--that didn't occur to me!' said I, in the cadet key. 'Fawd, my boy, you know too much--you're quite a sea-cook!' 'Oh, now! But I'm afraid, Winterton, I never shall land ashore in India--I _am_ tempted to go into the navy, instead.' 'I say, Mr Ford,' put in a fat unlicked cub of a tea-middy, grinning as he listened, 'I've put you up to a few _rises_ aboard, but I don't think I told you we've got a dozen or so of _donkeys_[11] below in the steerage?' 'Donkeys!--no?' said the griffin. 'Yes,' replied the midshipman; 'they kick like mad, though, if they get loose in a gale: why mine, now, would knock a hole through the side in no time--I'll show you them for a glass of grog, Mr Ford.' [11] Sea slang for sailors' chests. "'Done!' and away they went. 'That fool, Fawd, you know, Cawlins, makes one sick with his stuff; I declare he chews little bits of tobacco in our room till he vomits as much as before,' said Winterton. 'I tell you what, Cawlins, you're a sensible man--I'll let you into a secret! What do you think--there's the deucedest pretty girl in the vessel, we've none of us seen except myself; I caught a sight of her this very mawning. She don't visit the cuddy at all; papa's proud, you pusseeve--a nabob, in short!' 'Oh dear!' said I. 'Yes, I do assure you, quite a bew-ty! What's to be done?--we absolutely must meet her, eh, Cawlins?' Here I mused a bit. 'Oh!' said I, looking up again, 'shall we send a deputation, do you think?' 'Or get up a ball, Cawlins? Hallo, what's this?' said he, leaning over the breast-rail to look at a stout lady who was lugging a chubby little boy of three or four, half dressed, up the poop-stair, while her careful husband and a couple of daughters blocked it up above. 'See, Tommy, dear!' said she, 'look at the _land_--the nice land, you know, Tommy.' 'Come away, my love,' said her spouse, 'else you won't see it.' Tommy, however, hung back manfully. 'Tommy don't want wook at _yand_,' sang out he, kicking the deck; 'it all such 'mell of a sheep, ma; me wook at 'at man wis _gate feel_. Fare other _feel_, man? Oh, fat a ugwy man!' The honest tar at the wheel pulled up his shirt, and looked terribly cut at this plain remark on his phiz, which certainly wasn't the most beautiful; meanwhile he had the leech of the mainto'gallant-sail shaking. 'Mind your helm, there,' sung out the second mate from the capstan. 'My good man,' said the lady, 'will you be so kind as to show us the land?' 'Ay, ay, sir,' growled he, putting up his weather spokes; 'sorry I carn't, ma'am--please not to speak to the man at the wheel.' Jacobs was coiling down the ropes on a carronade close by, and stepped forward: 'Beg your ladyship's pardon,' said he, 'but if ye'll give me charge o' the youngster till you goes on the poop--why, I've got a babby at home myself.' The stout lady handed him over, and Jacobs managed the little chap wonderfully. This was the first time Tommy had been on deck since leaving home, and he couldn't see over the high bulwarks, so he fancied it was a house he was in. 'Oh, suts big _tees, man_,' shouted he, clapping his hands as soon as he noticed the sails and rigging aloft; 'suts warge birds in a _tees_.' 'Ay, ay, my little man,' answered Jacobs, 'that's the wonderful _tree_. Did ye ever hear Jack and the Bean-stalk, Tommy?' 'Oh, 'ess, to be soo, _man_,' said Tommy, scornfully, as if he should think he had. "'Well, little un,' said Jacobs, 'that's it, ye see. It grows up every night afore Jack's door--and them's Jack an' his brothers a-comin' down out on the wonderfowl country aloft, with fruits in their hands.' The little fellow was delighted, and for going aloft at once. 'Ye must wait a bit, Tommy, my lad, till you're bigger,' said Jacobs; 'here, I'll show you the country, though'; so he lifted the boy up to let him see the bright blue sea lying high away round the sky. In place of crying, as he would have done otherwise, Tommy stared with pleasure, and finished by vowing to get as soon big as possible, Jacobs advising him to eat always as hard as he had been doing hitherto. "That morning the breakfast party was in high spirits; Mr Finch, the chief officer, rigged up to the nines in white trousers and Company's jacket, laying himself out to please the young ladies, with whom he began to be a regular hero. He was as blustering as a young lion, and as salt-tongued as a Channel pilot to the men; but with the ladies, on the poop or in the cabin, he was always twisting his sea-talk into fine language, like what you see in books, as if the real thing weren't good enough. He rubbed his hands at hearing the mate on deck singing out over the skylight to trim yards, and gave a look along to the captain. 'You must understand, ladies,' said the mate, 'this is what we mariners call the "ladies' wind"!' 'Oh, delightful!' 'Oh, _so_ nice!' 'You sailors _are_ so polite!' exclaimed the young ladies--'then does it actually _belong_ to us?' 'Why it's a _Trade_ wind, Miss Fortescue!' said Ford, the nautical cadet, venturing to put in a word; but the ladies paid no attention to him, and the chief mate gave him a look of contempt. 'You see, ladies, the reason is,' said the mate, in a flourishing way, 'because it's so regular, and as gentle as--as--why it wafts your bark into the region of, you see--the----' 'The "Doldrums,"' put in the third mate, who was a brinier individual by far, and a true seaman, but wished to pay his compliments, too, between his mouthfuls. 'At any rate,' Finch went on, 'it's congenial, I may say, to the feelings of the fair--you need never touch her braces from one day to another. I just wish, Miss Fortescue, you'd allow me the felicity of letting you see how to put the ship about.' 'A _soldier_ might put her in stays, miss,' said the third mate again, encouragingly, 'and out of 'em again; she's a remarkably easy craft, owing to her----' 'Confound it, Mr Rickett,' said the first mate, turning round to his unlucky inferior, 'you're a sight too coarse for talking to ladies. Well the captain didn't hear you!' Rickett looked dumfoundered, not knowing what was wrong; the old ladies frowned; the young ones either blushed or put their handkerchiefs to their mouths, and some took the occasion for walking off. "The weather began to have a different turn already by the time we got up--the clouds banking to leeward, the sea dusky under them, and the air-line between rather bluish. Two or three lazy gulls in our wake began to look alive and show themselves, and a whole black shoal of porpoises went tumbling and rolling across the bows for half an hour, till down they dived of a sudden, head-foremost, one after another in the same spot, like so many sheep through a gap. "My gentleman-mate was to be seen everywhere about the decks, and active enough, I must say; the next minute he was amongst two or three young ladies aft, as polite as a dancing-master, showing them everything in board and out, as if nobody knew it except himself. Here a young girl, one of Master Tommy's sisters, came skipping aft, half in a fright. 'Oh, Miss Fortescue!' cried she, 'just think!--I peeped over into a nasty black hole there, with a ladder in it, and saw ever so many common sailors hung up in bags from the ceiling. Oh, what do you think, one of them actually kissed his hand to me.' 'Only one of the watch below awake, miss,' said the mate; 'impertinent swab--I only wish I knew which it was.' 'Poor fellows,' said the young ladies, 'pray don't be harsh to them; but what have they been doing?' 'Oh, nothing,' said he, with a laugh, 'but swing in their hammocks since eight bells.' 'Then are they so lazy as to dislike getting up to such delightful-looking occupations?' 'Why, ma'am,' said the mate, staring a little, 'they've been on deck last night two watches, of four hours each, I must say that for them.' 'Dear me!' broke out the ladies; and on this the chief officer took occasion to launch out again concerning 'the weary vigils,' as he called them, 'which we mariners have to keep, far distant from land, without a smile from the eyes of the fair to bless us. But, however, the very thought of it gives courage to the sailor's manly heart, to disregard the billows' fearful rage, and reef topsails in the tempest's angry height!' Thought I, 'He'd much better do it before.' However, the young ladies didn't seem to see that, evidently looking upon the mate as the very pink of seamen! and he actually set a second lower stud-sail, to show them how fast she could walk. "'D'ye know, sir,' put in the third mate, coming from forward, 'I'm in doubt it's going to be rather a sneezer, sir, if ye look round the larboard stun-s'ls.' Sure enough, if our fine gentleman had had time, amidst his politeness, just to cast an eye beyond his spread of cloth, he would have noticed the clouds gathered all in a lump to north-eastward, one shooting into another--the breast of them lowering down to the horizon, and getting the same colour as the waves, till it bulked out bodily in the middle. You'd have fancied the belly of it scarce half-a-mile off from the white yard-arms, and the hollow of it twenty--coming as stealthily as a ghost, that walks without feet after you, its face to yours, and the skirt of its winding-sheet in 'kingdom-come' all the while. I went up on the poop, and away behind the spanker I could see the sun gleam for one minute right on the eye of a stray cloud risen to nor'-west, with two short streaks of red, purple, and yellow together--what is called a 'wind-gall'; then it was gone. The American was talking away with jovial old Rollock and Ford, who began to look wise, and think there was mischief brewing in the weather. 'Mind your helm there, sirrah!' sung out the mate, walking aft to the wheel, as everything aloft fluttered. 'She won't lie her course, sir,' said the man. 'All aback, for'ud!' hailed the men at work on the bowsprit; and hard at it went all hands, trimming yards over and over again; the wind freshening fast, stu'nsails flapping, booms bending, and the whole spread of canvas in a cumber, to teach the mate not to be in such a hurry with his absurd merchantman's side-wings next time. The last stu'nsail he hauled down caught full aback before the wheel could keep her away quick enough; the sheet of it hitched foul at the boom-end, and crack through went the boom itself, with a smash that made the ladies think it a case of shipwreck commencing. The loose scud was flying fast out from behind the top of the clouds, and spreading away overhead, as if it would catch us on the other side; while the clouds themselves broke up slowly to both hands, and the north-east breeze came sweeping along right into the three topsails, the wind one way and the sea another. As she rounded away steadying before it, you felt the masts shake in her till the topsails blew out full; she gave one sudden bolt up with her stern, like an old jackass striking behind, which capsized three or four passengers in a heap, and next minute she was surging along through the wide heave of the water as gallantly as heart could wish, driving a wave under her bows that swung back under the fore-chains on both sides, with two boys running up the rigging far aloft on each mast to stow the royals. The next thing I looked at was poor Ford's nautical hat lifting alongside on the top of a wave, as if it were being handed up to him; but no sooner seen, than it was down in the hollow a quarter of a mile off, a couple of white gulls making snatches at it and one another, and hanging over it again with a doubtful sort of scream. Still the wind was as yet nothing to speak of when once aft; the sea was getting up slowly, and the Indiaman's easy roll over it made everyone cheerful, in spite of the shifts they were put to for getting below. When the bell struck for dinner, the sun was pretty clear, away on our starboard bow; the waves to south-westward glittered as they rose; one side of the ship shone bright to the leech of the mainto'gallant-sail, and we left the second mate hauling down the jibs for want of use for them. "The splendid pace she went at was plain, below in the cuddy, to everybody; you felt her shoving the long seas aside with the force of a thousand horses in one, then sweep they came after her, her stern lifted, she rolled round, and made a floating rush ahead. In the middle of it, something darkened the half-open skylight, where I perceived the Scotch second mate's twisted nose and red whiskers, as he squinted down with one eye aloft, and disappeared again; after which I heard them clue up to'gallant-sails. Still she was driving through it rather too bodily to let the seas rise under her; you _heard_ the wind hum off the main-topsail, and sing through betwixt it and the main-course, the scud flying over the skysail-mast truck, which I could see from below. The second mate looked in once more, caught the first officer's eye with a glance aloft, and the gallant mate left attending to the ladies to go on deck. Down went the skylight frame, and somebody carefully threw a tarpaulin over it, so that there was only the light from the port windows, by which a dozen faces turned still whiter. "The moment I shoved my head out of the booby-hatch, I saw it was like to turn out a regular gale from nor'-east. Both courses brailed close up, and blowing out like rows of big bladders; the three topsail-yards down on the caps to reef, their canvas swelling and thundering on the stays like so many mad elephants breaking loose; the wild sky ahead of us staring right through in triumph, as it were, and the wind roaring from aft in her bare rigging; while a crowd of men in each top were laying out along the foot-ropes to both yard-arms. Below, they were singing out at the reef-tackles, the idlers tailing on behind from the cook to the cabin-boys, a mate to each gang, and the first officer, with his hands to his mouth, before the wheel, shouting, 'Bear a hand!--d'ye hear!----two reefs.' It did one's heart good, and I entered into the spirit of it, almost forgiving Finch his fine puppy lingo, when I saw him take it so coolly, standing like a seaman, and sending his bull's voice right up with the wind into the bellies of the topsails--so I e'en fell to myself, and dragged with the steward upon the mizzen reef-tackle till it was chock up. There we were, running dead before it, the huge waves swelling long and dark after us out of the mist, then the tops of them scattered into spray; the glaring white yards swayed slowly over aloft, each dotted with ten or a dozen sturdy figures, that leant over, with the reef-points in their hands, waiting till the men at the _earings_ gave the word; and Jacobs' face, as he turned round to do so--hanging on heaven knows what at one of the ends--was as distinct as possible against the gray scud miles off, and sixty feet above water. A middy, without his cap, and his hair blowing out, stood holding on in the maintop to quicken them; the first mate waved his hand for the helmsman to 'luff a little.' The ship's head was rounded slowly up as she rose on a big blue swell, that caught a wild gleam on it from westward, when I happened to glance towards the wheel. I could scarcely trust my eyes--in fact it had never been less in my mind since coming aboard than at that very point--but outside one of the round-house doors, which was half open, a few feet from the bulwark I leant over--of all moments in the day, _there_ stood Lota Hyde herself at last. Speak of faces!--why I hadn't even power to turn farther round, and if I was half out of breath before, what with the wind and with pulling my share, I was breathless now--all my notions of her never came up to the look of her face at that instant. She just half stopped, as it were, at sight of the state of things, her hands letting go of the large shawl, and her hair streaming from under a straw hat tied down with a ribbon--her lips parted betwixt dread and bewilderment, and her eyes wandering round till they settled to gazing straight at the scene ahead in pure delight. I actually looked away aloft from her again, to catch what it was she seemed to see that could be so beautiful!--the second reef just made fast, men crowding in to run down and hoist away with the rest, till, as they tailed along decks, the three shortened topsails rose faster up against the scud, and their hearty roaring chorus was as loud as the gale. 'Keep her away, my lad,' said the mate, with another wave of his hand; the topsails swelled fair before it, and the Indiaman gave a plunge right through the next sea, rising easily to it, heave after heave. The setting sun struck two or three misty spokes of his wheel through a cloud, that made a big wave here and there glitter; the ship's white yards caught some of it, and a row of broad backs, with their feet stretching the foot-rope as they stowed the foresail, shone bright out, red, blue, and striped, upon the hollow of the yellow fore-topsail, in the midst of the gale; while just under the bowsprit you saw her black figure-head, with his white turban, and his hand to his breast, giving a cool salaam now and then to the spray from her bows. At that moment, though, Lota Hyde's eye was the brightest thing I could find--all the blue gone out of the waves was in it. As for her seeing myself, I hadn't had space to think of it yet, when all of a sudden I noticed her glance light for the first time, as it were, on the mate, who was standing all the while with his back to her on the same plank of the quarter-deck. 'Down main-course!' he sung out, putting one hand in his jacket-pocket; 'down both tacks--that's it, my men--down with it!'--and out it flapped, slapping fiercely as they dragged it by main force into the bulwark-cleets, till it swelled steady above the main-stay, and the old ship sprang forward faster than before, with a wild wash of the Atlantic past her sides. "'Another hand to the wheel, here!' said the first officer. He took a look aloft, leaning to the rise of her bows, then to windward as she rolled; everything looked trim and weatherly, so he stepped to the binnacle, where the lamp was ready lighted; and it just struck me what a smart, good-looking fellow the mate was, with his sunburnt face; and when he went to work, straightforward, no notion of showing off. "'Confound it, though,' thought I of a sudden, seeing _her_ eyes fixed on him again, and then to seaward. 'Mr Macleod,' said he to the second mate, 'send below the watch, if you please. This breeze is first-rate, though!' "When he turned round he noticed Miss Hyde, started, and took off his cap with a fine bow. 'I beg pardon, ma'am,' said he, 'a trifle of wind we have. I hope, Miss Hyde, it hasn't troubled you in the round-house?' What Miss Hyde might have said I don't know, but her shawl caught a gust out of the spanker, though she was in the lee of the high poop; it blew over her head, and then loose--I sprang forward--but the mate had hold of it, and put it over her again. The young lady smiled politely to the mate, and gave a cold glance of surprise, as I thought, at me. I felt that moment I could have knocked the mate down and died happy. 'Why, sir,' said he, with a cool half-sneer, 'I fancied none of you gentlemen would have favoured us this capful of wind--plenty of air there is on deck, though.' "It just flashed through my mind what sort of rig I was in--I looked over my infernal longshore toggery, and no wonder she didn't recollect me at all. '_Curse_ this confounded folly!' muttered I, and made a dart to run up the poop-steps, where the breeze took me slap aback, just as the judge himself opened the larboard door. 'Why, Violet,' exclaimed he, surprised at seeing his daughter, 'are you exposing yourself to this disagreeable--I declare a perfect _storm_.' 'But see, papa!' said she, taking hold of his arm, 'how changed the sea is!--and the ship!--just look where the sun was!' 'Get in--get in, do!' kept on her father; 'you can see all that again in some finer place; you should have had a servant with you, at least, Violet.' 'I shall come out oftener than I thought, papa, I can tell you!' said she, in an arch sort of way, before she disappeared. "The mate touched his cap to the judge, who asked where the captain was. ''Gad, sir,' said the judge crossly, 'the floor resembles an earthquake--every piece of furniture swings, sir; 'tis well enough for sleeping, but my family find it impossible to dine. If this _oolta-poolta_ continues in my apartments, I must speak to Captain Williamson about it. He must manage to get into some other part of the sea, where it is less rough,' saying which, he swayed himself in and shut the door. "I still kept thinking and picturing _her_ face--Lota Hyde's--when she noticed the mate. After all, any one that knew tack from bowline might reef topsails in a fair wind; but a girl like _that_ would make more count of a man knowing how to manage wind and sea than of the Duke on his horse at Waterloo beating Bonaparte; and as for talk, he would jaw away the whole voyage, no doubt, about moonlight and the ocean, and your genteel fancy mariners. 'By George, though!' thought I, 'if the mate's a better man than me, hang me--it's all right; but burn my wig if I don't go and turn a Hindoo fakeer, with my one arm stuck up in the air till I die. Go it, old lady,' said I, as I glanced over the side before going below for the night, 'roll away, only shake something or other to _do_ out of the pace you're going at.' CHAPTER VI "The next morning, when Westwood and I went on deck, there was still a long sea running after us. However, by noon the sun came sifting through aloft, the breeze got warm, the decks were dry as a bone, and one just saw the large dark-blue swells lift up alongside with a shower of spray, between the seams of the bulwarks. By six o'clock, again, it was got pretty dusk ahead, and I strolled forward right to the heel of the bowsprit with Westwood, looking down through her head-boards into the heap of white foam that washed up among the woodwork every time she plunged. One knot of the men were sitting with their legs over the break of the top-gallant forecastle, swinging as she rolled--laughing, roaring, and singing as loud as they could bawl, since the wind carried it all forward out of the officers' hearing. I was rather surprised to see and hear that Jacobs' friends, Bill <DW18>s and Tom, were there; the rogues were taking back their savage to the Andaman Isles again, I suppose. "'Well, my lads,' said Tom, a regular sample of the man-o'-war's-man, 'this is what I calls balling it off. That mate knows how to make her go, anyhow.' 'We'll soon be into tropical regents, I consider,' remarked Bill, who made a point of never using sea-phrases except ashore, when he came out double salt, to make up for his gentility afloat. 'Hum,' grumbled a big ugly fellow, the same so flattered at the wheel by little Tommy, 'I doesn't like your fair winds. I'll tell you what, mates, we'll be havin' it puff more from east'ard ere third watch.' 'What's the odds, Harry, old ship?' said Tom, 'a fair wind still.' 'I say, my lads,' exclaimed Tom again, looking along toward the poop, 'yonder's the ould naboob squinting out of the round-house doors!--what's he after now, I wonder?' "On stooping down, accordingly, I could see the judge's face with the binnacle light shining on it, as he swayed to and fro in the doorway, seemingly in a passion at something or other. 'Why,' said Bill, 'I consider he can't altogether circumstand the shindy as this here roll kicks up inside of his blessed paliss.' 'Nabob, does ye call him,' said Harry, sulkily; 'I'll tell you what, mates, he ben't nothin' but a reg'lar ould tyrant. T'other mornin' there, I just chances to brush against him as I kiles up a rope; says he, "_Fellow_" an' says he to the skipper, "I'd take it kind," says he, "if ye'd horder them common sailors for to pay more contention alongside o' _my_ legs, Captain Williamson." Why, do the old beggar not think as a feller ben't a _man_ as well as hisself, with his _comming sailors_, an' be blowed to him.' 'Well, though, Harry, old ship,' said Tom, 'ain't that daurter of his'n a jewel! I say, mates, she's all rounded into the head, and a clear run from aft, like a corvette model. My eye, that hair of hers is worth gold; I'd go down on the deck to please her, d'ye see.' 'No doubt,' says Bill, 'she's what I call a exact sparkler.' 'Well, I doesn't know,' said Harry, 'last vy'ge but one we'd got one aboard, a'most beautifuller--half as high again, an' twice her beam--I'm not sure but _she_----' 'All my eye, messmates,' broke in Tom; 'that one were built for _stowing_, ye see, bo', like yer cargo lumpers. No, this here young gal 'minds me o' no other blessed thing but the _Nymph_ corvette's figure-head--and that warn't her match, neither. She don't look down upon a sailor, I can tell ye; there, I see her t'other morning-watch a-talkin' to Jacobs yonder, as pleasant and cheery as----Hullo, there's the captain comed out of the naboob's cabin, and speaking with the mate by the compass--blest if they ain't a-goin' to alter her course.' "'Send aft here to the braces!' sung out the first officer to the boatswain. 'Blow me, shipmates, that's yeer naboob now, I'll bet a week's grog,' growled Harry; 'ship's course as fair as a handspike through a grummit; couldn't bring the wind more aft; my eyes, the sea's comin' to be bought and sold.' Whatever it might be for, in came the starboard yard-arms till she lay over a little; down studding and topgallant-sails, as neither of them could stand it except from aft; and off went the old ship rising high athwart the seas, her head sou'-south-east, and one streak of broken yellow light, low down to westward on her lee quarter. It was beginning to blow harder, too, and by eight bells it was 'Reef topsails, single reef.' The waves played slap on her weather side, the heavy sprays came showering over her bulwarks forward, and the forecastle planks were far from being so comfortable for a snooze as the night before. "As soon as the wheel was relieved, and the other watch below, 'the ugly man' and his companions returned. 'Mates,' said he, solemnly, planting his back against the bitts, 'I've sailed this five-and-twenty year before the mast, an' I never yet seed the likes o' _that_! Take my say for it, we're _on_ a wind now, but afore next mornin' we'll be close-hauled, beating up against it.' 'Well,' said another, 'she leaks a deal in the eyes of her below; in that case, Harry, _your_ watch as slings in the fore-peak 'll be all afloat by that time.' 'What day did this craft sail on, I asks?' said the sailmaker gravely. 'Why, a Thursday night, old ship,' replied several eagerly. 'No,' went on the sailmaker; 'you counts sea-fashion, shipmates; but till ye're clear o' the pilot, ye know, it's land-fashion ye ought for to go by. 'Twas a _Friday_ by that 'ere said reckoning, shipmates.' 'No! so it was though,' said the rest; 'it don't _look_ well.' 'Howsomedever I'm not goin' to come for to go and be a croaker,' continued the sailmaker, in a voice like a ghost's. 'Well, luck or no luck, mates,' grumbled big Harry, 'if so be them larboard bowlines is hauled taut by the morning watch, blow me if I don't be upsides with that 'ere ould naboob--that's all.' "Next morning, after all, it was easy to feel the ship had really been hauled close on a wind. When we went up the weather was clearing, though with a strongish gale from eastward, a heavy sea running, on which the Indiaman strained and creaked as she rose, rolling slowly to windward with her three double-reefed topsails strained full, then pitched head into it as a cloud of foam and spray flew over her weather-bow. It was quite early, the decks lately washed down, and the Indian judge walking the weather quarter-deck as grave and comfortable as if it was all right. The captain was with him, and two mates to leeward. 'Sail ho!' hailed a man on the foreyard. 'Whereaway?' sang out the mate of the watch. 'Broad abeam!' "The captain went up to the poop, and I stood on the foremost carronade near the main rigging, where I could just see her now and then white against the blue haze between the hollows of the waves, as the Indiaman lifted. 'There she is!' said I, thinking it was Westwood that stopped behind me; it was the judge, however, and as soon as I got down he stepped up, holding on with one hand to a back-stay. The ship was rising after a pitch, every bulkhead and timber in her creaking, when all of a sudden I felt by my feet what all sailors feel the same way--she was coming up in the wind too fast to mount with the next wave, and a regular _comber_ it was going to be. I looked to the wheel--there was big Harry himself with a grin on his face, and his eye on Sir Charles, as he coolly gave her half a weather-spoke more, and then whirled it back again to meet her. 'For heaven's sake, look out, sir!' exclaimed I. 'Why, so I do,' said the judge, rather good-naturedly. 'Zounds! what's----' You felt the whole ship stop creaking for a moment, as she hung with the last wave--'Hold on!' shouted a mid--she gave a dull quiver from stem to stern, and I fairly pulled the judge close into the bulwark, just as smash, like thunder, came a tremendous green sea over us, three in one, washing down into the lee scuppers. The old gentleman staggered up, dripping like a poodle, and unable to see--one heard the water trickling through the skylights, and stepping away downstairs like a fellow with iron heels; while there was the sailor at the wheel grinding down his spokes in right earnest, looking aloft at the shaking fore-topsail, and the Indiaman seemingly doubtful whether to fall off or broach-to. Up she rose again, however, and drove round with her Turkhead in the air, then dip through the spray as gallantly as ever. "'Send that lubber from the wheel, Mr Macleod!' said the captain angrily, when he came down, 'he nearly broached the ship to just now!' The 'ugly man' put on a double-gloomy face, and grumbled something about her 'steering wild'; but the knowing squint he gave Jacobs, who relieved him, was enough to show me he was one of the best helmsmen aboard. As for the judge, he hadn't the least notion that it was anything more than a natural mischance, owing to exposing himself. He eyed the bulwark as if he couldn't understand how any wave was able to rise over it, while the captain was apologising, and hoping he wouldn't be the worse. 'Eh, young gentleman!' said Sir Charles of a sudden, turning round to me, after a glance from the weather side to the lee one, 'now I observe the circumstances, the probability is I should have had myself severely injured on the opposite side there, had it not been for your presence of mind, sir--eh?' Here I made a bow, and looked as modest as I could. 'I perceive you are wet, young gentleman,' said he again; 'you'd better change your dress--eh?' 'Thank you, sir!' I said; and as he walked off quite drenched to his cabin with the captain, I heard him remark it was 'wonderfully intelligent in a mere griffin.' "However, the wind soon got down to a fine top-gallant breeze; less of a sea on, the clouds sunk in a long grey bank to leeward, and the strange sail plain abeam of us--a large ship steering seemingly more off the wind than the _Seringapatam_, with topgallant-sails set--you could just see the heads of her courses, and her black lower-yards, when both of us rose together. Our first officer was all alive at the sight; the reefs were out of our topsails already, and he soon had us ploughing along under ordinary canvas, though still hugging the wind. In a short time the stranger appeared to take the challenge, for he slanted his yards, clapped on royals and hauled down a stu'nsail, heading our course, till he was one body of white cloth on the horizon. For awhile we seemed to gain on her; but after dinner, there was the other ship's hull up on our lee-bow, rising her white streak out of the water steadily, and just lifting at times on the long blue seas; she was fore-reaching on us as plain as could be. The mate gave a stamp on the deck, and kept her away a little to set a stu'nsail. 'Why,' said I to Westwood, 'he'll fall to leeward of himself!' 'She's too much _by the head_, Collins,' said Westwood; 'that's it!' 'Hasn't he the sense to take the fore-course off her?' said I, 'instead of packing more on! Why that craft weathers on us like a schooner--I wish you and I had the Indiaman for an hour or two, Tom!' "It wasn't an hour before we could see the very waves splashing up under her black weather-side, and over her high bows, as she slanted right through it and rose to windward again, standing up to cross our course--a fine frigate-built Indiaman, sharper stemmed than her kind in ordinary, and square in her spread; one yard-arm just looking over the other as they ranged aloft, and all signs of a weatherly craft. 'That's the _Duke o' Bedford_!' said a sailor at the braces to his companions, 'all oak planks, and not a splinter of teak in _her_! No chance!' Out flew the British colours from her mizzen-peak, and next the Company's striped ensign at her fore-royal mast-head, as a signal to speak. However, the _Seringapatam_ only answered by showing her colours, and held on. All of a sudden the other Indiaman was seen slowly falling off before the wind, as if in scorn at such rude manners, and sure of passing us if she chose. For a moment the red sunset glanced through betwixt all three of her masts, every rope as fine as wire! then the canvas swung broad against it, blood-red from the sun, and she showed us her quarter-gallery, with a glimpse of her stern-windows glittering--you even made out the crowd of passengers and soldiers on her poop, and a man or two going up her rigging. The sea beyond her lay as blue as blue could be, what with the crimson streak that came zigzag on both sides of her shadow, and gleamed along the smooth troughs, taking a crest or two to dance on by the way; and what with the rough of it near hand, where the tops of the dark waves ran hither and thither in broad white flakes, we surging heavily over them. "In a few minutes more the sun was not only down, but the clouds banked up to westward of a deep purple; and almost at once you saw nothing of the other ship except when a stray streak somehow or other caught her rising, or her mast-heads came across a pale line in the clouds. The breeze got pleasanter as the night went on, and the _Seringapatam_ rattled away in fine style, careening to it by herself. "Well, you know, nothing could be better for a good understanding and high spirits amongst us than a fast course, fine weather, and entering the tropics. As for the tropics, if you have only a roomy ship and a good run of wind, as we had, in those latitudes, everything outside of you seems almost to have double the stuff in it that air and water have in other places; while _inside_ of one, again, one felt twice the life he had before, and everybody else came out _newer_ a good deal than on the parlour-rug at home. As the days got each hotter than the last, and the sea bluer and bluer, we began to think better of the heavy old _Seringapatam's_ pace, teak though she was, and her sole good point right before the wind. Every night she lighted her binnacle sooner, till deuce the bit of twilight there was, and the dark sky came down on us like the extinguisher over a candle. However, the look of things round and aloft made full amends for it, as long as we held the "Trades"; old Neptune shifting his scenes there so quickly, that nobody missed getting weather and air, more than he could help, were it only a sight how the Indiaman got on, without trouble to any living soul save the man at the wheel, as one long, big, bright wave shoved her to another, and the slower they rose the more business she seemed to do of herself. By the time they had furbished her up at their leisure, the _Seringapatam_ had a queer Eastern style, too, throughout; with her grass mattings and husky _coir_ chafing-gear, the yellow varnish about her, and her three topsails of country canvas, cut narrow towards the head--bamboo stu'nsail booms, and spare bits of bamboo always ready for everything; besides the bilious-like gold- patches here and there in the rest of her sails, and the outlandish figure-head, that made you sometimes think there might be twenty thousand of them under the bows, dancing away with her like Juggernaut's travelling pagoda. "The decks were lively enough to look at; the men working quietly by twos and threes about the bulwarks all day long, and pairs of them to be made out at different points aloft, yarning away comfortably together, as the one passed the ball for the other's serving-mallet, with now a glance at the horizon, and now a grin at the passengers below, or a cautious squint at the top of the mate's cap. White awnings triced over poop and quarter-deck, the cover of the waist hammock-netting clean scrubbed, and the big shady main-course half brailed-up, rustling and bulging above the boats and booms amidships; every hatchway and door with a round funnel of a wind-sail swelling into it, and their bellies moving like so many boa-constrictors come down from aloft, and going in to catch cadets. You saw the bright white sky dazzling along under the awning-cheeks, that glared on it like snow; and the open quarter-deck ports let in so many squares of shifting blue light, with a draught of air into the hot carronade muzzles, that seem to gasp for it, with their red tompions stuck out like tongues. The very look of the lifting blue water on the shady side was refreshing, and the brighter the light got, _it_ grew the darker blue. You listened for every cool splash of it on the bends, and every rustle of the canvas aloft; and instead of thinking, as the landsmen did, of green leaves and a lazy nook for shelter, why to my fancy there's a great deal more satisfaction in good _dark blue_, with a spray over the cathead to show you're going, and with somewhat to go for! For want of better, one would have given his ears to jump in head-foremost, and have a first-rate bathe--the very sea itself kept rising up alongside, to make an easy dive for one, and sinking into little round troughs again, where the surges would have sprinkled over your head. Now and then a bigger wave than ordinary would go swelling up, and out sprang a whole glittering shower of flying-fish, freckling the dark side with drops, and went flittering over into the next, or skimming the crests out of sight into a hollow. "The writers and cadets were in high feather at knowing they were in the same latitude as India, and appeared in all sorts of straw hats, white trousers, and white jackets. Ford had left off talking of going aloft for awhile, to flourish about his swimming--when he looked over with the surgeon into the smooth of a hollow, and saw something big and green, like an immense cucumber, floating along within a fathom or two of the ship, deep down in the blue water. While the griffin asked what it was, a little ripple broke above, a wet black horn came right out of it, and two fiendish round eyes glared up at us ahead of it, as we leant over the quarter, set wide in a broad black snout, shaped like a gravedigger's shovel; then it sank away into the next wave. Ford shivered, in spite of the heat. 'The devil?' inquired one of the writers, coolly, to the surgeon. 'Not just him,' said the Scotchman; 'it's only the first _shark_!' "The young ladies, in their white dresses, now made you think of angels gliding about: as to the only one I had an eye for, by this time it wasn't of not seeing her often enough I had to complain, as she seemed to delight in nothing else but being somewhere or other upon deck, first one part of the ship, then another, as if to see how different the look-out could be made, or to watch something in the waves or the horizon. Instead of sitting with a needle or a book, like the rest, with the corner of one eye toward the gentlemen, or talking and giggling away at no allowance, she would be noticing a man aloft as if she were there herself, or trying to see past a sail, as if she fancied there was something strange on the other side of it. The rest of the girls appeared shy of her at first, no doubt on account of the judge's separate quarters and his grandee style; next, they made acquaintance, she speaking and smiling just as if she had known them before; then again most of them seemingly got jealous because the cadets squinted after her, while old Rollock said Miss Hyde would be the beauty on Chowringee Course, and the first officer was eternally pointing out things to her, like a showman at a fair. "However, she seemed not to mind it at all, either way; those that did talk to her would scarce hear her answer ere they lost her, and there she was, looking quietly down by herself into the ripples alongside; a minute after she would be half-playing with little Tommy, and making companions of Tommy's young sisters, to see the sheep, the pigs, and the cow, or feed the poultry. As for the handsome 'first officer,' when he caught occasion for his politeness, she took it graciously enough, and listened to all he said, till, of a sudden, a smile would break over her face, and she seemed to me to put him off as easy as a duchess--on the score, it might be, of the judge's looking for her off the poop, or something else of the kind. 'Twas the more curious how much at home she seemed amongst the men at work, when she chanced to go 'forward' with Tommy and his sisters, as they skipped hither and thither: the rough blue-shirted fellows took the quids out of their cheeks as soon as they saw the party coming from aft, and began to smirk, shoving the tar-buckets and ropes aside. "One forenoon, an old lady under the poop awning, where she and her daughter were sewing together at a bright strip of needlework, asked me to hold her woollen yarns for her as she balled them off--being the red coat for a sepoy killing a tiger, which her daughter was making in yellow. I couldn't well refuse, seeing that amongst the ladies I was reckoned a mild, quiet young man. Even in these days I must say I had a good deal of that look, and at home they used always to call me 'quiet Ned.' My mother, good soul, never would believe I broke windows, killed cats, or fought; and the mystery to her always is _why_ the neighbours had a spite at me, for if I had been a wild boy, she said, or as noisy as little Brown next door, why she wouldn't have objected to my going to sea!--that noisy little Brown, by-the-by, is now a fat banker. So in I had to stick my thumbs at arms'-length, and stoop down to the old lady, the more with a will since I guessed what they were talking of. "'Well though, Kate,' continued the old lady, winding away at the thread, 'you cannot deny her to be a charming creature, my love?' 'Oh, if you mean _pretty_!' said the girl, 'I don't _want_ to deny it--not _I_, ma'am--why should I, indeed?' 'Pity she's a little light-headed,' said her mother in a musing way. '_Affected_, you mean, mother!' said Miss Fortescue, 'and haughty.' 'Do you know, Kate,' replied the old lady, sighing, 'I fear she'll soon _go_ in India!' '_Go?_' said the daughter, sharply. 'Yes; she won't stand the hot season as I did--these flighty girls never do. Poor thing! she certainly hasn't _your_ stamina now, my love!' "Here Miss Fortescue bit her lip, tossed her head, and was saying that wasn't what she cared about, though in fact she looked ready to cry; when just at the moment I saw Lota Hyde herself half above the little gallery stair, gazing straight at me, for the first time, too; a curious kind of half-smile on her face, as I stood with my paws out, the old lady jerking the yarn off my wrists, and I staring right over her big bonnet at the sky astern of the awning, pretending not to listen. All at once my mouth fell, and before she could turn her face away from the funny countenance I no doubt put on, I saw her cheek rosy and her eyes sparkle with laughter, instead of seeming like one to die soon. "For my part I couldn't stand it at all, so I just bolted sheer round and made three strides to the poop-ladder, as dignified as was possible, with ever so many plies of red yarn foul of my wrists, and a big red ball hopping after me when I'd vanished, like a fellow running from a hot shot! I daresay they thought on the poop I'd had a stroke of the sun on my brain, but till next day I kept clear of the passengers, and took to swigging off stiff nor'-westers of grog as long as Westwood would let me. CHAPTER VII "Next evening, when the cuddy dinner was scarce over, I went up to the poop, where there was no one to be seen; the sun just setting on our starboard-quarter in a golden blaze that stretched overhead, with flakes of it melting, as 'twere, all over the sky to port, and dropping in it like threads of oil in water; the ship with a light breeze aft, and stu'nsails packed large upon her, running almost due for the line. The waves to westward were like liquid light, and the eddies round our counter came glittering out, the whole spread of her mizzen and main canvas shining like gold cloth against the fore: then 'twas but the royals and sky-sails brighter than ever, as the big round sun dipped down with a red streak or two, and the red water-line, against his hot old face. Every blue surge between had a clear green edge about its crest, the hollows turning themselves inside out from deep purple into bright blue, and outside in again--and the whole rim of the sea grew out cool and clear, away from the ship's taffrail. A pair of sharp-headed dolphins that had kept alongside for the last few minutes, swimming near the surface, turned tail round the moment I put my nose over the bulwark, and shot off like two streaks of a rainbow after the flying-fish. "I was just wondering where Lota Hyde could be this time, when on a sudden I observed little Tommy poke his curly head out of the booby-hatch, peeping cautiously round; seeing nobody, however, save the man at the wheel, who was looking over his shoulder at the sun, the small rogue made a bolt out of the companion, and scampered aft under the awning to the judge's starboard door, with nothing on but his night-shirt. There he commenced kicking and shoving with his bare feet and arms, till the door flew open, and over went Tommy on his nose, singing out in fine style. The next thing I heard was a laugh like the sound of a silver bell; and just as the boy's sister ran up in a fright lest he had gone overboard, Violet Hyde came out leading the little chap wrapped in a long shawl that trailed astern of him, herself with a straw bonnet barely thrown upon her head. 'Tommy says you put him in bed too soon, Jane!' said she, smiling. 'Iss!' said Master Thomas, stoutly, 'go 'way, Dzane!' 'You hadn't bid me good-night--wasn't that it, Tom? But oh! _what_ a sea!' exclaimed she, catching sight of it under the awning. The little fellow wanted to see it, too; so the young lady lifted him up in her arms, no small weight I daresay, and they both looked over the bulwark: the whole sky far out of the awning to westward being spotted with orange scales, turning almost scarlet, faster than the dusk from both ends could close in; the clear greenish tint of it above the openings of the canvas going up into fathomless blue overhead, the horizon purple, and one or two still black clouds tipped with vermilion against the far sky--while the Indiaman stole along, scarce plashing under her bends. "Every now and then you heard a whizz and a flutter, as the flying-fish broke out of a bigger surge, sometimes just missing the ship's side; at last two or three fell over the mizzen chains, and pop came one all of a sudden right into the white breast of Miss Hyde's dress inside her scarf, where only the wings kept it from disappearing. She started, Jane screamed, but the little boy coolly pulled it out, commencing to overhaul it in great delight. 'Oh, fat a funny ickoo bird!' shouted he; 'it's fell down out of 'ese t'ees!' looking aloft. 'No, no,' said Miss Hyde, laughing, as she drew her shoulders together with a shiver--'birds' noses don't drop water! 'Twill die if you don't put it in again, Tommy--'tis a fish!' 'A fish!' said he, opening his eyes wider, and smacking his lips. 'Yes, Tommy eat it for my beckfust!' However, the young lady took it out of his hand, and dropped it overboard; on which the small ogre went off rather discontented, and kissed her more as a favour than otherwise. It was almost dark already, the water shining up in the ship's wake, and the stars coming out aloft; so I was left wondering at the impudence of flying-fish, and the blessings of being a fat little imp in a frock and trousers, compared with this puzzle of a 'traverse,' betwixt _being_ a third lieutenant and hailing for a 'griffin.' "The night following, after a sultry hot day, the wind had varied a good deal, and the ship was running almost close-hauled on a warm south-easterly breeze, with somewhat of a swell in the water. Early in the first watch there was a heavy shower, after which I went on deck, leaving Westwood at his book. The half-moon was just getting down to leeward, clear of a ragged dark cloud, and a long space of faint white light spread away on the horizon, behind the sheets of the sails hauled aft; so that you just saw a sort of a glimmer under them, on the black heave of the swell between. Every time she rolled to leeward on it, a gleam of the moonshine slipped inside the shadow of her high bulwarks, from one wet carronade to another, and went glistening over the moist decks, and among the boats and booms, that looked like some big brute or other lying stretched out on his paws, till you saw the men's faces on the forecastle as if they were so many mutineers skulking in the dark before they rush aft: then up she righted again, and all was dark in-board. "The awnings were off, and the gruff third mate creaking slowly to and fro in his soaked shoes; the judge stood talking with the captain before one of the round-house doors; directly after I noticed a young lady's figure in a white dress close by the mizzen-rigging, apparently intent on the sea to leeward. 'Well, now or never!' thought I, stepping over in the shadow of the mainsheet. I heard her draw a long breath; and then, without turning her head at the sound of my foot, 'I wonder if there is anything so strange in India,' exclaimed she; '_is_ there now?' 'No, no, madam!' said I, starting, and watching as the huge cloud grew darker, with a rusty stain in it, while three or four broad-backed swells, one beyond the other, rose up black against the setting moon, as if they'd plunge right into her. Miss Hyde turned round, with one hand on the bulwark to steady herself, and half looked at me. 'I thought,' said she--'where is papa?--I thought my father----' I begged pardon for intruding, but next minute she appeared to have forgotten it, and said, in a musing sort of way, partly to herself, partly to me--'I seem to _remember_ it all--as if I just saw that black wave--and--that monstrous cloud over again! Oh! really that is the _very_ same top it had _then_--see!'--'Yes,' said I, leaning forward, with a notion I _had_ seen it before, though heaven knew when. 'Did you ever read about Columbus and Vasco di Gama?' asked she, though directly afterwards her features broke into a laughing smile as she caught sight of mine--at the thought, I suppose, of my ridiculous figure the last time she saw me. 'No, never,' said I; 'but look to windward, ma'am; 'tis coming on a squall again. For heaven's sake, Miss Hyde, go in! We're to have another shower, and that pretty thick. I wonder the mate don't stow the royals.' 'What do you mean?' said she, turning. 'Why are you alarmed, sir? I see nothing particular.' The sea was coming over, in a smooth round-backed swell, out of a dirty, thick jumble of a sky, with a pitch-black line behind--what Ford would have called 'wild' by daylight; but the young lady's eye naturally saw no more in it than a dark night. "Here the judge came over from the binnacle, giving me a nod, as much as to say he recollected me. 'I am afraid, sir,' said I, 'if you don't make haste, you'll get wet.' 'How!' said Sir Charles, ''tis an exceedingly pleasant night, I think, after such a very hot day. They don't know how to cool rooms here--this perpetual wood retains heat till midnight, sir! That detestable pitch precludes walking--the sea absolutely glares like tin. _Why_ do you suppose so now--eh, young gentleman?' said he again, turning back, all of a sudden, with his daughter on his arm. "'Why--why--why, Sir Charles,' said I, hesitating betwixt sham innocence and scarce knowing what reason to give; 'why, I just think--that is to say, it's my feeling, you see.' 'Ah, ah, I _do_ see,' replied the judge, good-humouredly; 'but you shouldn't ape the sailor, my good fellow, as I fancy you do a little. I don't particularly admire the class, but they always have grounds for what they say in their profession, frequently even acute. At your aunt's, Lady Somers's now, Violet, who was naturally so surrounded by naval officers, what I had to object to was, not their want of intelligence, but their forwardness. Eh--eh! who--what is _that_?' exclaimed he suddenly, looking straight up into the dark, as five or six large drops fell on his face out of it. All at once you heard a long sigh, as it were, in the canvas aloft, a clap like two or three carronades fired off, as all the sails together went into the masts--then a hum in the air far and near--and whish! rush! came the rain in sheets and bucketfuls off the edge of a cloud over our very heads, plashing and washing about the deck with coils of rope; ship rolling without a breath of wind in her sails; sails flapping out and in; the rain pouring down ten times faster than the scupper-holes would let it out, and smoking grey in the dark hollow of the swells, that sank under the force of it. "The first officer came on deck, roaring in the hubbub to clue up and furl the royals before the wind came again. It got pitch-dark, you couldn't see your hand before you, and we had all lost mark of each other, as the men came shoving in between us. However, I knew whereabouts Miss Hyde was, so I felt along the larboard rigging till I found a back-stay clasped in her hands, and the soaked sleeve of her muslin dress, while she leant back on a carronade, to keep from being jerked down in the water that washed up over her feet with every roll, full of ropes and a capstan bar or two. Without saying a word, I took up Lota in my arms, and carried her aft in spite of the roll and confusion, steering for the glimmer of the binnacle, till I got her inside one of their own cabins, where there was a lamp swinging about, and laid her on a sofa. I felt somehow or other, as I went, that the sweet creature hadn't fainted, though all the while as still as death; accordingly I made off again at once to find the judge, who, no doubt, was calling for his daughter, with a poor chance of being heard. "In a minute or two more the rain was over; it was light enough to make out the horizon, as the belt of foam came broadening out of it; the ship gave two or three wild bounds, the wheel jolting and creaking; up swelled the black waves again over one side, the topsails flapped full as the squall rushed roaring into them, and away she rose; then tore into it like a scared horse, shaking her head and throwing the snow-white foam into her fore-chains. 'Twas as much as three men could do to grind down her wheel, leaning and grinning to it; you saw just the Indiaman herself, scarce so far forward as the booms, and the broad swell mounting with her out of the dark, as she slowly squared yards before it, taking in to'gallant-sails while she did so with her topsail-yards lowered on the caps. However, the look of it was worse than its force, else the swell wouldn't have risen so fast, as every sailor knew; and by two bells of the mid-watch she was bowling under all, as easy as before, the mate of the watch setting a stunsail. "When I went down, shaking myself like a Newfoundland, Westwood was swinging in his cot with a book turned to the lamp, reading _Don Quixote_ in Spanish. 'Bless me, Ned!' said he, 'you seem to like it! paying fair and weathering it too!' 'Only a little adventure, Westwood!' said I, laughing. 'Why, here have I been enjoying better adventures than we seem likely to have,' said he, 'without stirring a hand, except for the wild swings you gave me from deck. Here's _Don Quixote_----' 'Don Quixote be hanged!' said I: 'I'd rather wear ship in a gale, myself, than all the humbug that never happened--_out_ of an old play-book. What's the use of _thinking_ you see service, when you don't? After all, you couldn't _expect_ much till we've crossed the Line--nothing like the tropics, or the Cape, for thickening a plot, Tom. Then there's the Mozambique, you know!' 'Well, we'll see,' said Westwood, lazily, and half asleep. "The whole next day would have been weary enough in itself, as not a single glimpse of the fair Lota could I catch; and the weather, between the little puffs of air and squalls we had, was fit to have melted poor Ford to the bone, but for the rain. However, that day was sufficient, by fits and starts, to bring us up to the Line; and before crossing it, which we did by six o'clock in one of the black squalls, half of the passengers had been pretty well ducked by Neptune and his gang besides. "Rare fun we had of it for three or four hours on end; the cadets and writers showing fight in a body, the Yankee being regularly keelhauled, tarred, and feathered, though I believe he had crossed the Line twice by land; while the Scotch surgeon was found out, in spite his caution, never to have been lower than the West Indies--so he got double ration. A word to Jacobs took Westwood scot-free; but, for my own part, wishing of course to blind the officers, I let the men stick the tar-brush in my mouth the first word I spoke, and was shaved like the mischief, not to speak of plumping afterwards behind the studding-sail curtain into three feet water, where I absolutely saved Ford from drowning, he being as sick as a dog. "Late at night the breeze held and freshened, and, being Saturday night, the gentlemen in the cuddy kept it uproariously after their troubles; drinking and singing songs--Tom Little's and your sentimental affairs; till, being a bit flushed myself, I was on the point of giving them one of Dibdin's, when I thought better of it, and went on deck instead. The mate was there, however, and his red-whiskered Scotch sub with the twisted snout, leaning on the capstan with their noses together. The night was dark, and the ship made a good noise through the water; so 'Hang it!' thought I, 'somehow or other I'll have out a stave of "Black-eyed Susan" at the top of my pipe, though overboard I go for it. "There was an old square topsail-yard slung alongside to larboard, as far as the quarter-boat, and I went up to the poop to get over and sit on it; especially when I found Ford's friend the fat midshipman was in the boat itself, 'caulking'[12] his watch out, as he did every night in a fresh place. [12] Sleeping on deck. "I was no sooner there again, than I saw a light in the aftermost gallery window, and took it in my head if I sung _there_, why, in place of being afraid there was someone under her casement, that and the wind and water together would put her to sleep, if she was the worse of last night--in fact, I may say I was a little '_slewed_'[13] at the time. How to get there, though, was the matter, it being rather a nice practice to sling over an Indiaman's quarter-gallery, bulging out from her steep counter; accordingly, first I took the end of coil round the mizzen-shrouds, and made a bowline-knot to creep down the stern-mouldings with, and then swing free by help of a guide-line to boot. Just before letting go of the taffrail, another fancy struck me, to hitch the guide-line to the trigger of the life-buoy that hung ready for use; not that I'd the notion of saving myself if I went overboard, but just because of the good joke of a fellow slipping his own life-buoy, and then cruising away, with a light at his mast-head, back to the Line. [Footnote 13: Anglice, _not_ sober.] "'Twas curious, but when I was 'two or three sheets in the wind,' far from growing stupid, I used always to get a sort of cunning that would have made me try and cheat a purser; so away I lowered myself till the rope was taut, when I slipped easy enough round the counter, below the window. Every time she rolled, out I swung, and in again, till I steadied with my feet, slacking off the other line from one hand. Then I began to give voice like old Boreas himself, with a sort of a notion, at each shove I got, how I was rocking the Indiaman like a big cradle, as Jacobs did his baby. All at once I felt the rope was _giving_ off the belaying-pin, till I came down with a jolt under the window below; only singing the louder, as it was half open, and I could just look in. With every wash of the waves the water, a couple of fathoms under my feet, blazed up like fire, and the wake ran boiling out from the black stern by the rudder, like the iron out of a furnace; now and then there came a sulky flare of dumb lightning to leeward, and showed the black swell out of the dark for miles. "I fancied I didn't care for the water, but I began to think 'twas rather uncomfortable the notion of sousing into such an infernally flame-looking stream; I was actually in a fright at being boiled, and not able to swim. So I dropped chorus to haul myself up, when of a sudden, by the lamp inside the state-room, I saw Winterton and Ford come reeling in, one after the other, as drunk as lords. Winterton swayed about quietly on his legs for a minute, and then looked gravely at Ford, as if he'd got a dreadful secret to make known. "'Ford!' said he. 'Ay,' said Ford, feeling to haul off his trousers--'ay--avast you--blub-lub-lubber!' 'I say, Ford!' said the cadet again, in a melancholy way, fit to melt a marling-spike, and then fell to cry--Ford all the time pulling off his trousers, with a cigar in his mouth, till he got on a chest, and contrived to flounder into his cot with his coat on. After that he stretched over to put the lamp out, carefully enough, but he let fall his cigar, and one leg of his nankeen trousers hung out of the cot, just scraping the deck every time he swung. I watched, accordingly, holding on by the sill, till I saw a spark catch in the stuff, and there it was, swinging slowly away in the dark, with a fiery ring creeping round the leg of the trousers, ready to blow into a flame as soon as it had a clear swing. No doubt the fool would come down safe enough himself with his cot; but I knew Winterton kept powder in the cabin sufficient to blow up the deck above, where that sweet girl was sleeping at the moment. 'Confound it,' I thought, quite cooled by the sight, 'the sooner I get on deck the better.' "However, you may fancy my thoughts when I heard men at the taffrail, hauling on the spanker-boom guys; so I held on till they'd go forward again; suddenly the mate's voice sung out to know 'what lubber had belayed the slack of a topsail clueline _here_?' Down I went with the word, as the rope was thrown off, with just time to save myself by a clutch of the port-sill at arm's-length--where, heaven knew, I couldn't keep long. The mate looked over and caught sight of my face, by a flicker of the summer lightning, as I was slipping down: I gave him one curse as loud as I could hail, and let go the moulding. 'Man overboard,' shouted he, and the men after him; however, I wasn't altogether overboard yet, for I felt the other part of the rope bring me up with a jerk and a swing right under the quarter-boat, where I clung like a cat. "How to get on deck again without being seen was the question, and anxious enough I was at thought of the burning train inside, when out jumped someone over my head; I heard a splash in the water, and saw a fellow's face go sinking into the bright wake astern, while the boat itself was coming down over me from the davits. I still had the guide-line from the life-buoy round my wrist, and one moment's thought was enough to make me give it a furious tug, when away I sprang clear into the eddies. The first thing I saw at coming up was the ship's lighted stern-windows driving to leeward, then the life-buoy flaring and dipping on a swell, and a bare head, with two hands, sinking a few feet off. I made for him at once, and held him up by the hair as I struck out for the buoy. A couple of minutes after, the men in the boat had hold of us and it; the ship came sheering round to the wind, and we were very shortly on board again. "'Confound it, Simm, what took you overboard, man?' asked the mid in the boat at his dripping messmate, the fat reefer. 'Oh, bother!' said he,'if you must know--why, I mistook the quarter-boats; I thought 'twas the _other_ I was in when you kicked up that shindy. Now I remember, though, there was too much _rain_ in it for comfort.' 'Well, youngster,' said Tom, the man-o'-war's-man, 'this here gentleman saved your life, anyhow!' 'Why, mate,' whispered Bill, ''tis the wery same greenhorn we puckalowed so to-day. Didn't he jump sharp over, too?' 'Pull! for your lives, my lads!' said I, looking up at Ford's window; and the moment we got on deck, below I ran into the state-room, and cut Ford down by the heels, with the tinder hanging from him, and one leg of his trousers half gone. As for the poor reefer, a pretty blowing up he got; the men swore I had jumped overboard after him, and the mate would have it that, instead of sleeping, he wanted to get into the judge's cabins; especially when next day Sir Charles was in a rage at his daughter being disturbed by some sailor or other singing outside. CHAPTER VIII "You must surely be tired by this time, ma'am, of this long-winded yarn of mine?" said the commander of the _Gloucester_ to the elder of his fair listeners, next evening they met with the evident expectation of hearing further; "but after all, this voyage must be dull work for you at present, so I daresay you are amused with anything by way of a change. "Well, one morning, when Westwood and I went on deck, it was a stark staring calm; as dead as a mill-pond, save for the long winding heave that seemed to come miles up out of the stale blue water, and get tired with the journey--from the horizon to us in one lazy coil, and on every side, just serving to jerk the wheel a spoke back and forward, with nobody at it. The very bits of pumpkin-paring and fat which the cook had thrown overboard the night before lay still alongside, with an oily track oozing round about them from the 'slush'[14]--the sails hanging from the yards, up and down, like clothes on a screen--and when you looked over the side away from the sun, you saw your own face, like a fellow's that had been long drowned, peering back at you, as it were, round the keel--in fact, there you scarce knew where the water _was_. [14] Cook's grease. "Somehow or other the ship kept sheering round, by little and little, till, although one had chosen a shady spot, all of a sudden the blazing sun came right into his eyes; or the single streak of white cloud lying behind you, to starboard, a while after stuck itself before your face from the very opposite quarter--you fancying, too, you had your eye the whole time on the same bit of water. Being lost in a wood or a fog was nothing to it, especially with the sun at noon drawn up right overhead, so that you couldn't look aloft, and staring down into the sea out of a pool of bright light; 'like one tremendously keen little eye,' as some of the passengers said, 'examining a big blind one.' 'Why,' put in one of the writers, 'I fear he wants to take the _mote_ out of his brother's eye--this vessel, that is to say!' 'Hang it, I hope not!' said Winterton, rather alarmed. 'He promises well to do it, then,' said another young civilian, 'but I wish he'd take the _beam_ out of his own first, ha, Smythe?' However, few men have the spirit to laugh at little in a calm near the Line, so Smythe gave no more than a sickly grin, while Westwood looked the clergyman very properly. "Both passengers and crew, all of us that could swim, gave wistful looks now and then alongside at the water, hot as it seemed, for a bathe; just floating up, as it were, with the mere huge size of it, under a dazzle of light, and so blue and smooth you couldn't see a hair's-breadth below; while, a bit off, the face of it and the very air appeared to dance and quiver like little streams of glass. However, all thoughts of bathing were put out of your head when you saw the black three-cornered affair, with a rake aft, somewhat like the end of a scythe, that went steering slowly round us; then cruising hither and thither, till its infernal horn was as dry as the deck; and at times driving straight off, as if it ran in a groove through the level surface; when back again it came from the other side, creeping lazily towards us, till it sank with a light _tip_, and a circle or two on the blue water. The hook and chain were hanging up and down over the taffrail, with the piece of rank pork looking green in the shadow near the rudder, where you read the white figures of her draught as plain as in dock; but the shark, a fifteen-feet customer, if he was an inch, was too knowing to have touched it. "'Pity he's gone, Collins,' said Ford to me, after we had watched him at last out of sight; 'wasn't there any plan of catching him, I wonder! Now we shall have a bathe though, at any rate.' 'Gone?' said I, 'he won't leave us in a hurry, if we don't leave _him_!' 'Poh, man!' said Ford, 'I tell you he's tired out and gone away!' Five minutes after Ford was leaning over the quarter and wiping his face, while he fanned himself with his straw hat, which fell out of his hand into the water. He had got over into the mizzen-chains to throw a line round it, when he gave a loud shriek, and jumped in-board again. Two or three fathoms of green came up from the keel, balancing on a pair of broad fins under Ford's hat, and a big round snout touched it; then a dozen feet of white belly gleamed in the water, the hat gave a gulp as it was drawn down, and a few small air-bells rose to the top. 'He prefers some flavours to others, you see, Ford,' said I. ''Tis the second hat I've seen you lose: I hope your head won't be in the _third_; but you mariners, you see----' However, Ford had bolted to his cabin. "On turning round I perceived Miss Hyde, with the general's lady, under the awning on the other side, where the old lady leant against a cushion, with her hands crossed and her bonnet strings loose--though a strapping raw-boned Irishwoman she was--and kept Miss Hyde's maid fanning her from behind with a large feather _punkah_. The old lady had started at Ford's cry, and gave a look round at me, half fierce and half orderly, as if she expected to know what was the matter at once. 'Only my friend lost his hat, ma'am,' said I, stepping forward. 'These cadets are so 'tagious, my dear!' said she to the young lady, falling back again without the least more notice of me. 'They plague the life of me, but the brigadier can't drill them as he would if this were a troopship--I wish he could, for the sake of the profession!--now, my dear, _you_ kape out of the s-hun!' However, I stuck where I was, fancying I caught the slightest bit of an arch twinkle in the corner of the young lady's eye, though she didn't look at me. 'Keep going, can't ye!' said the old lady crossly to the maid. 'No, ma'am, indeed!' said the girl, glancing over to her young mistress, 'I'm ready to drop!' 'Send up papa's _kitmagar_, then, Wilkins,' said Miss Hyde; and the girl went off toward the gallery stair, muttering she 'hoped she didn't come--here to be--made a black Indian slave of--at least to a old'--the remainder being lost in the stair. "As I leant on the rail-netting, behind the old lady, I happened to tread on her fat pug-dog's tail, whereupon the ugly brute made its teeth meet, without further notice, in the small of my leg, after which it gave a yelp, and ran beneath the chairs. 'What's that, Die?' exclaimed its mistress; 'good hivens! is that same griffin here _yet_, my dear! Hadn't he ayven the spirit to take a hint?--I say, was it _you_ hurt Dianny, young man?' 'Oh dear no, ma'am, not for the world!' said I, looking at my trousers, hard as the thing was to stand, but thinking to smooth her over, though I wasn't quite up to the old Irishwoman it turned out. 'Ha! ha! so she bit you?' said she, with a flash of her hawk's eye, and leaning back again coolly. 'If he'd only kicked poor Die for it under my chair now, I'd have forgiven him; but he hadn't ayven the heart at the time to drop her a curse--and _I_ thinking all the while, too, by the luke of his eye he was from the County Clare! My heart warms to the County Clare always, because, although I'm not Irish myself, you know, I'd once a schoolfellow was born in it--without counting all my relations! Oh, the smooth spalpeen!' continued she, harder than before, glancing at me as I looked all abroad from one to the other; 'listen, niver you let that fellow spake to you, my dear! he's too----' But here I walked quietly off to put the poop's length betwixt me and the talking old vixen, cursing her and her dog both, quite enough to have pleased her Irish fancy. "On the quarter-deck, the judge and the general seemed really to enjoy the heat and quiet, sitting with their feet up before the round-house, and smoking their long red twisted hookahs, while they watched the wreaths of smoke go whirling straight up from the bowls to the awning, and listened to the faint bubble of it through the water in the bottles, just dropping a word now and then to each other. A tall, thin 'native' servant with long sooty hair hanging from his snow-white turban, stood behind the judge's chair, bolt upright, with his arms folded, and twice as solemn as Sir Charles himself; you saw a stern-window shining far abaft, through one of the round-house doors, and the fat old fellow of a _consumah_[15] busy laying the cloth for tiffin, while the sole breath of air there was came out of thereaway. [15] East Indian steward. "Suddenly eight bells struck, and everyone seemed glad of something new; the judge's _consumah_ came out salaaming to say tiffin was ready; the cuddy passengers went below for wine-and-water and biscuit; and the men were at dinner. There being nothing to take care of on deck, and the heat of course getting greater, not a soul stayed up but myself; but I preferred at the moment lighting a cheroot, and going up aft to see clear of the awnings. The cockatoo had been left on the poop-rail, with its silver chain hitched round one of the mizzen back-stays, where it shifted from one leg to the other, hooked itself up the back-stay as far as it could go, then hurried down again, and mused a bit, as wise as Solomon--then screamed out at the top of its voice--'Tip--tip--pr-r-retty cacka--tippoo--cok-ka--whee-yew-ew-ew!' finishing by a whistle of triumph fit to have split one's ears, or brought a gale of wind--though not on account of skill in its books, at any rate. Again it took to swinging quietly head-down, at furious rate, and then slewed upright to plume its feathers, and shake the pink tuft on its head. "No sooner had I got up the stair, however, than, to my perfect delight, I saw Violet Hyde was still sitting aft, and the old Irishwoman gone; so I stepped to the taffrail at once, and, for something to be about, I hauled up the shark-hook from astern. The moment I caught her eye, the young lady smiled--by way of making up, no doubt, for the old one. 'How _very_ solitary it is!' said she, rising and looking out; 'the ship almost seems deserted, except by us!' 'By Jove! I almost wish it were,' thought I. 'A dead calm, madam,' I said, 'and likely to hold--the under-swell's gone quite down, and a haze growing.' 'Are we sure _ever_ to leave this spot then?' asked she, with a slight look of anxiety. 'Never fear it, ma'am,' said I; 'as soon as the haze melts again, we're near a breeze, I assure you--only, by the length of the calm and the heat together, not to speak of our being so far to east'ard, I'm afraid we mayn't get rid of it without a gale at the end to match.' 'Indeed?' said Miss Hyde. "The fact was, Westwood and I had been keeping a log, and calculated just now we were somewhere to south-eastward of Ascension; whereas, by the captain and mate's reckoning she was much farther to west. "'I never thought the sea could appear so dreadful,' said she, as if to herself--'much more than in a storm.' 'Why, madam,' said I, 'you haven't exactly seen one this voyage--one needs to be close-hauled off the Cape for that.' "Somehow or other, in speaking to _her_, by this time I forgot entirely about keeping up the sham cadet, and slipped into my own way again; so all at once I _felt_ her two dark-blue eyes looking at me curiously. 'How!--why,' exclaimed she suddenly, and then laughing, 'you seem to know all about it!--why, you speak--have you been studying sea affairs so thoroughly, sir, with your friend, who--but I _do_ think, now, one can scarcely _trust_ to what you have said?' 'Well--why--well,' said I, fiddling with the shark-hook, 'I don't know how it is, but I feel as if I must have been at sea some time or other before; you wouldn't suppose it, ma'am, but whenever I fix my eyes on a particular rope, I seem almost to know the name of it.' 'And its _use_ too?' asked she, merrily. 'I shouldn't wonder!' said I; 'perhaps I was _born_ at sea, you know, madam!' and I gave a side-look to notice how she took it. 'Ah! perhaps!' said Miss Hyde, laughing: 'but do you know one sometimes fancies these things; and now I think of it, sir, I even imagined for a moment I had seen _yourself_ before!' 'Oh,' said I, 'that couldn't be the case; I'm sure, for my part, I should recollect clear enough if I'd seen--a--a _lady_ anywhere! I think you said something of the kind, ma'am, that night of the last squall--about the water and the clouds, ma'am, you remember?' The young lady looked away, though a notion seemed to flash through her mind. 'Yes,' said she, 'that terrible rain, _you_ were----' 'Washed into the lee-scuppers,' said I, indifferently, for I didn't want her to suspect it was _I_ that had kissed her hand in the dark as I carried her in. 'I hope Sir Charles and yourself got in safe, Miss Hyde?' However, she was watching the water alongside, and suddenly she exclaimed, 'Dear! what a pretty little fish!' 'By heavens!' said I, seeing the creature with its sharp nose and blue bars, as it glanced about near the surface, and then swam in below the ship's bilge again, 'that's one of the old villain's pilots--he's lying right across our keel! I wish I could catch that shark!' "The pork was of no use for such an old sea-lawyer, and I cast a wistful eye on the Irishwoman's fat pug-dog stretched asleep on her shawl by the bulwark; 'he'd take _that_ in a trice though!' I even laid out some marline from a stern-locker, and noticed how neatly one could pass the hook under her belly round to the tail, and seize her so snugly on, muzzled and all; but it was no go, with the devil to pay afterwards. All of a sudden I heard somebody hawking and spitting above the awning forward, near where the cockatoo kept still trying to master his own name. 'The Yankee, for a thousand!' thought I; 'is Daniel trying to walk along the spanker-boom?' Next, someone sung out, 'Hal-loo-oo-oo!' as if there was a tomahawk over him, ready to split his brain. Miss Hyde looked alarmed, when the Scotch mate, as I thought, roared, 'Shiver my tops'ls!' Then it was a sailor hailing gruffly, 'Bloody Capting Brown--bloody Capting Brown--Capting Brown!' "'Somebody drunk aloft!' thought I, walking forward to see; when a funny little black head peeped round the awning with a yellow nose as sharp as a marling-spike, and red spectacles, seemingly, round its keen little eyes; then, with a flutter and a hop, the steward's pet mina-bird[16] came down, and lighted just under the cockatoo. 'Ha!' said I, laughing, 'it's only Parson Barnacle!' as the men called him--a sooty little creature scarce bigger than a blackbird, with a white spot on each wing, and a curious pair of natural glasses on his head, which they kept in the forecastle and taught all sorts of 'jaw,' till they swore he could have put the ship about, took kindly to tar, and hunted the cockroaches like a cat. [16] _Mina-bird_, or grakle, a frequent pet in homeward-bound East-Indiamen, and singular for its mimetic faculty; but impudent, and, from educational disadvantages, not particularly select in its expressions: appearance as described by the lieutenant. "No doubt he was glad to meet his countryman the cockatoo, but Tippoo stuck up his crest, swelled his chops, and looked dreadfully frightened; while the mina-bird cocked his head on one side, gave a knowing wink as it were, though all the time as grave, with his spectacles, as a real parson. 'How's her head?' croaked he, in a voice like a quartermaster's; 'blowing hard!' 'Old Capting Brown!' and hopped nearer to the poor cockatoo, who could stand it no longer, but hooked himself up the back-stay as fast as possible, out of sight, the chain running with him; and just as I swung myself clear of the awning to run aloft for a catch of it, out flew Parson Barnacle to the end of the crojack-yard, while the cockatoo gave a flap that loosed the _kitmagar's_ lubberly hitch, and sent him down with his wings spread on the water. "At another time it wouldn't have cost me a thought to go head-foremost after him, when I heard his young mistress exclaiming, 'Oh, poor dear Tippoo will be drowned!' but recollecting our hungry green friend on the other side, I jumped down for the end of a rope to slip myself quietly alongside with. However, at the very moment, Tom, the man-o'-war's-man, happening to come up from the forehatchway to throw something overboard, and seeing Miss Hyde's cockatoo, off went his shoes and jacket at once, and I heard the splash as he struck the water. I had scarce time to think, either, before I saw Mick O'Hooney's red head shoot up on deck, and heard him sing out, 'Man overboard, be the powers, boys! Folly my lader! Hurroo!' and over he sprang. 'Here's dip,' said another, and in half a minute every man that could swim was floundering in the smooth water alongside, or his head showing as it came up--pitching the cockatoo to each other, and all ready to enjoy their bathe; though, for my part, I made but one spring to the ship's starboard quarter, to use the only chance of saving the thoughtless fellows from a bloody fate to some of them. "I knew the shark would be cautious at first, on such a sudden to-do, and I had marked his whereabouts while the men were well toward the bows; and 'hang it,' thought I, seeing the old woman's fat pug in my way, 'Dianny, or die all; I bear no malice, but you must go for it, my beauty!' As quick as thought, I made one turn of marline round her nose, took off the pork, and lashed her fast on to the hook all standing, in spite of her squeaks; then twisted the lady's shawl round the chain for a blind to it, and flung the whole right over the larboard quarter, where I guessed the old fellow would be slewing round astern to have a look out before he went fairly in chase. I watched the line sink slowly with the weight over the gunwale for half a minute, afraid to let him see my head, and trembling for fear I should hear a cry from one of the men: when jerk went the rope clear of a belaying-pin as he ran off with his bait. I took a quick turn to hook him smartly in the throat, and then eased off again till the 'cleets' brought him up with a 'surge' fit to have parted the line, had it not been good new inch-and-a-half rope--though, as it was, the big Indiaman would soon have sheered stern-round to the force of it, if he'd only pulled fair. "The young lady stood noticing what I did, first in a perplexed sort of a way, and then with no little surprise, especially when the shark gave every now and then a fiercer tug, as he took a sweep astern; by this time, however, everybody was on deck in a crowd, the passengers all in a flurry, and half of the men scrambling up from alongside to tail on to the line, and run him out of water. So away they went with it full-speed towards the bows, as soon as the ladies were out of the way--dragging two or three cadets back-foremost, head over heels, down the poop stair--till, in spite of his tugging, the shark's round snout showed over the taffrail, with the mouth wide open under his chin, as it were, and one row of teeth laid flat behind another, like a comb-maker's shop-counter. A running bowline passed round his handsome waist, then another pull, and over he came on the poop, floundering fourteen feet long, and flourishing his tail for room, till the carpenter chopped it across, in a lucky moment with his axe. "All hands gathered round the shark to see him cut up, which was as good as a play to them, becalmed as we were; when, to my no small dismay, I heard Mrs Brigadier Brady's loud voice asking where her dog was; and the brigadier himself, who seemed more afraid of his wife than anybody else, kept poking about with his red-faced English butler to find the animal. 'For God's sake,' said he, in a half whisper, twenty times over, 'haven't ye seen Mrs Brady's dog, any of ye?--she'll rout the ship inside out for it, captain, if we don't soon ase her mind.' However, I knew only Miss Hyde was aware who caught the shark, and as she didn't appear to have told, why of course I kept all fast myself. 'Here's a 'baccy-box!' sung out the big old boatswain, standing astride over the tail, while the cook and his black mate ripped away from the tail up. 'Hand over, if ye please, sir,' said 'ugly' Harry, 'it's mine, Mr Burton!' Harry gave it a wipe on his knee, and coolly bit a quid off the end of his lost pigtail. The next thing was Ford's hat, which no one claimed, so black <DW71> clapped it on his woolly head. "'What's that you've got there now, <DW71>?' said the boatswain: 'out with it, my lad!' 'Golly!' chuckled the <DW65>, rolling the whites of his eyes and grinning like mad; 'oh sar, Misser Barton! dis 'ere shark riglar navligator! I 'clare to you, sar, um got chr'ometer aboard. Oh gum; berry much t'ink dis your own lost silber tickler, Misser Barton.' 'Bless me, so it is, my lad,' said the boatswain, as the black handed him a silver watch as big as a turnip, and he looked at the cook, who was busy fumbling with his knife. 'Sorry as you was _taxed_ with it, doctor,'[17] said he, doubtfully; 'well, I'm blowed, though, it only goes an hour and a half--and here it's a-ticking yet.' Here a burst of laughter went round, and somebody sung out, 'Maybe the ould pawn-broking Judas of a shark winded it up hisself, just to mark the time o' his "goin' off the hooks."' 'I say, doctor,' hailed another, 'too bad, ain't it though, to cut up _your uncle_?' 'Ha, ha, ha,' cried the cadets and writers, looking at the Scotch surgeon; 'd' ye hear that, doctor? I wouldn't stand it. They say you ain't particular in Edinbro', though. Some rum mistakes happened there, eh, doctor?' [17] Familiar metonymy, or nickname, at sea, for the ship's cook. "The Scotchman got into a passion at this, being the worst cut they could give any fellow from a country where they were famous for kindred and body-snatching at once--but all of a sudden there was a 'Hulloo! Shiver my taw'sels! What's this? Let's see'; and the whole poopful of us were shoving together, and jumping on each other's shoulders to have a look. 'Well, we-ell,' said the old boatswain, as he peered curiously into the mess of shark's bowels--'I'll be blowed.' 'The likes o' that now!' croaked the old sailmaker, lifting up his two hands, ''tain't lucky, Mr Burton!' 'My eye! them's not young _sharks_, anyhow!' said one of the men. 'What's t'ou think they be, mun,' said the north-country Chips, 'but litter o' young blind poops? an' here's t' ou'd un, see, as deed's mutton! Dang him, but someun's got an' baited t' hook wi't, there's nou't else in 's guts.' "The whole poop was one roar of laughing, when Mrs Brady's pug was found delivered of four pups inside the shark, since she went overboard, and two of 'em alive; the news ran fore and aft in a moment. '_Took short_ she's been, Jack!' said one. 'Beats the prophet Joney!' 'I say, mate, them whelps is born twice over. Blessed if my Sal at home, now, wouldn't give a year's 'lotment for one on 'em.' "'Look out, all hands of ye,' cried someone, 'there's the old girl herself coming on deck; sharp's the word.' And away we scuttled right and left, some aloft, and some down one poop-ladder, as Mrs Brady, with the brigadier and his butler after her, came fuming up the other. The black made one spring over the quarter as soon as he saw her; but the Irish topman, Mick, slipped his foot amongst the shark's blood, and rolled on his back, while the old bo'sun made stand in the thick of it behind. 'Saze the villains, I charge ye, brigadier,' screamed Mrs Brady, though he and his manservant only kept dodging the boatswain round a sort of a quagmire of blood and grease, while the old vixen caught Mick by his red hair and whiskers. 'Where's my dog, ye murderous spalpeen?' said she, panting for breath; 'what have ye done with my Dianny, ye monsther? Spake, or I'll----' 'Be the holy elaven thousand, yer ladyship!' said Mick, 'an' it's _lost_ did ye think she wor! Isn't there _five_ of 'em back! Whisper! yer ladyship's riv'rence--she's _laid in_, poor craythure, an'----' '_Oh!_ you Irish thief!' Tug came both Mrs Brady's hands through his hair, while the butler caught a kick in the stomach from Mick's foot. 'Murther!' gasped the poor fellow, 'sure an' I dun' know she was ayven a faym'le, fur me own part; bad luck t' ye mates, give uz a hand. Och, an' is this the road ye thrate a counthryman, mim?' '_Me_ your countryman! ye bog-trottin' wretch ye!' screamed the old fury, her brogue getting worse the more she heated--'take _that_!--don't rise, if ye dare.' 'Faix thin, yer ladyship darlin',' said O'Hooney, grinning in spite of his hard usage, 'I tould a lie--och, lave some o' me hair!--murther intirely! I'm----' "All the time none of us could stir for sheer laughing, but seeing poor Mike like to fare hard with the old vixen, who was near as big as himself, and as strong as a horse, I whispered to the men to run round and let go the poop awning--so down it came, with a few buckets of water in it, over the five of them; and you just saw Mrs Brady's sharp elbow through the canvas, lifted for the next slap, when we had her all fast, struggling like a cat in a bag, while O'Hooney and the boatswain crept out below. 'Stiff breeze that as we've had!' said the bo'sun shaking himself on the forecastle. 'Couldn't ye've bowsed over on the old jade's pitticuts, Mick?' said one of his shipmates, 'and capsized her all standing?' 'Sorra fut you'd stir, yourself, mate,' said he, wiping his face, 'wid such a shay grinnydeer! she'd man-handle ye as asy's twurl a mop!' CHAPTER IX "After all this, you may suppose one didn't weary so much, even of the calm. As soon as the decks were clear, most of us took tea on the poop, for fear of meeting the brigadier's lady below, everyone holding his cup ready for a start. Rollock, the planter, who had slept and swung in his cot half the day, was like to split his sides when he heard the story; by-the-way, I believe both the little pups lived and throve on goat's milk, and the men called one of them 'Young Jonah,' though he had so much of the terrier that the old lady disowned him. "It was quite dark, and cool for a night near the Line, though not a ripple stirred, and I stayed after the rest to smoke a cigar, stopping every now and then near the aftermost bull's-eye, that shone through the deck, and thinking of Lota. 'By Jove!' thought I, 'she hasn't said a word to the judge about our having met before. Think of having a secret, almost, with _her_!' After all, though, I felt well enough I might as soon hope for the Emperor of China's daughter as for such a creature, unless something wonderfully strange fell out; deucedly in love as I was, I wasn't puppy enough to fancy I'd ever succeed by mere talk; 'but here's for a bold heart and a weather eye,' I thought; 'and if these can't do it, I _will_!' said I aloud, when someone clapped me on the shoulder. "'Well, Tom, are you there?' said I, thinking it was Westwood. 'Why,' answered old Rollock, laughing, 'not so far wrong, my boy--but as it's thirty years since anyone called me so, I thought you _were_, for a moment!--Meditating, eh?' 'Only a cigar before bedtime--will you have one, sir?' 'Ah--well,' said the planter, 'I'll take a light at least--queer life this, eh? Shouldn't know this _was_ water, now--more like train-oil! Looks _junglish_ a little under the stars yonder.' 'Nothing but the haze come down,' said I; ''tis clear enough aloft, though--look out for squalls ere long.' 'As your friend Ford would have it,' said Rollock; 'but how a lad of your spirit can manage to stand this so well, I can't think!' 'Deyvilish dull, sir!' said I, with a lazy drawl, 'but can't be helped, you know.' 'Come, come, now, don't mend it by copying poor Winterton,' chuckled Rollock; 'you're no fool, Collins, so don't pretend to be. I say though, Collins, my boy,' continued he rather gravely, 'there is one really soft piece I begin to notice in you lately--I fear you're falling in love with that girl!' '_I_, sir!' said I; 'dear me, what makes you----' 'My dear boy,' went on the kind-hearted old fellow, 'I take an interest in you; no lad of your stuff practises all this tomfoolery without something under it, and I see you've _some_ serious meaning or other. Did you know her before?' 'Oh--why--not exactly,' I dropped out, taken rather short. 'I see, I see!' he went on; 'but I tell you what, Collins, a cadet can do nothing madder than marry at first landing; she had better be a cold-hearted flirt, after all--though, God knows, no man can say what _that_ does but one that's--felt it!--_I_--I mean I _knew_--a young fellow that went out as ambitious as you can be, and he----' "Here the planter's voice shook a little, and he stopped, puffing at his cheroot till the short end of it just lighted up his hook nose and part of his big white whiskers in the dark, only you saw his eye glistening, too. 'Devil take it!' thought I, 'who'd have expected the old boy to be so sharp, though?' 'Well but, Collins,' said he at last, 'just you enter heart and soul into your profession; I'd stake my life you'll rise, who knows how far--when you get captain's pay even, _then_ you may think of it--that is, if she----' 'Why,' said I, 'd'ye suppose the judge would----' '_Judge!_' exclaimed Mr Rollock--'worse and worse! Weren't we talking of pretty little Kate Fortescue? My _dear_ boy, you don't intend to say you mean Miss Hyde! I left _that_ to your puppy of a "first officer," as they call him! Why, that young girl will be the beauty of Calcutta.' At this I fancied someone else gave a whistle near us. 'Of course, sir,' said I, raising my voice, 'you didn't suppose me such a fool.' In fact, Miss Fortescue had never entered my head at all. 'Something strange about _you_, Collins!' said the planter, a little shortly; 'you puzzle me, I must say.' As we turned to go below, I heard somebody walk down the poop-ladder, and then the mate's voice sung out from the binnacle to 'strike eight bells!' "The calm was as dead as ever next morning, and, if possible, hotter than before--not a rope changed aloft, nor a cloth in the sails moved; but it was pretty hazy round us, which made the water a sort of pale old-bottle blue, that sickened you to look at; and a long dipping and drawling heave gradually got up as if there were blankets on it; the ship, of course, shifting round and round again slowly, like a dog going to lie down, and the helm giving every now and then a sudden jolt. Near noon it cleared up with a blaze of light, as it were; the sole difference at first being, that what looked like melting lead before now turned into so many huge bright sheets of tin, every sudden bend of it as good as flashing up thousands of needles in your eyes. A good deal surprised we were, however, shortly after, to find there was a sail in sight, another square-rigged vessel, seemingly standing up on the horizon six or seven miles off. Being end on to us at the time, though every glass in the ship was brought to bear on her, 'twas hard to say what she was; then she and we went bobbing and going up and down with a long round heave between us, slowly enough, but always at cross purposes, like two fellows see-sawing on a plank over a <DW18>. When she was up, we were down, and we just caught sight of her royal, no bigger than a gull on the water; jerk went our rudder, and next time she seemed to have vanished out of the glasses altogether, till we walked round to the other side, and made her out again under the awning on the opposite beam. At length she lifted broad to us for a moment or two, showing a long pale sort of hull with a red streak, apparently without ports, and brig-rigged, though the space betwixt her two masts was curious for that kind of craft. "'Wonderful light-sparred for her size that brig, sir,' said the third officer, dropping his glass. 'Ay, so she is, Mr Small,' replied Captain Williamson; 'what would you call her then? You've as good knowledge of craft as any man, Mr Small, I think.' 'Why,' said the old mate, screwing his eye harder for a long look, 'I'd say she's--not a cruiser, Captain Williamson--no, nor a Greenock Indyman--nor a----' 'Oh!' said Finch, 'some African timberer or other, I daresay, Small.' 'Well, Mr Finch,' said the third mate, handing him the glass, 'mayhap you'll just say yourself, sir.' 'No, no, Mr Small,' said the captain; 'I'd trust to you as soon as any man, sir, in a matter of the kind.' 'Why, the hull of her's wonderful Yankee-like, sir,' said Small again; 'I'm thinking they've been and _squared_ her out of a schooner--and made a bad job of it too, sir! Bless us! what a lean-headed pair o' taups'ls--as high as our fore one, sir.' Suddenly the old mate gave his thigh a slap, and laid down his glass on the capstan; 'Lor', sir!' said he, 'that's the thing; she's nothing more nor less but a John Crapeau, Captain Williamson!' "'I daresay you're right, Mr Small,' said the skipper, taking the glass; 'just so--ay, ay--I thought it myself!' 'Pity Old Nap's boxed up yonder nowadays, then, sir,' said the first officer, rubbing his hands and pointing to eastward, where he thought St Helena was; 'why, sir, we should have the peppering of the Frenchman; I don't suppose we'd need to care though she were twice the size--and what's more, we want fresh water before seeing the Cape, sir!' 'Well,' said the old skipper, laughing, 'that is the worst of it, Finch! As for spirit, you've as much as any man, Mr Finch, and I _do_ think we'd know how to take the weather-hand of him--eh?' 'I'll be bound we should!' said Finch, laughing too. As for the Frenchman, both Westwood and I had made him out by his rig at once, thanks to man-o'-war practice; but we smiled to each other at the notion of making a prize of Monsieur, under Finch's management, with not a gun that could have been used for half a day, and everything else at sixes and sevens. "In a little while it was proposed amongst the cadets, hot as the calm was, to make a party to go and see the French vessel. Ford of course was at the head of it. Winterton thought they would no doubt have plenty of champagne on board, and some others, who could row, wanted to try their hands. Accordingly the captain's gig was got ready, a sort of awning rigged over it, and two or three of them got in; when one, who was Miss Fortescue's cousin, persuaded her to join, if Mr Rollock would come. Then the brigadier, being rather a good-humoured man, said he should like to face the French once more, and Daniel Snout shoved himself eagerly in without asking, by your leave. One of the men was sent to take charge; and as there was room still, I was just going to jump in too, for the amusement of it, when Mrs Brady hurried to the taffrail with her parasol up, and said, if the brigadier went she should go as well--in fact, the old woman's jealousy of her rib was always laughably plain. 'Hang it! then,' thought I, 'catch me putting myself in the same boat with _her_! the same ship is enough in all conscience!' So away they were lowered off the davits, and began pulling in tolerable style for the brig, a couple of hours' good work for such hands at midday, smooth water as it was. "'Now, gentlemen,' said the first officer briskly, as we looked after them dipping over the long bright blue heave--'now, gentlemen, and ladies also, if you please, we'll have another party as soon as the men get their dinner--give these gentlemen a full hour's law, we'll overhaul them. See the larboard quarter-boat clear, Jacobs.' It was just the least possible hazy again behind the brig in the distance, and as the judge stood talking to his daughter on the poop, I heard her say, 'Is the other vessel not coming nearer already, papa? See how much more distinct its sails are this moment--there!--one almost observes the white canvas!' 'Pooh, Lota, child!' answered Sir Charles, 'that cannot be--'tis perfectly calm, don't you know?' In fact, however, Lota showed a sailor's eye for air, and I was noticing it myself; but it was _only_ the air made it look so. 'Ah! now,' exclaimed she again, ''tis as distant as ever! That must have been the light'; besides, the brig had been lifting on a wide swell. "'I beg pardon, Sir Charles,' said the mate, coming up and taking off his cap, 'but might I use the freedom--perhaps yourself and Miss Hyde would like to visit the French brig?' The judge looked at his daughter as much as to ask if she would like it. 'Oh yes! so much!' exclaimed she, her bright eyes sparkling, 'shall we?' 'No! Not _I_!' said Sir Charles. 'I shall take my siesta. Quite safe, sir--eh?' 'Oh, quite safe, Sir Charles!' said Finch, 'a dead calm, sir--I'll take the utmost care you may be sure, Sir Charles--as safe as the deck, sir!' 'Oh, very well,' replied the judge, and he walked down to see after his tiffin. The young lady was going down the quarter-gallery stair, when I caught my opportunity to say--'I hope you'll excuse it, Miss Hyde, ma'am--but I _do_ trust you'll not risk going in the boat so far, just now!' Half a minute after I spoke, she turned round, and looked at me with a curious sort of expression in her charming face, which I couldn't make out--whether it was mischievous, whether it was pettish, or whether 'twas inquisitive. 'Dear me!' said she, 'why--do you----' 'The weather might change,' I said, looking round about, 'and I shouldn't wonder if it did--or a swell might get up--or----' 'I must say, Mr--Mr Collins,' said she, laughing slightly, 'you are very gloomy in your anticipations--almost timorous, I declare! I wonder how you came to be so weather-wise! But why did you not advise poor Mrs Brady, now?' I couldn't see her face as she spoke, but the tone of the last words made me feel I'd have given worlds to look round and see what it was like at the moment. 'Perhaps, ma'am,' said I, 'you may remember the _rain_?' 'Well, we shall see, sir!' replied she, glancing up with a bright sparkle in her eye for an instant, but only toward the end of the spanker-boom, as it were; and then tripping down the stair. "I kept watching the gig pull slowly toward the brig in the distance, and the cutter making ready on our quarter till the men were in, with Jacobs amongst them; where they sat waiting in no small glee for the mate and his party, who came up a few minutes after; and I was just beginning to hope that Violet Hyde had taken my advice, when she and another young lady came out of the round-house, dressed for the trip, and the captain gallantly handed them in. 'My compliments to the French skipper, Mr Finch,' said the captain, laughing, 'and if he ain't better engaged, happy to see him to dinner at--two bells[18] in the dog-watch, we'll make it!' 'Ay, ay, sir,' said Finch. 'Now then!--all ready?' 'Smythe's coming yet.' said a 'writer.' 'We can't wait any longer for him,' replied the mate; 'ease away the falls, handsomely, on deck!' 'Stop,' said I, 'I'll go then!' 'Too late, young gentleman,' answered the mate, sharply, 'you'll cant us gunnel up, sir!--lower away, there!' However, I caught hold of a rope and let myself down the side, time enough to jump lightly into her stern-sheets the moment they touched the water. The officer stared at me as he took the yoke-lines to steer, but he said nothing, and the boat shoved off; while Miss Hyde's blue eyes only opened out, as it were, for an instant, at seeing me drop in so unceremoniously; and her companion laughed. [18] Five o'clock P.M. "'I shouldn't have supposed you so nimble, Mr Collins!' said the writer, looking at me through his eyeglass. 'Oh,' said I, 'Ford and I have practised climbing a good deal lately.' 'Ha! ha!' said the civilian, 'shouldn't be surprised, now, if your friend were to take the navigation out of Mr Finch's hands, some day!' 'Bless me, yes, sir!' said Finch, with a guffaw, as he sat handling the lines carelessly, and smiling to the ladies, with his smart cap over one ear; 'to be sure--ha! ha! ha!--it's certain, Mr Beveridge! Wouldn't you take the helm here, sir?' to me. 'Oh, thank you, no, sir!' replied I, modestly, 'I'm not quite so far _yet_--but we've got a loan of Hamilton Moore and Falconer's Dictionary from the midshipmen, and mean to----' 'No doubt you'll teach us a trick or two yet!' said Finch, with a sneer. 'Now, for instance,' said I, coolly, 'aloft yonder, you've got the _throat halliards_ jammed in the block with a gasket, and the mizzen-topsail cluelines rove wrong side of it, which Hamilton Moore distinctly----' "'Hang the lubber that did it, so they are!' exclaimed the mate, looking through the spy-glass we had with us. 'Now you've your _jibs_ hauled down, sir,' continued I, 'and if a squall came on abeam, no doubt they'd wish to shorten sail from _aft_, and keep her away--however, she would broach-to at once, as Hamilton Moore shows must----' 'You and Hamilton Moore may----Well, no fear of a squall just now, at any rate, ladies,' said he. 'Stretch out, men--let's head upon Mr Ford and his gig, yet!' "Terribly hot it was, close to the water, and so stifling that you scarce could breathe, while the long glassy swell was far higher than one thought it from the ship's deck; however, we had an awning hoisted, and it refreshed one a little both to hear the water and feel it below again, as the cutter went sliding and rippling over it to long slow strokes of the oars; her crew being all men-o'-war's-men, that knew how to pull together and take it easy. The young ladies kept gazing rather anxiously at the big old _Seringapatam_, as she rose and dropped heavily on the calm, amused though they were at first by a sight of their late home turning 'gable' on to us, with her three masts in one, and a white straw hat or two watching us from her taffrail; whereas, ahead, they only now and then caught a glimpse of the brig's upper canvas, over a hot, hazy, sullen-looking sweep of water as deep-blue as indigo--with six hairy brown breasts bending before them to the oars, and as many pair of queer, rollicking, fishy sort of eyes, fixed steadily on the bonnets aft, in a shame-faced, down-hill kind of way, like fellows that couldn't help it. In fact, I noticed a curious grin now and then on every one of the men's faces, and a look to each other when they caught sight of myself sitting behind the mate, as he paid out his high-flying speeches; Jacobs, again, regarding me all the while out of the whites of his eyes, as it were, in a wooden, unknowing fashion fit to have made a cat laugh--seeing he never missed his mark for one moment, and drew back his head at every pull with the air of a drunken man keeping sight of his own waistcoat buttons. "By the time we were halfway, the swell began to get considerable, and the mate stepped up abaft to look for the gig. 'Can't see the boat yet,' said he; 'give way there, my lads--stretch out and bend your backs! there's the brig!' 'Hallo!' exclaimed he again, 'she's clued up royals and to'gallants'ls! By heavens! there go her tops'ls down too! Going to bend new sails, though, I daresay, for it looks clear enough there.' 'The ship's run up a flag, aft sir,' said Jacobs. 'The----so she has,' said Finch, turning round; 'recall signal! What's wrong? Sorry _we_ can't dine aboard the French vessel this time, ladies!' said he, 'extremely _so_--and the griffins there after all, too. I hope _you_ won't be disappointed in any great measure, Miss Hyde; but if you wished it now, miss, I'd even _keep_ on, and----' "The young lady a little at this, and turned to her companion just as I remembered her doing from the dragoon in the ball-room. 'Do you not think, Miss Wyndham,' said she, '_we_ ought not to wish any officer of the ship should get reproved, perhaps, on _our_ account?' 'Oh dear, no,' said Miss Wyndham: 'indeed, Mr Finch, you had better go back, if the captain orders you.' "'Hold on there with your larboard oars, you lubbers!' sang out Finch, biting his lip, and round we went, pulling for the Indiaman again; but by this time the swell was becoming so heavy as to make it hard work, and it was soon rarely we could see her at all; for nothing gets up so fast as a swell, sometimes, near the Line; neither one way nor the other, but right up and down, without a breath of wind, in huge smooth hills of water darker than lead, not a speck of foam, and the sky hot and clear. 'Twas almost as if a weight had been lifted from off the long heaving calm, and the whole round of it were going up dark into the sky, in one weltering jumble, the more strange that it was quiet; sweep up it took the boat, and the bright wet oar-blades spread feathering out for another stroke to steady her, let alone making way; though that was nothing to the look of the Indiaman when we got near. She was rolling her big black hull round in it as helpless as a cask; now one side, then the other, dipping gunwale to in the round swell that came heaping up level with her very rail, and went sheeting out bright through the bulwarks again; the masts jumping, clamps and boom-irons creaking on the yards, and every sail on her shaking, as her lower yard-arms took it by turns to aim at the water--you heard all the noise of it, the plunge of her flat broadside, the plash from her scuppers, the jolts of her rudder, and voices on board; and wet you may be sure she _was_ from stem to stern. "'Comfortable,' thought I; 'we've come home too soon of a washing-day, and may wait at the door, I fear!' 'Oh dear,' exclaimed the three griffins, 'how are we to get in!' and the young ladies looked pale at the sight. The mate steered for her larboard quarter without saying a word, but I saw he lost coolness and got nervous--not at all the man for a hard pinch: seemingly, he meant to make a dash alongside and hook on. 'If you do, sir,' said I, 'you'll be smashed to staves'; and all at once the ship appeared almost over our heads, while the boat took a send in. I looked to Jacobs and the men, and they gave one long stroke off, that seemed next heave to put a quarter of a mile between us. 'Close shave that,' said the bowman. 'Begs pardon, sir,' said Jacobs, touching his hat, with his eyes still fixed past the mate, upon me; 'hasn't we better keep steadying off, sir, till such time as a sulk in the swell----' 'Hold your jaw, sirrah,' growled Finch, as he looked ahead still more flurried; 'there's a _squall_ coming yonder, gentlemen, and if we don't get quick aboard, we may lose the ship in it! Pull round, d' ye hear there!' Sure enough, when we lifted, there was the French brig clear out against a sulky patch of dark-grey sky, growing in, as it were, far off behind the uneven swell, till _it_ began to look pale; the Indiaman's topsails gave a loud flap out, too, one after the other, and fell to the mast again. "Suddenly I caught the glance of Violet Hyde's eyes watching me seriously, as I sat overhauling the Indiaman for a notion of what to do, and I fancied the charming girl had somehow got nearer to me during the last minute or two, whether she knew it or not; at any rate, the thought of having such a creature to protect made all my blood tingle. 'Never fear, ma'am,' said I, in a half whisper; when Finch's eye met mine, and he threw me a malicious look, sufficient to show what a devil the fellow would be if ever he had occasion; however, he gave the sign for the men to stretch out again, and high time it was, as the Indiaman's main-topsail made another loud clap like a musket-shot. Still he was holding right for her _quarter_--the roll the ship had on her was fearful, and it was perfect madness to try it; but few merchant mates have chanced to be boating in a Line swell, I daresay; when just as we came head on for her starboard counter, I took the boat's tiller a sudden shove with my foot, as if by accident, that sent us sheering in close under her _stern_. The bowman prized his boat-hook into the rudder-chains, where the big hull swung round us on both sides like an immense wheel round its barrel, every stern window with a face watching us--though one stroke of the loose rudder would have stove us to bits, and the swell was each moment like to make the men let go, as it hove us up almost near enough to have caught a hand from the lower-deck. "'For God's sake steady your wheel,' said I; 'hard a port!' while the mate was singing out for a line. 'Now, up you go,' said I to Jacobs in the hubbub, 'look sharp, and send us down a whip and basket from the boom-end, as we did once in the _Pandora_, you know!' Up the rope went Jacob like a cat, hand over hand; and five minutes after, down came the 'basket' over our heads into the boat, made out of a studding-sail and three capstan-bars, like a big grocer's scale dangling from the spanker-boom. The mate proposed to go up first with Miss Hyde, but she hung back in favour of her companion; so away aloft went Miss Wyndham and he, swinging across the Indiaman's stern as she rolled again, with a gant-line to steady them in--Finch holding on to the whip by one hand, and the other round the young lady, while my blood crept at the thought how it might have been Lota herself! "As soon as it came down again, she looked for a moment from me to Jacobs, when Captain Williamson himself shouted over the taffrail! 'Sharp, sharp, there! the squall's coming down! she'll be up in the wind! let's get the helm free!' and directly after I found myself swinging twenty feet over the water with Violet Hyde, as the ship heeled to a puff that filled the spanker, and rose again on a huge swell, gathering steerage way, while every bolt of canvas in her flapped in again at once like thunder. I felt her shudder and cling to me--there was one half-minute we swung fairly clear of the stern; they stopped hoisting--and I almost thought I'd have wished that same half-minute half-a-day; but a minute after she was in the judge's arms on the poop; the men had contrived to get the cadets on board, too, and the boat was dragging astern, with the line veered out, and her crew still in it baling her out. "I fixed my eyes at once, breathless as we of the boat party were, on the weather-signs and the other vessel, which everybody on the poop was looking at, as soon as we were safe, and our friends in the gig had to be thought of. The short top-swell was beginning to soften in long regular seas, with just air enough aloft to give our light sails a purchase on it, and put an end to the infernal clatter; but the vapour had gathered quicker than you could well fancy behind the brig in the distance, so that she looked already a couple of miles nearer, rising up two or three times on as many huge swells that shone like blue glass, while she steadied herself like a tight-rope dancer on the top of them, by a studding-sail set high from each side. On the far horizon beyond her, you'd have thought there was a deep black ditch sunk along under the thickening blue haze, as it stretched out past her to both hands, till actually the solid breast of it seemed to shove the brig bodily forward over the oily-like water, every spar and rope distinct; then the fog lifted below as if the teeth of a saw came splitting through it, and we saw her bearing down towards us--cloud, water, and all, as it were--with a white heap of foam at her bows. "'Brace up sharp, Mr Finch!' said the old skipper hastily, 'and stand over to meet her. Confound this! we _must_ have these people out of that brig in a trice; we shall soon have a touch of the Horse Latitudes, or my name's not Richard Williamson--ay, and bid good-bye to 'em too, I think!' "For a quarter of an hour or so, accordingly, we kept forging slowly ahead, while the brig continued to near us. No one spoke, almost--you heard the lazy swash of the water round our fore-chains, and the stillness aboard had a gloomy enough effect, as one noticed the top of the haze creep up into round vapoury heads upon the sky, and felt it darkening aloft besides. We were scarce three-quarters of a mile apart, and could see her sharp black bows drip over the bright sheathing, as she rolled easily on the swell; when the Indiaman suddenly lost way again, sheered head round, and slap went all her sails from the royals down, as if she had fired a broadside. Almost the next moment, a long low growl ran muttering and rumbling far away round the horizon, from the clouds and back to them again, as if they had been some huge monster or other on the watch, with its broad green muzzle shooting quietly over us as it lay; the brig dipped her gilt figure-head abeam of us, and then showed her long red streak; the swell sinking fast, and the whole sea far and wide coming out from the sky as dark and round as the mahogany drum-head of the capstan. "'Bless me, Small,' said the captain, 'but I hope they've not knocked a hole in my gig--ay, there _they_ are, I think, looking over the brig's quarter--but don't seem to have a boat to swim! Get the cutter hauled alongside, Mr Stebbing,' continued he to the fourth mate, 'and go aboard for them at once--confounded bothering, this! Mind get my gig safe, sir, if you please--can ye _parley-voo_, though, Mr Stebbing?' 'Not a word, sir,' said the young mate, a gentlemanly, rather soft fellow, whom the other three all used to snub. 'Bless me, can't we muster a bit o' French amongst us?' said the skipper; 'catch a _monshoor_ that knows a word of English like any other man--'specially if they've a chance of keeping my gig!' 'Well, sir,' said I, 'I'll be happy to go with the officer, as I can speak French well enough!' 'Thank ye, young gentleman, thank ye,' said he, 'you'll do it as well as any man, I'm sure--only look sharp, if you please, and bring my gig with you!' So down the side we bundled into the cutter, and pulled straight for the brig, which had just hoisted French colours, not old 'three-patches,' of course, but the new Restoration flag. "I overhauled her well as we got near, and a beautiful long schooner-model she was, with sharp bows, and a fine easy-run hull from stem to stern, but dreadfully dirty and spoilt with top-bulwarks, as if they meant to make her look as clumsy as possible; while the brig-rig of her aloft, with the ropes hanging in bights and hitches, gave her the look of a hedge-parson on a race-horse; at the same time, I counted six closed ports of a side, in her red streak, the exact breadth and colour of itself. Full of men, with a long gun, and schooner-rigged, she could have sailed round the Indiaman in a light breeze, and mauled her to any extent. "They hove us a line out of the gangway at once, the mate got up her side as she rolled gently over, and I followed him: the scene that met our eyes as soon as we reached the deck, however, struck me a good deal on various accounts. We couldn't at first see where Mr Rollock and his party might be, for the shadow of a thick awning after the glare of the water, and the people near the brig's gangway; but I saw two or three dark-faced, very French-like individuals, in broad-brimmed straw hats and white trousers, seemingly passengers; while about twenty Kroomen and <DW64>s, and as many seamen with unshaven chins, earrings, and striped frocks, were in knots before the long-boat, turned keel up amidships, careless enough, to all appearance, about us. One of the passengers leant against the mainmast, with his arms folded over his broad chest, and his legs crossed, looking curiously at us as we came up; his dark eyes half closed, the shadow of his hat down to his black moustache, and his shirt-collar open, showing a scar on his hairy breast; one man, whom I marked for the brig's surgeon, beside him; and another waiting for us near the bulwarks--a leathery-faced little fellow, with twinkling black eyes, and a sort of cocked hat fore-and-aft on his cropped head. '_Moi_, monsieur,' said he, slapping his hand on his breast as the mate looked about him, 'oui, je suis capitaine, monsieur.' "'Good-day, sir,' said Stebbing, 'we've just come aboard for our passengers--and the gig--sir, if you please.' 'Certainement, monsieur,' said the French skipper, bowing and taking a paper from his pocket, which he handed to the mate, 'I comprind, sare--monsieur le capitaine d' la fregate Anglaise, il nous demande nos--vat you call--_peppares_--voila! I have 'ad le honneur, messieurs, to be already sarch by vun off vos _crusoes_--pour des _esclaves_! vous imaginez _cela_, messieurs!' and here the worthy Frenchman cast up his hands and gave a grin which seemed meant for innocent horror. '_Slaifs! chez_ le brigantin _Louis Bourbon_, Capitaine Jean Duprez? _Non!_' said he, talking away like a windmill, 'de Marseilles a l'Isle de France, avec les vins choisis----' 'You mistake, monsieur,' said I, in French; 'the ship is an Indiaman, and we have only come for our _friends_, who are enjoying your wine, I daresay, but we must----' 'Comment?' said he, staring, '_what_, monsieur? have de gotness to----' "Here the moustached passenger suddenly raised himself off the mast, and made one stride between us to the bulwarks, where he looked straight out at the Indiaman, his arms still folded, then from us to the French master. He was a noble-looking man, with an eye I never saw the like of in anyone else, 'twas so clear, bold, and prompt--it actually went _into_ you like a sword, and I couldn't help fancying him in the thick of a battle, with thousands of men and miles of smoke. 'Duprez,' said he, quickly, 'je vous le dis encore--debarquez ces miserables!--nous _combattrons_!' 'Then, mon ami,' said the surgeon, in a low, cool, determined tone, stepping up and laying a hand on his shoulder, 'aussi, _nous couperons les ailes de l'Aigle_, seulement!--Hush, mon ami, restrain this unfortunate madness of yours!--c'est bien mal-a-propos a present!' and he whispered something additional, on which the passenger fell back and leant against the mainmast as before. 'Ah!' said the French master in his own language, shaking his head, and giving his forehead a tap, 'le pauvre homme-la! He has had a coup-de-soleil, messieurs, or rather of the _moon_, you perceive, from sleeping in its rays! _Ma foi!_' exclaimed he, on my explaining the matter, 'c'est pos-_sible_?--we _did_ suppose your boat proposed us the honour to visit, when evidently deterred by the excessive undulation!--My friends, resign yourselves to a misfort----' 'Great heavens! Mr Stebbing,' said I, 'the boat is _lost_!' 'By George! what _will_ the captain say, then!' replied he; however as soon as I told him the sad truth, poor Stebbing, being a good-hearted fellow, actually put his hands to his face and sobbed. "All this time the brig's crew were gabbling and kicking up a confounded noise about something they were at with the spare spars, and in throwing tarpaulins over the hatches; for it was fearfully dark, and going to rain heavy; the slight swell shone and slid up betwixt the two vessels like oil, and the clouds to south-westward had gathered up to a steep black bank, with round coppery heads, like smoke over a town on fire. 'Will you go down, messieurs,' said the Frenchman, politely, 'and taste my _vin de_----' 'No, sir,' said I, 'we must make haste off, or else--besides, by-the-way, we couldn't, for you've got all your hatches battened down!' 'Diable, so they are!' exclaimed he, '_par honneur_, gentlemen, I regret the occasion of--ha!' Just before, a glaring brassy sort of touch had seemed to come across the face of the immense cloud; and though everything, far and wide, was as still as death, save the creaking of the two ships' yards, it made you think of the last trumpet's mouth! But at this moment a dazzling flash leaped zigzag out of it, running along from one cloud to another, while the huge dark mass, as it were, tore right up, changing and turning it inside out like dust--you saw the sea far away under it, heaving from glassy blue into unnatural-like brown--when crash broke the thunder over our very heads, as if something had fallen out of heaven, then a long bounding roar. The mad French passenger stood up, walked to the bulwarks, and looked out with his hand over his eyes for the next; while the young mate and I tumbled down the brig's side without further to-do, and pulled fast for the ship, where we hardly got aboard before there was another wild flash, another tremendous clap, and the rain fell in one clash, more like stone than water, on sea and decks. For half an hour we were rolling and soaking in the midst of it, the lightning hissing through the rain, and showing it glitter; while every five minutes came a burst of thunder and then a rattle fit to split one's ears. At length, just as the rain began to slacken, you could see it lift bodily, the standing sheets of it drove right against our canvas and through the awnings--when we made out the French brig with her jib, topsails, and boom-mainsail full, leaning over as she clove through it before the wind. "The squall burst into our wet topsails as loud as the thunder, with a flash almost like the lightning itself, taking us broad abeam; the ship groaned and shook for a minute ere gathering way and falling off, and when she rose and began to go plunging through the black surges no brig was to be seen: every man on deck let his breath out almost in a cry, scarce feeling as yet but it was equal to losing sight for ever of our late shipmates, or the least hope of them. The passengers, ladies and all, crowded in the companion-hatch in absolute terror, every face aghast, without thinking of the rain and spray; now and then the sulky crest of a bigger wave would be caught sight of beyond the bulwarks, as the sea rose with its green back curling over into white; and you'd have said the shudder ran down into the cabin, at thought of seeing one or other of the lost boat's crew come weltering up from the mist and vanish again. I knew it was of no use, but I held on in the weather mizzen-rigging, and looked out to westward, against a wild break of light which the setting sun made through the troughs of the sea; once and again I could fancy I saw the boat lift keel up, far off betwixt me and the fierce glimmer. "'Oh, do you see them? _do_ you not see it yet?' was passed up to me over and over, from one sharp-pitched voice to another; but all I could answer was to shake my head. At last, one by one, they went below; and after what had happened, I must say I could easily fancy what a chill, dreary-like, awful notion of the sea must have come for the first time on a landsman, not to speak of delicate young girls fresh from home, at sight of the drenched quarter-deck leaning bare down to leeward, the sleet and spray battering bleak against the round-house doors, where I had seen Miss Hyde led sobbing in, with her wet hair about her face; then the ship driving off from where she had lost them, with her three strong lower masts aslant into the gale, ghastly-white and dripping--her soaked sheets of canvas blown grey and stiff into the rigging, and _it_ strained taut as iron; while you saw little of her higher than the tops, as the scud and the dark together closed aloft. Poor Miss Fortescue's mother was in fits below in her berth--the two watches were on the yards aloft, where no eye could see them, struggling hard to furl and reef; so altogether it was a gloomy enough moment. I stayed awhile on deck, wrapped in a pea-coat, keeping my feet and hanging on, and thinking how right down in earnest matters _could_ turn of a sudden. I wasn't remarkably thoughtful in these days, I daresay, but there did I keep, straining my eyes into the mist to see, I couldn't tell what, and repeating over and over again to myself these few words out of the Prayer-book, 'In the midst of life we are in death,' though scarce knowing what I said. CHAPTER X "However, the Indiaman's officers and crew had work enough in managing her at present: after a sunset more like the putting out of him than anything else, with a flaring snuff and a dingy sort of smoke that followed, the wind grew from sou'-west into a regular long gale, that drove the tops of the heavy seas into the dead-lights astern, rising aft out of the dark like so many capes, with the snow drifting off them over the poop. At midnight, it blew great guns, with a witness; the ship, under storm staysails and close-reefed main-topsail, going twelve knots or more, when, as both the captain and mate reckoned, we were near St Helena on our present course, and to haul on a wind was as much as her spars were worth; her helm was put hard down, and we lay-to for morning, the ship drifting off bodily to leeward with the water. The night was quite dark, the rain coming in sudden spits out of the wind; you only heard the wet gale sob and hiss through the bare rigging into her storm canvas, when the look-out men ahead sung out, 'Land--land close to starboard!' 'Bless me, sir,' said the mate to the captain, 'it's the Rock--well that we _did_--' 'Hard up! hard up with the helm!' yelled the men again, 'it's a _ship_!' "I ran to the weather main-chains and saw a broad black mass, as it were, rising high abeam, and seeming to come out from the black of the night, with a gleam or two in it which they had taken for lights ashore in the island. The _Seringapatam's_ wheel was put up already, but she hung in the gale, doubtful whether to fall off or not; and the moment she _did_ sink into the trough, we should have had a sea over her broadside fit to wash away men, boats, and all--let alone the other ship bearing down at twelve knots. 'Show the _head_ of the _fore-topmast-staysail_!' shouted I with all my strength to the forecastle, and up it went slapping its hanks to the blast--the Indiaman sprang round heeling to her ports on the next sea, main-topsail before the wind, and the staysail down again. Next minute a large ship, with the foam washing over her cat-heads, and her martingale gear dripping under the huge white bowsprit, came lifting close past us--as black as shadows aloft, save the glimmer of her main-tack to the lanterns aboard--and knot after knot of dim faces above her bulwarks shot by, till you saw her captain standing high in the mizzen-chains, with a speaking-trumpet. He roared out something or other through it, and the skipper sung out under both his hands, 'Ay, ay, sir,' in answer; but it turned out after that nobody knew what it was, unless it might be, as I thought, '_Where_ are you going?' The minute following, we saw her quarter-lanterns like two will-o'-the-wisps beyond a wave, and she was gone--a big frigate running under half her canvas, strong though the gale blew. "'Why, Mr Finch,' said Captain Williamson, as soon as we had time to draw breath, 'who was _that_ bid show the fo'topmast-stays'l; twan't _you_?' 'No,' said the mate, 'I'd like to know who had the hanged impudence to give orders here without----' 'Well now, Finch,' continued the old skipper, 'I'm not sure but that was our only chance at the moment, sir; and if 'twas one of the men, why I'd pass it over, or even give him an extra glass of grog in a quiet way.' No one could say who it was, however; and, for my part, the sight of the frigate made me still more cautious than before of letting out what Westwood and I were. In fact, I couldn't help feeling rather uneasy, and I was glad to hear the superstitious old sailmaker whispering about how he feared there was no luck to be looked for 'when drowned men and _ghostesses_ began to work the ship!' "The first streak of dawn was hardly seen, when a sail could be made out in it, far on our lee bow, which the officers supposed to be the frigate. Westwood and I, however, were of opinion it was the French brig, although by sunrise we lost sight of her again. Everyone in the cuddy talked of our unfortunate friends and their melancholy fate; even Ford and Winterton were missed, while old Mr Rollock had been the life of the passengers. But there was naturally still more felt for the poor girl Fortescue; it made all of us gloomy for a day or two; though the fresh breeze and the Indiaman's fast motion, after our wearisome spell of a calm, did a great deal to bring things round again. Westwood was greatly taken up with my account of the brig and her people, both of us agreeing there was somewhat suspicious about her, though I thought she was probably neither more nor less than a slaver, and he had a notion she was after something deeper: what that might be, 'twas hard to conceive, as they didn't appear like pirates. One thing, however, we _did_ conclude from the matter, that the brig couldn't have been at all inclined for visitors; and, in fact, there was little doubt but she _would_ actually refuse letting the boat aboard, if they reached her; so in all likelihood our unhappy friends had been swamped on that very account, just as the squall came on. When this idea got about the ship, of course you may suppose neither passengers nor crew to have felt particularly amiable towards the French vessel; and if we had met her again, with any good occasion for it, all hands were much inclined to give her a right-down thrashing, if not to make prize of her as a bad character. "'Well, Tom,' said I to Westwood one day, 'I wish these good folks mayn't be disappointed, but I do suspect this blessed mate of ours will turn out to have run us into some fine mess or other with his navigation! Did you notice how _blue_ the sky looked this morning, over to eastward, compared with what it did just now where the sun _set_?' 'No,' said Westwood, 'not particularly; but what of that?' 'Why, in the _Iris_,' replied I, 'we used always to reckon that a sign, hereabouts, of our being near the _land_! Just you see now, to-morrow morning, if the dawn hasn't a hazy yellow look in it before the breeze fails; in which case 'tis the African coast to a certainty! Pity these "Hyson Mundungo" men, as Jack calls them, shouldn't have their eyes about them as well as on the log-slate. I daresay now,' continued I, laughing, 'you heard the first mate bothering lately about the great variation in the compass here? Well, what do you suppose was the reason of it, but that sly devil of a _kitmagar_ shoving in his block for grinding curry under the feet of the binnacle every time he was done using it! I saw him get a kick one morning from the man at the wheel, who chanced to look down and notice him. Good solid iron it is, though painted and polished like marble, and the circumcised rascal unluckily considered the whole binnacle as a sort of second Mecca for security.' 'Hang the fellow!' said Westwood, 'but I don't see much to laugh at, Ned. Why, if you're right, we shall all be soaked and fried into African fever before reaching the Cape, and we've had misfortunes enough already. Only think of an exquisite creature like Miss----' 'Oh,' interrupted I, fancying Master Tom began lately to show sufficient admiration for her, 'betwixt an old humdrum and a conceited fool like that, what could you expect? All I say is, my dear parson, stand by for a pinch when it comes.' "On going down to tea in the cuddy, we found the party full of spirits, and for the first time there was no mention of their lost fellow-passengers, except amongst a knot of cadets and writers rather elevated by the Madeira after dinner, who were gathered round the Reverend Mr Knowles, pretending to talk regretfully of his Yankee friend Mr Daniel Snout. 'Yes, gentlemen,' said the missionary, who was a worthy, simple-hearted person, 'in spite of some uncouthness, and perhaps limited views, the result of defective education, he was an excellent man, I think.' 'Oh certainly, certainly,' said a writer, looking to his friends, 'and the one thing needful you spoke of just now, sir, I daresay he had it always in his eye, now?' 'Mixed, I fear,' replied the missionary, 'with some element of worldly feeling, for in America they _are_ apt to make even the soul, as well as religious association, matter of commerce; but Mr Snout, I have reason to be assured, had the true welfare of India at heart. We had much interesting conversation on the subject.' 'Ah,' said the sharp civilians, 'he was fond of getting information, was poor Daniel. Was that why he asked you so many questions about the Hindoo gods, Mr Knowles?' 'He already possessed much general knowledge of their strange mythology himself,' answered the missionary, 'and I confess I was surprised at it, especially as he confessed to me that that gorgeous country, with its many boundless capabilities, should have occupied his thoughts more and more from boyhood, amidst the secular activity of modern life--even as it occurred unto myself!' "Here the worthy man took off his large spectacles, gave them a wipe, and put them on again, while he finished his tea. 'Before this deplorable dispensation,' continued he again, 'he was on the point of revealing to me a great scheme at once for the enlightenment, I believe, of that benighted land, and for more lucrative support to those engaged in it. I fear, gentlemen, it was enthusiasm--but I have grounds for thinking that our departed friend has left in this vessel many packages of volumes translated into several dialects of the great Hindoo tongue--not omitting, I am convinced, the best of books.' 'Where?' exclaimed several of the cadets, rather astonished. '_Well!_ poor Snout can't have been such a bad fellow, after all!' 'All hum!' said the writer, doubtfully, 'depend upon it. I should like now to have a peep at Jonathan's bales!' 'I myself have thought also,' said the missionary, 'it would gratify me to look into his apartment--and were it permitted to use one or two of the volumes, I should cheerfully on our arrival in Bom----' 'Come along,' said the cadets--'let's have a look!--shouldn't wonder to see Daniel beside his lion yet, within! or hear "Guess I ain't."' 'My young friends,' said the missionary, as we all went along the lighted passage, 'such levity is unseemly'; and indeed the look of the state-room door, fastened outside, as the steward had left it before the gale came on, made the brisk cadets keep quiet till the lashing on it was unfastened--'twas so like breaking in upon a ghost. However, as it chanced, Mr Snout's goods had got loose during her late roll, and heaped down to leeward against the door--so, whenever they turned the handle, a whole bundle of packages came tumbling out of the dark as it burst open, with a shower of small affairs like so many stones after them. "'What's all this?' exclaimed the cadets, stooping to look at the articles by the lamp-light, strewed as they were over the deck. The reverend gentleman stooped, too, stood straight, wiped his spectacles, and fixed them on his nose, then stooped again; at length one long exclamation of surprise broke out of his mouth. They were nothing but little ugly images done in earthenware, painted and gilt, and all exactly the same: the writer dived into a canvas package, and there was a lot of a different kind, somewhat larger and uglier. Everyone made free with a bale for himself, shouting out his discoveries to the rest. 'I say, Smythe, this is Vishnu, it's marked in the corner!' 'I say, Ramsay, here's Brahma!' 'Ha! ha! ha! if I haven't got Seeva!' 'I say, what's this though?' screamed a young lad, hauling at the biggest bale of all, while the missionary stood stock upright, a perfect picture of bewilderment, '_Lo!_' being all he could say. The lad had lighted on a gross or so of hideous gentlemen and ladies with three heads and five arms, packed nicely through each other in cotton, but inside the state-room. At this last prize, however, the poor missionary could stand it no longer. 'Oh! oh!' groaned he, clapping his hand to his head, and walking slowly off to his berth; while, as the truth gleamed on the cadets and us, we sat down on the deck amidst the spoil, and roared with laughter like to go into fits, at the unfortunate Yankee's scheme for converting India.[19] I had found the American by no means to my fancy as a berth-mate, so, after some dealings with the steward, I not only had secured a pretty comfortable berth for my poor friend Westwood, but one for myself. This had been, in short, soon afterwards managed, with the help of some shifting among the best-natured of the young cadets. [19] It is here due to the credit of our friend the captain, who was not unusually imaginative for a sailor, to state, that this speculation, as a commercial one, is strictly and literally a _fact_, as the Anglo-Indian of Calcutta can probably testify. The bold and all but poetical catholicity of the idea could have been reached, perhaps, by the "progressing" American intellect alone, while Staffordshire, it is certain, furnished its realisation; the investment, it is nevertheless believed, proved eventually unprofitable. "'Well--hang me!' said a writer, as soon as he could speak, 'but this _is_ a stroke beyond the Society for Diffusing Useful Knowledge!' 'Every man his own priest--ha! ha! ha!' shouted another. 'I say, Smythe,' sung out a cadet, 'just fancy--ha! ha! "D. Snout, Esquire, and Co."--ho! ho! ho! you know it's too rich to enjoy by ourselves, "_My_thullogy store," Bombay, near the cathedral!' 'Cheap Brahmas, wholesale and retail--eh? families supplied!' 'By George! he's a genius lost!' said Smythe; 'but the parson needn't have broken with him for that--I shouldn't wonder, now, if they had joined partnership, but Daniel might have thought of mining all their clay heads with gunpowder and percussion locks, so that the missionary could have gone round afterwards and blown up heathenship by a touch!' "The noise of all this soon brought along the rest of the gentlemen, and few could help laughing. When the thing got wind on deck, however, neither the old skipper nor the men seemed to like it much; what with the notion of the ship's being taken, as it were, by a thousand or two of ugly little imps and Pagan idols, besides bringing up a drowned man's concerns, and 'yawhawing,' as they said, into his very door--it was thought the best thing to have them all chucked overboard next morning. "'Twas a beautifully fine night, clear aloft, and the moon rising large on our larboard bow, out of a delicate pale sort of haze, as the ship headed south'ard with the breeze; for I marked the haze particularly, as well as the colour of the sky, that lay high over it, like a deep-blue hollow going away down beyond, and filling up with the light. There was no living below for heat, and the showers of cockroaches that went whirring at the lamps, and marching, with their horrid feelers out, straight up your legs; so, fore and aft, the decks were astir with us all. Talk of moonlight on land! but even in the tropics you have to see it pouring right down, as it was then, the whole sky full of it aloft as the moon drew farther up, till it came raining, as it were, in a single sheet from one bend of the horizon to another, the water scarce rippling to the breeze, only heaving in long low swells that you heard just wash her bends; one track brighter than the rest, shining and glancing like a looking-glass drawn out, for a mile or so across our quarter, and the ship's shadow under her other bow. You saw the men far forward in her head, and clustered in a heap on the bowsprit-heel, enjoying it mightily, and looking out or straight aloft, as if to polish their mahogany faces, and get their bushy whiskers silvered; while the awnings being off the poop, the planks in it came out like so much ivory from the shade of the spanker, which sent down a perfect gush of light on everyone moving past. For the air, again, as all the passengers said, it was balmy, though for my part--perhaps it might be a fancy of mine--but now and then I thought it sniffed a little too much _that_ way to be altogether pleasant in the circumstances. "Of course, no sooner had I caught sight of Sir Charles Hyde than I looked for his daughter, and at last saw someone talking to a young lady seated near the after-gratings, with her head turned round seaward, whom it didn't require much guessing for me to name. Not having seen her at all since the affair of the boats, I strolled aft, when I was rather surprised to find that her companion was Tom Westwood, and they seemed in the thick of an interesting discourse. The instant I got near, however, they broke it off; the young lady turned her head--and never, I'd swear, was woman's face seen fairer than I thought hers at that moment--when the bright moonlight, that had seemed trying to steal round her loose bonnet and peep in, fell straight down at once from her forehead to her chin, appearing, as it were, to dance in under her long eyelashes to meet her eyes: while one fall of her brown hair hung bright in it, glistening against the shadow round her cheek, that drew the charming line of her nose and lip as clear as the horizon on the sky! The very moment, in fact, that a bitter thought flashed into my mind, for to my fancy she looked vexed at seeing me, and a colour seemed mounting up to her cheek, even through the fairy sort of glimmer on it. _Could_ Tom Westwood have been acting no more than the clerical near such a creature? and if a fellow like him took it in his head, what chance had _I_? The next minute, accordingly, she rose off her seat, and gave me a slight bow in answer to mine, and walked direct to the gallery stair, where she disappeared. "'We were talking of that unlucky adventure the other day,' said Westwood, glancing at me, but rather taken aback, as I thought. 'Ay?' said I, carelessly. 'Yes,' continued he; 'Miss Hyde had no idea you and I were particularly acquainted, and seems to think me a respectable clergyman, but I must tell you, Ned, she has rather a suspicious opinion of yourself!' 'Oh, indeed!' said I, suddenly. 'Fact, Ned,' said he; 'she even remembers having seen you before, somewhere or other--I hope, my dear fellow, it wasn't on the stage?' 'Ha! ha! how amusing!' I said, with the best laugh I could get up. 'At any rate, Collins,' he went on, 'she sees through your feigned way of carrying on, and knows you're neither griffin nor land-lubber, but a sailor, for I fancy this is not the first time the young lady has met with the cloth! _What_ do you suppose she asked me now, quite seriously?' 'Oh, I couldn't guess, of course,' replied I, almost with a sneer; 'pray don't----' 'Why, she inquired what could be the design of one concealing his profession so carefully--and actually appearing to be on a secret understanding with some of the sailors! Directly after, she asked whether that brig mightn't really have been a pirate, and taken off the poor general, Miss Fortescue, and the rest?' 'Ah,' said I, coldly, 'and if I might venture to ask, what did you----' 'Oh, of course,' replied Westwood, laughing, 'I could only hide my amusement and profess doubts, you know, Ned!' 'Very good joke, Mr Westwood,' thought I to myself, 'but at least you can't weather on _me_ quite so innocently, my fine fellow! I didn't _think_ it of him, after all! By Heaven, I did _not_!' "'By-the-by, Collins,' exclaimed Westwood in a little, as he kept his eye astern, 'there's something away yonder on our lee quarter that I've been watching for these last ten minutes--what do you think it may be? Look! just in the tail of the moonshine yonder!' What it might be, I cared little enough at the time, but I did give a glance, and saw a little black dot, as it were, rising and falling with the long run of the water, apparently making way before the breeze. 'Only a bit of wood, I daresay,' remarked I; 'but whatever it is, at any rate, the drift will take it far to leeward of us, so you needn't mind.' Here we heard a steward come up and say to the first officer, who was waiting with the rest to take a lunar observation, that Captain Williamson had turned in unwell, but he wanted to hear when they found the longitude; accordingly they got their altitude, and went on making the calculations on deck. 'Well, steward,' said the mate, after a little humming and hawing, 'go down and tell the captain, in the meantime, about _five east_; but I think it's a good deal over the mark--say I'll be down myself directly.' "'A long sight _below_ the mark, rather!' said I, walking aft again, where Westwood kept still looking out for the black dot. 'You'll see it nearer now, Ned,' said he; 'more like a <DW64>'s head, or his hand, than a bit of wood--eh?' 'Curious!' I said; 'it lies well up for our beam still, _'spite_ of the breeze. Must be a shark's back fin, I think, making for convoy.' In ten minutes longer the light swell in the distance gave it a lift up fair into the moonshine; it gleamed for a moment, and then seemed to roll across into the blue glimmer of the sea. 'I say, Collins,' said Westwood, gazing eagerly at it, ''tis more like a bottle, to _my_ sight!' We walked back and forward, looking each time over the taffrail, till at length the affair in question could be seen dipping and creeping ahead in the smooth shining wash of the surface, just like to go bobbing across our bows and be missed to windward. 'Crossing our hause I _do_ declare!--Hanged if _that_ ain't fore-reaching on us, with a witness!' exclaimed the two of us together: 'And a _bottle_ it _is_!' said Westwood. "I slipped down the poop-stair, and along to the forecastle, where I told Jacobs; when two or three of the men went out on the martingale-stays, with the bight of a line and a couple of blocks in it, ready to throw round this said floating oddity, and haul it alongside as it surged past. Shortly after, we had it safe in our hands; a square-built old Dutchman it was, tight corked, with a red rag round the neck, and crusted over with salt--almost like one of Vanderdecken's messages home, coming up as it did from the wide glittering sea, of a tropical moonlight night, seven weeks or so after our leaving land. The men who had got it seemed afraid of their prize, so Westwood and I had no difficulty in smuggling it away below to our berth, where we both sat down on a locker and looked at one another. 'What poor wretch hove this overboard, I wonder, now?' said he; 'I daresay it may have knocked about, God knows how long, since _his_ affair was settled.' 'Why, for that matter, Westwood,' replied I, 'I fancy it's much more important to find there's a strong easterly current hereabouts just now.'[20] [20] Currents are designated from the direction they run _towards_; winds, the quarter they blow _from_. "Here Westwood got a corkscrew, and pulled out the cork with a true parson-like gravity; as we had expected, there was a paper tacked to it, crumpled up, and scrawled over in what we could only suppose was _blood_. "'No. 20,' read he, 'what does that mean?' 'The twentieth bottle launched, perhaps,' said I, and he went on--'For God's sake, if you find this, keep to the south-west--we are going that way, we think--we've fallen amongst regular Thugs, I fear--just from the folly of these three griffins--(they're looking over my shoulder, though)--we are not ill-treated yet, but kept below and watched--yours in haste----' 'What this signature is I can't say for the life of me, Ned; no date either.' 'Did the fellow think he was writing by post, I wonder?' said I, trying to make it out. 'By the powers, Westwood, though,' and I jumped up, 'that bottle _might_ have come from the Pacific, 'tis true--but what if it were old Rollock, after all! _Thugs_, did you say? Why, I shouldn't wonder if the jolly old planter were on the hooks still. _That_ rascally brig!' And accordingly, on trying the scrawl at the end, over and over, we both agreed that it was nothing but 'T. ROLLOCK.'" CHAPTER XI The next evening our friend the captain found his fair audience by the taffrail increased to a round dozen, while several of the gentlemen passengers lounged near, and the chief officer divided his attention between the gay group of ladies below and the "fanning" main-topsail high up, with its corresponding studding-sail hung far out aloft to the breeze; the narrative having by this time contracted a sort of professional interest, even to his matter-of-fact taste, which enabled him to enjoy greatly the occasional glances of sly humour directed to him by his superior, for whom he evidently entertained a kind of admiring respect, that seemed to be enhanced as he listened. As for the commander himself, he related the adventures in question with a spirit and vividness of manner that contributed to them no small charm; amusingly contrasted with the cool, dry, indifferent sort of gravity of countenance amidst which the keen grey seawardly eye, under the peak of the naval cap, kept changing and twinkling as it seemed to run through the experience of youth again--sometimes almost approaching to an undeniable wink. The expression of it at this time, however, was more serious, while it appeared to run along the dotted reef-band of the mizzen-topsail above, as across the entry in a log-book, and as if there were something interesting to come. "_Well_, my dear captain," asked his matronly relative, "what comes next? You and your friend had picked up a--a--what was it _now_!" "Ah! I remember, ma'am," said the naval man, laughing; "the bottle--that was where I was. Well, as you may conceive, this said scrap of penmanship in the bottle _did_ take both of us rather on end; and for two or three minutes Westwood and I sat staring at each other and the uncouth-looking fist, in an inquiring sort of way, like two cocks over a beetle. Westwood, for his part, was doubtful of its being the planter's writing at all; but the whole thing, when I thought of it, made itself as clear to me, so far, as two half-hitches, and so the angrier I was at myself for being _done_--by a frog-eating bloody-politeful set of Frenchmen like these. Could we only have clapped eyes on the villanous thieving craft at the time, by Jove! if I wouldn't have manned a boat from the Indiaman, leave or no leave, and boarded her in another fashion. But where they were now, what they meant, and whether we should ever see them again, Heaven only knew. For all we could say, indeed, something strange might have turned up at home in Europe--a new war, old Boney got loose once more, or what not; and I could scarce fall asleep for guessing and bothering over the matter, as restless as the first night we cruised down the Channel in the old _Pandora_. "Early in the morning-watch a sudden stir of the men on deck woke me, and I bundled up in five minutes' time. But it was only the second mate setting them to wash decks, and out they came from all quarters, yawning, stretching themselves, and tucking up their trousers, as they passed the full buckets lazily along; while a couple of boys could be seen hard at work to keep the head-pump going, up against the grey sky over the bow. However, I was so anxious to have the first look-out ahead, that I made a bold push through the thick of it for the bowsprit, where I went out till I could see nothing astern of me but the Indiaman's big black bows and figure-head, swinging as it were round the spar I sat upon, with the spread of her canvas coming dim after me out of the fog, and a lazy snatch of foam lifting to her cutwater as the breeze died away. "The sun was just beginning to rise; ten minutes before it had been almost quite dark; there was a mist on the water, and the sails were heavy with dew; when a circle began to open round us, where the surface looked as smooth and dirty as in a dock, the haze seeming to shine through, as the sunlight came sifting through it, like silver gauze. You saw the big red top of the sun glare against the water-line, and a wet gleam of crimson came sliding from one smooth blue swell to another; while the back of the haze astern turned from blue to purple, and went lifting away into vapoury streaks and patches. All of a sudden the ship came clear out aloft and on the water, with her white streak as bright as snow, her fore-royal and truck gilded, her broad foresail as red as blood, and every face on deck shining as they looked ahead, where I felt like a fellow held up on a toasting fork, against the fiery wheel the sun made ere clearing the horizon. Two or three strips of cloud melted in it like lumps of sugar in hot wine; and after overhauling the whole seaboard round and round, I kept straining my eyes into the light, with the notion there was something to be seen in that quarter, but to no purpose; there wasn't the slightest sign of the brig or any other blessed thing. What struck me a little, however, was the look of the water just as the fog was clearing away; the swell was sinking down, the wind fallen for the time to a dead calm; and when the smooth face of it caught the light full from aloft, it seemed to come out all over long-winding wrinkles and eddies, running in a broad path, as it were, twisted and woven together, right into the wake of the sunrise. "When I came in-board from the bowsprit, big Harry and another grumpy old salt were standing by the bitts, taking a forecastle observation, and gave me a squint, as much as to ask if I had come out of the east, or had been trying to pocket the flying-jibboom. '_D'you_ notice anything strange about the _water_ at all?' I asked in an offhand sort of way, wishing to see if the men had remarked aught of what I suspected. The old fellow gave me a queer look out of the tail of his eye, and the ugly man seemed to be measuring me from head to foot. 'No, sir,' said the first, carelessly; 'can't say as how I does'; while Harry coolly commenced sharpening his sheath-knife on his shoe. 'Did you ever hear of currents hereabouts?' said I to the other man. 'Hereaway!' said he. 'Why, bless ye, sir, it's unpossible as I _could_ ha' heerd tell on sich a thing, 'cause, ye see, sir, there ain't none so far out at sea, sir--al'ays axin' _your_ parding, ye know, sir!' while he hitched up his trousers and looked aloft, as if there were somewhat wrong about the jib-halliards. "The Indiaman by this time had quite lost steerage-way and came sheering slowly round, broadside to the sun, while the water began to glitter like a single sheet of quicksilver, trembling and swelling to the firm edge of it far off; the pale blue sky filling deep aloft with light, and a long white haze growing out of the horizon to eastward. I kept still looking over from the fore-chains with my arms folded, and an eye to the water on the starboard side, next the sun, where, just a fathom or two from the bright copper of her sheathing along the water-line, you could see into it. Every now and then little bells and bubbles, as I thought, would come up in it, and break short of the surface; and sometimes I fancied the line of a slight ripple, as fine as a rope-yarn, went turning and glistening round one of the ship's quarters, across her shadow. Just then the old sailor behind me shoved his face over the bulwark, too, all warts and wrinkles, like a ripe walnut-shell, with a round knob of a nose in the middle of it, and seemed to be watching to see it below, when he suddenly squirted his tobacco-juice as far out as possible alongside, and gave his mouth a wipe with the back of his tarry yellow hand; catching my eye in a shame-faced sort of way, as I glanced first at him and then at his floating property. "I leant listlessly over the rail, watching the patch of oily yellow froth as it floated quietly on the smooth face of the water; till all at once I started to observe that beyond all question it had crept slowly away past our starboard bow, clear of the ship, and at last melted into the glittering blue brine. The two men noticed my attention, and stared along with me; while the owner of the precious cargo himself kept looking after it wistfully into the wake of the sunlight, as if he were a little hurt; then aloft and round about, in a puzzled sort of way, to see if the ship hadn't perhaps taken a sudden sheer to port. 'Why, my man,' I said, meeting his oyster-like old sea-eye, 'what's the reason of _that_?--perhaps there is some current or other here, after all, eh?' Just as he meant to answer, however, I noticed his watch-mate give him a hard shove in the ribs with his huge elbow, and a quick screw of his weather top-light, while he kept the lee one doggedly fixed on myself. I accordingly walked slowly aft as if to the quarter-deck, and came round the long-boat again, right abreast of them. "Harry was pacing fore and aft with his arms folded, when his companion made some remark on the heat, peering all about him, and then right up into the air aloft. 'Well then, shipmate,' said Harry, dabbing his handkerchief back into his tarpaulin again, 'I've seen worse, myself--ownly, 'twas in the Bight o' Benin, look ye--an' afore the end o' it, d'ye see, we hove o'erboard nine o' a crew, let alone six dozen odds of a cargo!' 'Cargo!' exclaimed his companion, in surprise. 'Ay, black _passingers_ they was, ye know, old ship!' answered the ugly rascal, coolly; 'an' I tell ye what it is, Jack, I never sails yet with passengers aboard, but some'at bad turned up in the end--al'ays one or another on 'em's got a foul turn in his conscience, ye see! I say, mate,' continued he, looking round, 'didn't ye note that 'ere longshore looking customer as walked aft just now, with them soft quest'ns o' his about----' 'Why,' says Jack, 'it's him Jacobs and the larboard watch calls the Green Hand, an' a blessed good joke they has about him, to all appearance, but they keeps it pretty close.' 'Close, do they,' growled Harry, 'I doesn't like the cut of his jib, I tell ye, shipmate! Jist you take my word for it, that 'ere fellow's done some'at bad at home, or he's bent on some'at bad afloat--it's all one! Don't ye mark how he keeps boxhaulin' and skulking fore an' aft, not to say looking out to wind'ard every now an' again, as much as he expected a sail to leave in sight?' 'Well, I'm blowed, but you're right, Harry!' said the other, taking off his hat to scratch his head, thoughtfully. 'Ay, and what's more,' went on Harry, 'it's just comed ath'art me as how I've clapped eyes on the chap somewheres or other afore this--if I don't think it was amongst a gang o' Spanish pirates I saw tried for their lives, and let off, in the Havanney!' "'Thank you, my man,' thought I, as I leant against the booms on the other side. 'Did you?--a wonder it wasn't in the Old Bailey, which would have been more possible, though less romantic--seeing in the Havannah I never was!' The curious thing was that I began to have a faint recollection, myself, of having seen this same cross-grained beauty, or heard his voice, before; though where and how it was I couldn't for the life of me say at the moment. "'Lor' bless us, Harry!' faltered out the old sailor, 'ye don't mean it!--sich a young, soft-looked shaver, too!' 'Them smooth-skinned sort o' coves is kimmonly the worst, mate,' replied Harry; 'for that matter ye may be quite sure he's got his chums aboard--an' how does _we_ know but the ship's _sold_, from stem to starn? There's that 'ere blackavizzed parson, now, and one or two more aft--cuss me if that 'ere feller smells brine for the first time! An' as for this here Bob Jacobs o' yours, blow me if there ain't over many of his kind in the whole larboard watch, Jack! A man-o'-war's-man's al'ays a blackguard out on a man-o'-war, look-ye!' 'Why, bless me, shipmate,' said Jack, lowering his voice, 'by that recknin', a man don't know his friends in this here craft! The sooner we gives the mate a hint the better, to my thinking?' 'No, blow me, no, Jack,' said Harry, 'keep all fast, or ye'll kick up a worse nitty, old boy! Just you hould on till ye see what's to turn up--ownly stand by and look out for squalls, that's all! There's the skipper laid up below in his berth, I hears--and to my notions, that 'ere mate of ours is no more but a blessed soldier, with his navigation an' his head-work, an' be blowed to him: where's he runned the ship, I'd like to know, messmate!' 'Well, strike me lucky if I'm fit to guess!' answered Jack, gloomily. 'No, s'help me Bob, if he knows hisself!' said Harry. 'But here's what _I_ says, anyhow--if so be we heaves in sight of a pirate, or bumps ashore on a ileyand i' the dark, shiver my tawsels if I doesn't have a clip with a handspike at that 'ere soft-sawderin' young blade in the straw hat!' 'Well, my fine fellow,' thought I, 'many thanks to you again, but I certainly shall look out for _you_!' "All this time I couldn't exactly conceive whether the sulky rascal really suspected anything of the kind, or whether he wasn't in fact sounding his companion, and perhaps others of the crew, as to how far they would go in case of an opportunity for mischief; especially when I heard him begin to speculate if 'that 'ere proud ould beggar of a naboob, aft yonder, musn't have a sight o' gould and jowels aboard with him! Why, for the matter o' that, mate,' continued he, 'I doesn't signify the twinklin' of a marling-spike, mind ye, what lubberly trick they sarves this here craft, so be ownly ye can get anyhow ashore, when all's done! It's nouther ship-law nor shore-law, look ye, mate, as houlds good on a lonely dazart!' 'Ay, ay, true enough, bo',' said the other, 'but what o' that? there ain't much signs of a dazart, I reckon, in this here blue water!' 'Ho!' replied Harry, rather scornfully, 'that's 'cause you blue-water, long-v'yage chaps isn't up to them, brother. There's you and that 'ere joker in the striped slops, Jack, chaffing away over the side jist now about a current--confounded sharp he thinks hisself, too--but d'ye think Harry Foster ain't got his weather-eye open? For my part, I thinks more of the streak o' haze yonder-away, right across the starboard bow, nor all the currents in----' 'Ay, ay,' said Jack, stretching out again to look, 'the heat, you means?' 'Heat!' exclaimed the ugly topman, 'heat be blowed! Hark ye, mate, it _may_ be a strip o' cloud, no doubt, or the steam over a sand-bank; but so be the calm lasts so long, and you sees that 'ere streak again by sundown with a touch o' yallow in 't----' "'What--_what_--shipmate?' asked Jack, breathless with anxiety. 'Then it's the black coast iv Africay, and _no_ mistake,' said Harry. 'And what's more,' continued the fellow, coolly, after taking a couple of short turns, 'if there _be's_ a current, why look ye, it'll set dead in to where the land lays--an' I'm blessed if there's one aboard, breeze or no breeze, as is man enough for to take her out o' the suck of a Africane current.' 'The Lord be with us!' exclaimed the other sailor, in alarm, 'what's to be done, Harry, bo'; when do you mean for to let them know aft?' 'Why, maybe I'm wrong, ye know, old ship,' said Harry, 'an' a man mustn't go for to larn his betters, ye know; by this time half o' the watch has a notion on it, at any rate. There's Dick White, Jack Jones, Jim Sidey, an' a few more Wapping men, means to stick together in case o' accidents; so Jack, man, ye needn't be in sich an a taking. What the' (here he came out with a regular string of top-gallant oaths), 'when you finds a good chance shoved into your fist, none o' your doin', ain't a feller to haul in the slack of it 'cause he's got a tarry paw and ships before the mast? I tell ye what it is, old ship, 'tain't the first time you an' me's been cast away, an' I doesn't care the drawin' of a rope-yarn, in them 'ere latitudes, if I'm cast away again. Hark ye, ould boy: grog to the mast-head, a grab at the passengers' wallibles, when they ha'n't no more use for 'em, in course; and the pick of the ladies, jist for the takin' o' them ashore!' "'Lord love ye, Harry, belay there!' said Jack; 'what's the good o' talkin' on what ain't like to be?' 'Less like things turn up,' said Harry. 'More by token, if I hasn't pitched upon my fancy lass a'ready; an' who knows, old ship, but you marries a naboob's darter yet, and gets yourself shoved all square, like a riglar hare, into his heestate, as they calls it? For my part, I've more notion of the _maid_! An' it'll go hard with me if we doesn't manage to haul that 'ere mishynar parson safe ashore on the strength of it.' 'God bless ye, Harry,' answered Jack, somewhat mournfully, 'I'm twice spliced already!' 'Third time's lucky, though,' replied Harry, with a chuckle, as he walked towards the side again and looked over; the rest of the watch being gathered on the other bow, talking and laughing; the passengers beginning to appear on the poop, and the Scotch second mate standing up aft on the taffrail, feeling for a breath of wind. The big topman came slowly back to his companion, and leant himself on the spars again. 'Blowed if I don't think you're right, mate,' said he, 'you and that 'ere lawyer. You'd a'most say there's a ripple round her larboard bow just now, sure enough--like she were broadside on to some drift or another. Hows'ever, that's neither here nor there; for my part, I sets more count by the look o' the sky to east'ard; an' be blowed, shipmate, if that same yonder don't make me think of _woods_.' 'Well,' said Jack, '_I_ goes by sunrise, messmate, an' I didn't like it overmuch myself, d' ye see! That 'ere talk o' yours, Harry, consarnin' dazarts and what not--why, bless me, it's all my eye--this bout, at any rate--seein' as how, if we doesn't have a stiff snuffler out o' that very quarter afore twenty-four hours is over, you call me lubber!' "'Ho, ho! old salt,' chuckled Harry, 'none o' them saws holds good hereaway; if it's the coast of Africay, mate, _two_ watches 'll settle our hash in them longitudes, without going the length o' _six_! Ha'n't I knocked about the bloody coast of it six weeks at a time, myself, let alone livin' as many months in the woods?--so I knows the breedin' of a turn_a_dy a cussed sight too well, not to speak on the way the landblink looms afore you sights it!' "'_Lived_ in them there woods, did ye?' inquired Jack. 'Ay, bo', an' a rum rig it was too, sure enough,' said Harry; 'the very same time I told you on, i' the Bight o' Benin.' 'My eye,' exclaimed the other, 'a man never knows what he may come to. Let's into the rights of it, Harry, can't ye, afore eight bells strikes?' "'Woods!' said Harry, 'I b'lieve ye, ould ship. I see'd enough o' woods, that time, arter all--and 'twan't that long agone, either--I'll not say _how_ long, but it wa'n't _last_ v'yage. A sharp, clinker-built craft of a schooner she wor; I'm not goin' to give ye her right name, but they called her the _Lubberhater_[21]--an' if there wa'n't all sorts on us aboard, it's blaming ye--an' a big double-jinted man-eatin' chap of a Yankee was our skipper, as sly as slush--more by token, he had a wart alongside o' one eye as made him look two ways at ye--Job Price by name--an' arter he'd made his fortin, I heard he's took up a teetotal chapel afloat on the Missishippey. She'd got a strapping long nose, that 'ere schooner, so, my boy, we leaves everything astarn, chase or race, I promise ye; an' as for a blessed ould ten-gun brig what kept a-cruising thereaway, why, we jest got used to her, like, and al'ays lowers our mainsail afore takin' the wind of her, by way o' good-bye, quite perlite. Blowed if it warn't rum, though, for to see the brig's white figger'ed over the swell, rollin' under a cloud o' canvas, stens'ls crowded out alow an' aloft, as she jogged arter us. Then she'd haul her wind an' fire a gun, an' go beating away up in chase of some other craft, as caught the chance for runnin' out whenever they sees the _Lubberhater_ well to sea--why, s' help me Bob, if the traders on the coast didn't pay Job Price half-a-dozen blacks apiece every trip, jist for to play that 'ere dodge. At last, one time, not long after I joined the craft, what does he do but nigh-hand loses her an' her cargo, all owin' to reckonin' over much on this here traverse. Out we comes one night in the tail of a squall, an' as soon as it clears, there sure enough we made out the brig, hard after us, as we thinks--so never a rag more Job claps on, 'cause two of his friends, ye see, was jist outside the bar in the Noon river. Well, very soon the cruiser begins to overhaul us, as one gaff-taups'l wouldn't do, nor yet another, till the flying-jib and bonnets made her walk away from them in right 'arnest--when slap comes a long-shot that that took the fore-topmast out of us in a twinkling. So when the moonlight comed out, lo an' behold, instead o' the brig's two masts stiff and straight against the haze, there was _three_ spanking sticks all ataunto, my boy, in a fine new sloop-o'-war as had fresh come on the station--the _Iris_, they called her--and a fast ship she wor. But all said and done, the schooner had the heels of her in aught short of a reef-taups'l breeze--though, as for the other two, the sloop-o'-war picked off both on 'em in the end.' [21] Query--Liberator? "At this point of the fellow's account, I, Ned Collins, began to prick up my ears, pretty sure it was the dear old _Iris_ he was talking of; and, thought I, 'Oho, my mate, we shall have you directly--listening's all fair with a chap of this breed.' "'Well,' said he, ''twas the next trip after that, we finds the coast clear, as commonly was--for, d' ye see, they couldn't touch us if so be we hadn't a slave aboard--in fact, we heerd as how the cruiser was up by Serry Lony, and left some young leftenant or other on the watch with a sort o' lateen-rigged tender. A precious raw chap he was, by all accounts--and, sure enough, there he kept plying off and on, in-shore, 'stead of out of sight to seaward till the craft would make a bolt; an' as soon as ye dropped an anchor, he'd send a boat aboard with a reefer, to ax if ye'd got slaves in the hold. In course, ye know, Job Price sends back a message, "palm-ile an' iv'ry, an' gould if we can"--h'ists the Portingee colours, brings up his Portingee papers, and makes the Portingee stoo'rd skipper for the spell--but anyhow, bein' no less nor three slavers in the mouth of the Bonny river at the time, why, he meant to show fight if need be, and jest man-handle the young navy sprig to his heart's content. Hows'ever, the second or third night, all on a suddent we found he'd sheered off for a decency's sake, as it might be, an hour or two afore we'd began to raft off the <DW65>s. Well, mate, right in the midst of it there comes sich a fury of a turnady off the land, as we'd to slip cable and run fair out to sea after the other craft what had got sooner full--one on 'em went ashore in sight, an' we not ninety blacks aboard yet, with barely a day's water stowed in. "'The next morning, out o' sight of land, we got the sea-breeze, and stood in again under everything, till we made Fernandy Po ileyand, three leagues off, or thereby, an' the two ebony-brigs beating out in company, so the skipper stands over across their course for to give them a hail, heaves to and pulls aboard the nearest, where he stays a good long spell and drinks a stiff glass, as ye may fancy, afore partin'. Back comes Job Price in high glee, and tould the mate as how that mornin' the brigs had fell foul o' the man-o'-war tender, bottom up, an' a big Newfoundling dog a-howlin' on the keel--no doubt she'd turned the turtle in that 'ere squall--more by token, he brought the dog alongst with him in a present. So away we filled again to go in for the Bonny river, when the breeze fell, and shortly arter there we was all three dead becalmed, a couple o' miles betwixt us, sticking on the water like flies on glass, an' as hot, ye know, as blazes--the very moral o' this here. By sundown we hadn't a drop of water, so the skipper sent to the nearest brig for some; but strike me lucky if they'd part with a bucketful for love, bein' out'ard bound. As the Spanish skipper said, 'twas either hard dollars or a stout <DW65>, and t' other brig said the same. A slight puff o' land-wind we had in the night, though next day 'twas as calm as ever, and the brigs farther off--so by noon, my boy, for two blessed casks, if Job Price hadn't to send six blacks in the boat. Shorter yarn, Jack, but the calm held that night too, and blowed if the brigs would sell another breaker--what we had we couldn't spare to the poor devils under hatches, and the next day, why they died off like rotten sheep, till we hove the last on 'em o'board; and frighterful enough it was, mind ye, for to see about fifty sharks at work all round the schooner at once, as long as it lasted. "'Well, in the arternoon we'd just commenced squabbling aboard amongst ourselves, round the dreg water, or whether to board one o' the brigs and have a fair fight, when off come a bit of a breeze, betwixt the two high peaks on Fernandy Po, both the brigs set stensails, and begins slipping quietly off--our skipper gived orders to brace after them, and clear away the long gun amidships; but all on a suddent we made out a lump of a brig dropping down before it round the ileyand, which we knowed her well enough for a Bristol craft as had lost half her hands up the Callebar, in the gould an' iv'ry trade. Down she comed, wonderful fast for the light breeze, if there hadn't been one o' yer currents besides off the ileyand, till about half-a-mile away she braces up, seemingly to sheer across it and steer clear of us. Out went our boat, an' the skipper bids every man of her crew to shove a short cutlash inside his trousers. Says he, "I guess we'll first speak 'em fair, but if we don't ha' water enough, it'll be 'tarnall queer, that's all," says he--an' Job was a man never swore, but he _looked_ mighty _bad_ that time, I must say; so we outs oars and pulls right aboard the trader, without answerin' ever a hail, when up the side we bundled on deck, one arter the other, mad for a drink, and sees the master with five or six of a crew, all as white as ghostesses, and two or three Kroomen, besides a long-legged young feller a-sittin' and kicking his feet over the kimpanion hatch, with a tumblerful o' grog in his fist, as fresh to all seemin' as a fish, like a supper-cargo or some'at o' the sort, as them craft commonly has. "'"What schooner's that?" axes the master, all abroad like; an' says Job--says he, out o' breath, "Never you mind; I guess you'll let 's have some water, for we wants it mighty keen!" "Well," says the other, shaking his head, "I'm afeared we're short ourselves--anyhow," says he, "we'll give ye a dipper the piece"--and accordingly they fists us along a dozen gulps, hand over hand. "'Twon't do, I guess, mister," says our skipper; "we wants a cask!" Here the master o' the brig shakes his head again, and guv a look to the young long-shore-like chap aft, which sings out as we couldn't have no more for love nor money--an' I see Captin Price commence for to look savitch again, and feel for the handle on his cutlash. "Rather you'd ax iv'ry or gould-dust!" sings out the supper-cargo; "hows'ever," says he, "as ye've tooken sich a fancy to it, short o' water as we is, why a fair exchange ain't no robbery," says he: "you wants water, an' we wants hands; haven't ye a couple o' <DW65>s for to spare us, sir, by way of a barter now?" he says. "Well, mate, I'll be blowed if I ever see a man turn so wicked fur'ous as Job Price turns at this here, an says he, through his teeth, "If ye'd said a <DW65>'s nail-parin', I couldn't done it, so it's no use talkin'." "Oh come, captin," says the young fellow, wonderful angshis-like, "say _one_, jist--it's all on the quiet, ye know. Bless me, captin," says he, "I'd do a deal for a man in a strait, 'tickerly for yerself--an' I think we'd manage with a single hand more. I'll give ye two casks and a bag o' gould dust for _one_ black, and we'll send aboard for him just now, ourselves!" "No!" roars Job Price, walkin' close up to him; "ye've riz me, ye cussed Britisher ye, an' I tell ye we'll _take_ what we wants!" "No jokes though, captin!" says the feller; "what's _one_ to a whole raftful I heerd of ye shipping?" "Go an' ax the sharks, ye beggar!" says the skipper; "here, my lads!" says he, an' makes a grab at the other's throat, when slap comes a jug o' rum in his eye-lights, and the young chap ups fist in quick-sticks, and drops him like a cock, big as he was. By that time, though, in a twinklin' the master was flat on deck, and the brig's crew showed no fight--when, lo an' behold, my boy, up bundles a score o' strapping man-o'-war's-men out of the cabing. One or two on us got a cut about the head, an' my gentleman supper-cargo claps a pistol to my ear from aft, so we knocked under without more to-do. In five minutes' time every man jack of us had a seizing about his wrists and lower pins; and says Job Price, in a giving-up sort o' v'ice, "You're too cust spry for playin' jokes on, I calc'late, squire," he says. "Jokes!" says the young feller, "why, it's no joke--in course you knows me?" "Niver see'd ye atween the eyes afore," says Job, "but don't bear no malice, mister, now." "That's it," says the t'other, lookin' at the schooner again, "no more I does, so jist think a bit; ha'n't you really a <DW65> or so aboard o' ye--if it was jist one?" "Squash the one!" says Job, shakin' his head nellicholly like--an' "Sorry for it," says the chap, "'cause ye see I'm the leftenant belongin' to the _Irish_, an' I carn't titch yer schooner if so be ye ha'n't a slave aboard." "Lawk a'mighty!--no!" sings out Job Price, 'cause, bein' half-blinded he couldn't ha' noted the lot o' man-o'-war's-men sooner. "But I _can_," says the other, "for piratecy, ye see; an' what's more," he says, "there's no help for it now, I'm afeard, mister what-they-call-ye." "'Well, mate, after that ye may fancy our skipper turns terrible down in the mouth; so without a word more they parbuckles us all down below into the cabin--an' what does this here leftenant do but he strips the whole lot, rigs out as many of his men in our duds, hoists out a big cask o' water on the brig's far side, and pulls round for the schooner--hisself togged out like the skipper, and his odd hands laid down in the boat's bottom.' You won't wonder at my being highly amused with the fellow's yarn, since the fact was that it happened to be one of my own adventures in the days of the _Iris_, two or three years before, when we saw a good many scenes together, far more wild and stirring, of course, in the thick of the slave trade; but really the ugly rascal described it wonderfully well. "'Well,' said Harry, 'I gets my chin shoved up in the starn-windy, where I seed the whole thing, and tould the skipper accordently. The schooner's crew looked out for the water like so many oysters in a tub; the leftenant jumps up the side with his men after him, an' not so much as the cross of two cutlashes did we hear afore the onion-jack flew out a-peak over her mains'l. In five minutes more, the schooner fills away before the breeze, and begins to slide off in fine style after the pair o' brigs, as was nigh half-hull down to seaward by this time. There we was, left neck and heel below in the trader, and he hauled up seemin'ly for the land; an' arter a bit, says the skipper to me, "Foster, my lad, I despise this way o' things," says he; "ain't there no way on gettin' clear?" "Never say die, captin!" I says; an' says he, "I calc'late they left considerable few hands aboard?" "None but them sleepy-like scum o' iv'ry men," I says, but be blowed if I see'd what better we was, till down comes a little <DW65> cabin-boy for some'at or other, with a knife in his hand. Job fixes his eye on him--I've heerd he'd a way in his eye with <DW65>s as they couldn't stand--an' says he, soft-sawderin' like, "Come here, will ye, my lad, an' give us a drink," so the black come for'ard with a pannikin, one foot at a time, an' he houlds it out to the skipper's lips--for, d'ye see, all on us had our flippers lashed behind our backs. "Now," says he, "thankee, boy--look in atwixt my legs, and ye'll find a dollar." With that, jest as the boy stoops, Job Price ketches his neck fast betwixt his two knees, an' blowed if he didn't jam them harder, grinning all the time, till down drops the little black throttled on the deck. "That's for thankin' a <DW65>!" says he, lookin' as savitch as a fiend, and got the knife in his teeth, when he turned to and sawed through the seizing round my wrists--an' in course I sets every man clear in quick-sticks. "_Now!_" says Job, looking round, "the quicker the better--that cussed lubber-ratin' hound's got my schooner, but maybe, my lads, this here iv'ry man'll pay expenses: if I'm made out a pirate, I'll arn the name!" "'Well, we squints up the hatchway, and see'd a young midshipman a-standing with his back to us, watching the brig's crew at the braces, an' a pistol in one hand--when all at once our skipper slips off his shoes, runs up the stair as quiet as a cat, an' caught the end of a capstan-bar as lay on the scuttle. With that down he comes crash on the poor fellow's scull from aft, and brained him in a moment. Every man of us got bloody-minded with the sight, so we scarce knowed what we did, ye know, mate, afore all hands o' them was gone--how, I ain't goin' for to say, nor the share as one had in it more nor another. The long an' the short on it was, we run the brig by sundown in amongst the creeks up the Camaroons river, thinkin' to lie stowed away close thereabouts till all wor cold. Hows'ever, they kicked up the devil's delight about a piratecy, and the sloop-o'-war comes back shortly, when night an' day there was that young shark of a leftenant huntin' arter us, as sharp as a marling-spike--we dursn't come down the river nohow, till what with a bad conscience, fogs, and sleepin' every night within stink o' them blasted muddy mangroves an' bulrushes together, why, mate, the whole ten hands died off one arter the other in the fever--leaving ownly me an' the skipper. Job Price was like a madman over the cargo, worth good knows how many thousand dollars, as he couldn't take out; but for my part, I gets the brig's punt one night and sculls myself ashore, and off like a hare into the bush by moonlight. No use, ye know, for to say what rum chances I meets with in the woods, livin' up trees and the like for fear o' illiphants, sarpents, an' high-annies; but, blow me, if I didn't think the farther ye went aloft, the more monkeys an' parrykeets you roused out, jabberin' all night so as a feller couldn't close an eye--an' as for the sky, be blowed if I ever once sighted it. So, d' ye see, it puts all notions o' fruits an' flowers out o' my head, an' all them jimmy-jessamy sort o' happy-go-lucky yarns about barbers' ileyands and shipherdresses what they used for to spell out o' dicshinars at school--all gammon, mate!' "'Lor' love ye, no, surely,' said Jack; 'it's in the Bible!' "'Ay, ay,' said Harry, 'that's arter ye've gone to Davy Jones, no doubt; but I've been in the Southsy ileyands since, myself, an' be blowed if it's much better there! Hows'ever, still anon, I took a new fancy, an' away I makes for the river, in sarch of a <DW65> villache, as they calls 'em; and sure enough it warn't long ere right I plumps in the midst on a lot o' cane huts amongst trees. But sich a shine and a nitty as I kicks up, ye see, bein' half-naked, for all the world like a wild man o' the woods, an' for a full hour I has the town to myself, so I hoists my shirt on a stick over the hut I took, by way of a flag o' truce, an' at last they all begins for to swarm in again. Well, ye see, I knowed the ways o' the natifs thereabouts pretty well, an' what does I do but I'd laid myself flat afore an ugly divvle of a wooden himmache, as stood on the flour, an' I wriggles and twists myself, and groans like a chap in a fit--what they calls _fittish_, thereaway--an' in course, with that they logs me down at once for a rig'lar holy 'possel from Jerusalem. The long an' the short on it was, the fittish-man takes me under charge, and sets me to tell fortins or the like with an ould quadrant they got somewheres--gives me a hut an' two black wives, begad! and there I lives for two or three weeks on end, no doubt, as proud as Tommy; when, one fine morning, what does I see off shore in the river but that confounded man-o'-war tender, all ship-shape an' ataunto again. So, my boy, I gives 'em to understand as how, bein' over vallible at home with the king of England, in course he'd sent for to puckalow me away--an' no sooner said, but the whole town gets in a fluster--the fittish-man, which a knowin' chap he was, takes and rubs me from heel to truck with ile out on a sartin nut as turned me coal-black in half-an-hour, an' as soon as I looks in the creek, mate, be blowed if I'd a knewn myself from a <DW65>, somehow!' "To tell the truth, as _I_ thought to myself, it was no wonder, as Master Harry's nose and lips were by no means in the classic style, and his skin, as it was, didn't appear of the whitest. "'So there, ye know, I sits before a hut grindin' away at maize, with nothink else but a waist-cloth round me, and my two legs stuck out, till such a time as the leftenant an' two boats' crews had sarched the villache, havin' heerd, no doubt, of a white man thereabouts--an' at last off they went. Well, in course, at first this here affair gives the fittish-man a lift in the <DW65>s' eyes, by reason o' havin' turned a white man black--'cause, ye see, them fittish-men has a rig'lar-bred knowledge on plants and sich-like. But hows'ever, in a day or two I begins for to get rayther oneasy, seein' it didn't wash off, an' accordently I made beknown as much to the fittish-man, when, my boy, if he doesn't shake his mop-head, and rubs noses, as much as to say, "We ain't agoin' to part." 'Twas no use, and thinks I, "Ye man-eating scum, be blowed if I don't put your neck out, then!" So I turns too with my knife on a log o' wood, carves a himmache twice as big an' ugly as his'n, and builds a hut over it, where I plays all the conjerin' tricks I could mind on--till, be hanged if the <DW65>s didn't begin to leave the fittish-man pretty fast, and make a blessed sight more o' me. I takes a couple more wives, gets drunk every day on palm-wine and toddy juice--as for the hogs an' the yams they brought me, why I couldn't stow 'em away; an' in place o' wanting myself white again, I rubs myself over and over with that 'ere nut, let alone palm-ile, till the ould fittish-man looks brown alongside o' me. At last the king o' the <DW65>s thereaway--King Chimbey they called him, or some'at o' that sort--he sends for to see me, an' away to his town they takes me, a mile or two up the country, where I see'd him; but I'm blowed, Jack, if he'd got a crown on at all, ownly a ould red marine's coat, an' a pair o' top-boots, what was laid away when he warn't in state. Hows'ever, he gives me two white beans an' a red un in sign o' high favour, and gives me to know as I wor to stay there. But one thing I couldn't make out, why the black king's hut an' the josst-house as they calls it, was all stuck round with bones an' dead men's skulls!--'twan't long, though, ere I finds it out, mate! That 'ere fittish-man, d 'ye see, wor a right-down imp to look at, and wicked enough he eyed me; but still anon I sends over for my wives, turns out a black feller out on his hut, an' slings a hammock in it, when the next day or so I meets the first fittish-man in the woods, an' the poor divvle looks wonderful friendly-like, makin' me all kinds o' woful signs, and seemin'ly as much as to say for to keep a bright look-out on the other one. All on a suddent what does he do, but he runs a bit as far as a tree, picks up a sort of a red mushroom, an' he rubs with it across the back o' my hand, gives a wink, and scuttles off. What it meaned I couldn't make out, till I gets back to the town, when I chanced to look at my flipper, and there I see a clean white streak alongst it! Well, I thinks, liberty's sweet, an' I'm blessed if a man's able to cruise much to windward o' right-down slavery, thinks I, if he's black! Howsomever, thinks I, I'll jest hold on a _bit_ longer. "'Well, next day, the black king had the blue-devils with drinking rum, an' he couldn't sleep nohow, 'cause, as I made out, he'd killed his uncle, they said--I doesn't know but he'd eaten him, too--anyhow, I see'd him eat as much of a fat hog, raw, as ud sarve out half the watch--so the fittish-man tells him there's nought for it but to please the fittish. What that wor, blowed if I knew; but no sooner sundown nor they hauls me out o' my hut, claps me in a stinking hole as dark as pitch, and leaves me till mornin', as I thought. Jist about the end o' the mid-watch, there kicks up a rumpus like close-reef taups'ls in a hurricane--smash goes the sticks over me; I seed the stars, and a whole lot o' strange blacks with long spears, a-fightin', yellin', tramplin', an' twistin' in the midst of the huts--and off I'm hoisted in the gang, on some feller's back or other, at five knots the hour, through the woods--till down we all comes in a drove, plash amongst the very swamps close by the river, where, lo an' behold! I makes out a schooner afloat at her anchor. The next thing I feels a red-hot iron come hiss across my shoulders, so I jumped up and sang out like blazes, in course. But, my flippers bein' all fast, 'twas no use; I got one shove as sent me head-foremost into a long canoe, with thirty or forty <DW65>s stowed away like cattle, and out the men pulls for the schooner. A big bright fire there was ashore, astarn of us, I mind, where they heated the irons, with a chap in a straw hat sarvin' out rum to the wild blacks from a cask; and ye saw the pitch-black woods behind, with the branches shoved out red in the light on it, and a bloody-like patch on the water under a clump o' sooty mangroves. An', Jack, if I didn't feel the life sick in me, that time--for, d' ye see, I hears nothin' spoke round me but cussed French, Portingeese, an' <DW65> tongue--'specially when it jist lighthens on me what sort on a case I were in; an' thinks I, "I'm took for a _slave_, arter all!--an' be hanged, but I left that 'ere 'farnal mushroom a-lying under that there tree yonder!" I begins for to think o' matters an' things, an' about Bristol quay, an' my old mother, an' my sister as was at school--mind ye, mate, all atwixt shovin' off the mangroves an' coming bump agen the schooner's side--an' blow me if I doesn't turn to, an' nigh-hand commences for to blubber--when jist then what does I catch sight on, by the lantern over the side, but that 'ere villain of a fittish-man, an' what's more, King Chimbey hisself, both hauled in the net. And with that I gives a chuckle, as ye may suppose, an' no mistake; for thinks I, so far as consarns myself, this here can't last long, blow me, for sooner or later I'll find some un to speak to, even an I nivver gets rid o' this here outer darkness--be blowed if I han't got a white mind, any ways, an' free I'll be, my boy! But I laughs, in course, when I see'd the fittish-man grin at me--for thinks I, "My cocks, you're logged down for a pretty long spell of it!" "'Well, bo,' somehow I knows no more about it till such time as I sort o' wakes up in pitch-dark, all choke and sweat, an' a feller's dirty big toe in my mouth, with mine in some un else's eye; so out I spits it, an' makes a scramble for my life. By the roll and the splash I knowed I wor down in the schooner's hold; an' be hanged if there warn't twenty or thirty holding on like bees to a open weather-port, where the fresh wind and the spray come a-blowing through--but there, my boy, 'twere no go for to get so much as the tip o' yer nose. Accordently, up I prizes myself with my feet on another poor devil's wool--for d' ye see, by that time I minds a man's face no more nor so much timber--an' I feels for the hatch over me, where by good luck, as I thought, there I finds it not battened down yet, so I shoved my head through on deck like a blacksmith's hammer. "'Well, mate, there was the schooner's deck wet, a swell of a sea on round her, well off the land, no trifle of a morning gale, and the craft heeling to it; a lot o' hands up on her yards, a-reefing at the boom mains'l and fo'taups'l, an' if my heart doesn't jump into my mouth with the sight, for I feels it for all the world like a good glass o' grog, settin' all to rights. Two or three there was walkin' aft the quarter-deck, so out I sings, "Hullo! hullo there, shipmates, give us a hand out o' this!" Two on 'em comes for'ard, one lifts a handspike, but both gives a grin, as much as to say it's some <DW65> tongue or other in place o' good English--for, d' ye see, they'd half their faces black-beard, and rings i' their ears--when up walks another chap like the skipper, an' more the looks of a countryman. "I'm a free-born Briton!" roars I again; with that he lends me a squint, looks to the men, and gives some sort of a sign, when they jams-to the hatch and nips me fast by the neck. "Devil of a deep beggar, this 'ere!" says he; "jist give him the gag, my lads," says he; "the planters often thinks more of a dumby, 'cause he works the more, and a stout piece o' goods this _is_!" says he. Well, mate, what does they do but one pulls out a knife, an' be blowed if they warn't a-goin' for to cut out my tongue; but the men aloft sung out to hoist away the yards; so they left me ready clinched till they'd belay the ropes. Next a hand for'ard, by good luck, hailed "Sail ho!" and they'd some'at else to think o' besides me; for there, my boy, little more nor three miles to wind'ard, I see'd the _Irish_ as she come driving bodily out o' the mist, shakin' out her three to'gallant-sails, an' a white spray flying with her off one surge to another. Rather bad it was, mind ye, for my windpipe, for every time the schooner pitched, away swings my feet clear o' the <DW65>'s heads--'cause, d' ye see, we chanced for to be stowed on the 'tween-decks, an' another tier there was, stuffed in her lower hold--an' there I stuck, mate, so as I couldn't help watchin' the whole chase, till at last the hatch slacks nip a bit, and down I plumps into the dark again. "'Well, bo', the breeze got lighter, an' to all seemin' the cursed schooner held her own; but hows'ever, the sloop-o'-war kept it up all day, and once or twice she tips us a long shot; till by sunset, as I reckoned, we hears no more on her. The whole night long, again, there we stews as thick as peas--I keeps harknin' to the sighs and groans, an' the wash along the side, in a sort of a doze; an' s'help me Bob, I fancies for a moment I'm swinging in my hammock in the foc'sle, an it's no more but the bulkheads and timbers creakin'. Then I thinks it's some un else I dreams on, as is oneasy, like to choke for heat and thirst; and I'm a-chucklin' at him--when up I wakes with the cockroaches swarming over my face. Another groan runs from that end to this, the whole lot on us tries hard, and kicks their neighbours to turn, an' be blowed if I knowed but I was buried in a churchyard, with the horrid worms all a-crawl about me. All on a suddent, nigh-hand to daybreak it was, I hears a gun to wind'ard, so with that I contrives for to scramble up with my eye to the scuttle-port. 'Twas a stiffish breeze, an' I see'd some'at lift on a sea like a albatross's wing, as one may say--though what wor this but the _Irish's_ bit of a tender, standing right across our bows--for the schooner, ye see, changed her course i' the night-time, rig'lar slaver's dodge, thinkin' for to drop the sloop-o'-war, sure enough. But as for the little f'lucca, why they hadn't bargained for her at all, lying-to as she did, with a rag o' sail up, in the troughs of the sea, till the schooner was close on her. "'Well, no sooner does they go about, my boy, but the muskeety of a cruiser lets drive at her off the top of a sea, as we hung broadside to them in stays. Blessed if I ever see sich a mark!--the shot jist takes our fore top fair slap--for the next minute I seed the fore-topmast come over the lee-side, an' astarn we begins to go directly. What's more, mate, I never see a small craft yet handled better in a sea, as that 'ere chap did--nor the same thing done, cleaner at any rate--for they jist comes nigh-hand tip on our bowsprit-end, as the schooner lifted--then up in the wind they went like clockwork, with a starnway on as carried the f'lucca right alongside on us, like a coachman backing up a lane, and _grind_ we both heaved on the swell, with the topmast hamper an' its canvas for a fender atwixt us. Aboard jumps the man-o'-war's-men, in course, cutlash in hand, an' for five minutes some tough work there was on deck, by the tramp, the shots, an' the curses over our heads--when off they shoved the hatches, and I seed a tall young feller in a gold-banded cap look below. Be blowed if I wasn't goin' to sing out again, for, d' ye see, I'm blessed if I took mind on the chap at all, as much by reason o' the blood an' the smoke he'd got on his face as aught else. Hows'ever, I holds a bit meantime, on account o' Job Price an' that 'ere piratecy consarn--till what does I think, a hour or two arter, when I finds as this here were the very leftenant as chased us weeks on end in the Camaroons. So a close stopper, sure enough, I keeps on my jaw; an' as for scentin' me out amongst a couple o' hundred blacks in the hold, why, 'twere fit to 'ppal my own mother herself. "'Well, Jack, by this time bein' near Serry Loney, next day or so we got in--where, what does they do but they _lubberrates_ us all, as they calls it, into a barracoon ashore, till sich time as the slaver ud be condemned--an' off goes the tender down coast again. Arter that, they treats us well enough, but still I dursn't say a word; for one day, as we goed to work makin' our huts, there I twigs a printed bill upon the church-wall, holdin' out a reward, d' ye see, consarnin' the piratecy, with my oun name and my very build logged down--ownly, be hanged if they doesn't tack on to it all, by way of a topgallant ink-jury to a man, these here words--"He's a very ugly feller--looks like a furriner." Well, mate, I ain't a young maiden, sure enough, but, thinks I, afore I fell foul o' that blasted fittish-man an' his nut, cuss me if I looks jist so bad as that 'ere! So ye know this goes more to my heart nor aught else, till there I spells out another confounded lie in the bill, as how Captin Price's men had mutinied again him, and murdered the brig's crew--when, in course, I sees the villain's whole traverse at once. So sayin', I watched my chance one night an' went aboard a Yankee brig as were to sail next day; an' I tells the skipper part o' the story, offerin' for to work my passage across for nothing; which, says he, "It's a hinterestin' narritif"--them was his words; and, says he, "It's a land o' freedom is the States, an' no mistake--ain't there no more on ye in the like case?" he says. "Not as I knows on, sir," I answers; an' says he, "Plenty o' gen'lmen there is yonder, all in silks an' satins; an' I hear," says he, "there's one on 'em has a chance o' bein' President next time--anyhow I'm your friend," says he, quite hearty. "'Well, the long an' short of it was, I stays aboard the brig, works my spell in her, an' takes my trick at the hellum--but I'm blowed, Jack, if the men 'ud let me sleep in the foc'sle, 'cause I was a black, so I slung my hammock aft with the <DW65> stoord. D' ye see, I misgived myself a bit when we sank the coast, for, thinks I, it's in Africay as that 'ere blessed mushroom are to be found, to take the colour off me--hows'ever, I thinks it carn't but wear out in time, now I've got out o' that 'ere confounded mess, where, sure enough, things was against me. So at last the v'yage were up, an' the brig got in to New Orleans. There I walks aft to the skipper for to take leave, when says he, wonderfly friendly like, "Now, my lad," says he, "I'm goin' up river a bit for to see a friend as takes a interest in your kind--an' if ye likes, why I'll pay yer passage that far?" In course I agrees, and up river we goes, till we lands at a fine house, where I'm left in a far-handy, ye know, while the skipper an' his friend has their dinner. All at once the gen'lman shoves his head out of a doure, takes a look at me, an' in again--arter that I hears the chink o' dollars--then the skipper walks out, shuts the doure, and says he to me, "Now," he says, "that's a 'cute sort o' tale ye tould me, my lad, but it's a lie, I guess!" "Lie, sir!" says I, "what d' ye mean?" for ye see that 'ere matter o' the iv'ry brig made me sing small at first. "No slack, Pumpey," says he, liftin' his forefinger like a schoolmaster; "ain't yer name Pumpey?" says he. "Pumpey!" says I, "my name's Jack Brown," for that wor the name I'd gived him afore. "Oh!" says he, "jest say it's Gin'ral Washington, right off. Come," says he, "I guess I'd jest tell ye what tripe you belongs to--you're a Mandigy <DW65>," says he. "It's all very well," he says, "that 'ere yarn, but that's wot they'd all say when they comes, they've been dyed black! Why," says he, "doesn't I see that 'ere brand one night on yer back--there's yer arms all over pagan tattooin'----" "Bless ye, captin," I says, a-holdin' up my arm, "it's crowns an' anchors!" "Crowns!" says he, turnin' up his nose, "what does we know o' crowns hereaway--_we_ ain't barbers yet, I guess"--of what he meant by _barbers_ here, mate, I'm hanged if I knowed. "'Sides," says he, "you speaks broken Aimerricane!" "'Merricain?" I says, "why, I speaks good English! an' good reason, bein' a free-born Briton--as white's yerself, if so be I could ownly clap hands for a minnet on some o' them mushrooms I tould ye on!" "Where does they grow, then?" axes he, screwin' one eye up. "In Africay yonder, sir," I says, "more's the pity I hadn't the chance to lay hands on them again!" "Phoo!" says he, "glad they ain't _here_! An' does you think we 're a-goin' for to send all the way over to Africay for them mushrooms you talks on? Tell ye what, yer free papers 'ud do ye a sight more good _here_!" says he; "it's no use with a black skin for to claim white laws; an' what's more, ye're too tarnation ugly-faced for it, let alone colour, Pumpey, my man," he says. "I tell ye what it is, Captin Edwards," says I, "my frontispiece ain't neither here nor there, but if you calls me Pumpey again, blowed an' I don't pitch inty ye!"--so with that I handles my bones in a way as makes him hop inside the doure--an' says the skipper houldin' it half-shut, "Harkee, lad," he says, "it's no go your tryin' for to run, or they'll make ye think angels o' bo'sun's-mates. But what's more," says he, "nivver you whisper a word o' what ye tells me, about nuts an' mushrooms, or sich like trash--no more will I; for d' ye see, my lad, in that case they'd jest _hush ye up_ for good!" "Who d' ye mean?" I says, all abroad, an' of a shiver like--mindin' on the slave-schooner again. "Why, the planter's people," says he, "as I've sold ye to." An' with that he pints into his mouth, and shuts the doure. "'Well, mate, ye may fancy how I feels! Here I stands, givin' a look round for a fair offing; but there was bulwarks two fadom high all round the house, a big bloodhound lyin' chained, with his muzzle on his two paws, an' nobody seem'd for to mind me. So, I see'd it were all up wonst more; an' at the thou't of a knife in my tongue, I sits right down in the far-handy, rig'lar flabbergasted, when out that 'ere blasted skipper snoots his head again, an' says he, "Pumpey, my lad, good-day," says he; "you knows some'at o' the water, an' as they've boat-work at times hereaway, I don't know but, if you behaves yerself, they'll trust you with an oar now an' then: for I tould yer master jist now," says he, "as how you carn't speak no English!" Well, I gives him a hoath, 'cause by that time I hadn't a word to throw at a dog; and shortly arter, up comes the overseer with his black mate, walks me off to a shed, strips me, and gives me a pair o' cotton drawers and a broad hat--so out I goes the next mornin' for to hoe sugarcane with a gang o' <DW65>s. "'Well, mate, arter that I kept close enough--says no more, but mumbles a lot o' no-man's jargon, as makes 'em all log me down for a sort o' double-Guinea savitch--'cause why, I were hanged afeard for my tongue, seein', if so be I lost it, I'd be a <DW65> for ever, sure enough. So the blacks, for most part being country-bred, they talks nothin' but a blessed jumble, for all the world like babbies at home; an' what does they do but they fancies me a rig'lar African <DW65>, as proud as Tommy, an' a'most ready for to washup me they wor--why, the poor divvles 'ud bring me yams and fish; they kisses my flippers an' toes as I'd been the Pope; an' as for the young girls, I'm blowed if I warn't all the go amongst 'em--though I carn't say the same where both's white, ye know! What with the sun an' the cocoa-nut ile, to my thinkin', I gets blacker an' blacker--blessed if I didn't fancy a feller's very mind turned <DW65>. I larns their confounded lingo, an' I answers to the name o' Pumpey, blast it, till I right-down forgets that I'd ever another. As for runnin', look ye, I knowed 'twas no use thereaway, as long as my skin tould against me, an' as long as Africay wor where it wor. So, my boy, I see'd pretty clear, ye know, as this here world 'ud turn a man into a rig'lar built slave-<DW65> in the long run if he was an angel out o' heaven! "'Well, mate, one day I'm in the woods amongst a gang, chopping firewood for the sugar-mill, when, what does I light on betwixt some big ground-leaves and sich like, but a lot o' them very same red mushrooms as the fittish-man shows me in Africay!--blowed if there warn't a whole sight o' them round about, too! So I pulls enough for ten, ye may be sure, stuffs 'em in my hat, an' that same night, as soon as all's dark, off I goes into the woods, right by the stars, for the nearest town 'twixt there and New Orleans. As soon as I got nigh-hand it, there I sits down below a tree amongst the bushes, hauls off my slops, an' I turns to for to rub myself all over, from heel to truck, till daybreak. So, in course, I watches for the light angshis enough, as ye may suppose, to know what colour I were. Well, strike me lucky, Jack, if I didn't jump near a fadom i' the air, when at last I sees I'm _white_ wonst more!--blessed if I didn't feel myself a new man from stem to starn! I makes right for a creek near by, looks at my face in the water, then up I comes again, an' every yarn o' them cussed slave-togs I pulls to bits, when I shoves 'em under the leaves. Arter that I took fair to the water for about a mile, jist to smooth out my wake, like; then I shins aloft up a tree, where I stowed myself away till noon--'cause, d'ye see, I knowed pretty well what to look for next. An' by this time, mind ye, all them queer haps made a fellow wonderful sharp, so I'd scheme out the whole chart aforehand how to weather on them cussed Yankees. "'Accordently, about noon, what does I hear but that 'ere savitch bloodhound comin' along up creek, with a set o' slave-catchers astarn, for to smell out my track. With that, down I went in the water again, rounds a point into the big river, where I gets abreast of a landin' place, near the town, with craft laying out-stream, boats plyin', an' all alive. D' ye see, bo', I'd got no clothes at all, an' how for to rig myself again, 'blowed if I knows--seein' as how by this time I'd turned as white as the day I were born, an' a naked white man in a town arn't no better than a black <DW65>. So in I swims like a porpus afore a breeze, an' up an' down I ducks in the shallow, for all the world like a chap a-takin' a bath; an' out I hollers to all an' sundry, with a Yankee twang i' my nose, for to know if they had seen my clothes, till a whole lot on 'em crowds on the quay. Hows'ever, I bethinks me on that 'ere blasted brand atwixt my shoulders, an' I makes myself out as modest as a lady, kicks out my legs, and splashes like a whale aground, an' sticks out my starn to 'em for to let 'em see it's white. "Hullo!" I sings out, "han't ye seen my clothes?" "No, stranger," says they, "someun's runned off with 'em, we cal'clates!" With that I tells 'em I'm a Boston skipper new comed up from New Orleans; an' not being used to the heat, why I'd took a bath the first thing; an' I 'scribes the whole o' my togs as if I'd made 'em--"split new," says I, "an' a beaver hat, more by token there's my name inside it; an'," says I, "there's notes for a hundred dollars in my trousers!" "'By this time down comes the slave-catchers, an' says they, hearin' on it, "That 'ere tarnation <DW65>'s gone off with 'em, we'll know 'un by them marks well enough," says they, an' off they goes across river. "Hullo!" I sings out to the folks, "I'm a-gettin' cold here, so I guess I'll come ashore again, slick off!" I twangs out. "Guess ye can't, straunger!" they hails; "not till we gets ye some kiverin's!--we 're considerable proper here, we are!" "Ain't this a free country, then?" I says, givin' a divvle of a splash; an' with that they begs an' axes me for to hould on, an' they'd fix me, as they calls it, in no time. "Well, mate, what does they do but one an' another brings me somethin' as like what I 'scribed as could be, hands 'em along on a pole, an' I puts 'em on then an' there. Arter that, the ladies o' the place bein' blessed modest, an' all of a fright leest I'd a comed out an' gone through the town--why, out o' grannytude, as they says, they gets up a supperscription on a hundred dollars to make up my loss--has a public meetin' logged down for the evenin', when I'm for to indress the citizens, as they says, all about freedom an' top-gallantry, an' sich-like. Hows'ever, I jist sticks my tongue in my cheek, eats a blessed good dinner in a hot-ell, watches my chance, an' off by a track-boat at sundown to New Orleans, where I shipped aboard a English barque, an' gets safe out to sea wonst more. "'Lord love ye, Harry!' exclaimed Jack hereupon, 'the likes o' that now! But I've heerd say, them fittish-men you talks on has wonderful knowledge--why, mayhap it's them as keeps all the <DW65>s black, now?' 'Well, bo',' said Harry, 'I don't doubt but if them 'Merricain slaves jist knowed o' that 'ere red mushroom, why they'd show the Yankees more stripes nor stars! D' ye see, if a Yankee knowed as his own father were a-hoein' his sugar-canes, blowed if he wouldn't make him work up his liberty in dollars! All the stripes, d' ye see, mate, is for the blacks, an' all the stars is for the whites, in them Yankee colours as they brags so much about! But what I says is, it's cussed hard to get through this 'ere world, shipmate, if ye doesn't keep well to the wind'ard of it!' "I was the more amused with this account of the ugly rascal's adventures that I remembered two or three of the occasions he mentioned, and he told them pretty exactly so far as I had to do with them. As for the fetish-man's curious nut, and that extraordinary mushroom of his, why 'ten to one,' thought I, 'but all the while the fellow never once touched a piece of _soap_!' which, no doubt, had as much to do with it as anything besides. Somehow or other, notwithstanding, I had taken almost a fancy to the villain--such a rough sample of mankind he was, with his uncouth grumpy voice, and his huge black beard; and he gave the story in a cool, scornful sort of way that was laughable in itself. 'So, my lad,' I thought, 'it seems you and I have met twice before; but if you play any of your tricks this time, Master Harry, I hope you've found your match'; and certainly, if I had fancied my gentleman was in the slaver's hold that time off the African coast, I'd have 'lubberrated' him with a vengeance. "'I say, mates,' said he again, with a sulky kind of importance, to those of the watch who had gathered round during the last half of his yarn, 'there's three things I hates--an' good reason!' 'What be's they, Harry?' asked the rest. 'One's a Yankee,' said he, 'an' be blowed to him; the second's a slaver; and the third is--I carn't abide a <DW65>, nohow. But d' ye see, there's one thing I _likes_----' Here eight bells struck out, and up tumbled the watch below, with Jacobs' hearty face amongst them: so I made my way aft, and, of course, missed hearing what that said delightful thing might be, which this tarry AEsop approved of so much. CHAPTER XII "While I was listening, I had scarcely noticed, that within the last few minutes a light air had begun to play aloft among the higher canvas, a faint cat's-paw came ruffling here and there a patch of the water, till by this time the Indiaman was answering her wheel again, and moving slowly ahead, as the breeze came down and crept out to the leeches of her sails, with a sluggish lifting of her heavy fore-course. The men were all below at breakfast, forward, and, of course, at that hour the poop above me was quite a Babel of idlers' voices; while I looked into the compass and watched the ship's head falling gradually off from north-east-by-north, near which it had stuck pretty close since daybreak. The sun was brought before her opposite beam, and such a perfect gush of hazy white light shot from that quarter over the larboard bulwarks, that thereaway, in fact, there might have been a fleet of ships, or a knot of islands, and we none the wiser, as you couldn't look into it at all. "The chief mate came handing a wonderfully timid young lady down the poop-ladder with great care, and as soon as they were safe on the quarter-deck, she asked, with a confiding sort of lisp, 'And where are we going _now_ then, Mr Finch?' 'Well, miss,' simpered he, 'wherever _you_ please, I'll be glad to conduct you!' 'Oh, but the ship I mean,' replied she, giggling prettily. 'Why,' said Finch, stooping down to the binnacle, 'she heads due south-east at present, miss.' 'I _am_ so glad you are going on again!' said the young lady; 'but oh! when shall we see dear _land_ once more, Mr Finch?' 'Not for more than a week, I fear,' answered the mate, 'when we arrive at the Cape of Good Hope. But there, miss, your poetic feelings will be gratified, I assure you. The hills there, I might say, Miss Brodie,' he went on, 'not to speak of the woods, are quite dramatic! You mustn't suppose the rough mariner, rude as he seems, Miss Brodie, is entirely devoid of romance in his sentiments, I hope!' and he looked down for the twentieth time that morning at his boots as he handed her down the cabin hatchway, longing to see the Cape, no doubt. 'Much romance, as you call it, there is in ugly Harry yonder!' thought I; and comparing this sort of stuff, aft, with the matter-of-fact notions before the mast, made me the more anxious for what might turn up in a few hours, with this gallant first officer left in full charge, and the captain, as I understood, unable to leave his cot. A good enough seaman the fellow was, so far as your regular deep-sea work went, which those India voyagers had chiefly to do with then; but for aught out of the way, or a sudden pinch, why, the peace had just newly set them free of their leading-strings, and here this young mate brought his new-fangled school navigation, forsooth, to run the _Seringapatam_ into some mess or other; whereas, in a case of the kind, I had no doubt he would prove as helpless as a child. "By this time, for my part, all my wishes for some ticklish adventure were almost gone, when I thought of our feelings at the loss of the boat, as well as the number of innocent young creatures on board, with Lota Hyde herself amongst them; while here had I got myself fairly set down for a raw griffin. Yet neither Westwood nor I, unless it came to the very worst, could venture to make himself openly useful! I was puzzled both what to think of our exact case, and what to do; whereas a pretty short time in these latitudes, as the foremast-man had said, might finish our business altogether; indeed, the whole look of things, somehow or other, at that moment, had a strange unsettled touch about it, out of which one unaccustomed to those parts might be sure some change would come. The air, a little ago, was quite suffocating, the heat got greater; and the breeze, though it seemed to strengthen aloft, at times sank quietly out of her lower canvas like a breath drawn in, and caught it again as quietly ere it fell to the masts. What with the slow huge heave of the water, as it washed glittering past, and what with the blue tropical sky overhead, getting paler and paler at the horizon astern, from fair heat--while the sunlight and the white haze on our larboard beam, made it a complete puzzle to behold--why, I felt just like some fellow in one of those stupid dreams after a heavy supper, with nothing at all in them, when you don't know how long or how often you've dreamt it before. Deuce the hand or foot you can stir, and yet you've a notion of something horrid that's sure to come upon you. "We couldn't be much more than a hundred miles or so to south'ard of St Helena; but we might be two thousand miles off the land, or we might be fifty. I had only been once in my life near the coast thereaway, and certainly my recollections of it weren't the most pleasant. As for the charts, so little was known of it that we couldn't depend upon them; yet there was no doubt the ship had been all night long in a strong set of water toward north-east, right across her course. For my own part, I was as anxious as anyone else to reach the Cape, and get rid of all this cursed nonsense; for since last night, I saw quite well by her look that Violet Hyde would never favour me, if I kept in her wake to the day of judgment. There was I, too, every time I came on deck and saw those round-house doors, my heart leapt into my throat, and I didn't know port from starboard! But what was the odds, that I'd have kissed the very pitch she walked upon, when _she_ wasn't for _me_!--being deep in love don't sharpen the faculties neither, and the more I thought of matters the stupider I seemed to get. 'Green Hand!' thought I, 'as Jacobs and the larboard watch call me, it appears--why, they're right enough! A green hand I came afloat nine years ago, and, by Jove! though I know the sea and what belongs to it, from sheer liking to them, as 'twere--it seems a green hand I'm to stick--seeing I know so blessed little of womankind, not to speak of that whole confounded world ashore! With all one's schemes and one's weather-eye, something new always keeps turning up to show one what an ass he is; and hang me, if I don't begin to suppose I'm only fit for working small traverses upon slavers and jack-nasty-faces, after all! There's Westwood, without troubling himself, seems to weather upon me, with her, like a Baltimore clipper on a Dutch schuyt!' In short, I wanted to leave the _Seringapatam_ as soon as I could, wish them all a good voyage together away for Bombay, sit down under Table Mountain, and then perhaps go and travel amongst the Hottentots by way of a change. "The chief officer came aft towards the binnacle again, with a strut in his gait, and more full of importance than ever, of course. 'This breeze'll hold, I think, Macleod?' said he to the second mate, who was shuffling about in a lounging, unseamanlike way he had, as if he felt uncomfortable on the quarter-deck, and both hands in his jacket pockets. 'Well,' said the Scotchman, 'do ye not think it's too early begun, sir?' and he looked about like an old owl, winking against the glare of light past the mainsheet to larboard; 'I'll not say but it will, though,' continued he, 'but 'odsake, sir, it's terrible warm!' 'Can't be long ere we get into Cape Town now,' said the mate, 'so you'll turn the men on deck as soon as breakfast's over, Mr Macleod, and commence giving her a coat of paint outside, sir.' 'Exactly, Mr Finch,' said the other, 'all hands it'll be, sir? For any sake, Mr Finch, give they lazy scoundrels something to do!' 'Yes, all hands,' said Finch; and he was going below, when the second mate sidled up to him again, as if he had something particular to say. 'The captain'll be quite better by this time, no doubt, Mr Finch?' asked he. '_Well_--d' ye mean?' inquired the mate, rather shortly; 'why no, sir, when the surgeon saw him in the morning watch, he said it was a fever, and the sooner we saw the Cape the better for him.' 'No doubt, no doubt, sir,' said the second mate, thoughtfully, putting his forefinger up his twisted nose, which I noticed he did in such cases, as if the twist had to do with his memory--'no doubt, sir, that's just it! The doctor's a sharp Edinbro' lad--did he see aucht by common about the captain, sir?' 'No,' said Finch, 'except that he wanted to go on deck this morning, and the surgeon took away his clothes and left the door locked.' 'Did he, though?' asked Macleod, shaking his head, and looking a little anxious; 'didna he ask for aucht in particular, sir?' 'Not that I heard of, Mr Macleod,' replied the mate; 'what do you mean?' 'Did he not ask for a green leaf?' replied the second mate. 'Pooh,' said Finch, 'what if he did?' 'Well, sir,' said Macleod, 'neither you nor the doctor's sailed five voyages with the captain, like me. He's a quiet man, Captain Weelumson, an' well he knows his calling; but sometimes warm weather doesn't do with him, more especial siccan warm weather as this, when the moon's full, as it is the night, ye know, Mr Finch. There's something else besides that, though, when he's taken that way.' 'Well, what is it?' asked the mate, carelessly. 'Oo!' said Macleod, 'it can't be _that_ this time, of course, sir--it's when he's near the _land_! The captain knows the smell of it, these times, Mr Finch, as well as a cockroach does--an' it's then he asks for a green leaf, and wants to go straight ashore--I mind he did it the voy'ge before last, sir. He's a quiet man, the captain, as I said, for ord'nar'--but when he's roused, he's a----' 'Why, what was the matter with him?' said Finch, more attentive than before; 'you don't mean to say?--go on, Mr Macleod.' The second mate, however, looked cautious, closed his lips firmly, and twirled his red whiskers, as he glanced with one eye aloft again. 'Hoo!' said he, carelessly, 'hoo, it's nothing, nothing--just, I'm thinking, sir, what they call disgestion ashore--all frae the stommach, Mr Finch. We used just for to lock the state-room door, an' never let on we heard--but at any rate, sir, _this_ is no the thing at all, ye know! Mester Semm,' continued he to the fat midshipman, who came slowly up from the steerage, picking his teeth with a pocket-knife, 'go forrid and get the bo'sun to turn up all hands.' "'Sir,' said I, stepping up to the mate next moment, before the round-house, 'might I use the freedom of asking whereabouts we are at present?' Finch gave me a look of cool indifference, without stirring head or hand; which I saw, however, was put on, as, ever since our boating affair, the man evidently detested me, with all his pretended scorn. 'Oh certainly, sir!' said he, 'of course!--sorry I haven't the ship's log here to show you--but it's two hundred miles or so below St Helena, eight hundred miles odd off the south-west African coast, with a light westerly breeze bound for the Cape of Good Hope--so after that you can look about you, sir!' 'Are you _sure_ of all that, sir?' asked I, seriously. 'Oh no, of course not!' said he, still standing as before, 'not in the least, sir! It's nothing but quadrant, sextant, and chronometer work, after all--which every young gentleman don't believe in!' Then he muttered aloud, as if to himself, 'Well, if the captain _should_ chance to ask for a _green_ leaf, I know where to find it for him!' "I was just on the point of giving him some angry answer or other, and perhaps spoiling all, when I felt a tap on my shoulder, and on turning round saw the Indian judge, who had found me in the way either of his passage or his prospect, on stepping out of the starboard door. 'Eh!' said he, jocularly, as I begged his pardon, 'eh, young sir--I've nothing to do with pardons--always leave that to the governor-general and councillors! Been doing anything wrong, then? Ah, what's this--still calm, or some of your wind again, Mr Officer?' 'A fine breeze like to hold, Sir Charles,' answered the mate, all bows and politeness. 'So!' said Sir Charles; 'but I don't see Captain Williamson at all this morning--where is he?' 'I am sorry to say he is very unwell, Sir Charles,' said Finch. 'Indeed!' exclaimed the judge, with whom the captain stood for all the seamanship aboard, and looking round again rather dissatisfied. 'Don't like that, though. I hope he won't be long unable to attend to things, sir--let me know as soon as he is recovered, if you please.' 'Certainly, Sir Charles,' said the chief officer, touching his cap with some appearance of pique; 'but I hope, sir, I understand my duties in command, Sir Charles.' 'Daresay, sir,' said the judge, '_as_ officer, probably. Commander absent--horrible accidents already,' he muttered, crossly, changing his usual high sharp key to a harsh croak, like a saw going through a heavy spar, 'something sure to go wrong--wish we'd done with this deuced tiresome voyage. Ha, young gentleman,' exclaimed he, turning as he went in, 'd'ye play chess--suppose not--eh?' 'Why yes, sir,' said I, 'I do.' 'Well,' continued he, overhauling me more carefully than he had done before, though latterly I had begun to be somewhat in his good graces when we met by chance, 'after all, you've a _chess_ eye, if you know the game at all. Come in, then, for God's sake, and let's begin. Ever since the poor brigadier _went_, I've had only myself or a girl to play against. 'Gad, sir, there is something, I can't express how horrible to my mind, in being matched against _nobody_--or, what's worse, against a _woman_! But recollect, young gentleman, I can not bear a tyro'; and he glanced at me as we walked into the large poop-cabin as sharply and as cold as a nor'-wester, ere it breaks to windward. "Now I happened to know the game, and to be particularly fond of it; so, restless as I felt otherwise, I gave the old nabob a quiet nod, laid down my griffin-looking straw hat on the sofa, and in two minutes there we were, sitting opposite over a splendid China-made chess-board, with elephants, emperors, mandarins, and Chinamen, all square and ataunto, as if they'd been set ready for days. The dark _kitmagar_ commenced fanning over his master's head with a bright feather punka, the other native servant handed him his twisted hookah and lighted it, after which he folded his arms and stood looking down on the board like a pundit at some campaign of the Great Mogul; while the judge himself waited for my first move, as if it had been some of our plain English fellows in Hindostan commencing against your whole big India hubbub and finery, to get hold of it all in the end. For my part I sat at first all of a tingle and tremble, thinking how near his lovely daughter might be; and there were the breakfast-cups laid out on a round table at the other side, behind me. "However, I made my move, Sir Charles made his, and pitched into the game in a half-impatient, half long-headed sort of way, anxious to get to the thick of it, as it were, once more. Not a word was said, and you only heard the suck of the smoke bubbling through the water-bottle of his pipe, after each move the judge made; till I set myself to the play in right earnest, and, owing to the old gentleman's haste at the beginning, or his over-sharpness, I hooked him into a mess with which I used to catch the old hands at chess in the cockpit, just by fancying what _they_ meant to be at. The judge lifted his head, looked at me, and went on again. 'Your queen is in check, Sir Charles!' said I, next time, by way of a polite hint. '_Check_, though, young gentleman!' said he, chuckling, as he dropped one of his outlandish knights, which I wasn't yet up to the looks of, close to the windward of my blessed old Turk of a king; so the skirmish was just getting to be a fair set-to, when I chanced to lift my eyes, and saw the door from the after-cabin open, with Miss Hyde coming through. 'Now, papa,' exclaimed she on the moment, 'you must come to breakfast'--when all of a sudden, at seeing another man in the cabin, she stopped short. Being not so loud and griffin-like in my toggery that morning, and my hat off, the young lady didn't recognise me at first--though the next minute, I saw by her colour and her astonished look, she not only did that, but something else--no doubt remembering at last where she had seen me ashore. 'Well, child,' said the judge, 'make haste with it, then!--Recollect where we are, now, young gentleman--and come to breakfast.' She had a pink muslin morning-dress on, with her brown hair done up like the Virgin Mary in a picture, and the sea had taken almost all the paleness off her cheek that it had in the ball-room at Epsom, a month or two ago--and, by Jove! when I saw her begin to pour out the tea out of the silver teapot, I didn't know _where_ I was! 'Oh, I forgot,' said the judge, waving his hand from me to her, in a hurry, 'Mr Robins, Violet! ho, _kitmagar_, curry l'ao!' 'Oh,' said she, stiffly, with a cold turn of her pretty lip, 'I have met Mr--Mr----' 'Collins, ma'am,' said I. 'I have met this gentleman by accident _before_.' 'So you have--so you have,' said her father; 'but you play chess well, Mr--a--a--what's his name?--ah! Colly. Gad, you play _well_, sir--we must have it out!' "The young lady glanced at me again with a sort of astonishment; at last she said, no doubt for form's sake, though as indifferently as possible: 'You have known your friend the missionary gentleman long, I believe, sir?--the Reverend Mr Thomas--I think that is his name?' 'Oh no, ma'am!' said I hastily, for the judge was the last man I wished should join Westwood and me together, 'only since we crossed the Line, or so.' 'Why, I thought he said you were at school together!' said she, in surprise. 'Why--hem--certainly not, ma'am--a--a--I--a--a--I don't remember the gentleman there,' I blundered out. 'Eh, what?--check to your queen, young gentleman, surely?' asked Sir Charles. 'What's this, though! Always like to hear a mystery explained, so'--and he gave me one of his sharp glances. 'Why, why--surely, young man, now I think of it in that way, I've seen you before in some peculiar circumstances or other--on land, too. Why, where was it--let me see now?' putting his finger to his forehead to think; while I sat pretty uneasy, like a small pawn that had been trying to get to the head of the board, and turn into a knight or a bishop, when it falls foul of a grand figured-out king and queen. However, the queen is the only piece you need mind at a distance, and blessed hard it is to escape from _her_, of course. Accordingly, I cared little enough for the old nabob finding out I had gone in chase of them; but there sat his charming little daughter, with her eyes on her tea-cup; and whether the turn of her face meant coolness, or malice, or amusement, I didn't know--though she seemed a little anxious too, I thought, lest her father should recollect me. "'It wasn't _before_ me, young man?' asked he, looking up of a sudden: 'no, that must have been in India--_must_ have been in England, when I was last there--let me see.' And I couldn't help fancying what a man's feelings must be, tried for his life, as I caught a side-view of his temples working, dead in my wake, as it were. The thing was laughable enough, and for a moment I met Lota's eye as he mentioned England--'twas too short a glimpse, though, to make out; and, thought I, 'he'll be down on Surrey directly, and then Croydon--last of all, the back of his garden-wall, I suppose!' 'Check' it was, and what I was going to say I couldn't exactly conceive, unless I patched up some false place or other, with matters to match, and mentioned it to the old fellow, though small chance of its answering with such a devil of a lawyer--when all at once I thought I heard a hail from aloft; then the second mate's voice roared close outside, 'Hullo!--aloft there!' The next moment I started up, and looked at Miss Hyde, as I heard plainly enough the cry, 'On deck there--land O!' I turned round at once, and walked out of the round-house to the quarter-deck, where, two minutes after, the whole of the passengers were crowding from below, the judge and his daughter already on the poop. Far aloft, upon the fore-to'-gallant-yard, in the hot glare of the sun, a sailor was standing with his hand over his eyes, and looking to the horizon, as the Indiaman stood quietly before the light breeze. 'Where-away-ay?' was the next hail from the deck. 'Broad on our larboard bow, sir,' was the answer." CHAPTER XIII "Well, ma'am," continued the naval man, on again resuming his narrative, "as I told you, the sudden hail of 'Land!' brought us all on deck in a twinkling, in the midst of my ticklish conversation with the judge. 'Hallo! you aloft!' shouted the chief officer himself, 'd'ye hear, sirrah! use your eyes before hailing the deck!' 'Land, sir!' came falling down again out of the sunlight; 'land it is, sir--broad away on our larboard bow, sir.' "By this time it was about half-past nine, or ten o'clock, of the morning. Heading nearly due south-east, as we now were, the Indiaman's bowsprit ran up into the full white blaze of light, in which her flying jib-boom seemed to quiver and writhe far away from her like an eel in water; while the spread of her sails against it loomed twice as large as ordinary from the sort of hazy double-edged look they had, with a twinkling thread of sun drawing all round them like a frame, as if one saw through a wrong-screwed glass. You'd have thought by the glance under the fore-course, over the ship's head-gratings, she was travelling off quietly into some no-man's-land or other, where it would be so bright we should have to wear blue spectacles: the light breeze being almost direct from nor'-west, and so fairly in her favour, with the help of her studding-sails she was making wonderful progress for such a mere breath--about four knots to the hour, as I reckoned. The air aloft appeared in the meantime to be steadying and _sucking_ though the water kept smooth, and her bows scarce made a noise in it: the wide soft swells of the sea just floated up of a pale blue, and lifted her on, till she went seething gently down into it again; only, if you put your head over the starboard side, and listened, you thought you heard a sort of dull poppling ripple coming along the bends from round her counter. As for the line of horizon on one bow or the other, 'twas hardly to be made out at all, with a streaky white haze overlying it, up in the sky as it were, on both sides, behind the dazzle of light. However, the passengers were fancying all kinds of fine tropical matters lay hidden thereaway; and in fact, what with the notion of land after a long voyage, and what with the faint specks of bright cloud that seemed to be melting far off in the glare--to anyone last from Gravesend, that had never seen anything stranger than Richmond Hill of a Sunday, the whole thing ahead of the ship would have rather an enchanted sort of a look. At length the third mate was seen to shove his spy-glass together in the top-gallant cross-trees, and came slowly down the rigging. 'Well, Mr Rickett,' said the chief officer, meeting him, as he landed on deck. 'Well, sir,' said Rickett, 'it is land after all, Mr Finch!' The mate rapped out an oath, and took another turn: Macleod screwed his mouth as if he were going to whistle, then pulled his red whiskers instead, and looked queer at Rickett; while Rickett stood peering into his spy-glass as he would have done into his hat, had he still been a foremast-man. The mate's eye met his, then turned to the passengers leaning over the poop-railing; and they all three walked to the capstan, where they began to overhaul the charts, and laid their heads together out of earshot. "Now, whether this said land just made out on the north-east trended away back to south-east, as the clearer look of the horizon to starboard made one think, it was hard to say--though in _that_ way of it, there were _seemingly_ two plans for widening her distance. Either Finch might think it better to keep hold of a fair wind, and just edge her off enough to drop the point on her weather quarter--when, of course, if things stood as they were, we should soon set a good stretch of water betwixt us and the coast; or else they might brace direct round on the other tack, and head right south-west'ard, out to sea again; though if we were still in it, the current would set us every bit as much in its own direction as ever. Accordingly, I sidled nearer to the capstan, and watched anxiously for what the third mate had to propose, after humming and hawing a little, and scratching his head under his cap for half a minute. 'At any rate, Mr Finch, sir,' said he, 'more especially the captain being off charge, I may say, why, I'd advise ye, sir, to----' Here he dropped his voice; but Finch apparently agreed to what he said. "'Ready about ship, there!' said the second mate aloud to the boatswain forward; and in ten minutes afterwards the _Seringapatam_ was fairly round, as I had expected, heading at a right-angle to her former course, with the breeze before her starboard beam, and the sun blazing on the other. I walked forward to the bows, and actually started to hear how loud and clear the ripple had got under them of a sudden; meeting her with a plash, as if she were making six or seven knots headway, while the canvas seemed to draw so much stiffer aloft, you'd have supposed the breeze had freshened as soon as the helm was put down. The mates looked over the side and aloft, rubbing their hands and smiling to each other, as much as to say how fast she was hauling off the bad neighbourhood she was in, though the heat was as great as ever, and you didn't feel a breath more air below, nor see the water ruffle. To _my_ notion, in fact, it was just the set of the current against her that seemingly freshened her way, the ship being now direct in its teeth; so that, of course, it would keep bearing her up all the time away north-eastward, with _her_ own leeway to help it; and the less could anyone notice the difference betwixt the water going past her side, and her passing the water. This tack of hers, which Rickett, no doubt, thought such a safe plan, might be the very one to put her in a really dangerous way yet: for when they did discover this under-tow, how were they to take her out of it, after all? Probably by trying to stand fair across the stream of it to southward, which, without three times the wind we had, would at best take us out many miles nearer the land it set upon, or leave us perhaps becalmed in the midst of it. "The truth was, that although I hadn't seen what like the land was, and couldn't have said, by the chart, _where_ we were, I began to have a faint notion of whereabouts we possibly soon might be, from what I remembered hearing an old quartermaster in the _Iris_ say, a couple of years before, regarding a particular spot on the south-west coast, where the currents at some seasons, as he phrased it, made a regular racecourse meeting. The old fellow gave me also, at the time, some bearings of the nearest coast, with the landmarks at the mouth of a river a little farther north--which, he said, he would know if you set him down there of a dark night, though he had been in his bed at Gosport the minute before, if there was just a bright streak of sky to the eastward--namely, a big black rock like two steps, and a block at the foot of them, somewhat the shape of a chipped holystone, running down on one side out of a high headland, like an admiral's cocked hat, with six mop-headed trees upon the root of the rock, for all the world like hairs on a wart. Here I recollected how my worthy authority pointed modestly for example to a case of the kind on his own nose. The opposite shore of its mouth was flat, with a heavy white surf; but it shut in so far upon the other, he said, that, steering from the south'ard, one would never know there was a river there at all. The Bambar he called it; but if he meant the Bembarooghe, we could scarcely be near _it_, or that much toward being abreast of St Helena. For all I saw, indeed, we might have nothing to eastward of us save a hard coast, or else the sandy coast farther down, shoaling out of sight of land. At any rate, I knew we must have got into the tail of the great sea-stream from round the Cape of Good Hope, which would, no doubt, split out at sea on Viana's Bank, and turn partly to north-eastward thereabouts; so that it wasn't a very bad guess to suppose we were getting up somewhere near Cape Frio, the likeliest place in the world to find old Bob Martin's 'Maze,' which we used to joke about so in the _Iris_. "What was done, though, required to be done quickly, and I looked about for Tom Westwood, till I saw him on the poop amongst the rest, talking again to Miss Hyde, as they all crowded towards the lee-quarter to watch the land-haze seemingly dropping astern. My heart swelled as it were into my throat, however, at such an appearance of good understanding betwixt the two--whereas there was _she_, an hour ago that very morning, would scarce favour me with a look or a word!--and, for the life of me, I couldn't have spoken to Westwood at the time, much less gone hand in hand; for that matter he didn't seem to be suspecting aught wrong to trouble himself about. What to say or do, either, I couldn't think; since the more he cut me out, and the less friendly I felt to him, the less could I risk the chance of showing us both up for what we _were_--which, of course, would bring him in for the worst of it; as if _I_, by Jove, were going to serve him some low trick for the sake of shoving _him_ out with the young lady. "Meantime I kept fidgeting about, as if the deck were too hot for me, snatching a glance now and then, in spite of myself, at Violet Hyde's fairy-like figure; so different from the rest of them, as she stretched eagerly from below the awning over the ship's quarter-gallery, trying to make out where the land lay--now putting her little hand over her eyes to see better, then covering them altogether from the dazzle, as she drew in her head again and shook her bright brown hair in the shadow, answering Westwood--confound him! The Indian servant each time carefully poking out the red and yellow punkah-fringe for a cover over her, while the passengers were one and all ready to cry at not seeing the land, and leaving it behind. The judge himself was the only man that seemed to have a dim notion of something queer in the whole case; for every few minutes he walked quietly to the break of the poop, where I noticed him cast a doubtful look down upon the 'chief officer'; and when the surgeon came up, he asked anxiously how Captain Williamson was, and if he couldn't be seen below. However, the surgeon told him the captain had just fallen for the first time into a good sleep, and there was no admittance, but he was likely to be much better soon. "By this time there was no standing out from under the awnings, and the quarter-deck and poop had to be well swabbed to keep them at all cool, the steam of it rising inside with a pitchy, hempen sort of smell you never feel save in the Tropics; the _Seringapatam_ still feeling the breeze aloft, and lifting on the water with a ripple forward, although her big courses went lapping fore and aft every time she swung. The long white haze on the horizon began to melt as the sun heightened, clearing from under the wake of the light, till now you could fairly see the sky to eastward. Near noon, in fact, we had almost dropped the haze altogether on the ship's quarter; and at first I was glad to see how much way she had made in the two hours, when on second thoughts, and by noticing some marks in the loom of it, I had no doubt but though she might be farther off, why it was only while she set more up to north-eastward, so that we were actually, so to speak, leaving it by getting nearer! However, as the men were at dinner, and most of the passengers gone off the poop, down to 'tiffin,' I made up my mind to try what I could do in a quiet way, towards making the mate think of it more seriously. "'Ah,' said I, in a would-be brisk and confidential kind of way, 'glad we're leaving that--a--you know, that land, Mr Finch.' 'Indeed, sir,' said he indifferently. 'Oh, you know,' said I, 'it's all very well for the _passengers_ there to talk fine about land--land--but you and I, Mr Finch, don't need to be told that it's always dangerous at sea, you know.' The mate lifted his head and eyed me for a moment or two between the disgust a sailor feels at seeing a fellow pretend to aught like seamanship, and a particular sort of spite toward me which I'd noticed growing in him for the last few days--though I daresay my breakfasting that morning in Sir Charles's cabin might have brought it to a height. "'Land dangerous, sir!' answered he carelessly, as he went on wiping his quadrant again; 'who put _that_ into your head?' 'Oh, well,' returned I, just as carelessly, 'if it's to leeward of course--or with a current taking you towards it--only then. But I've no doubt, Mr Finch, if this wind _were_ to--ah--you know, heave more abaft, that's to say get stronger, the craft would at least stand still, till you got her.' 'What on earth _are_ you talking about, Mr Ford--Collins, I mean?' asked he sharply. 'Really, sir, I've got something more to attend to at present, than such trash about a current, and the devil knows what else!' 'How, why, Mr Finch,' said I, seemingly surprised in my turn, '_are_ we not in a current just now, then?' 'Current!' replied Finch, almost laughing outright, 'what _does_ the man mean?' 'Why, every one thinks so, in the cuddy,' said I, as if rather taken aback, and venturing what you fair ladies call a 'fib,' 'ever since we picked up the bottle last night.' This, by-the-by, had got spread through some of the men to the passengers, though, of course, nobody knew what had been in it yet. '_There_, I declare now,' continued I, pointing to our lee-bow, where I'd had my eyes fixed during the five minutes we spoke, 'we can try it again. Do you see that bird yonder on the water?' The mate turned his head impatiently, and 'Look, watch him, sir,' said I. "This was a tired man-o'-war bird afloat about twenty fathoms off, with its sharp white wings stretched just clear of the water, and its black eye sparkling in the sunlight, as it came dipping on the long, smooth, hot-blue swell into the lee of the ship's lofty hull, till you saw its very shadow in the glitter below it. The Indiaman seemed to pass him as if he rode there at anchor; only the curious thing was, that the bird apparently neared her up from leeward, crossing her larboard quarter within a fathom or two, when all of a sudden he got becalmed, as it were, in the wake right astern, and by the time either of us could walk to the ship's taffrail, she was close over him; as if, whenever her hull was end-on, it took his surface-drift away from him, and, what was more, as if the _ship_ kept hold of it--her eighteen feet or so to his little inch of a draught--for it couldn't be owing to the wind. "However, the man-o'-war bird took offer of the next swell to get air in his wings, and rose off the heave of it with a sharp bit of a scream, away after some black boobies diving for fish, which no doubt he would catch, as they dropped them at sight of him. "The mate upon this started and looked round, then aloft. 'Confound it!' said he to himself, 'if this breeze would only freshen! There _is_ a sort of set on the surface just now,' continued he to me, coolly enough, 'though how you idlers happened to have an idea of it puzzles me, unless because you've nothing else to do but watch the water. Currents are pretty frequent hereabouts, however.' 'Dear me!' said I, 'but if we should----' 'Stuff, sir!' said he, quickly, 'the coast here must be steep-to enough, I should think, since if it weren't for the haze, we'd have sighted it thirty miles off! What we want is wind--wind, to let's cross it.' 'But then a calm, Mr Finch,' I said; 'I'm hanged afraid of those calms!' 'Well, well, sir,' said he, not liking just to shake me off at once, after my proving less of a ninny in sea matters than he had supposed, 'these long currents never set right ashore; even if we lose the wind, as we may soon, why, she'll take off into the eddy seaward, sir, if you _must_ know--the dead-water in-shore, and the ebb-tide, always give it a safe turn!' "All this, of course, was as much to satisfy himself as me. 'Well, that's delightful,' said I, as if quite contented, and Mr Finch walked away hastily down one of the poop-ladders, no doubt glad to get rid of me in a decent manner, though I saw him next minute glancing in at the compass-boxes. "'Keep her up to her course, sirrah; luff, d'ye hear,' said he to Jacobs, who was, perhaps, the best helmsman aboard. 'She falls off tremendous bad, sir,' answered Jacobs, with another whirl of the spokes; her want of actual headway making the Indiaman _sag_ dead away to leeward, as she shoved into the force of the sea-stream, running more and more direct upon her starboard bow. One minute the courses would sink in with a long sighing fall to the lower-masts, the next her topsails would flutter almost aback, and the heat even in the shadow of her awnings was extreme, yet she still seemed to have a breeze through the white glare aloft. I was determined to bring things to a point somehow or other, so I followed the mate down the steps. 'Oh, by-the-by, Mr Finch!' said I eagerly, 'suppose one of those dreadful--what do you call 'em?--ah, tornadoes--were to come on! I understand this is just the way, near Africa--baffling breeze--heat suffocating--hazy atmosphere--long swell--and current rising to the surface!' "At this Finch stood up in a perfect fury. 'What the devil d'ye mean, sir,' said he, 'by dodging me about the decks in this fashion, with these infernally foolish questions of yours?' 'Oh, my fine fellow,' thought I, 'you shall settle with me for that.' 'Tornadoes never blow hereabouts, except off-shore, if you _must_ know, sir!' he rapped out, sticking his hands in his jacket-pockets as he said so, and taking a turn on the quarter-deck. 'That's quite a mistake, I assure you, sir!' said I, carried away with the spirit of the thing; 'I've seen the contrary fifty times over, and, from the look of the sky aloft just now, I'd bet----' Here I stopped, recollected myself, put the top of my cane in my mouth, and peered under the awning at the sea with my eyes half-shut, as sleepily as usual with my messmates the cadets. The chief officer, however, stepped back in surprise, eyed me sharply, and seemed struck with a sudden thought. 'Why, sir,' said he, rather anxiously, 'who may--what can _you_ know of the matter?' 'Pooh!' replied I, seeing some of the passengers were coming on deck, 'I'm only of an inquiring turn of mind! You seafaring persons, Mr Finch, think we can't get any of that kind of knowledge on land; but if you look into Johnson's Dictionary, why, you'll find the whole thing under the word Tornado: 'twas one of the pieces I'd to get by heart before they'd admit me into our yacht-club--along with Falconer's _Shipwreck_, you know!' 'Indeed!' said the mate, slowly, with a curl of his lip, and overhauling me from head to foot and up again; 'ah, indeed! That was the way, was it, sir?' I saw 'twas no use. I daresay he caught the twinkle in my eye; while Jacobs' face, behind him, was like the knocker on a door with trying to screw it tight over his quid, and stuffing the knot of his neckerchief in his mouth. "'Of course, sir,' answered I, letting my voice fall; 'and the long and the short of it is, Mr Finch, the sooner you get your ship out of this current the better! And what's more, sir, I daresay I could tell you _how_!' "Whether he was waiting for what I'd to say, or thinking of something just occurred to him, was doubtful: he still gazed steadily at me, without saying a word; so I went on. 'You must know I had an old uncle who was long in His Majesty's Royal Navy, and if there was one point he was crazy upon, 'twas just this very matter of currents--though, for my part, Mr Finch, I really never understood what he meant till I made a voyage. He used to tell my mother, poor woman--who always fancied they had somewhat to do with puddings--that he'd seen no less than half-a-dozen ships go on shore, owing to currents. Now, Jane, he'd say, when you're fairly in a current, never you try to cross out of it, as folks often do, _against_ the run of it, for in that case, unless the wind's strong enough, why, instead of striking the eddy to take your craft right off-shore, it'll just set you over and over to the _inside_. You'll cross, in the end, no doubt--but ten to one it's exactly where the water begins to shoal; whereas, the right plan's as simple as daylight, and that's why so few know it! Look ye, he'd say, always you cross _with_ the stream--no matter though your head seems to make landward; why, the fact is, it'll just set you outside of itself, clear into its own bight, when you can run off to seaward with the eddy, if ye choose. _That's_ the way to cross a current, my uncle used to say, provided you've but a light wind for handling her with! Now, Mr Finch,' added I, coolly, and still mouthing my stick as before--for I couldn't help wishing to give the conceited fellow a rub, while I lent him a hint--'for my own part, I can't know much of these things, but it _does_ seem to me as if my uncle's notions pretty well suited the case in hand!' "Finch was too much of a fair seaman not to catch my drift at once, but in too great a passion to own it at the time. 'D'ye think, sir,' said he, with a face like fire, 'so much sense as there is in this long rigmarole of yours, that I'm such a--that's to say, that I didn't know it before, sir? But what I've got to do with _you_, Mr Collinson, or whatever your name may be--you may have been at sea twenty years, for aught I care--but I'd like to know _why_ you come aboard here, and give yourself out for as raw a greenhorn as ever touched ropes with a kid glove?' 'Well, Mr Finch,' said I, 'and what's that to you, if I choose to be as green as the North Sea whaling-ground?' 'Why, sir,' said Finch, working himself up, 'you're devilish cunning, no doubt, but perhaps you're not aware that a passenger under a false rig, in an Indiaman, may be clapped in limbo, if the captain thinks fit? Who and what are you, I ask?--some runaway master's mate, I suppose, unless you've got something deeper in hand! Perhaps,' ended he, with a sneer, 'a pickpocket in disguise?' 'Sir,' said I, getting up off the bulwark I'd been leaning upon, 'at _present_ I choose to be a cadet, but at any rate, you shall make an apology for what you said just now, sir!' 'Apology!' said the mate turning on his heel, 'I shan't do anything of the sort! You may be thankful, in the meantime, if I don't have you locked up below, that's all! Perhaps, by-the-by, sir, all you wanted was to show off your seamanship before the young lady in the round-house there?' Here the glance the fellow gave me was enough to show he knew pretty well, all the while, what we were matched against each other for. "I could stand this no longer, of course; but, seeing that one or two of the passengers were noticing us from the poop, I looked as polite as is possible to do when you've lost your temper; and, in fact, the whole disappointment of this hair-brained cruise of mine--not to speak of a few things one had to stand--carried me away at the moment. There was no scheme I wouldn't rather have been suspected of, by this time, than the real one--namely, having gone in chase of Violet Hyde. I took a card out of my pocket and handed it quietly to Mr Finch. 'You don't seem able to name me, sir,' said I. 'However, I give you my word, you may trust that bit of pasteboard for it; and as I take you to be a gentleman by your place in this ship, why, I shall expect the satisfaction one gentleman should give another, the first time we get ashore, although it _should_ be to-morrow morning! And, by Jove!' thought I, 'I hope I'm done with the most foolish trick ever a fellow played himself! The man that ventures to call me _green_ again, or look at me as if he wanted to cool his eyes, hang me if he shan't answer for it! As for a woman,' thought I, but, oh, those two blue eyes yonder--confound it! as I caught sight of a white muslin skirt in the shade of the poop-awning above. "I must say, for Finch, he took my last move coolly enough, turning round to give me another look, after glancing at the card. 'Indeed!' said he, as if rather surprised; 'well, sir, I'm your man for _that_, though it can't be just as soon as to-morrow morning! A Company's officer may meet a lieutenant in the Navy any time--ay, and take his ship off the land too, I hope, sir!' and with that he walked off forward. 'Lieutenant!' said I to myself; 'how did he give me my commission so pat, I wonder?' and I pulled out another card, when I found, to my great annoyance, that in my hurry that morning I had happened to put on a coat of Westwood's by mistake, and instead of plain 'Mr Collins,' they were all 'Lieutenant Westwood, R.N.' 'Here's another confounded mess!' thought I, 'and all will be blown in the end!' However, on second thoughts, the notion struck me, that, by sticking to the name, as I must do _now_ at any rate, why, I should keep Westwood clear of all scrapes, which, in _his_ case, might be disagreeable enough; whereas, at present, he was known only as the Reverend Mr Thomas--and, as for _his_ either shamming the griffin, or giving hints how to work the ship, he was one of those men you'd scarce know for a sailor, by aught in his manner, at least: and, indeed, Tom Westwood always seemed to need a whole frigate's ways about him, with perhaps somewhat of a stir, to show what he really was. "Five minutes or so after this, it didn't certainly surprise me much to see the Indiaman laid on the opposite tack, with her head actually north-by-east, or within a few points of where the light haze faded into the sky: the mate seeming by this time to see the matter clearly, and quietly making his own of it. The ship began to stand over towards the outer set of the current, which could now be seen rippling along here and there to the surface, as the breeze fell slowly: you heard nothing save the faint plash of it astern under one counter, the wafting and rustling of her large main-course above the awnings, for she was covered over like a caravan--the slight flap of her jibs far ahead on the bowsprit startled you now and then as distinctly as if you got a fillip on your own nose; the stunsail, high up beside the weather-leech of her fore-topsail, hung slack over the boom, and one felt each useless jolt of the wheel like a foot-slip in loose sand when you want to run--all betwixt the lazy, listless voices of the passengers, dropping and dropping as separate as the last sands in an hour-glass. Still, every minute of air aloft helped her nearer to where you saw the water winding about the horizon in long swathes, as it were, bluer than the rest, and swelling brimful, so to speak, out of a line of light; with the long dents and bits of ripple here and there creeping towards it, till the whole round of the surface, as far as you could see, came out into the smooth, like the wrinkles on a nutmeg. "Four bells of the afternoon watch had struck--two o'clock, that is--when Rickett, the third mate, and one or two men, went out to the arm of the spritsail-yard across the bowsprit, where they lowered away a heavy pitch-pot with a long strip of yellow bunting made fast to it, and weighted a little at the loose end, to mark the _set_ of the current; and as the pot sank away out on her larboard bow, one could see the bright- rag deep down through the clear blue water, streaming almost fairly _north_. She appeared to be nearing the turn of the eddy, and the chief officer's spirits began to rise. Rickett screwed one eye close, and looked out under his horny palm with the other, doubtful, as he said, that we should 'sight the land off-deck before that. As for this trifle of an air aloft, sir,' said he, 'I'm afraid we won't----' 'Hoot, Mr Reckett,' put in Macleod, stepping one of his long trouserlegs down from over the quarter-deck awning, like an ostrich that had been aloft, 'ye're aye afraid; but it's not easy to see aloft, Mr Fench, sir.' 'How does the land lie _now_, Mr Macleod?' asked the first officer. 'Well, I wouldn't wonder but we soon dropped it, sir--that's to _east'ard_, I mean,' replied he; 'though it's what we call a bit mountainous, in Scotland--not that unlike the Grampians, Mr Fench, ye know!' 'Hang your Grampians, man!--what's _ahead_ of us, eh?' said the mate hastily. 'Why, sir,' said the Scotchman, 'there _is_ some more of it on the nor'-east, lower a good deal--its just flush with the water from here, at present, Mr Fench--with a peak or two, trending away too'ard north; but the light yonder on our starboard bow makes them hard for to see, I may say.' "In fact, some of the men forward were making it out already on the starboard bow, where you could see the faint ragged shape of a headland coming out, as it were, of the dazzle beyond the water, which lay nickering and heaving between, from deep-blue far away into pale; while almost at the same time, on her starboard quarter, where there was less of the light, another outline was to be seen looming like pretty high land, though still fainter than the first. As for the space betwixt them, for aught one could distinguish as yet, there might be nothing _there_ except air and water over against the ship's side. "'Well,' said the mate briskly, after a little, 'we're pretty sure, _now_, to have the land-breeze to give us sea-room, before two or three hours are over--by which time, I hope we'll be in the eddy of this infernal current, at any rate!' However, I was scarce sure he didn't begin to doubt the plan I'd given him; whereas had he known the whole case in time, and done the thing _then_, it was certain enough--and the best thing he could do, even as it was: but what troubled me now, why, suppose anything happened to the ship, mightn't he turn the tables on me after all, and say I had some bad design in it? I loitered about with my arms folded, saying never a word, but watching the whole affair keener than I ever did one of Shakspeare's plays in the theatre after a dull cruise; not a thing in sea, sky, or Indiaman, from the ripples far off on the water to ugly Harry hauling taut the jib-sheet with his chums, but somehow or other they seemed all to sink _into_ me at the time, as if they'd all got to come _out_ again strong. You hardly knew _when_ the ship lost the last breath of air aloft, till, from stealing through the smooth water, she came apparently to a standstill, everything spread broad out, not even a flap in the canvas almost, it had fallen a dead calm so gradually. "However, _my_ troubles weren't seemingly over yet, for just then up came the judge's dark kitmagar to the gangway where I was, and, from the sly impudence of the fellow's manner, I at once fancied there was something particular in the wind, as if he'd been seeking me about-decks. 'S'laam, mistree!' said he, with but a slight duck of his flat brown turban, 'Judge sahib i-send Culley Mistree his chupprass'--_message_, forsooth!--'sah'b inquire the flavour of gentlyman's Ees-Inchee Coompanee, two-three moment!' 'The flavour of my East-India Company, you rascal!' said I, laughing, yet inclined to kick him aft again for his impertinent look; 'speak for yourself, if you please!' "In fact, the whiff of cocoa-nut oil, and other dark perfumes about him, came out in a hot calm at sea, when everything sickens one, as to need no inquiry about the matter; however, I walked straight aft to the round-house, and in at the open door, through which Sir Charles was to be seen pacing from one side of his cabin to the other, like a Bengal tiger in a cage. 'Harkye, young man,' said he sternly, turning as soon as I came in, with my hat in my hand, 'since I had the honour of your company here this morning, I have recollected--indeed, I find that one of my servants had done the same--that you are the person who molested my family by various annoyances beside my garden at Croydon, sir!' 'Indeed, Sir Charles!' said I coolly, for the bitter feeling I had made me cool: 'they must have been unintentional then, sir! But I was certainly at Croydon, seeing my mother's house happens to be there.' 'You must have had some design in entering this vessel, sir!' continued the judge, in a passion: ''gad, sir, the coincidence is too curious! Tell me what it is at once, or by----' 'My design was to go to India, sir,' answered I, as quietly as before. 'In what capacity?--who are you?--what--who--what do you want _there_, eh?' rapped out the judge. 'I'm not aware, sir,' said I, 'what right you've got to question me; but I--in fact, I'll tell _so_ much to any man--why, I'm an officer in the Navy.' "Sir Charles brought short up in his pacing and stamping, and stared at me. 'An officer in the Navy!' repeated he; 'but yes--why, now I think, I do remember something in your dress, sir--though it was the _face_ that struck me! In short then, sir, this makes the case worse: you are here on false pretences--affecting the very reverse, sir--setting yourself up for a model of simplicity,--a laughing-stock indeed!' 'I had reasons for not wishing my profession to be known, Sir Charles,' said I; 'most special reasons. They're now over, however, and I don't care _who_ knows it!' 'May I ask what these were?' said the judge. '_That_ I'll never tell to any man breathing!' I said determinedly. "The judge walked two or three times fore and aft; then a thought seemed to strike him--he looked out as if at the decks and through below the awnings, then shut the door and came back to me again. 'By-the-way,' said he seriously, and changing his tone, 'since this extraordinary acknowledgment of yours, sir, something occurs to me which makes me almost think your presence in the vessel in one sense opportune. I have reason to entertain a high opinion of naval officers as technical men, professionally educated in His Majesty's regular service, and--you look rather a _young_ man--but have you had much experience, may I ask?' 'I have been nine or ten years at sea, sir,' replied I, a little taken aback, 'in various parts of the world!' 'I have some suspicion lately,' he went on, 'that this vessel is not navigated in a--in short, that at present, probably, we may be in some danger--do _you_ think so, sir?' 'No, Sir Charles,' said I, 'I don't think she _is_, as matters stand--only in a troublesome sort of quarter, which the sooner she's out of the better.' 'The commander is, I find, dangerously unwell,' continued he, 'and of the young man who seems to have the chief care of the vessel, I have no very high--well--_that_, of course I----Now, sir,' said he, looking intently at me, 'are _you_ capable of--in short, of managing this Company's vessel, should any emergency arise? I have seen such, myself--and in the circumstances I feel considerable alarm--uneasiness, at least--Eh, sir?' 'Depend upon it, Sir Charles,' I said, stepping toward the door, 'in any matter of the kind I'll do my best for this ship! But none knows so well as a seaman, there are cases enough where your very best can't do much!' "The judge seemed rather startled by my manner--for I _did_ feel a little misgiving, from something in the weather on the whole; at any rate I fancied there was a cold-bloodedness in every sharp corner of his face, bilious though his temper was, that would have let him see _me_ go to the bottom a thousand times over, had I even had a chance with his daughter herself, ere he'd have yielded me the tip of her little finger: accordingly 'twas a satisfaction to me, at the moment, just to make him see he wasn't altogether in his nabob's chair in Bengal yet, on an elephant's back. "'Ah, though!' said he, raising his voice to call me back, 'to return for an instant--there is one thing I must positively require, sir--which you will see, in the circumstances, to be unavoidable. As a mere simple cadet, observe, sir, there was nothing to be objected to in a slight passing acquaintance--but, especially in the--in short, equivocal--sir, I must request of you that you will on no account attempt to hold any communication with my daughter, Miss Hyde--beyond a mere bow, of course! 'Twill be disagreeable, I assure you. Indeed, I shall----' 'Sir,' said I, all the blood in my body going to my face, 'of all things in the world, _that_ is the very thing where your views and mine happen to square!' and I bowed. "The man's coolness disgusted me, sticking such a thing in my teeth, after just reckoning on my services with the very same breath--and all when it wasn't required, too! And by Heaven! thought I, had _she_ shown me favour, all the old nabobs in Christendom, and the whole world to boot, shouldn't hinder me from speaking to her! What I said apparently puzzled him, but he gave me a grand bow in his turn, and I had my hand on the door, when he said, 'I suppose, sir, as a naval officer, you have no objection to give me your name and rank. I forget what----' Here I remembered my mistake with the mate, and on the whole I saw I must stick by it till I was clear of the whole concern; as for _saying_ my name was Westwood, that I couldn't have done at the time for worlds; but I quietly handed him another card, meaning, of course, to give Westwood the cue as shortly as possible, for his own safety. The judge started on seeing the card, gave me one of his sharp glances, and made a sudden step towards me. 'Have you any relation in India, Mr Westwood?' said he, slowly, to which I gave only a nod. 'What is he, if I may inquire?' asked he again. 'A councillor or something, I believe,' said I, carelessly. '_Thomas_ Westwood?' said Sir Charles. 'Ah,' said I, wearied of the thing, and anxious to go. 'An uncle, probably, from the age?' he still put in. 'Exactly, that's it!' I said. 'Why--what!--why did you not mention this at first?' he broke out suddenly, coming close up; 'why, Councillor Westwood is my very oldest friend in India, my dear sir! This alters the matter. I should have welcomed a nephew of his in my house, to the utmost! Why, how strange, Mr Westwood, that the fact should emerge in this curious manner!' and with that he held out his hand. 'Of course,' said he, 'no such restriction as I mentioned could for a moment apply to a nephew of Councillor Westwood!' "I stared at him for a moment, and then--'Sir,' said I, coolly, 'it seems the whole matter goes by names; but if my name were the devil or the Apostle Paul, I don't see how it can make a bit of difference in _me_: what's more, sir,' said I, setting my teeth, 'what_ever_ my name may be, depend upon it, I shall never claim acquaintance either with you or--or--Miss Hyde!' With that I flung straight out of the cabin, leaving the old gentleman bolt upright on the floor, and as dumb as a stock-fish, whether with rage or amazement I never stopped to think. "I went right forward on the Indiaman's forecastle, clear of all the awnings, dropped over her head out of sight of the men, and sat with my legs amongst the open woodwork beneath the bowsprit, looking at the calm--nobody in sight but the Hindoo figure, who seemed to be doing the same. _Westwood!_ thought I, bitterly; then in a short time, when the mistake's found out, and he got safe past the Cape, perhaps--it'll be nothing but Westwood! He'll have a clear stage, and all favour; but at any rate, how_ever_ it may be, _I_'ll not be here, by Heaven, to see it. That cursed councillor of his, I suppose, is another nabob--and no doubt he'll marry her, all smooth! Uncles--I little thought, by Jove! when I knocked off that yarn to the mate about _my_ uncle--but, after all, it's strange how often a fellow's paid back in his own coin! "The heat at the time was unbearable--_heat_, indeed! 'twasn't only heat--but a heavy, close, stifling sort of feeling, like in a hot-house, as if you'd got a weight on your head and every other bit of you: the water one time so dead-blue and glassy between the windings of it, that the sky seemed to vanish, and the ship looked floating up into where _it_ was--then again you scarce knew sea from air, except by the wrinkles and eddies running across each other between, toward a sullen blue ring at the horizon--like seeing through a big twisted sieve, or into a round looking-glass all over cracks. I heard them clue up everything aloft, except the topsails--and _they_ fell slapping back and forward to the masts, every now and then with a _thud_ like a thousand spades clapped down at once over a hollow bit of ground--till all seemed as still between as if they'd buried something. I wished to Heaven it were what I _felt_ at the time, and the thought of Violet Hyde, that I might be as if I never had seen her--when on glancing up betwixt the figure-head and the ship's stern, it struck me to notice how much the land on her starboard bow and beam seemed to have risen, even during the last hour, and that without wind; partly on account of its clearing in that quarter, perhaps; but the nearest points looked here and there almost as if you could see into them, roughening barer out through the hue of the distance, like purple blotches spreading in it. Whereas, far away astern of us, when I crossed over her headworks, there were two or three thin white streaks of haze to be seen just on the horizon, one upon another, above which you made out somewhat like a dim range of peaked land, trending one couldn't say how far back--all showing how fairly the coast was shutting her in upon the south-east, as she set farther in-shore, even while the run of the current bade fair to take her well clear of it ahead; which was, of course, all we need care for at present. Her want of steerage-way, however, let the Indiaman sheer hither and thither, till at times one was apt to get confused, and suppose her more in with the landloom than she really was. Accordingly the mate proved his good judgment by having a couple of boats lowered with a tow-line, to keep her at least stem-on to the current, although the trouble of getting out the launch would have more served his purpose, and the deeper loaded the better, since in fact there were _two_ favourable drifts instead of one, between every stroke of the oars. The men pulled away rather sulkily, their straw hats over their noses, the dip of the hawser scarce tautening at each strain, as they squinted up at the _Seringapatam's_ idle figure-head. For my part I had thought it better to leave him by himself, and go below. CHAPTER XIV "When I went into the cuddy, more for relief's sake than to dine, the passengers were chattering and talking away round the tables, hot and choking though it was, in high glee because the land was in sight from the starboard port-window, and they fancied the officers had changed their minds as to 'touching' there. Every now and then a cadet or two would start up, with their silver forks in their hands, and put their heads out; some asked whether the anchor had been seen getting ready or not; others disputed about the colour of tropical trees, if they were actually green like English ones, or perhaps all over blossoms and fruit together--the whole of them evidently expecting bands of <DW64>s to line the shore as we came in. "One young fellow had taken a particular fancy to have an earthworm, with earth enough to feed it all the rest of the voyage, otherwise he couldn't stand it; and little Tommy's mother almost went into hysterics again when she said, if she could just eat a lettuce salad once more, she'd die contented; the missionary looking up through his spectacles, in surprise that she wasn't _more_ interested about the slave-trade, whereof he'd been talking to her. As for Westwood, he joined quietly in the fun, with a glance now and then across to me; however, I pretended to be too busy with the salt beef, and was merely looking up again for a moment, when my eye chanced to catch on the swinging barometer that hung in the raised skylight, right over the midst of our noise. By George! ma'am, what was my horror when I saw the quicksilver had sunk so far below the mark, probably fixed there that morning, as to be almost shrunk in the ball! Whatever the merchant service might know about the instrument in those days, the African coast was the place to teach its right use to us in the old _Iris_. I laid down my knife and fork as carelessly as I could, and went straight on deck. "Here I sought out the mate, who was forward, watching the land--and at once took him aside to tell him the fact. 'Well, sir,' said he coolly, 'and what of that? A sign of wind, certainly, before very long; but in the meantime we're _sure_ to have it off the land.' 'That's one of the very reasons,' said I, 'for thinking _this_ will be from seaward--since towards evening the land'll have plenty of air without it! But more than that, sir,' said I, 'I tell you, Mr Finch, I know the west coast of Africa pretty well--and so far south as this, the glass falling so low as _twenty-seven_, is always the sign of a nor'-westerly blow! If you're a wise man, sir, you'll not only get your upper spars down on deck, but you'll see your anchors clear!' Finch had plainly got furious at my meddling again, and said he, 'Instead of that, sir, I shall hold on _everything_ aloft, to stand out when I get the breeze!' 'D' ye really think, then,' said I, pointing to the farthest-off streak of land, trending away by this time astern of us, faint as it was, '_do_ you think you could ever weather that point, with anything like a strong nor'-wester, besides a current heading you in, as you got fair hold of it again?' 'Perhaps not,' said he, wincing a little as he glanced at it; 'but you happen always to suppose what there's a thousand to one against, sir. Why, sir, you might as well take the command at once. But, sir, if it _did_ come to that, I'd rather--I'd rather see the ship _lost_--I'd rather go to the bottom with all in her, after handling her as I know well how, than I'd see the chance given to _you_!' The young fellow fairly shouted this last word into my very ear--he was in a regular furious passion. 'You'd _better_ let me alone, that's all I've got to say to you, sir!' growled he as he turned away; so I thought it no use to say more, and leant over the bulwarks, resolved to see it out. "The fact was, the farther we got off the land _now_, the worse, seeing that if what I dreaded should prove true, why, we were probably in thirty or forty fathoms of water, where no anchor could hold for ten minutes' time--if it ever caught ground. My way would have been to get every boat out at once, and tow in till you could see the colour of some shoal or other from aloft, then take my chance there to ride out whatever might come, to the last cable aboard of us. Accordingly I wasn't sorry to see that by this time the whole bight of the coast was slowly rising off our beam betwixt the high land far astern and the broad bluffs upon her starboard bow; which last came out already of a sandy reddish tint, and the lower part of a clear blue, as the sun got westward on our other side. What struck me was, that the face of the water, which was all over wrinkles and winding lines, with here and there a quick ripple, when I went below, had got on a sudden quite smooth as far as you could see, as if they'd sunk down like so many eels; a long uneasy ground-swell was beginning to heave in from seaward, on which the ship rose; once or twice I fancied I could observe the colour different away towards the land, like the muddy chocolate spreading out near a river-mouth at ebb-tide--then again it was green, rather; and as for the look of the coast, I had no knowledge of it. I thought again, certainly, of the old quartermaster's account in the _Iris_, but there was neither anything like it to be seen, nor any sign of a break in the coast at all, though high headlands enough. "The ship might have been about twelve or fourteen miles from the north-east point upon her starboard bow, a high rocky range of bluffs--and rather less from the nearest of what lay away off her beam; but after this you could mark nothing more, except it were that she edged farther from the point, by the way its bearings shifted or got blurred together: either she stood still, or she'd caught some eddy or under-rift, and the mate walked about quite lively once more. The matter was how to breathe, or bear your clothes--when all of a sudden I heard the second mate sing out from the forecastle 'Stand by the braces, there! Look out for the topes'l hawl-yairds!' "He came shuffling aft next moment as fast as his foundered old shanks could carry him, and told Mr Finch there was a squall coming off the land. The mate sprang up on the bulwarks, and so did I--catching a glance from him as much as to say--There's your gale from seaward, you pretentious lubber! The lowest streak of coast bore at present before our starboard quarter, betwixt east and south-east'ard, with some pretty high land running away up from it, and a sort of dim blue haze hanging beyond, as 'twere. Just as Macleod spoke, I could see a dusky dark vapour thickening and spreading in the haze, till it rose black along the flat, out of the sky behind it; whitened and then darkened again, like a heavy smoke floating up into the air. All was confusion on deck for a minute or two--off went all the awnings--and every hand was ready at his station, fisting the ropes; when I looked again at the cloud, then at the mates. '_By_ George!' said I, noticing a pale wreath of it go curling on the pale clear sky over it, as if to a puff of air, 'it _is_ smoke! Some <DW65>s, as they often do, burning the bush!' "So it was; and as soon as Finch gave in, all hands quietly coiled up the ropes. It was scarce five minutes after, that Jacobs, who was coiling up a rope beside me, gave me a quiet touch with one finger. 'Mr Collins, sir,' said he in a low voice, looking almost right up, high over toward the ship's larboard bow, which he couldn't have done before, for the awnings so lately above us, 'look, sir--there's an _ox-eye_!' I followed his gaze, but it wasn't for a few seconds that I found what it pointed to, in the hot far-off-like blue dimness of the sky overhead, compared with the white glare of which to westward our canvas aloft was but dirty grey and yellow. "'Twas what none but a seaman would have observed, and many a seaman wouldn't have done so--but a man-o'-war's-man is used to look out at all hours, in all latitudes--and to a man that knew its meaning, _this_ would have been no joke, even out of sight of land; as it was, the thing gave me a perfect thrill of dread. High aloft in the heavens northward, where they were freest from the sun--now standing over the open horizon amidst a wide bright pool of light--you managed to discern a small silvery speck, growing slowly, as it were, out of the faint blue hollow, like a star in the daytime, till you felt as if it _looked_ at you, from God knows what distance away. One eye after another amongst the mates and crew joined Jacobs' and mine, with the same sort of dumb fellowship to be seen when a man in London streets watches the top of a steeple; and however hard to make out at first, ere long none of them could miss seeing it, as it got slowly larger, sinking by degrees till the sky close about it seemed to thicken like a dusky ring round the white, and the sunlight upon our seaward quarter blazed out doubly strong--as if it came dazzling off a brass bell, with the bright tongue swinging in it far off to one side, where the hush made you think of a stroke back upon us, with some terrific sound to boot. "The glassy water by this time was beginning to rise under the ship with a struggling kind of unequal heave, as if a giant you couldn't see kept shoving it down here and there with both hands, and it came swelling up elsewhere. "To north-westward or thereabouts, betwixt the sun and this ill-boding token aloft, the far line of open sea still lay shining motionless and smooth; next time you looked, it had got even brighter than before, seeming to leave the horizon visibly; then the streak of air just above it had grown grey, and a long hedge of hazy vapour was creeping as it were over from beyond--the white speck all the while travelling down towards it slantwise from nor'ard, and spreading its dark ring slowly out into a circle of cloud, till the keen eye of it at last sank in, and below, as well as aloft, the whole north-western quarter got blurred together in one gloomy mass. If there was a question at first whether the wind mightn't come from so far nor'ard as to give her a chance of running out to sea before it, there was none now--our sole recourse lay either in getting nearer the land meanwhile, to let go our anchors ere it came on, with her head _to_ it--or we might make a desperate trial to weather the lee-point now far astern. The fact was, we were going to have a regular tornado, and that of the worst kind, which wouldn't soon blow itself out; though near an hour's notice would probably pass ere it was on. "The three mates laid their heads gravely together over the capstan for a minute or two, after which Finch seemed to perceive that the first of the two ways was the safer; though, of course, the nearer we should get to the land, the less chance there was of clearing it afterwards, should her cables part, or the anchors drag. The two boats still alongside, and two others dropped from the davits, were manned at once and set to towing the Indiaman ahead, in-shore; while the bower and sheet anchors were got out to the cat-heads ready for letting go, cables overhauled, ranged, and clinched as quickly as possible, and the deep-sea lead passed along to take soundings every few minutes. "On we crept, slow as death, and almost as still, except the jerk of the oars from the heaving water at her bows, and the loud flap of the big topsails now and then, everything aloft save them and the brailed foresail being already close furled; the clouds all the while rising away along our larboard beam nor'-west and north, over the grey bank on the horizon, till once more you could scarce say which point the wind would come from, unless by the huge purple heap of vapour in the midst. The sun had got low, and he shivered his dazzling spokes of light behind one edge of it, as if 'twere a mountain you saw over some coast or other; indeed, you'd have thought the ship almost shut in by land on both sides of her, which was what seemed to terrify the passengers most, as they gathered about the poop-stairs and watched it--_which_ was the true land and which the clouds, 'twas hard to say--and the sea gloomed writhing between them like a huge lake in the mountains. "I saw Sir Charles Hyde walk out of the round-house and in again, glancing uneasily about; his daughter was standing with another young lady, gazing at the land; and at sight of her sweet, curious face, I'd have given worlds to be able to do something that might save it from the chance, possibly, of being that very night dashed amongst the breakers on a lee-shore in the dark--or at best, suppose the Almighty favoured any of us so far, perhaps landed in the wilds of Africa. Had there been aught man could do more, why, though I never should get a smile for it, I'd have compassed it, mate or no mate; but all was done that could be done, and I had nothing to say. Westwood came near her, too, apparently seeing our bad case at last to some extent, and both trying to break it to her and to assure her mind; so I folded my arms again, and kept my eyes hard fixed upon the bank of cloud, as some new weather-mark stole out in it, and the sea stretched breathless away below, like new melted lead. "The air was like to choke you--or rather there was none--as if water, sky, and everything else wanted _life_, and one would fain have caught the first rush of the tornado into his mouth--the men emptying the dipper on deck from the cask, from sheer loathing. As for the land, it seemed to draw nearer of itself, till every point and wrinkle in the headland off our bow came out in a red coppery gleam--one saw the white line of surf round it, and some blue country beyond like indigo; then back it darkened again, and all aloft was getting livid-like over the bare royal mast-heads. "Suddenly, a faint air was felt to flutter from landward; it half lifted the topsails, and a heavy earthy smell came into your nostrils--the first of the land-breeze, at last; but by this time it was no more than a sort of mockery, while a minute after you might catch a low, sullen, moaning sound far off through the emptiness, from the strong surf the Atlantic sends in upon the west coast before a squall. If ever landsmen found out what land on the wrong side is, the passengers of the _Seringapatam_ did, that moment; the shudder of the topsails aloft seemed to pass into everyone's shoulders, and a few quietly walked below, as if they were safe in their cabins. I saw Violet Hyde look round and round with a startled expression, and from one face to another, till her eye lighted on me, and I fancied for a moment it was like putting some question to me. I couldn't bear it!--'twas the first time I'd felt powerless to offer anything; though the thought ran through me again till I almost felt myself buffeting among the breakers with her in my arms. I looked to the land, where the smoke we had seen three-quarters of an hour ago, rose again with the puff of air, a slight flicker of flame in it, as it wreathed off the low ground toward the higher point--when all at once I gave a start, for something in the shape of the whole struck me as if I'd seen it before. "Next moment I was thinking of old Bob Martin's particular landmarks at the river-mouth he spoke of, and the notion of its possibly being hereabouts glanced on me like a godsend. In the unsure dusky sight I had of it, certainly, it wore somewhat of that look, and it lay fair to leeward of the weather; while, as for the dead shut-in appearance of it, old Bob had specially said you'd never think it was a river; but then again it was more like a desperate fancy owing to our hard case, and to run the ship straight for it would be the trick of a Bedlamite. At any rate, a quick cry from aft turned me round, and I saw a blue flare of lightning streak out betwixt the bank of grey haze and the cloud that hung over it--then another, and the clouds were beginning to rise slowly in the midst, leaving a white glare between, as if you could see through it towards what was coming. The men could pull no longer, but ahead of the ship there was now only about eight or ten fathoms water, with a soft bottom. The boats were hoisted in, and the men had begun to clue up and hand the topsails, which were lowered on the caps, when, just in the midst of the hubbub and confusion, as I stood listening to every order the mate gave, the steward came up hastily from below to tell him that the captain had woke up, and, being much better, wanted to see him immediately. Mr Finch looked surprised, but he turned at once, and hurried down the hatchway. "The sight which all of us who weren't busy gazed upon, over the larboard bulwarks, was terrible to see: 'twas half dark, though the sun dropping behind the haze-bank, made it glimmer and redden. The dark heap of clouds had first lengthened out blacker and blacker, and was rising slowly in the sky like a mighty arch, till you saw their white edges below, and a ghastly white space behind, out of which the mist and scud began to fly. Next minute a long sigh came into her jib and foresail, then the black bow of cloud partly sank again, and a blaze of lightning came out all round her, showing you every face on deck, the inside of the round-house aft, with the Indian judge standing in it, his hand to his eyes--and the land far away, to the very swell rolling into it. Then the thunder broke overhead in the gloom, in one fearful sudden crack, that you seemed to hear through every corner of cabins and forecastle below--and the wet back-fins of twenty sharks or so, that had risen out of the inky surface, vanished as suddenly. "The Indiaman had sheered almost broadside on to the clouds, her jib was still up, and I knew the next time the clouds _rose_ we should fairly have it. Flash after flash came, and clap after clap of thunder, _such_ as you hear before a tornado--yet the chief officer wasn't to be seen, and the others seemed uncertain what to do first; while everyone began to wonder and pass along questions where he could be. In fact, he had disappeared. For my part, I thought it very strange he stayed so long; but there wasn't a moment to lose. I jumped down off the poop-stairs, walked forward on the quarter-deck, and said coolly to the men nearest me,'Run and haul down that jib yonder--set the spanker here, aft. You'll have her taken slap on her beam: quick, my lads!' The men did so at once. Macleod was calling out anxiously for Mr Finch. 'Stand by the anchors there!' I sang out, 'to let go the starboard one, the _moment_ she swings head to wind!' The Scotch mate turned his head; but Rickett's face, by the next flash, showed he saw the good of it, and there was no leisure for arguing, especially as I spoke in a way to be heard. I walked to the wheel, and got hold of Jacobs to take the weather helm. "We were all standing ready, at the pitch of expecting it. Westwood, too, having appeared again by this time beside me, I whispered to him to run forward and look after the anchors--when someone came hastily up the after-hatchway, with a glazed hat and pilot-coat on, stepped straight to the binnacle, looked in behind me, then at the black bank of cloud, then aloft. Of course I supposed it was the mate again, but didn't trouble myself to glance at him further--when 'Hold on with the anchors!' he sang out in a loud voice--'hold on there for your lives!' Heavens! it was the captain himself! "At this, of course, I stood aside at once; and he shouted again,'Hoist the jib and fore-topmast-staysail--stand by to set fore-course!' By Jove! this was the way to pay the ship _head_ off, instead of stern off, from the blast when it came--and to let her drive before it at no trifle of a rate, wherever _that_ might take her! '_Down_ with that spanker, Mr Macleod, d' ye hear?' roared Captain Williamson again; and, certainly, I did wonder what he meant to do with the ship. But his manner was so decided, and 'twas so natural for the captain to strain a point to come on deck in the circumstances, that I saw he must have some trick of seamanship above _me_, or some special knowledge of the coast--and I waited in a state of the greatest excitement for the first stroke of the tornado. He waved the second and third mates forward to their posts--the Indiaman sheering and backing, like a frightened horse, to the long slight swell and the faint flaw of the land-air. The black arch to windward began to rise again, showing a terrible white stare reaching deep in, and a blue dart of lightning actually ran zigzag down before our glaring fore-to'gallant-mast. Suddenly, the captain had looked at me, and we faced each other by the gleam; and, quiet, easy-going man as he was commonly, it just flashed across me there was something extraordinarily wild and _raised_ in his pale visage, strange as the air about us made everyone appear. He gave a stride towards me, shouting, 'Who are----' when the thunder-clap took the words out of his tongue, and next moment the tornado burst upon us, fierce as the wind from a cannon's mouth. "For one minute the _Seringapatam_ heeled over to her starboard streak, almost broadside on, and her spars towards the land--all on her beam was a long ragged white gush of light and mist pouring out under the black brow of the clouds, with a trampling eddying roar up into the sky. The swell plunged over her weather-side like the first break of a dam, and as we scrambled up to the bulwarks, to hold on for bare life, you saw a roller fit to swamp us, coming on out of the sheet of foam--when crash went mizzen-topmast and main-to'gallant-mast; the ship payed swiftly off by help of her headsails, and, with a leap like a harpooned whale, off she drove fair before the tremendous sweep of the blast. "The least yaw in her course, and she'd have never risen, unless every stick went out of her. I laid my shoulder to the wheel with Jacobs, and Captain Williamson screamed through his trumpet into the men's ears, and waved his hands to ride down the fore-sheets as far as they'd go; which kept her right before it, though the sail could be but half set, and she rather flew than ran--the sea one breadth of white foam back to the gushes of mist, not having power to rise higher yet. Had the foresail been stretched, 'twould have blown off like a cloud. I looked at the captain: he was standing in the lee of the round-house, straight upright, though now and then peering eagerly forward, his lips firm, one hand on a belaying-pin, the other in his breast--nothing but determination in his manner: yet once or twice he started, and glanced fiercely to the after-hatchway near, as if something from below might chance to thwart him. I can't express my contrary feelings, betwixt a sort of hope and sheer horror. We were driving right towards the land, at thirteen or fourteen knots to the hour--yet _could_ there actually be some harbourage hereaway, or that said river the quartermaster of the _Iris_ mentioned, and Captain Williamson know of it? "Something struck me as wonderfully strange in the whole matter, and puzzling to desperation--still, I trusted to the captain's experience. The coast was scarce to be seen ahead of us, lying black against an uneven streak of glimmer, as she rushed like fury before the deafening howl of wind; and right away before our lee-beam I could see the light blowing, as it were, across beyond the headland I had noticed, where the smoke in the bush seemed to be still curling, half-smothered, along the flat in the lee of the hills, as if in green wood, or sheltered as yet from seaward, though once or twice a quick flicker burst up in it. "All at once the gust of the tornado was seen to pour on it like a long blast from some huge bellows, and up it flashed--the yellow flame blazed into the smoke, spread away behind the point, and the ruddy brown smoke blew whitening over it:--when, Almighty power! what did I see as it lengthened in, but part after part of old Bob's landmarks creep out ink-black before the flare and the streak of sky together--first the low line of ground, then the notch in the block, the two rocks like steps, and the sugar-loaf shape of the headland, to the very mop-headed knot of trees on its rise! No doubt Captain Williamson was steering for it; but it was far too much on our starboard bow--and in half-an-hour at this rate we should drive right into the surf you saw running along to the coast ahead--so I signed to Jacobs for God's sake to edge her off as nicely as was possible. "Captain Williamson caught my motion. 'Port! port, sirrah!' he sang out sternly; '_back_ with the helm, d' ye hear!' and pulling out a pistol, he levelled it at me with one hand, while he held a second in the other. 'Land!--land!' shouted he, and from the lee of the round-house it came more like a shriek than a shout--'I'll be there though a thousand mutineers----' His eye was like a wild beast's. That moment the truth glanced across me--this was the _green leaf_, no doubt, the Scotch mate talked so mysteriously of. The man was mad! The land-fever was upon him, as I'd seen it before in men long off the African coast; and he stood eyeing me with one foot hard stamped before him. 'Twas no use trying to be heard, and the desperation of the moment gave me a thought of the sole thing to do. I took off my hat in the light of the binnacle, bowed, and looked him straight in the face with a smile--when his eye wavered, he slowly lowered his pistol, then _laughed_, waving his hand towards the land to leeward, as if, but for the gale, you'd have heard him cheer. At the instant I sprang behind him with the slack of a rope, and grappled his arms fast, though he'd got the furious power of a madman, and, during half-a-minute, 'twas wrestle for life with me. But the line was round him, arm and leg, and I made it fast, throwing him heavily on the deck, just as one of the mates, with some of the crew, were struggling aft, by help of the belaying-pins, against the hurricane, having caught a glimpse of the thing by the binnacle-light. They looked from me to the captain. The ugly topman made a sign, as much as to say, Knock the fellow down; but the whole lot hung back before the couple of pistol-barrels I handled. The Scotch mate seemed awfully puzzled; and others of the men, who knew from Jacobs what I was, came shoving along, evidently aware what a case we were in. "A word to Jacobs served to keep him steering her anxiously, so as to head two or three points more south-east in the _end_, furiously as the wheel jolted. So there we stood, the tornado sweeping sharp as a knife from astern over the poop-deck, with a force that threw anyone back if he left go his hold to get near me, and going up like thunder aloft in the sky. Now and then a weaker flare of lightning glittered across the scud; and, black as it was overhead, the horizon to windward was but one jagged white glare, gushing full of broad shifting streaks through the drift of foam and the spray that strove to rise. Our fore-course still held: and I took the helm from Jacobs, that he might go and manage to get a pull taken on the starboard brace, which would not only _slant_ the sail more to the blasts, but give her the better chance to make the sole point of salvation, by helping her steerage when most needed. Jacobs and Westwood together got this done; and all the time I was keeping my eyes fixed anxiously, as man can fancy, on the last gleams of the fire ashore, as her head made a fairer line with it; but, by little and little, it went quite out, and all was black--though I had taken its bearings by the compass--and I kept her to that for bare life, trembling at every shiver in the foresail's edge, lest either it or the mast should go. "Suddenly, we began to get into a fearful swell--the Indiaman plunged and shook in every spar left her. I could see nothing ahead, from the wheel, and in the dark; we were getting close in with the land, and the time was coming; but still I held south-east-by-east to the mark of her head in the compass-box, as nearly as might and main could do it, for the heaves that made me think once or twice she was to strike next moment. "If she went ashore in my hands! why, it was like to drive one mad with fear; and I waited for Jacobs to come back, with a brain ready to turn, almost as if I'd have left the wheel to the other helmsman, and run forward into the bows to look out. The captain lay raving and shouting behind me, though no one else could either have heard or seen him; and where the chief officer was all this time surprised me, unless the madman had made away with him, or locked him in his own cabin, in return for being shut up himself--which, in fact, proved to be the case, cunning as it was to send for him so quietly. At length Jacobs struggled aft to me again, and charging him, for Heaven's sake, to steer exactly the course I gave, I drove before the full strength of the squall along decks to the bowsprit, where I held on and peered out. Dead ahead of us was the high line of coast in the dark--not a mile of swell between the ship and it. By this time the low boom of the surf came under the wind, and you saw the breakers lifting all along--not a single opening in them! I had lost sight of my landmarks, and my heart gulped into my mouth--what I felt 'twould be vain to say--till I thought I _did_ make out one short patch of sheer black in the range of foam, scarce so far on our bow as I'd reckoned the fire to have been; indeed, instead of that, it was rather on her weather than her lee bow; and the more I watched it, and the nearer we drove in that five minutes, the broader it was. 'By all that's good!' thought I, 'if a river there is, that must be the mouth of it!' But, by Heavens! on our present course the ship would run just right upon the point--and, to strike the clear water, her foreyard would require to be braced up, able or not, though the force of the tornado would come fearfully on her quarter, then. There was the chance of taking all the masts out of her; but let them stand ten minutes, and the thing was done, when we opened into the lee of the points--otherwise all was over. I sprang to the fore-braces and besought the men near me, for God's sake, to drag upon the lee one--and that as if their life hung upon it--when Westwood caught me by the arm. I merely shouted through my hands into his ear to go aft to Jacobs and tell him to keep her head a _single point_ up, whatever might happen, to the last--then I pulled with the men at the brace till it was fast, and scrambled up again to the bowsprit heel. Jove! how she surged to it: the little canvas we had strained like to burst; the masts trembled, and the spars aloft bent like whip-shafts, everything below groaning again; while the swell and the blast together made you dizzy, as you watched the white eddies rising and boiling out of the dark--her cutwater shearing through it and the foam, as if you were going under it. The sound of the hurricane and the surf seemed to be growing together into one awful roar--my very brain began to turn with the pitch I was wrought up to--and it appeared next moment we should heave far up into the savage hubbub of breakers. I was wearying for the crash and the wild confusion that would follow--when all of a sudden, still catching the fierce rush of the gale athwart her quarter into the fore-course, which steadied her though she shuddered to it--all of a sudden, the dark mass of the land seemed as it were parting ahead of her, and a gleam of pale sky opened below the dusk into my very face. I no more knew what I was doing, by this time, nor where we were, than the spar before me--till again, the light broadened, glimmering low betwixt the high land and a lump of rising level on the other bow. "I hurried aft past the confused knots of men holding on to the lee of the bulwarks, and seized a spoke of the wheel. 'Tom,' shouted I to Westwood, 'run and let free the spanker on the poop! Down with the helm--down with it, Jacobs, my lad!' I sang out; 'never mind spars or canvas!' Down went the helm--the spanker helped to luff her to the strength of the gust--and away she went up to port, the heavy swells rolling her in, while the rush into her staysail and fore-course came in one terrible flash of roaring wind--tearing first one and then the other clear out of the bolt-ropes, though the loose spanker abaft was in less danger, and the way she had from both was enough to take her careening round the point into its lee. By Heavens! there were the streaks of soft haze low over the rising moon, under the broken clouds, beyond a far line of dim fringy woods, she herself just tipping the hollow behind, big and red--when right down from over the cloud above us came a spout of rain, then a sheet of it lifting to the blast as it howled across the point. 'Stand by to let go the larboard anchor!' I sang out through the trumpet; and Jacobs put the helm fully down at the moment, till she was coming head to wind, when I made forward to the mates and men. 'Let--go!' I shouted; not a look turned against me, and away thundered the cable through the hawse-hole; she shook to it, sheered astern, and brought up with her anchor fast. By that time the rain was plashing down in a perfect deluge--you couldn't see a yard from you--all was one white pour of it; although it soon began to drive again over the headland, as the tornado gathered new food out of it. Another anchor was let go, cable paid out, and the ship soon began to swing the other way to the tide, pitching all the while on the short swell. "The gale still whistled her spars for two or three hours, during which it began by degrees to lull. About eleven o'clock it was clear moonlight to leeward, the air fresh and cool: a delicious watch it was, too. I was walking the poop by myself, two or three men lounging sleepily about the forecastle, and Rickett below on the quarter-deck, when I saw the chief officer himself rush up from below, staring wildly round him, as if he thought we were in some dream or other. I fancied at first the mate would have struck Rickett, from the way he went on, but I kept aft where I was. The eddies ran past the Indiaman's side, and you heard the fast ebb of the tide rushing and rippling sweetly on her taut cables ahead, plashing about the bows and bends. We were in old Bob Martin's river, whatever that might be. CHAPTER XV "Well," continued the commander, his voice making use of the breeze as he stood aft of the group, "I could not have slept more than three or four hours on a stretch, when I was woke by a fellow shoving his lantern in my face, and saying it wasn't me he wanted; for which I gave him a hearty objurgation, and turned over a swing of the cot to go asleep again. The sailor grumbled something about the parson being wanted for the captain; and all at once it flashed on my mind where we were, with the whole of last night's ticklish work--seeing that, hard rub as it was, it had clean left me for a time. 'Try the aftermost berth, then,' said I, slipping out in the dark to put on my trousers. "The fact was, on going below to our state-room, I had found my own cot taken up by someone in the confusion; and as every door stood open at night in that latitude, I e'en made free with the nearest, which I knew was the missionary's. In a minute or two I heard Westwood meet the mate, who said he thought the captain would like to see him, and hoped they hadn't 'disturbed the other gentleman.' 'Oh no, I daresay not,' said Westwood, rather nervously, guessing, I daresay, what he was wanted for; while Finch slipped quietly past to listen at the state-room door, where both he and I might hear the 'other gentleman,' whoever he was, snoring pretty plain. "When the first officer shut the door to, however, turned the key, and put it in his pocket, I nearly gave vent to a whistle. 'I see!' thought I; 'but, my fine fellow, it seemed you never were meant for a good jailer, anyhow!' He was no sooner gone than I walked forward toward the captain's cabin, near the after-hatchway, anxious enough to see how the poor man was, since I had had such a share in bringing him to a point, one way or another. Westwood was standing against the light out of the open door, and I looked in along with him, at the cot slung high to the beams like a lump of shadow, the lamp striking across below it on all the captain's little affairs--his glazed hat and his wet coat, the names of two or three old books even hanging in shelves against the bulkhead--and into the little state-room off the cabin, where the surgeon was stooping to mix a draught. "The hard-featured Scotch mate stood holding the captain's wrist with one clumsy flipper, as if trying to feel his pulse, fumbling about his own face with the other, and looking more concerned than I'd thought possible for him. 'Well, I've slept--a good deal,' said the captain, in a weak voice, putting up his hand slowly to rub his eyes, but seemingly quite composed, and knowing nothing of what had happened--which rid me of the horrid notion I could scarce help before, that he had known what he was about. His head was close shaved, and the look of a sailor clean gone off his face with the bluff, honest oak-colour it commonly had, till you'd have wished him decently in his bed thousands of miles off, with women slipping out and in; only the blood from his arm hanging down on the sheet, with the sharp point of his nose and the shape of his knees coming up off the shadow, kept it all in one with the wild affair on deck a few hours gone. "'She's on her course, you say?' added he, listlessly. 'Must be a _very_ light breeze though, Mr Macleod.' 'So it is, sir; so it is, no doubt!' replied the second mate, soothing him; 'did ye say we'll _pent_ the ship, sir?' 'Ay, before we go into port, Mr Macleod, to be sure,' said Captain Williamson, trying to put a cheerful tone into his voice; 'she's had a good deal of buffeting, but we mustn't let 'em see it, you know! Didn't you lose a mizzen-topmast somehow, though, Mr Macleod?' ''Deed ay, sir,' said Macleod, hastily, afraid he was getting upon the scent of what had happened; 'the first officer's watch it was, sir--will _I_ tell Mr Finch ye're wanting to speak to him about it, Captain Williamson?' and he began to shuffle towards the door. "'Finch? Finch?' said the sick man, passing his finger over his eyes again; 'what voyage _is_ this, Mr Macleod?' 'Why--why,' said the Scotchman, starting, and rather puzzled himself. 'Oo, it's just _this_ voyage, ye know, sir! Mr Finch, ye mind, sir?' 'No, no; don't let him leave the deck for a moment, Macleod!' said the captain, anxiously: 'harkye, James, I'm afraid I've trusted overmuch to the young man all along! I'll tell ye, Mr Macleod, I don't know whether I was asleep or not, but I _heard_ him somewhere wishing he had the command of this ship! I shouldn't like him to take her off my hands! Have you seen the Scilly lights yet, Mr Macleod?' The mate shook his head; he had contrived to persuade the poor man we were far homeward bound. 'If you'd only get the pilot aboard, Mr Macleod,' the captain went on, 'I'd die contented; but mind the charts--mind the charts--I've got the charts to mind for another sort of voyage myself, James!' 'Hoot, hoot, captain!' said the Scotchman, 'what sets ye for to talk after that fashion--you'll be up an' about decks directly, sir! What were ye saying about top-m'sts now, sir?' Captain Williamson gave the second mate a glance that looked into him, and he held down his head, for the man evidently believed fully, as none of us could help doing, that there was death on the captain's face. "'James, James!' said the captain, slowly, 'you've no notion how some things weigh on the mind at a pass of this kind! Other things one don't remember--but there's one in particular, almost as it were yesterday--why, surely you were with me that voyage, Mr Macleod! when I let some o' the passengers take a boat in a calm, and all----' Here he stopped, seemingly overcome. 'There was one young creature amongst 'em,' he went on, 'the age of my own girl, Macleod--my own little Nan, you know--and now--now I miss _her_--and, and----' The poor man gave a great gulp, clutching the mate's arm, and gazing him in the face. 'Wasn't it a long time ago?' said he, very anxiously; 'if it wasn't, I would go mad! They were all drowned--drowned--I _see_ that black squall coming down on the swell _now_, man, and the brig, and all of us looking out to the wind'ard!' 'I mind something about it,' replied Macleod, stoutly, though he looked away: ''twas none o' your fault, though, Captain Williamson--they were just _fey_, sir; and more than that, if ye mind, sir, they took the boat again' all orders--on the sly, I may say.' "Westwood was on the point of starting forward to make known how the case stood, on the strength of our finding the paper in the bottle, when I pressed his arm, and whispered that it could only make things worse, and cheat the sick man of a notion more likely to do him good than otherwise. 'It's a heavy charge, Mr Macleod, a heavy charge!' said he, falling back again; 'and one Mr Brown needn't envy.' 'Mr _Finch_, sir, ye mind,' put in the second mate, setting him right; 'but keep up your heart, sir, for any sake!' 'I feel I'll last over the time o' next full tide,' said the captain, solemnly. 'I don't want to know how far we're off, only if there's any chance at all, Macleod, you won't spare canvas to carry her in.' "The Scotchman rubbed one of his hard cheek-bones after the other, and grumbled something or other in his throat by way of agreement. The whole thing was melancholy to see, after last night's stir, with the dim lamp or two twinkling along the gloom of the steerage, the dead quietness of the ship, and the smothered sort of glare under the captain's cot bringing out the mere litter on the floor, to the very cockroaches putting their ugly feelers out of one of his shoes in a corner; he shut his eyes, and lay for a minute or two seemingly asleep, only murmuring something about a breeze, and then asking them to shove out the port, 'twas so close. The second mate looked to the surgeon, who signed to him to do it, as if it didn't much matter by this time; while he gave him the draught of physic he was mixing, however. "The Indiaman was beginning to swing slowly before the first of the flood, stern off at her anchors; and whenever the port was opened, 'twas so still otherwise that you heard the tide clearly in the cabin, rippling along the timbers to the copper upon her bows--plash, plash, and lap, lip, lap, like no other earthly sound that a man can hear--and you even began to note it on something else a good bit off, though it seemed to be all quite dark out-board. The captain's eyes opened by degrees, till we saw them looking at us out of the shadow of the cot, and the second mate started as if to mend his mistake; only 'twas plain enough, by that time, the captain _knew_ the sound, half raising himself up and listening. A few early mosquitoes came in, and, after dancing about to refresh themselves in the light and warmth under the cot, began to bite savagely; everyone of us had a distant horn sounding in his ear, and each was rubbing it or his nose, except the sick man; but not one of them settled on him. As the starboard port slued gradually opposite to the nearest shore, a low, deep hum was carried in over the water, ebbing and flowing, and full of dim, creeping noises, like things stirring in their sleep, as if the little cabin had been an ear to the ship. At times the tree-frogs broke out in a loud clicking chirrup; then, between the fits of it, when all seemed still again for a moment or two, you heard a low, half-smothered, small sound, deeper down, as it were, fill up the break with its throbbing and trill-trilling, as if just _one_ land-cricket or a grasshopper did it, till it came out as clear as though it were a child's rattle close by, and all of a sudden stopped; when back floated the huge whispering hum again, with a damp smell of leaves on a cold breath of the land-air, that died away as quickly as it reached us. The bewilderment on Captain Williamson's white face for that minute's time was cruel to witness, and Macleod would certainly have closed the port, but for the captain's seizing his arm again, with a wild, questioning sort of a look into the second mate's eyes. 'Oh, good God!' faltered out the captain, 'it's--it's _land_!----where--where----?' 'For goodsake, sir,' said Macleod, 'don't ask me the now--take a bit of sleep, sir.' "We could hear one another breathing, when ting-tang went four bells on deck. You heard it going across to the shore, as it were; and a few moments after, out of the humming far and wide along the land, back came the sound of another bell, toll upon toll, like some clock striking the hour a long way off. Then a third one followed on it, from a different direction, ringing clearer in the air; while the murmur and the rush seemed to swell up the more all round, and the plashing of the tide made the ship heave at her anchors. The mate shivered, Westwood and I started, but some extraordinary notion or other gleamed over the captain's face as he sat up. He was quite in his senses, too, apparently, though it seemed to be neither more nor less than sheer joy that overcame him, for he let out a long breath, and his eyes were glistening as if the tears stood in them. 'James--James Macleod!' said he quickly, with a husky voice,' you oughn't to've deceived one you've sailed so long with; but you meant me a good surprise, and 'twas kindly done of you! _I_ know the very run o' the clocks off Greenwich Reach, man; d'ye think one could mistake the sound of Lon'on town, fidgeting when it wakes, either?--we 're--we're _home_ already!' "And he fell back in the cot, with the drops running down his cheek, smiling happily all the time at Macleod in a way that went to one's heart; while the Scotchman stared helplessly to the surgeon, who slipped to the port and closed it. 'I know by your way, James,' continued the poor man, 'you wanted to send up to Virginia Row for 'em _all_; but don't send for an hour yet; better go up yourself and break it to 'em--_break_ it to 'em, be sure of that, James; I shouldn't wonder but I pulled up, after all. Ah--that first one we heard was Greenwich Hospital--t'other is Dicksons' brewery or Redriff----' Here his eyelids began to drop, owing to the sleeping-draught he had got, when suddenly they opened wide again. "'Ha!' said he, listening, and putting up a finger, 'but I haven't heard St Paul's strike six yet; it's seldom so long after; ought to be heard from here of a morning; let's----' By little and little, however, the sick man's eyes closed, and you heard him murmuring, as his finger sank down, 'Macleod, say--to her--say--luff, luff, my lad, keep her her course--' till his shrunk face was as quiet on the pillow as if he'd been really at home the first night after a voyage. "'Oh man, doctor!' said the second mate, heaving a breath, 'isn't it terrible! Good forgive me for a lee to a dying man! Take an old seaman's word for it, Dr Small, yon clock ashore was no mortal soond, sir; ye may keep your drogues for them they'll do good to. 'Twas neither more or less than the captain's _dregy_!' 'Phoo!' answered the Scotch surgeon, who was one of your sceptical chaps, as I heard say, 'some other vessels here, of course, that's all.' The sailor gave him only a smile of pity for not being able to distinguish the sound of a ship's bell. 'There can't be a town hereabouts, Collins?' whispered Westwood. 'A town--no!' said I; 'it's the best wilderness sign you can have--the African bell-bird!'[22] 'Ah, ah!' said the surgeon, laughing, 'there now, Macleod--of course it can be explained naturally, like other things.' The second mate gave me a doubtful scowl; but seeing Westwood, whom he had always seemed to think rather in the way before, his eye softened. [22] _Sc._--The South African and South American _campanero_, or bell-bird, whose peculiar note may be heard two or three miles off, chiefly in the loneliest parts of the Brazilian or Benguela forest. "'You'll be wanting to see the captain as soon as he wakes up, sir,' said he. 'I'm terrified to face him--but if ye'd just slip in when he comes to himself, sir, I'm thinking, reverend sir, ye might wile him off yon terrible notion o' his.' Westwood shook his head, seriously, not knowing what to say. 'Ay, ay, sir,' continued Macleod, as he half closed the door, 'no doubt a man ought to be upon better things; but it's hard for him, when he's got a wife and weans six thousand miles away, and wants them alongside in a couple of hours--uncommon hard, sir! She's a douce, careful body, too, Mistress Williamson, like the captain's self; and I heard her fleech sore with the captain before we sailed, for to bide quietly ashore this time, for good. Poor woman! if she didn't e'en go the length o' pairtin' in anger the last morning, wae's me! till the very moment when (he telt me himself, sir), she out with her arms round his neck, crying like to choke! An' all to--but if the captain had a fault, 'twas the love o'--good forgive me, though, when it was but studying his faim'ly, Mr Thomas! If it was only an auld tarry deevil like me, now, with neither kith or kin!' 'Except cousins, Mr Macleod,' said the surgeon, as he wiped his lancet on his coat-tail--'plenty of them in the High----' But he caught Westwood's eye, and was ashamed to finish his heartless joke, though the rough second mate was too full of his feeling to hear it; when Westwood said something about our all thinking too little of these things beforehand, but how the captain was plainly a man that had done his duty carefully, which no doubt would ease his mind. The mate looked up, and eyed him sideways for a moment: 'Eh? what?' said he bluntly; 'it's not so little I mind o' what I used to hear at the kirk langsyne, as not to know that's not the right doctrine. D'ye think, sir, _that's_ what'll put him over, when he finds out this is not Greenwich Reach? There's the Methody minister with the glasses, though!' he broke out, when again a look of despair came over his broad hard-favoured countenance. 'They're always upon works, too, I've heard!' said he, turning and murmuring to himself; 'oh, if I could but hoist out a bit screed o' the truth myself to comfort the poor fellow with! Lord, how didn't I think of the Shorter Carritch--let's see how't went--"What is the chief end of"--no, it's "What is faith in--faith in the only rule to direct us"--no, no--"Baptism is a sacrament--where--whereby"'--and he was still overhauling some old catechism in this fashion, twisting himself all the time as if he were twisting a stiff rope the wrong way, with a look of misery none of us could have had the heart to laugh at, when a middy's voice came squeaking down the dark after-hatchway: 'Mr Macleod, sir, the chief officer wants you on deck.' "Westwood slipped quietly off, and the young surgeon was beginning to talk easily, to rid his mind of something, perhaps, till I asked if there wasn't any chance. 'Oh, the captain, you mean?' said he; 'don't think there is--he's a bad subject! If we were out at sea now, Mr Collins, the _calenture_ would make him think the waves all grass, or something as green as--as the cawdets used to call----' I looked at the fellow sternly, and he changed his key, though with a surprised air. "'You're blessed early up, though, you two!' said he. 'I suppose that cursed squall kept you idlers awake; but how they managed without the first mate I can't think. Clever fellow, Finch! but wasn't it a curious trick of the poor skipper to box him up below here? I fancy he'd a guess we would all soon be under the mate's command! It's a queer thing the brain, isn't it, Mr Collins? For exaumple, now, there's the captain, it makes him think something or other a clock near London, with everything accordingly! Macleod fancies it a soopernatural knell, and twaddles about some Calvinist stuff he learned at school. Then you and me, you know, imaugines it's a bird--now, which is it after all? _Nothing_--maybe, eh?' The fellow capped all with a sneer, as much as to say I was a fool, which I had stood from him several times before; though now I could have kicked him, more for his heartless way than aught else. 'I tell you, Mr Small,' said I, 'what I think _you_--you're neither more nor less than a----' but I turned on my heel. 'I'm off, however,' said he, 'to turn in again.' "Through the half-closed door one could see the sick man's face sleeping so quiet in the shadow from the lamp, you heard not a breath. I looked up the after-hatchway. It seemed still quite dark; and a patch of the deep dark-blue sky showed high over the square opening, with two or three keen sparks of stars, green ones and blue ones--you'd have thought the ladder, short as it was, went up to somewhere clean above the world. But the moment I got on deck, I saw it was really lighter--the heavy fog creeping slowly astern of the ship on both hands; the white mist rolling faster over it before the sea-breeze against her bows, which had swung seaward by this time from the tide, that rushed like a mill-stream upon both her tight cables; while the muddy river-water, bubbling, eddying, and fronting away past, spread far up in the middle, into the dusk astern. _Such_ a jabbering, croaking, hissing, shrieking, and yelling, too, as burst into one's ears out of the dark, as if whole legions of monkeys, bull-frogs, parrots, paroquets, and what not, were coming together full upon us from both sides, one band nearer than the other; till the heavy boom of the surf round the point, and the roar of the tide coming in over the shallows about the river-mouth, pretty well drowned it. "The sudden change was a good relief, Babel though it seemed after the closeness below, with what had been going on; and I looked ahead towards the sea, which lay away out off our larboard bow, round the headland, and over the opposite point; a cold watery streak of light showing it from where the breakers rose plunging and scattering along the sandy bar, to the steady grey line of horizon, clipped by one of the two brown chops we had got into. It looked dreary enough as yet, the mouth of it being wider than I'd fancied it from seaward at night; though even with full water over the long spit of sand in the middle, there was no draught at all for the Indiaman except by the channel betwixt it and the bold point to our right; and pretty narrow it appeared from our present berth, heaving, as it did, with the green swell that set in, while meantime the mist scudding across the face of the headland let us see but the hard lump of bare black rock underneath. "In less time than I've taken to speak, however, the full space of sky aloft was turning clear, the sea far away suddenly shone out blue, with the surges tipped white; you saw a sparkling star high over it sink slowly in, and the fog spread off the water near us, till here and there you caught the muffled-up shape of a big tree or two looming through, not half-a-mile off our starboard quarter; the mist creeping over the headland till the sharp peak of it stood out against its shadow on the shoulder of a hill beyond, and old Bob Martin's single clump of cocoas on the rise waving in landward from the brisk sea-breeze. "One passenger after another came peeping sleepily out of the companion-hatch at the men clearing away the wreck of the spars, and swabbing the quarter-deck down; but scarce had Smith, one of the young writers, reached the poop, when he gave a shout that covered both poop-ladders in no time, with people scrambling over each other to get up. Next minute you'd have fancied them a knot of flamingoes with their wings out, as the bright red daybreak brought out the edge of the woods far astern, through a hazy lane in the purple mist, topped so with stray cocoa-nut trees and cabbage-palms, dabbled like brushes in the colour, that they scarce knew them to be woods at all, and not a whole lot of wild savages fresh from other business of the kind, coming down with all sorts of queer tools upon us; more especially when one heard such a chorus of unaccountable cries, whistling and screaming, as seemed to struggle with the sound of the sea ahead of us, and the plash alongside. "The huge round sun struck hot crimson along the far turn of the reach, with all manner of twisted blots upon _him_, as it were, and the very grass and long reeds seemingly rustling into his face, so one didn't for the moment know him either; while the muddy chocolate- eddies, sweeping and closing beyond the ship's rudder, glittered and frothed up like blood; and every here and there, along the streak of light, the head of a log or a long branch came dipping up terribly plain--no wonder the old _Seringapatam_ had apparently turned tail to it all, ready to bolt if she could. "Almost as soon as you took your hands off your eyes, though, and could see without a red ball or two before them--_there_ was the nearest shore growing out toward our starboard bulwark all along, crowded with wet green woods, up into steaming high ground--all to eastward a dazzle of light, with two or three faint mountain-peaks shooting up far off in it, and a woody blue hill or so between; while here and there a broad bright hazy spoke of the sun's great wheel came cutting down into the forest, that brought out a patch full of long big leaves, ten times greener than the rest, and let you look off the deck into the heart of it amongst the stems over the bank. The jabber in the woods had passed off all at once with the dusk, the water deepening over the bar, and the tide running slower, so that everyone's confused face turned breathless with delight as it grew stiller and stiller. "The whole breadth of the river shone out by this time, full and smooth, to the opposite shore three times as far away, where the wood and bulrushes seemed to grow out of the water; a long thick range of low muddy-looking mangroves, with a cover of dark green, rounding from the farthest point one saw, down to some sandy hummocks near the mouth, and a ridge of the same drifted up by the wind off the beach. Beyond that side there was nothing, apparently, but a rolling sweep of long coarse grass, with a few straggling cocoa-nut trees and baobabs, like big swollen logs on end, and taken to sprouting at top: a dun- heave of land in the distance, too, that came out, as it got hotter, in a long desert-like, redbrick-dust sort of a glare. The sole living things to be seen as yet were some small birds rising up out of the long grass, and the turkey-buzzards sailing high over all across, as if on the look-out. "The air was so cool and clear, however, from the tornado overnight--not a cloud in the sky, and the strange scent of the land reaching us as the dew rose off it--you could see far and wide, with a delicious feeling of it all, that kept everyone standing fixed on the spot where he first gained the deck, even the men looking over their shoulders with the ropes in their fists, and the fresh morning breeze lifting one's hair. Surprised as the passengers were, nobody spoke a word, except the three or four children shouting, dancing, and pointing together, without being noticed, till, all at once, the whole poopful burst into one confusion of questions and exclamations, running hither and thither, shaking hands and jostling each other like distracted people. "I had a spy-glass at my eye, making out the other shore, when, turning round in the middle of it, the first thing I saw was Violet Hyde's face, as she stood with one little foot on the stair-head behind me, holding the rail with one hand, her eyes sparkling, and her parted lips murmuring like one in a dream: 'Oh, Mr Collins!' exclaimed she, breathless; 'what is this? Where are we--is it Fairyland? A _river_!' 'Yes, in Africa,' I said; 'but whether it's the Bembarooghe or the----' 'That fearful, fearful evening!' continued she, shuddering: 'I saw the frightful sky, and heard the storm--and now!--_Were_ we not in some very great danger, sir?' 'Yes, ma'am, we were,' replied I, as stiffly as I could; 'but, happily, it's over now!' And I gave my cap a lift to move off, uneasy as I was, every moment, lest Sir Charles should catch me speaking again to his daughter. However, Miss Hyde was gazing eagerly at the land, and I had to wait. 'What lovely, lovely green!' she half whispered: 'oh, if one could only tread upon it!--so un-English those strange tall trees look! are they not cocoa-nut trees and--and----' Suddenly, her voice faltered, and she turned round with her bright blue eyes swimming in tears--'How--how thankful we should be that we are not--like our poor, poor friends, who were lost!' exclaimed she. I thought of the poor captain below in his cot, but next moment I was explaining, to her sheer amazement, how the real truth of the matter stood, though, if possible, it seemed to horrify her still more. 'I can't think what they may be,' I rapped out; 'but if I had the command of this ship, I'd up anchor this very hour, and go out--at least as soon as the tide ebbed; but, at any rate, at the Cape I mean to get hold of some schooner or other, and if it were to China, why, I'll cruise after 'em till I----' 'Then you think,' began she, and an arch inquisitive sort of look danced in both her eyes as she turned away to watch the shore again, saying slowly, 'You _are_ a--a naval gentleman then, Mr West--Mr Collins?' I tried to stammer out something by way of an explanation, but it wouldn't do, and I said, 'At any rate, I'm no better, by this time, than an idler aboard _here_, ma'am!' "All at once, I caught a side-look from her eyes, that wasn't meant for me, as she glanced over the poop-netting. Half provoking and half sweet it was, though, and it made my brain somehow or other seem to spin round, till a little after, before I well knew what I was about, I was holding the long spy-glass for her to see the bank of the river--her warm breath coming on my ear as I stooped before her, near enough to have kissed the muslin on her shoulder, while her rosy mouth changed with every new spot that the glass brought near; and she had to hold one taper forefinger on the other eyelid to keep it shut, so that I could dwell on her face as if she'd been asleep. 'There, there!' exclaimed she, 'are actually flowers--with such immense leaves! And now--an enormous tree, with roots hanging from the branches, and other stems growing up into them. Why, yes!--is not that a banyan-tree, Mr----?' and she looked away at _me_, when of course the tree was vanished, and instead of that, the rather undeniable expression of a fellow in love, two or three inches off, bent fair upon her. Violet Hyde a little, and looked in again. 'And, I think,' continued she, 'I see--oh, two such beautiful creatures--deer, I think, coming out to drink from the river!' All this time, the ecstasies of the rest kept up the noise and confusion; the young lady's-maid was gaping open-mouthed at the shore, not even noticing her young mistress's straw bonnet fall off, and I had just picked it up with one hand, to put it quietly over that matchless nut-brown hair of hers, shining suddenly in the sun, like silk, when the judge's voice rang out sharp from the other stair, 'Violet, child, you'll have a sunstroke. Kitmagar, you scoundrel, _beebee sahib punkah lao_, sirrah!' I held on to the telescope like grim death, while that eternal punkah was hoisted over us both, the judge eyeing me somewhat coolly for the first moment. 'Well, well, Mr Westwood,' said he, however, 'you've got rid of that proud freak of yours; such behaviour as yours yesterday, I assure you, I shouldn't have endured from anyone else, young man! But, my dear boy,' added he, suddenly, 'from what I can gather, indeed, saw myself last night, I am convinced we owe you a very great deal--even, I suspect, the safety of the entire vessel!' Miss Hyde had left off using the glass, and, as I stood up, she gave me a quick glance of amazement. 'Mere chance, sir,' I stammered. 'Why,' said Sir Charles, 'I saw you at the steerage in the middle of the hurricane, when I believe the actual officers of the ship had left it in dismay. I tell you what, Mr Westwood, you're a bold fellow; and your uncle and I must see in India if we can't reward you in some way, my dear boy!' All this fondling style of thing, and for little more than a piece of luck, would have disgusted me if I hadn't been more taken up with watching the side of Violet Hyde's face, as she listened for sounds in the woods ashore. 'Strange, wasn't it, Violet, my dear,' continued he to his daughter, 'that my friend the Councillor's nephew should have gone out in the same Indiaman, so fortunately--though, of course, after all, it _was_ the first this season.' 'Ah!' said she, starting, 'I beg pardon, papa--what did you--weren't you talking of the river?' 'Don't you hear, child,' said the judge, 'I said it was a curious coincidence, Mr Westwood's going in this vessel.' 'Oh yes, indeed!' answered she, and couldn't help looking down a little confounded. But the lady's-maid was putting on her tiny slipper, which had come off, while her father mentioned that of course I'd had practical reasons for not owning my profession hitherto; meaning, I suppose, that I didn't speak for fear of having to work, like the monkeys--though the sharp old lawyer must have had a better guess by this time, and queer enough it must have been to see her face, listening to him as he explained it all. I stood biting my lips, meanwhile--two or three times on the point of telling him it was all nonsense about my being a nephew of any hanged old nabob whatever; when Sir Charles said carelessly he should leave the _Seringapatam_, if possible, at the Cape of Good Hope, as he couldn't trust safely to the present officers. "Just then up got the merry chant of the men running round with the capstan-bars, to get up anchor; the chief officer wishing, as it was found, to carry her farther into the river with the breeze--for the sake of filling our water-casks the easier, according to him, but more likely out of sheer spite at what had been done without him. What with eagerness in the cuddy to get on shore and see the woods, the breakfast below was a rare scene, no one minding what he did, even to rushing slap into a couple of ladies' berths for his boots, or laying a couple of loaded Joe Mantons into somebody's bed, swallowing biscuit and butter on the way. "Suddenly, we heard the splash of paddles in the water, with a hail in some foreign tongue or other, and hurried on deck in a body; where we found the ship tiding it slowly up, under jibs and fore-topsail, and beginning to open a longer reach where the river seemed to narrow in. A black-eyed, black-bearded fellow, with a tallow, yellow, sweaty sort of complexion, in a dirty jacket, drawers, and short boots, and an immense grass hat, shouting Portuguese louder and louder into the first mate's ear, till he actually put both hands together, and roared through them, pointing to himself now and then, as if surprised he wasn't known. "All at once, evidently quite disgusted, he turned and looked over the side, saying something to one of the ugliest and most ill-looking mulattoes I ever saw, who sat in the stern of a long rough canoe, hollowed out of some tree, with two naked black rowers, less of the real <DW65> than himself, as they leant grinning up at the bulwarks with their sharp teeth, that appeared as if they'd been filed to a point. The mulatto gloomed, but he gave no answer, and as one of the cadets and I knew a little Portuguese, we managed together to get something out of the fellow on deck, though, at noticing him for the first time that morning, I saw Finch turn red with surprise. "We understood the man to ask if we wanted nothing particular in the river, the meaning of which I saw better on bethinking me of the fire along the bush inside the headland, that had let me see the marks of it--no doubt a signal to some craft they had taken us for. However, so soon as he heard we needed no more than water and spars, after musing a minute, and speaking again to Rodriguez, as he called the mulatto, he said he would pilot us to a convenient berth himself, for two or three dollars; notwithstanding his title was, as he said, Don Jose Jeronimo Santa somebody, commandant of the Portuguese fort something else. The river, we found, was the Nouries or the Cuanene, where they had a settlement called Caconda, a good way up; a remarkably bad country he gave us to know, and not worth staying in, from the number of flies, and the elephants having got into a cursed way of burying their tusks--except, he hinted, for the plenty of blacks, all anxious to be sold and to see foreign countries; but the trade was nothing yet--absolutely nothing, said he, blowing his nose without a pocket-handkerchief, and suiting the act to the word, as he mentioned his notion of throwing it up and going farther north-west. "By this time we had stood over to the lowest shore, till you could see the thick coffee- mud in among the roots and suckers of the dark-green mangroves, with their red pods bursting under their rank-looking leaves--and over them, through the tall coarse guinea-grass, to the knots of feathery cocoas behind, swarming with insects; when he gave the sign to go about, one of his blacks heaving a lead, and grunting out the depth of water, as the ship made a long stretch across towards the woody side again, and Don Jose all the time taking it as easy as if the quarter-deck were his own, while he asked for a cigar and lighted it. Joke though he did, yet I couldn't like the fellow at all; however, as soon as she got pretty near the shore, about a quarter of a mile from what seemed a wide creek, glittering up between a high fringe of cane and bamboo clumps, he had the sails clued up, a single anchor let go in four or five fathoms, and our Portuguese friend got his money and bundled over the side, pulling quietly ashore. CHAPTER XVI "The tide by this time was quite still, and the breeze sank almost at once, as we were shut in from the sea, when we were surprised to see the striped Portuguese flag, rise off a tall bamboo stick, among the bushes on the open shore, nearly abreast of us, where a low muddy-like wall was to be made out, with something of a thatched roof or two, and a sort of rude wooden jetty running before it into the water. Shortly after, Don Jose came paddling out again, and got on board, this time with an old cocked hat on, excusing himself for not having fired a gun--which was to save us expense, he remarked, being particular friends--seeing that he'd got to demand twelve dollars of harbour dues and duties, whereas, if he saluted, he must have charged fourteen. The cool impudence of this brought the chief officer from the capstan; but the steady face of the fellow, and the glance he took round the deck when the cadet told him he'd better be off at once, made me think he had something or other to back him. Mr Finch, as usual, fumed up into a passion, and told the men to fling him over into his canoe, which they accordingly did, without the least nicety about it; the Portuguese next minute picking himself up, and standing straight, with the look of a perfect devil, as he shook his fist at the whole ship, while the canoe slid off to the shore. "Budge even so much as a single fathom, at present, we could not; and most of us were too much in the spirit of fun and venture to care a fig for having made an enemy of Don Jose So-on, as the cadet called him; indeed, it seemed rather to set a finer point on people's admiration of the green jungly-looking shore next to us, with its big aloes and agaves growing before the bush, and all sorts of cocoas, palms, monkey-bread, and tall white-flaked cotton trees, rising in every way out from over the rest. For my part, I thought more of the Portuguese _interest_, after all, than his hatred--which proved correct, by his soon sending out a sulky message by the mulatto, offering to sell us fowls and a bullock, at no ordinary price. However, all hands from the cabin were mad already to get ashore somewhere, and the cadets, bristling with fowling-pieces and rifles, each singing out that he was ready to supply the whole ship with fresh meat; so the mulatto had to sheer off, with a boat nearly lowered over his head. "From where we lay at the time, what with the large creek off one bow, and the broad river ahead of us, spreading brimful along to the light, the water had the look of a huge lake, fringed in by a confused hazy bluish outline steeping in the heat, where the distance clipped behind the lumps of keen verdure, showering over a dark mangrove-covered point. Before the two large quarter-boats could be got ready for the ladies and the rest of us, in fact, we heard the gigful of writers and cadets beginning to pop away at everything they saw alive, out of sight of the ship, till at last we were afloat, too, pulling slowly into the middle of the stream, and the men eyeing us lazily as they turned-to about the rigging, to send up new spars in place of those lost. The old Indiaman's big bows stood looming up broad astern of us on the sluggish eddies round her cable, with her tall, steady forespars and furled yards rising white against the low line of marshy shore in the distance, and wavering in her shadow below, till the thick green branches of the next point shut her out, and the glare off the face of the creek shot level over all of us in the two cutters, wild with every kind of feeling that India passengers could have after two months' voyage. "For my own part, I should have had rather a suspicion how absurd it was to go a-pleasuring in an African river we knew nothing about, especially when I saw that a day or two so long after the rains might suck it up, during ebb, into a pretty narrow mid-channel; all I thought of was, however, that I was steering the boat with Violet Hyde in it, the kitmagar holding his gaudy punkah over her before me, while the judge, with his gun in his hands, was looking out as eagerly, for the time, as the four griffins were pulling furiously, in spite of the heat that made the sweat run into their eyes. "The other party were soon off ahead of us up the main river, under care of the Scotch surgeon, laughing, talking, and halloing in chase of the cadets who had first left. However, Sir Charles thought there was more likelihood of game along the creek, and the ladies fancied it something new, so I steered right into it; the fat midshipman, Simm, watching me critically as I handled the yoke-lines, which he had given up to me in a patronising way, and the sailor in the bow regarding the exertions of the griffins with a knowingly serious expression, while he dabbled his flipper at ease in the water. "As the tide steadied, this said creek proved to be a smaller river, apparently from the hilly country I had noticed beyond the woods, by the clearness of its current, that showed the pale yellow reflection of the close bamboo-brake on one side, deep down into the light--the huge, sharp, green notched aloe-leaves and fern showing here and there out of it--the close, rank, stifling smell of rotten weeds and fungi giving place to the strange wild scent of the flowers, trailing and twisting in thick snaky coils up the stems on our opposite hand, and across from branch to branch, with showers of crimson and pink blossoms and white stars; still, eager as the ladies were to put foot on land, 'twas no use looking as yet for a spot of room, let alone going farther in. "The cadets were not long in being blown, either; when the midshipman, the bowman, and I, had to relieve them. However, _then_ I could look straight toward Violet Hyde's face, the shade of the scarlet punkah hanging over it, and her soft little straight nose and forehead catching a flickering burst from the leaves as we sheered at times under cover of the bank; while her eyelids, drooping from the glare, gave her bright eyes a half-sleepy sort of violet look, and it was only her lips that let you see how excited she felt. The griffin who had the tiller steering with the judgment of a tailor's 'prentice on a picnic to Twickenham, we came two or three times crash into the twigs of some half-sunk tree; then a blue bird like a heron would rise direct ahead of us, with its tall wet spindle legs and spurs glistening like steel behind it into the light, and a young snake in its sharp bill; or a grey crane rustled out of the cane from overhead, its long wings creaking in the air out of sight. Suddenly, you heard a long chirruping croak from a tree-frog, and the ground ones gave full chorus from farther in, whining and cackling and peep-peep-peeping in one complete rush that died as suddenly away again, like thousands of young turkeys. Then out in the midst of the quiet would come a loud clear wheetle-wheetling note from some curious fowl in an opening, with another of the same to match, dimmer amongst the thick of the bush. However, everything of the kind seemed to sink down with the heat at noon, the very buzz of flies round every dark feather of the cocoas, and the mosquito-hum along the bank, getting fainter; till one _heard_ the heat, as it were, creeping and thrilling down through the woods, with the green light that steeped into both edges of the long creek; every reed, cane, leaf, and twig, seemingly, at last giving it back again with a whispering, hushing crackle, and the broad fans of the palms tingling in it with rays from them, as they trembled before you in the glare, back into the high bundles of knotted and jointed bamboo, with their spiky-tufted crowns. "'Can you not almost _feel_ the forest grow!' exclaimed Miss Hyde; while the boat floated quietly to one side, and her charming young face shining out from the punkah, before Master Gopaul's deucedly ugly one, coolly staring past his snub nose, made one think of a white English rose and a black puff-ball growing together under a toadstool; plenty of which, as red as soldiers' coats, and as big as targets, looked here and there out of the bank. It put new spirit into me to see her, but still we could do little more than shove across from one side to the other--till something all at once roused us up in the shape of a long scaly-like log, seemingly lying along in the sun, which tumbled off the edge with a loud splash, and two of the young fellows let drive from their fowling-pieces, just after the alligator had sunk to the bottom. Rather uncomfortable it was to come sheering right over him next moment, and catch a glimpse of his round red eyes and his yellow throat, as the mud and weeds rose over him. "The other ladies shrieked, but Violet Hyde only caught hold of her father's arm and started back; though her blue eye and the clear cut of her pretty nostril opened out, too, for the moment her lips closed. Five minutes after, when a couple of large guinea-fowl sprang up, Sir Charles proved himself a better shot than the cadets, by dropping one of them over the water ahead of us, which was laid hold of by the reefer of the Indiaman, and stowed away fluttering into the stern-locker--Simm observing coolly that it was a scavengering carrion sort of bird, but perhaps one of his messmates might like to take it home stuffed to his sister. The judge merely smiled and patted the mid on the shoulder, remarking in great good-humour that he, Simm, would make a good attorney; and on we held, soaking to our shirts and panting, until the bowman hooked down the stem of a young plantain, with a huge bunch of full ripe yellow bananas under the long flapping leaves at its head, right into the midst of us, out of a whole clump of them, where the smooth face of the cove showed you their scarlet clusters of flowers and green round pods hanging over it, hidden as they were from above. Every man of us made a clutch, and the stem almost lifted Simm out of the boat with it, as it sprang back into the brake, rousing out a shower of gaudy- butterflies, and a cloud of mosquitoes, and making the parroquets scream inside; while the cadets' mouths were so full they couldn't speak, the reefer making a gulp with the juice seeming to come out at his eyes, the sailor spitting out his quid and stuffing in a banana, and the ladies hoping they were safe to eat, as I peeled the soft yellow rind off, and handed one to Violet Hyde, which she tasted at once. But if ever one enters into the heart of things in the tropics, I'd say 'tis when that same delicious taste melts through and through and all over you, after chewing salt-junk for a space. I remember one foremast man, who was always so drunk ashore he used to remember nothing in India but '_scoffing_[23] one juicy benanny,' as he called it; 'but hows'ever, Jack,' he'd say, ''twas blessed good, ye know, and I'm on the look-out for a berth again, jist for to go and have another.' One of us looked to the other, and Miss Hyde laughed and a bit when I offered her a second, while her father said, full five minutes after, ''Gad, Violet, it almost made me think I saw Garden Reach in the Hooghly, and the Baboo's Ghaut!' [23] _Anglice_, eating. "This whole time we couldn't have got more than three-quarters of a mile from where the ship lay, when, all at once, the close growth on our left hand began to break into low bush, and at length a spot offered where we might get ashore tolerably, with two or three big red ant-hills heaped up out of the close prickly-pear plant, and the black ants streaming over the bank, as well as up the trunk of a large tree. The monkeys were keeping up a chattering stir everywhere about; and two or three bright green little lizards, changing into purple and back again, as they lay gleaming in the sun on the sides of the ant-heaps, darted their long tongues out like silver bodkins at the ants coming past. In we shoved with a cheer, and had scarce moored to the tree ere the ladies were being handed out and tripping over the ground-leaves to the ankles, starting on again at every rustle and prick, for fear of snakes; till the bowman in charge was left in the boat by himself, and, there being seven of us with guns over our arms, the next notion of the griffins was to get a sight of some 'natives.' "In fact, there was a sort of a half-track leading off near the bank, through among the long coarse grass and the ferny sprouts of young cocoas, and a wide stretch of open country seen beyond it, dotted all over with low clumps of trees and bush rounded off in the gush of light, that gave it all a straw- tint up to where a bare reddish-looking ridge of hill looked over a long swell of wild forest, off a hot, pale, cloudless sky. Here and there you saw the shadow of one bluff lying purple on the side of another, and a faint blue peak between, letting north'ard into some pass through the hills, but no signs of life save a few dun big-headed buffaloes feeding about a swampy spot not very far off, and rather too shaggy, by all appearance, to make pleasant company. Accordingly, we held for a few yards under the shade, where the fat mid, thinking to show off his knowingness by getting cocoa-nuts for the ladies, began to shy balls of mud from the creek-sides at the monkeys in the trees. "However, he brought us rather more than he bargained for, till the whole blessed jungle seemed to be gathering between us and the boat to pelt us to death with nuts as big as eighteen-pound shot, husks and all; so off we had to hurry into the glare again, Sir Charles half-carrying his daughter through guinea-grass up to the waist--when somebody felt the smell of smoke, and next minute we broke out near it, wreathing up white from inside a high bamboo fence, propped up and tied all along with cocoa-nut husk. 'What the devil!' shouted the foremost cadet, as soon as he found the opening, 'they're cannibals!--roasting a black child, by heaven!' and in he dashed, being no chicken of a fellow _ashore_ at any rate, the others after him, while the judge, Simm, and I kept outside with the ladies, who were all of a shudder of course, what with the thought, and what with the queer scent of roast meat that came to us. 'Ha, ha!' laughed the cadet next moment, 'it's only a monkey, after all!--come in, though, Sir Charles, if you please, sir--nobody here, ladies.' "There, accordingly, was the little skinned object twirling slowly between two bamboo sticks, over a fire beneath two or three immense green leaves on a frame, with its knees up not to let its legs burn; about a dozen half-open sheds and huts, like little corn-stacks, thatched close with reeds, and hung with wattled mats of split bamboo, giving the place more the look of a farmyard than a village; as there was a big tree spreading in the middle, a few plantains, yams, and long maize-stalks flowering out of the coarse guinea-grass which the <DW65>s hadn't taken the trouble to tread down all round inside of the fence. "However, we weren't long of perceiving an old grey-headed black sitting on his hams against the post of a hut, watching us all the time; and a villainously ugly old thief he looked, with a string of Aggry beads about his head, and a greegree charm-bag hung round his shrivelled neck, which was stuck through a hole in some striped piece of stuff that fell over to his knees, as he sat mumbling and croaking to himself, and leering out of the yellows of his eyes, though too helpless to stir. Something out of the way attracted my notice, glittering in front of the hut over his head; but, on stepping up to it, I wasn't a little surprised to find it the stern-board of some small vessel or other, with the tarnished gilt ornament all round, and the name in large white letters--'_Martha Cobb_'--the port, Boston, still to be made out, smaller, below. This I didn't think so much of in itself, as the craft might have been lost; till, on noticing that the old fellow's robe was neither more nor less than a torn American ensign, in spite of his growls and croaks I walked past him into the hut, where there was a whole lot of marling-spikes, keys, and such like odds and ends, carefully stored up in a bag, marked with the same name, besides a stewpan with some ostrich feathers stuck where the handle had been, as if this rascally black sinner wore it on his head on state occasions, being probably the head man and a justice of the peace. "What struck me most, though, was a pocket-book with a letter inside it, in a woman's hand, addressed to the master of the brig _Martha Cobb_; dated a dozen years before, yellow and fusty, and with tarry finger-marks on it, as if the poor skipper, God knows, had read it over and over in his cabin many a fresh breeze betwixt there and Boston. I put it in my pocket, with a curse to the old black devil, as he croaked out and fell on his face trying to bite me with his filed teeth when I passed out, to follow the rest out of the bamboo-pen; wondering, of course, where all the other <DW64>s could be, unless they were dodging about the river shore to watch the Indiaman--little chance as there was of their trying the same joke with the _Seringapatam_ as with the _Martha Cobb_. "As for the women, however, I had scarce joined our party going out, when we met a half-naked black hag with a bunch of cocoa-nuts and husk. The moment she saw us she gave a squeal like an old hen, and fell flat, while several younger ones, jogging along with their naked black piccaninnies on their backs, turned tail and were off with a scream. Next minute we were almost as startled as they could be when three plump young jetty damsels dropped down right into the bushes alongside of us, off as many tall cocoas which they'd been climbing by a band round them, for the nuts. 'Mercy on us!' said the eldest of our lady passengers; and it _was_ rather queer, since they had nothing earthly upon them save very very short pet----I beg your pardon, ma'am, but I didn't know any other word. However, off they scampered for the woods, Simm and one of the cadets hard after them, and we turning away to smother our laughter, especially as the griffin had forgot his mother being with us. The middy being first started, he was a good way ahead, when all at once the sternmost of the black girls tripped in the band she had over her shoulder, Simm giving a cheer as he made prize of his chase; but scarce before the whole three of the dark beauties had him smothered up amongst them, laughing yelling, and squalling as they hauled him about; till I saw the dirk Simm sported glitter in one of their hands, and I made towards the spot in the notion of their finishing him in right earnest. "The black damsels ran off together as the unlucky reefer picked himself up, coming to us with his hair rubbed up like a brush, his cap out of shape in his hand, and the gold band off it, his red face shining, and all the gilt anchor-buttons off his jacket, besides being minus his dirk. 'Simm, Simm, my fine fellow!' said his friend the cadet, like to die with laughing, 'what--what did they do to you?--why, your head looks like a chimney-sweep's mop!' Simm knocked his cap against a tree to set it right, without a word, and we followed the others to the boat, where he swore, however, that he'd kissed 'em all three, at which Mrs Atkins fairly took him a slap on the side of the head, saying he was a nasty, improper boy, and she was glad _his_ poor mother couldn't see him run after creatures of that kind in African woods. 'Natives, indeed!' said she, 'I have heard so often of native modesty, too, in books; but, after all, there's nothing like experience, I think, Sir Charles?' 'Certainly not, ma'am,' replied the judge, humouring her, as she hadn't often had the chance of speaking to him before; ''tis almost as bad in India, though, you know.' 'Oh, _there_, Sir Charles,' said the lady, 'I never happened to go out, of course, except in the carriage!' 'Ah,' said the judge, coolly, 'you should try an elephant, sometimes, ma'am.' "After this, as Sir Charles was bent on getting a shot at something better, with a glass or two of Madeira to refresh us, we pulled farther still up the small river, passing the mouth of a deep marshy inlet, where I noticed a few long canoes belonging to the Congo village we had seen; the close, heavy heat of the woods getting, if possible, worse; and the rank green growth topping up round us as flat as before; when the sound of a loud rush of water up-stream broke upon us through the bush to northward, the surface rippling, and a slight cool breath seeming to flutter across it now and then, the very noise putting fresh soul into you. Suddenly we opened out on a broad bend, where it was hard work to force her round, and next moment a low fall was gleaming before us, where a hill-stream came washing and plashing over one wide rocky step above another in the turn, then sweeping out of a deep pool to both hands, and running away ahead, in between the spread of trees, seemingly to a sort of a lagoon, where you saw the light in the middle glancing bright down upon its face. A broad blue burst of air and light struck down along the hollow the stream rushed out of, off the roots of a regular mountain, leaning back to the sky, with its big tufted knolls and its shady rifts thrown out blue beyond one or two thick scaly-stemmed date-trees, waving their long, feathery, fringe-like leaves to the least bit of a breeze, on as many rough points near at hand; the _whole_ shape of the mountain you couldn't see for the huge mahogany-trees, teak, and African oak, rising up over one shoulder into a lump of green forest. In five minutes more we were through into the lagoon, which very possibly took round into the main river again, only the opposite end, to our surprise, was all afloat with logs of big timber choking it up, so that there we must stick or go back upon our wake. "However, the lagoon itself being broad enough and round enough in all conscience, with a deep hollow opening up out of it on the high ground, the judge and the cadets thought a better place couldn't have been chosen for landing after a little sport, while we left the fair ladies to rest in the cool, and look at the lotus-lilies spread all over one cove of it, floating white on their large leaves. The green edge of scum ran about the black shadow on the rest of it, gathering round where a big branch or two had fallen in, with the hot white sky looking bluer out through the broad leaves coming together aloft, and the showers of little sharp ones in the tamarind twigs, mangoes, ironwood, sumach, and all sorts, while here and there a knot of crimson blossoms looked out from under the boughs in the dark, humming with small flies. Beautiful spot as it was every way, especially after the heat, yet I didn't much like the idea of letting the ladies stay by themselves, except the sailor and the kitmagar. Nothing particular had turned up to trouble us, certainly, but I daresay 'twas because there was _one_ of them I never looked at without her soft fairy-like air making me think of something that might happen to her, life-like though she seemed. When I saw a big branch over her head, I kept fancying what it would do if it fell--and now, the thumping slabs and stones we scrambled over up into the gully toward the mountain, seemed to have come tumbling down off it to the very water's edge, covered with nets of thick creeping plants and trails of flat, fingery-leaved flowers, such as you see in hot-houses at home. A few yards higher, too, where the ground broke away into a slanting hollow out of the bush, 'twas all trampled and crushed, half-withering together in the heat of the sun, the young trees twisted and broken, and two or three good-sized ones lying out from the roots, which I set to the score of the timbers rolling down their logs, for some craft that evidently got their cargoes hereaway. "After all, the thought of a slap at some wild game was tempting enough, the judge appearing to consider anyone but a sportsman nobody at all; so up we went behind him out of the gully till we were all blowing like so many porpoises on the head of it, Sir Charles raising his finger as we peeped across a grassy <DW72> right under us, where a whole drove of small slender-legged antelopes were feeding. We had just time to rest, getting a breath of air off the heights, when one of the foremost lifted its head, listening the opposite way from us; next moment the entire scatter of them came sweeping direct over to leeward in a string--we could almost catch their bright black eyes through the grass, when the crack of our seven barrels turned them bolt off at a corner, and they were gone like wind on water. All of us had missed save Sir Charles Hyde, but his rifle-bullet had sent one of the antelopes springing up in the air ten feet or so, rolling over and over into the grass again, where we found it lying with its tongue out, and its large eye glazing amidst the blades and dust--a pair of huge turkey buzzards falling, as it were, out of two specks in the sun above us, already, and rising with an ugly flap while we got round the dead creature. "Hallo!' said the mid suddenly, looking back over toward the hollow we'd come out of, 'what's that?' "From where we stood we could just see through the wild cane to the mouth of the gully, half-a-mile down or more, leading upon the trees by the lagoon. I thought I could hear a dull heavy sound now and then going thump thump down the hollow and along it, the stones rumbling from one spot to another at the root of the hill; but noticing a light smoke rising farther into the course of the creek, with a faint echo of axes at work somewhere in the woods below, I wasn't sorry to find the timberers were still in the river, showing we weren't the only civilised folks that thought it fit to visit. Perhaps it might have been a quarter of an hour or more, however, and we were all looking out sharp for birds of any kind to pop at, happening to turn my head, I saw the long reeds were moving about the banks below and the trees twisting about furiously, and no sooner had I made a few paces than good heavens!--right in the break of the trees at the landing-place--_there_ was a huge brute of some sort coming slowly up out of the water; then another, and another, glistening wet in the bright light as the shadow of the branches slipped behind them. A blindness came over my eyes, and I had scarce time to make out the big block-like heads and moving trunks of five or six black African elephants, ere the whole case flashed upon me, and away I dashed full-speed down the <DW72>. The big beasts were turning quietly off into the hollow, and two or three of their calves trotted after them out of the bushes, munching the young cane-stalks as they lifted their pillars of legs and their tufty little tails, when I passed a fire of sticks blazing under a slab of rock, with the judge's guinea-fowl plucked and roasting before it from a string, the bowman's tarpaulin and his pipe lying near by--a sight that doubled the horror in me, to know he had left the boat at all; and no doubt, as I thought, taken fright and run off, man-o'war's-man though he was. I made three springs over the stones down to the water, terrified to look in, hearing it, as I did, splash and wash about the sides, up among the leaves of the trees, while a couple of monstrous brutes were to be seen by the light in the midst of it, still wallowing about, and seeming to enjoy sending the whole pool in wide rings and waves as far as it would go, with the noise besides; the one-half swimming and the biggest standing aground as he poured the water out of his long trunk all over his back, then broke off a branch and waved it to and fro like a fan round his flapping leathery ears. "Such a moment I hope never to know again--not the least sign of the boat could I see in the green black blink of the place, after the glare above, and I stood like a madman at the thought of what the herd of monsters had _done_ when they came suddenly down upon it; then I gave a wild cry, and levelled my ship's musket at the big elephant's head as he brought his small cunning eye slowly to bear upon me, dropped the branch, and began to swing his forehead, all the time looking at me, and wading out to the shallow--by Jove! my flesh creeps at it _just now_--though I couldn't have stirred for worlds till he was close enough for me to fire into that devilish eye of his. 'Twas no more than the matter of half-a-minute--till you may fancy what I felt to catch sight, all at once, of the cutter splashing up and down in the gloom below the branches, the ladies and the Hindoo crouching down terrified together, except Violet Hyde, who stood straight, holding the boat firm in by a bough, her white face fixed through the shadow, and her hair floating out of her straw bonnet each time her head went up among the leaves, with her glittering eyes on the two elephants. "Suddenly some heavy black figure dropped almost right over her into the boat, and she let go with a low cry, and sank down with her hands over her eyes; when they went sheering out towards the creek, the foretopman handling his boat-hook in her bow, without his tarpaulin. As for the wild elephants, I had just time to come to myself before the foremost had his feet on the stones below me, getting cautiously out of the pool; these awkward antics of theirs being possibly signs of too much satisfaction in a bathe for them to show aught like fury, if you didn't rouse them; so I was slipping quietly round the nearest tree when I heard the cadets halloing up the hill. The old bull elephant seemed a dangerous customer to meet, and I was hurrying over the dead grass and branches to give warning, just as Sir Charles Hyde could be seen coming down before the rest, his rifle over his shoulder. "However, he brought up the moment I sang out to stop: both the elephants were stalking off lower down into the hollow, and I dropped behind the slab where Tom Wilkes had been roasting his bird, when some fool of a cadet let drive at the bull elephant from above, hitting him fair on the front. You heard the rifle-bullet hit slap against it as if on an anvil: the she elephant made off at a fast trot, but the big brute himself turned round on the moment, lifting up his trunk straight aloft with a sharp trumpeting scream through it, and looked round till his small red eye lighted on the judge, who seemed quite out of breath from his sport. 'The fire! that fire, for God's sake, Mr Westwood, else I am lost!' called out Sir Charles, in a calm distinct key from where he stood with his eye fixed on the elephant, and could see me, too--a moment or two before the huge round-backed lump of a brute came running round into the track, stumbling heavily up the dead branches of the fallen trees and the dry guinea-grass, with a savage roar between his two white tusks--and I saw what the judge meant just in time to throw over the whole heap of flaming cocoa-tree husk among the withered grass and stuff a few yards before the monster, as dry as tinder, while the light air coming down the gully of the mountain, drove it spreading across his course up through the twigs, and sweeping in one sudden gust of fire up to the very end of his trunk. I saw it lift over the smoke like a black serpent, then another scream from the brute, and away he was charging into the hollow again, the flame licking up among the grass astern of him, and darting from one bough to another towards the cane-brake below. I had scarce drawn a long breath and remembered the devil's own thought that had come into my head, when the judge called to me, ere he slapped me on the shoulder. "'You did nobly there, my dear boy,' said Sir Charles; 'managed it well! 'Gad, it was a crisis, though, Mr Westwood!' 'I'm afraid, however, sir,' said I, eyeing the crackling bushes, smoking and whitening to a dead smoulder in the sunlight, then flashing farther down as the hill-breeze rustled off, 'I'm afraid we shall have the woods burning about our ears!' "Down we hurried accordingly, and hailed the cutter, where, scarce had we leisure to pass a few quick words and tumble in, before I heard a shout beyond the other turn of the creek, through the end of the lagoon; then something like the cheep of ropes through blocks, with the bustle of men's feet on a deck, and next minute a perfect hubbub of cries, whether Dutch, Portuguese, English, or all together, I couldn't say--only it wasn't likely the _last_ would kick up such a bother for nothing. Four or five Kroomen came leaping round and along the float of logs at the far end, their large straw hats shining in the light over their jet faces, as they peered across into the lagoon. The minute after they vanished we saw the white upper spars of a schooner slide above the farthest of the wood, and her bowsprit shoved past the turn just enough to show her sharp lead- bow, with the mouth of a gun out of a port, and a fellow blowing the red end of his match behind it. All at once the chorus of shouts and cries ceased, and a single voice sang out along the water, clear, stern, and startling, in bad Portuguese, '_Queren siete?_ who are you?' Still we gave no answer, quietly shoving off as fast as we could, the flicker of the fire in the brake behind the trees beginning to show itself through the black shade of the lagoon. '_Queren siete?_' sang out the voice, louder than before, in a threatening way, and the logs were knocking and plashing before the schooner as the Kroomen hauled at them to make an opening. 'Amigos! Amigos!' hailed we in turn; 'Ingleses, gentlemen!' shouted the cadet who knew Portuguese, calling to them not to fire, for heaven's sake, else they would do us some harm. With this, the hubbub was worse than before; they plainly had some design on us, from the confusion that got up; but by that time we were pulling hard into the narrow of the river, and took the fair current of it as soon as the boat was past the falling stream we had seen before, till we were round into the next reach. "In fact, the rate we all bent our backs at this time was pretty different from coming up: the cadets seemed hardly to feel the heat, fierce and close though it was, at thought of those that might be in our wake, and nobody spoke a word at ease till at last, after an hour's hard work, taking it in turns, we came full in sight of the Indiaman at her anchor on the broad current. The ladies blessed the very ropes hanging from her bowsprit, and we got safe aboard, where we found the two other boats had come back long before; and every one of us turned in directly after sundown, as tired as dogs. "Well, I didn't suppose I had slept an hour, dreaming terribly wild sort of dreams about Violet Hyde and elephants, then that I'd saved her myself, and was stooping to kiss her rosy lips, when a sudden noise on deck startled me. I shoved myself into my clothes, and rushed on the quarter-deck. She had gone aground at her stern in swinging in the water the Portuguese rascal gave her, canted a little over to starboard, away from the shore; and till morning flood nothing could be done to haul her off. The fog was rolling down with the land-breeze, and the jabber in the woods again thickened the confusion, when all at once a dim flash off the shore glimmered in the white fog, and a round-shot whistled just astern, pretty well aimed for her bilge, which would have cost us some work if it had hit. After that, however, there was no more of it, the fellow probably having spent either all his powder or his balls. As for his fort, I heard the chief officer swearing he would knock it about his ears next day--a thing that couldn't have done him much harm, certainly, unless mud were dear. "No sooner had the men gone below, leaving the ordinary anchor-watch, than Mr Finch, to my great surprise, walked up to me, and gave me a strange suspicious look, hinting that he began to have a good guess of what I really was, but if anything new of the kind turned up, said he, he should know better what to say to me. 'Mr Finch,' said I, starting, 'this won't do, sir--you'll either speak your mind before cabin and cuddy, or to-morrow morning, by Jove! you'll go quietly ashore with me, sir--as I think, now you remind me of it, we settled to do, already!' The mate's face whitened, and he eyed me with a glare of malice, as I turned on my heel and began to walk the quarter-deck till he went below. "However, the thought of the thing stuck to me, and I kept walking in the dark to get rid of it: the four or five men of the anchor-watch shuffling lazily about, and all thick save ahead up the river, where the land-breeze blew pretty strong, bringing now and then a faint gleam out of the mist. I was leaning against the fore-chains, listening to the ebb-time, and thinking, when I saw one of the men creeping in from the bowsprit, which you just saw, where it ran up thick into the dusk, with scarce a glimpse of the jib-boom and flying-jib-boom beyond. "The sailor came up, touching his hat to me, and said he thought he saw something queer off the boom-end. 'Well,' said I gruffly, 'go and tell your mate, then.' I didn't know the fellow's voice, though it had a particular twang in it, and he wasn't in Jacobs' watch, I knew. 'Why, your honour,' he persisted, 'I knows pretty well what you air--asking your pardon, sir--but I think you'd make more out of it nor any of the mates! It's some'at rather skeary, sir,' added he. Accordingly I took hold of the man-ropes and swung myself up the bowsprit, and had my feet on the foot-rope below the jib-boom, when I heard his breath, following behind me. 'Never you trouble yourself, my man,' said I; 'one at a time!' and back he went in board again--for something curious in his way struck me; but I wanted to see what he meant. I had just got near the flying-jib, half-stowed in as it was on the boom, and I fancied, with a creep of my blood in me, I made out a man's head over the sail; but next moment a hand like a vice caught me by the throat, and some one growled out, 'Now ye infernal man-o'-war hound, I have ye--and down you goes for it!' "The instant I _felt_ it, my coolness came back; as for grappling, I couldn't, and the ebb current ran below to her bows at a rate fit to carry one out to sea in half-an-hour. I saw the whole plot in a twinkling, and never moved; instead of that I gave a sort of laugh, and followed the husky twang of the other man to a tee. 'He won't come, Harry, my lad!' said I, and my ugly friend let go before he had time to think twice. 'He be blowed!' said Harry, scornfully; 'an' why won't he, mate?' He had scarce the words out of his mouth, though, ere I took him a twist that doubled him over the spar, and down he slipped, hanging by a clutch of the sail. 'I suppose, my fine fellow,' said I, 'you forgot Fernando Po, and those <DW65> adventures of yours--eh?' and I went in without more ado. "I hadn't been ten minutes on deck, however, when I heard both of them swearing something or other to the first mate. A little after Finch came forward to me, with a ship's lantern, and three or four of the men behind. 'Mr Collins, or whatever's your name, sir,' said he aloud, 'I believe you've been seen just now at the bowsprit-end, making signals or something to the shore! You're in arrest at once, sir, and no more about it!' 'What the deuce!' said I, my blood up, and pulling out a pair of pocket-pistols I had had in the boat, 'let me see the man to----' At the moment a blow of a handspike from near the mast laid me senseless on the deck, and I knew nothing more.--But I see 'tis too far gone in the night to carry out the yarn, ladies!" CHAPTER XVII "Well, ma'am," resumed the commander, "I came to myself again at last, but when, how, or where, I really did not know, nor even what had been the matter with me; except that I lay on my back upon something or other softer than the planks, my head aching like to split, and so stupid, I couldn't take the trouble to choose amongst the strange notions that came creeping over me. 'Twas pitch-dark, too, and choking hot. The sole wish I had was for a drop of water; but there I stuck in the same helpless plight, more like a nightmare than aught else; and as for _time_, if it went by what I felt, why, I might have lain, then and before, long enough for one of the Seven Sleepers. First one fancy, and then another, came looming up from over my brain, like a sail on the horizon, till my head was full of it. That ugly rascal's story got hold of me, and I thought I was stowed away below in some abominable slaver; then I was the sick captain lying in my cot dreaming, with all as still and dark as death. As my wits cleared, however, I began to hear plenty of sounds, as it were, buzzing and rustling and booming in my very ears, then far away again. Confused though I was, a horrid idea struck me as I tried to listen--that Finch and his understrappers had put me ashore in the woods or handed me over to some of those villainous blacks with the filed teeth; and the _Seringapatam_ must be gone, Heaven knew how long! "Suddenly, as if to clinch my notion, I started for a moment at the loud cry of a bell-bird, as I thought at first; but, the next instant, a sort of a thick crust seemed to clear off my hearing, and I knew it was 'two bells' going on deck, so that I was still on board; after which a regular bustle got up of a sudden overhead. I heard people running up the nearest ladder from below; cadets shouting and clattering, apparently with muskets and cutlasses; the creak of the davit-blocks letting down the boats, and the chief officer's voice alongside. What with my broken head, though, and the want of air and water, I felt too sick to give them a thought. It wasn't long, either, before the whole Indiaman seemed to be as quiet as a church, except one heavy pair of feet on the quarter-deck above; then that stopped as well, and I heard nothing but the dull sound of the tide through her thick outer-timbers, gurgling up and poppling along, like to make me mad for thirst. I put up my hand to my head, and found my hair on one side all sticky, and covered with cockroaches; but though the very touch of their bristly feelers made my blood creep, and the wretches began to dig with their pincers into the wound, I was too weak to keep brushing them away as fast as they swarmed about it. "It must have been rather some sort of swoon than a doze that I woke out of again, when I heard a man's voice not far off, through the stillness of the 'tween-decks, reading aloud, which I soon made out to be Mr Knowles's, the missionary's; and, from the key of it, it was evidently the Bible he was reading. In a little while he gave up, and another voice came in, that I knew still better. It was Violet Hyde's--low enough, but so clear at times, that it seemed to come into the dark where I lay half-senseless, and afterwards I could even call back some of the very words; then it came to a stand, and I heard her two or three times apparently answering someone I couldn't hear. All at once, the missionary struck up the first note of a psalm-tune, and her lovely voice slid into it, till there was nothing in the whole ship, as it were, but _that_--singing the old Evening Hymn--alone--such music, I thought, never was on sea or land--when down from some opening above, out of heaven, you might have fancied, fell a chorus like the sound of angels and cherubs joining in at the end, once and again; catching up the air out of her sweet tongue, and drowning it in a way to ravish one's soul, till it sank into a hush in which you could hear the missionary's voice rise, as he prayed aloud, over the whispers of the ladies and children stealing away from round the skylight--with the slight creak of the rudder, now and then, in its case abaft, and the tide bumping and tapping outside, from the deadwood at her counter to the hollow planking amidships. "As for me, at first blush I thought it all part of my queer visions, till somehow or other I began to revive a bit, and felt for the door of the place they had boxed me up into. However, it was fast enough, and as soon as I tried to stand upright, something over my head gave me a shove down again--it being evidently one of the steward's store-rooms abaft of the cuddy, full of bags and such like lumber, where the best I could do was to stretch myself on the heap of old canvas again, groaning from sheer weakness and desperation. Just then I heard a light step coming close past the door, out of the large cabin, and I gave another groan. A dress rustled, and the foot started to the other side of the passage. "'For God's sake open the door!' said I, in a faint voice. 'What--who--is there?' exclaimed Miss Hyde, anxiously; but my mouth was so dry I couldn't answer her. Next moment she was trying the handle, though to no purpose; for a little after I caught the sound of her footsteps hastening off, and once more my senses left me. It couldn't have been more than a minute or two, however, for I heard the missionary's voice still praying beside Captain Williamson's cot, when a gush of air suddenly revived me, and I sat up winking at a glare of light, in which Violet Hyde's face seemed to be hovering brighter than the lamp she had in her two hands, as she stood and gazed at me between wonder and dismay; while the steward held the door only half open behind her, peeping in at me with one eye like a fellow watching a hyena in a cage. 'Miss!--miss!' said he, trying to shove the door to again, 'take care--he's a pirate, ma'am, he is! The chief officer'll blow me up for it, your ladyship!' 'Mr Westwood!' exclaimed she, pushing it wide in spite of him, 'what--what is this!--you are all over blood, Mr Westwood! Oh, are you wounded?--what can be--run, run for something,' said she to the steward--'where is the surgeon?' 'The doctor's gone with the rest of 'em, miss,' said he. With this I took hold of something to scramble up, bringing down a bag of cabin-biscuit over me, and got on my legs in the midst of the dust; but grim enough I must have looked, with my face like a North American Indian's, and the cockroaches sticking in my hair, as I stumbled out of the corner. The little Cockney of a steward seemed to think me dangerous, for all I saw of him next moment was his striped gingham jacket vanishing round a bulkhead aft. 'Oh,' stammered I, leaning against the doorpost, 'it's--it's nothing, after all--only--a little water!' The truth was, my brain felt so confused still, that I really was not quite sure how the case stood--whether I hadn't in fact bowsed up my jib too taut that night, and tumbled on my head, or kicked up some row or other; so I suppose I must have looked rather ashamed, which the young lady appeared to notice, by the expression of her face as she moved towards the cuddy, and slipped quietly through one of the folding-doors. 'Hush!' said she, gravely, holding up her finger, as she came out again and closed it, carrying a couple of decanters and a glass; 'poor Captain Williamson seems asleep--he was removed there this evening for air.' As I drank one tumbler of water after another, I fancied the young lady watched me curiously; however, I had scarce quenched my thirst when my own ideas got clear enough, as well as my tongue, to give an offhand account of what had happened. Violet Hyde started, and her voice faltered, as she said, 'Then--then you must have been shut up here all day--oh, how cruel of them! so hot, too! Oh, what a wonder you were not actually----' 'All day!' said I--'what day is it, then, Miss Hyde?' 'It is Sunday evening!' answered she, the tears rushing somehow or other into her eyes. 'Oh, how glad I am that I happened to pass! But your head--what a dreadful wound you must have got, Mr Westwood!' continued she; 'something must be done to it, _indeed_!' "What the sweet young creature hesitated and blushed about for the first time, I never guessed; but I can't help thinking that anything short of an angel would have laughed at the ridiculous figure I must have cut, with powdered biscuit added to the blood, the hair, and the cockroaches--although my worthy friend's handspike from behind the foremast had laid the bone bare, so that the bleeding saved it from a lump. I hardly know how it came about, but, five minutes after, there I was sitting on the planks of the 'tween-decks, while the charming girl herself stooped over me with a basin in one hand and a sponge in the other--the muslin sleeves tucked half up off her two round white arms, as she began to wash the blood carefully off the place. I couldn't stand it a minute, however. To feel her fairy fingers soiling themselves in such dirty work, for such a fellow as me, Ned Collins, made me shiver all over; so bolt upright I started, carrying away the sponge in the neck of my coat, and squeezing a teacupful of water down my back at every wriggle--while my lovely sick-nurse stood with one pretty little wrist out, betwixt alarm lest she had hurt me, and surprise at my life-like condition. After giving my face a wipe, however, and swallowing a glass or two of wine, with some of the biscuit I had knocked down, I felt wonderfully well, except for an ache at the top of my head. The next thing that occurred to me, of course, was to have my friend the mate made aware of his mistake; but as for the curious quietness of the Indiaman at that hour, even of a Sunday evening, I couldn't understand it, and I looked for a cap to go on deck with immediately. The young lady seemed to be looking up the after-hatchway, and listening, I thought, and the lady passengers could be heard talking about the poop; but when Violet Hyde turned round, and our eyes met again, I caught an anxious expression in them that puzzled me. 'Do you think it will be long before we shall hear them?' said she, next moment. 'Who?--whom?' asked I, hastily. 'Oh!' said she, starting,'you could not have known they had gone, Mr Westwood. Tell me, Mr Westwood,' said she, coming nearer to me, putting her hand lightly on my arm, and glancing into my face, 'tell me, did you not know that that vessel was in the river?' 'Vessel, Miss Hyde?' I said, looking at her steadily in turn. 'It's all one riddle to me--what vessel do you mean, madam?' 'The--the pirate!' exclaimed she, breathlessly; and turning towards the hatchway again, while I stood eyeing her stupidly, all abroad, so to speak. 'For heaven's sake, tell me what you mean, Miss Hyde!' said I, putting my hand to my head. 'Ah, but you look so white--you are not well yet, sir,' said she, softly. 'To think how all the passengers were amused, and even papa too, when they heard this morning of your being arrested as a--a----But nobody could know you were so hurt, Mr Westwood. Then when some of the sailors came back, and said they had seen the French ship in disguise----' 'By Jupiter! the _brig_ they meant?' I broke out. 'Then, good heavens! they must have painted her lead-colour, and turned her back into a schooner! _That_ was she, for a thousand!' 'And, you know, yesterday morning, sir,' continued the young lady, '_you_ told me you knew our friends were there, instead of being lost, as we thought!' "'Yes, yes!' said I, 'there must be some bad scheme at the bottom; but by morning we'll have a slap at them, for certain. For my part I feel----' 'Why,' said Miss Hyde, turning anxiously to me, 'almost everybody in the ship has gone _already_. Whenever the truth was discovered, there was such a confusion amongst the gentlemen and the officers that they could not think of anything else; and, as soon as the sun had set, they all crowded into the boats and went away together, to surprise the pirates in the dark.' 'Good God!' exclaimed I, in sheer amazement, and making toward the hatchway. 'Miss Hyde! _do_ you say so!--How many were there then, ma'am?' I asked. 'Oh,' said she, quickly, 'I am so glad there was such a number--five boats quite full, I believe. Not a single gentleman would stay, except little Tommy's father, who is upstairs--and papa was one of the first to get down into a boat with his rifle. But do you not think,' added she, with somewhat of a tremble in her voice, 'do you not think the people in the French ship will yield, or at least give our friends up?' "'I hope to goodness they may!' said I, turning away from the eagerness those soft eyes of hers glittered with, as she leant out before the faint glimmer through the cuddy-door, the light of the lamp in her hand shining bright over her hair and her shoulders; while the gloomy stillness of the whole ship, below, made me think of the voice that had hailed us through the lagoon, and the same man's face--as I had no doubt now it was--when I saw it aboard the brig at sea, before the thunder-squall came on. I almost fancied I saw Finch and _him_ meeting at the present moment, with the mate's awkward look as the Frenchman's sword flashed across him--my fingers gripped together for the handle of a cutlass, to go tumbling up amongst the men over the schooner's bulwarks in the creek--when all at once another notion darted into my head, to remind me where we were in the meantime; I ran to the companion and sprang up the stair on to the quarter-deck. "It was a hot, still night; but the change from the closeness below to the deck seemed to make quite a new man of one in an instant. I jumped on the nearest carronade-slide, and looked round to see how the land lay, which at first was difficult enough to do. They had got the Indiaman fair afloat again, I found, a little more off the shore, and farther down--the starboard gun I stood upon being, as I guessed by the shape of the trees, about opposite the mud fort, which Finch had probably been peppering at as he threatened, since the port was open, and two or three shot lying in the scuppers beside it. 'Twas somewhere nigh-hand eight o'clock of the evening, I think, and quite black on the nearest bank--you couldn't even make out the top of the woods against the sky; but another cable-length would have served to open the lower reach of the river, where it came brimming up full round the point with the night flow, sending a floating sort of a glimmer along in the dusk over against us. One could even pitch upon a line where it ran side by side with the heavy shadow that took in the ship, going across to the swampy-looking shore off our larboard side, and blackening away up-stream, while the dim bubbles and eddies swept out of the one into the other. I could just catch the low, deep roar of the sea more than a mile off, muffled by the trees and mangroves on both sides between it and us; and, the tide having come almost to a standstill, you heard the ripple against her bows get gentler and gentler, with a weak plash here and there in the dark among the grass and sedge alongshore, which seemed to wake up a chirping mutter in the bushes--and at times you'd have thought something came wading out from the edge; till in a few minutes both river and forest had sunk, as it were, into a sleep. The quieter they got, however, the more uneasy I began to feel at the state I saw things in upon deck; absolutely not a soul to be seen from wheel to bowsprit, except one man walking back and forward by himself on the forecastle, and giving a look now and then carefully enough over at the cable; Mr Brown being on the poop with his family and the knot of ladies, talking under their breath; while the old Scotch mate could be seen through the cabin skylight, leaning his bald crown over his two hands, under the lamp near the captain's cot, to listen to the missionary, as he sat gravely whispering and looking at him through his spectacles. "For my part, I hadn't a doubt but the ship had been watched from shore all along; and there was no saying at present _who_ might be keeping an eye upon her, even if this affair of the French brig weren't to catch us in some deep trick or other. If it were really she, and lying where we caught a glimpse of her the day before, 'twould take three or four hours, at night, even to pull there and back again; but as for her being an ordinary pirate, I had a strong notion she was no such thing, and the stranger I thought the whole matter throughout. "As I peered over the bulwarks into the thick of the tall jungle, the showers of fireflies came here and there flickering out from under the big leaves, lighting up the green of them for a moment, and dancing across a black mouth in the bank nearest us, like emerald sparks. By this time, too, the starlight was growing large out over the dusk, till the whole height of the sky had heaved itself above our upper spars, clear as crystal, and sprinkled full of soft silver points, that gathered and got brighter as you looked. One could see the whole breadth of the river floating slowly between, with lazy brown swirls of current twisting and curling round the point, and the eddies rising in the middle, to where the water glistened among the dark wet mangrove stems, or some oily swell near the edge went lipping in with the gleam of a star lengthened upon it. Hot and close though the night still was, while the rank smell of the mud came at times into our nostrils from one side, and of growing leaves from the other, yet it was pleasant enough after being shut up for ever so many hours in a dark hole below. "Neither did I think there was any fear of trouble from the natives while this lasted; but the haze that seemed to be oozing out over the mass of woods, with now and then a cool breath of air from up-river, showed what a fog we might expect as soon as the land-wind began to blow strong from inland. Sometimes I fancied I heard cries in the distance among the woods, over the croaking of the frogs which seemed to get up as one listened; then again I could make out the hollow booming of the African tree-drum, with a chorus of horns and savage-like shouts, apparently filling up every break in the hum that rose off the ground--far enough away, however, to satisfy me the blacks were only making merry before turning in. "As for Tom Westwood, he had plainly gone with the boats, clerical though he was, which didn't go to set my mind greatly at rest, knowing him to be one of your slap-dash fellows when roused; and, either way, it couldn't do much good to a man hailing for a parson to be particularly active on boat-service. But you may easily conceive what a pitch one's anxiety for the upshot rose to, at every whisper and hush of the woods, and every glimmer of the water far astern, where the upper reach could just be seen brimming pale out of the shadow, against a thick fringe of misty cane-clumps, topped with tall palms and cocoas--their stems wavering in the thin haze, and their dark crowns seemingly floating off above it like heads coming away from the bodies, as the heavy blue land-fog began to gather like smoke away behind. "The flow of tide having of course set the Indiaman's stern up-stream, the ladies on the poop could be seen clustered across the taffrail, with the careful married gentleman in the middle of them, more dignified than ordinary, as they one and all strained their eyes into the dusk before them; when one of the men came down the poop-stairs behind me, and, on turning, I saw to my surprise that it was Jacobs, he being still more astonished to see me on deck. I soon found, to my great relief too, that, what with the anchor-watch and some lads, there were still seven or eight of the crew aboard, whom I advised him to get on deck and make them keep a bright look-out--more especially as he was one of the boatswain's mates, and had charge of the watch at the moment; for, to tell the truth, seriously speaking, I had more real fear, all along, of some attack from the <DW64>s and Don Jose, than of the French craft they _would_ fancy a pirate, whatever might be her reason for stowing away Rollock and his companions--although I told Jacobs I had no doubt now but it _was_ actually she. 'Ay, ay, sir,' said Jacobs in a low voice, giving his trousers an uneasy hitch up, 'not a doubt on it, Mr Collins. Black Harry and his mates clapped eyes on her this forenoon, when they went up for water--so they said, anyway!' 'What, Bob?' said I, starting--'was it _that_ scoundrel? Did they not see her then?' 'Well, sir,' replied Jacobs, 'as I gather, 'twas rather one of her boats they fell ath'art of. You'll mind Harry was in the cutter that time you boarded the brig at sea, Mr Collins, a week or two 'gone--so, you see, he knowed one or two o' the crew at once; and in course, sir, comin' across one another hereaway, they'd make shift to have a talk, but none on 'em ever guessed about our passengers bein' aboard of her, till----' 'Did the fellow himself think they were pirates, then?' asked I, more anxiously than before--a shivering dread of I didn't know what beginning to creep on me, as I turned suddenly round to eye the river glooming away up from the starlight, through into the blue heaps of hazy forest. 'Why, sir,' answered Jacobs hastily, 'he's a desperate sort, is that 'ere Foster, if it was only what I've heard him _say_, swinging sound asleep in 's hammock. I wouldn't tell as much otherways; but I tell ye what it is, sir, my mind misgived me o' this here overnight boat-business! It's my sober notion, Leftenant Collins,' gravely added he, seeing I still looked anxiously to him--'it's my notion, if that craft's aught of a pirate, Harry Foster and more nor half of his watch 'ud think no more o' joining her, on a chance, than _one_ on 'em did o' taking you that clip with a handspike this morning, sir! As for this here brig, Master Ned, your honour,' continued he, 'what did she do, but, to my fancy, she's keeped a eye on us ever since we first fell foul of her?' "'Jacobs! Jacobs!' I broke out directly, 'get every hand up on the foc'sle at once, with everything like arms you can find--for God's sake look sharp, and then bear a hand here to have the carronades fore and aft run in, and stuffed full of some old iron or other, as we can't have grape!' Hurried as it was, I saw the whole thing--a regular deep-laid plot it seemed, too--and the first time I had seen light as to what the strange brig could be after. Here had she dodged us, no doubt, for weeks; got hold of our friends by accident, which would give her a clue how to find us anywhere during the rest of our voyage, as we were too strong-handed for her _then_. 'Twas very likely they thought we should suspect something, and follow wherever they could manage to lure the Indiaman--or else possibly they had run into the river the very same day we did, and perhaps seen us out of the haze which hid the land from us that morning; and _now_, if they had studied it for years, they couldn't have contrived a cleverer trap than this that Finch and the passengers had run their heads into, with more than a dozen mutinous dogs, at least, in their company. A prize like an East-Indiaman was worth taking some trouble about, of course; while such villains as Foster and his messmates, I knew, would fancy a Bengal nabob carried untold treasures with him, and it was plain to me they had something like an understanding with the stranger's crew. 'Ay, ay, sir,' said Jacobs, in answer to me; 'hows'ever, the first mate left word with Mr Macleod he'd send up a rocket and a blue-light in case o' a good success, or else come back with the boats.' 'Heaven help them, Jacobs!' said I, taking a hasty turn or two, 'for _we_ can't. But there _is_ something more horrid in the matter than I fancied--only all we can do is to look to ourselves and the ship! Harkye, though, Bob,' added I, following him; 'bring up the beef-kid, will ye? I feel terribly sharp-set, notwithstanding.' "I came back and looked from the quarter-deck down the skylight, where the second mate still sat with his elbows on the table, apparently listening to the missionary; when the good man suddenly took off his spectacles and peered under Macleod's broad fists, as an undeniable snore broke out between them; then he glanced toward the captain, who seemed dozing in his cot, raised his mild eyes for a moment through the opening up to the blue starry sky swimming out above, put on his spectacles again, and taking up the Bible, he leant back in his chair to read, as if there were neither pirates, savages, nor aught a man need dread, in the world. "'Strange!' I thought. 'Yet, after all isn't there a soul below there, ere a few hours, will go higher aloft than the smallest star that twinkles over the main-truck yonder? And who knows how many of us may----' However, I saw Jacobs hurrying aft again, and the rest coming up out of the fore-peak; so hard to work we set for the best part of an hour, which it took us to get the guns on deck made serviceable, and to find powder enough. Not a cutlass or pistol was left on board, so we had only two or three axes and pikes, with a rusty musket or two, and handspikes, certainly, to spare. "As soon as we had taken breath, 'Now, Jacobs, my man,' said I, 'send out the boys to loose the jibs and fore-topsail--let's hoist the yard, too, with the sail clued up--all ready for slipping her cable at five minutes' warning! It can't do any harm--and I've no more doubt,' said I, 'than if I saw it, we shall have that schooner coming down with the ebb upon us!' 'Tide'll turn in little better nor an hour, sir,' said Jacobs, when we had got this quietly done. 'And by that time the breeze will be blowing with it,' said I, 'bringing down the fog too, however--but keep a bright look-out aloft for the signal, Jacobs! If you see _it_, or the boats, good and well. But I tell you what it is, Jacobs,' added I, firmly, 'should it be the schooner instead, that instant we must cut and run for it! I shall carry the ship out to sea, if I can, as I brought her in--where we may have a better chance with her in the morning, or get clear off, perhaps!' "There being no more we could do, and having instructed Jacobs to go down and rouse Mr Macleod himself if he saw the signal, I kept stealing back and forward on one side of the quarter-deck alone. The river was still as a mill-pond, except where it trembled in long streaky gleams from the sky, else I should at once have slipped cable and begun to go down, leaving the boats to come after us, if they did come, as they best could. There wasn't a breath of air yet, either, save what seemed now and then to waft out of the thick woods, and to bring the whole whispering buzz of them stifled together along the face of the water, with the heavy scent of the aloes and trailers on the bank, meeting the warm steam that crept across from the mangroves on the opposite shore. A hundred notions ran through my head, as I walked, of what might happen: whether the boats would miss the schooner altogether, and she drop down upon us in the meantime, either by the creek or the river--or whether Foster and his crew of Wapping blackguards would carry out what I'd no doubt they had at heart. "But at any rate, as for a set of passengers and merchant sailors catching an armed schooner asleep, with one like that Frenchman in her, I had his fierce dark face too much before me whenever I thought of him to fancy the thing for a moment. That _that_ man was in command of the stranger craft, and had some scheme in hand he would stir heaven and earth to carry out, unless you ground his head to powder, was an idea that came shivering sharp into me as I kept watching the dark mouth of the creek astern, and the glimmering reach beyond--looking almost to see the schooner's bowsprit shoot out of one of them, tide or wind though there was none. Frigate to frigate in a breeze, in fact, I should have minded my weather-gage pretty cautiously with _him_, if a seaman he was; but if he were bent on having the old _Seringapatam_ at present, by heaven! what I feared was worse than either plunder or walking the plank--seeing there was a prize the judge had left on board, for which I felt a free-cruising captain would give all the treasures that fellows like Foster might think an Indian nabob had in his portmanteau. "In fact, I saw Violet Hyde moving restlessly, two or three times, near the break of the poop, as she watched the dim opening astern, while her lady's maid kept close behind her, afraid to stay below; and waiting, idle as I was, I almost began for the time to forget everything else that might be going on, at thought of _her_ being only a few feet off, with no one by but the servant-maid. The touch of her soft hand about my head an hour ago came back on me, and the drowsy creeping kind of hush of the tropical night seemed to bewilder my senses at every rustle of her dress--I shan't even deny that the notion seized me for half-a-minute, were the schooner to make prisoners of the boats' crews, how I might carry the Indiaman out to sea, and go Lord knows where with her. Then the idea of defending her, and saving her, made one wild with excitement--I felt as if I had the strength of twenty in me, almost longing to see the pirates' faces, especially the dark Frenchman's, and to wait till they came close on, when we could let drive into them, expecting to find us helpless. I made up my mind that Mr Brown there, and the missionary too, should work at a gun as soon as they were wanted--when, trip, trip, I heard her footstep coming down the poop-stair behind me, and stood trembling and tingling to my very finger-ends. "'Mr Westwood,' said her low sweet voice, and I turned round. 'Yes, madam,' I answered, gulping down my breath. 'Have you heard--do you see anything?' 'They've scarce had time yet,' said I; 'of course the more cautious they are the better!' 'Oh!' continued she, her hands clasping together, and the shawl falling half off her head to one shoulder--'oh, if there should really be bloodshed at this moment--the river looks so fearfully gloomy and silent! How is it possible to bear this suspense any longer, sir? If we could _only_ think they were not pirates after all!' 'Miss Hyde,' replied I seriously, as she seemed to wish me to speak, 'I can't have any doubt in my own mind what they are!' 'How! _what?_ for mercy's sake!' exclaimed she, gazing earnestly at me. 'You musn't suppose all pirates to be bloody murdering ruffians, Miss Hyde,' said I hastily. 'There's one man belonging to that craft yonder, _I'm_ sure, if he saw--if he stood where I stand just now, so near an angel----' The young lady shrank back with a startled look; but I wasn't master of myself longer, and out I broke: 'For God's sake forgive me, but I--I'd serve you like a slave--_dearest_ Miss Hyde. I'll stand up to the last drop of my blood before----' 'Mr West--wood!' was the answer, hanging betwixt surprise and terror. But I burst out with, 'Confound that name!--my name is _not_ Westwood, madam, and I'm no relation at all to the gentleman in India. I never said so, but your father mistook----' 'Who then--what are you--what design have you?' was her broken question; and she put one hand on the bulwarks as if for support, looking round from me to the woods, the river, and back to the ship and me again, so pale and terrified-like, that I could have cursed myself for my stupidity. "'Good heaven, Miss Hyde!' said I, lowering my voice, 'I do believe you take _me_ for one of the stranger's crew?' 'No--no!' faltered Violet; 'I--I--but the suspicions I heard to-day--you--you frightened me, sir!' 'Surely,' said I, ready to kneel at her feet, '_you_ must have known the truth of the matter, Miss Hyde. Why, here have I come afloat at a day's warning, bound for the East Indies--and all because I saw _you_ that evening at the garden-door! Oh, for kindness' sake, Miss Hyde, pardon my boldness--but I couldn't let slip the only chance of telling you--it took me unawares, in fact! I'm not such a fool as to fancy that such a fellow as I can have the least hope in the world; but--but----' She stood quite still, not uttering a word, with her face turned from me, but I could notice the colour was all come back to her cheek, and more--and saw the shining falls of her loose hair heaving on the bosom of her white muslin dress, as it rose and fell gently. I leant over the bulwarks and ventured to look half-round; when, oh heavens! how did my heart quicken in me to see the least bit of a smile come over her lips, though her eyes were dropped toward the gun close by. I can't say what I might have been bold enough to do, in the whirl of the moment--when suddenly she started, drew the shawl up from her shoulders again, and seemed to recollect the whole case of the boats with a shudder, as she glanced wildly again up the reach astern of us, bringing me to myself, too, at the same time; and I stood looking with her, intent to mark the first turn of the tide. CHAPTER XVIII "The night was warm enough, however, in all conscience; and, if one had been fit to eye it calmly, a glorious scene to see was the sky that rose above our heads, glowing dark as indigo-blue through the rigging aloft, as the ship's tall spars stood up into it, from one rope-ladder to another; her main-truck like a white button against the midmost depth, with every line running distinct to its place across knots of stars, and single bright ones piercing sharp through the black squares of the shrouds; while all round from her it widened away, glittering and seething with lights, that brought the woods looming out bigger and blacker along the nearest shore, making the dirty brown river look dirtier and drearier than before, as the steam spread over the close mangrove bank on the other side, and began to creep low out upon the water like fleeces of wool, with the stars here and there sparkling from the far horizon through the straggling fringe of cocoas beyond, and the huge bloated baobabs that twisted up out of the tall guinea-grass, as if their roots were in the air. The next glance I caught from Violet Hyde showed nothing but the distress she was in; and I walked forward to hail Jacobs on the fore-to'-gallant-yard, asking if he saw the signal yet. 'No, no, sir,' answered he, 'not a sign on it up to this time.' "So back again I went, gloomy enough myself, but trying to keep up my countenance, and saying I was sure we should see the boats come down with the tide when it turned. "'Have you noticed the stars aloft, Miss Hyde?' said I, in a cheerful way, to take off her thoughts till the upshot came; 'they never saw these in Europe, nor a night like this!' She looked up, and for a moment or two the soft blue dark of the hollow seemed to sweep round both of us, catching you up into it; the Milky Way falling over to westward, like a track astern of the great star-ship down in the south; and Orion's figure to be made out overhead, with the belt about him, stretching off west out of the Milky Way--the Serpent streaming far up to his foot; then Magellan's two shining bits of cloud, and the dim one, seaward. There were patches to be seen blacker than ink, too, where you seemed to look _through_ the sky, while every now and then a meteor shot far across it and fell, leaving a trail like a silver thread. 'Twas terrible, though, to see up into it, far away as they stood, and as steady as if we weren't there, when heaven only knew _what_ might come down river next half-hour. I felt her shoulder touch me as she leant back--the starlight glistening in her blue eyes, and nothing but it between her lovely young face and the stars; and I don't know how, but it appears to me I thought during that half-minute as I never thought before, and as if I looked off the other side of the world for the first time--yet you couldn't expect a fellow's brain to breed such notions in a merchantman's forecastle, or a frigate's steerage or gun-room, as it did beside an Indiaman's bulwarks, entering for a moment or two into the very feelings of a creature like the judge's daughter, when her warm breath almost lighted on his cheek! "Next minute I noticed over my shoulder, low down in the deep blue swell of the south, where the five bright stars of the Southern Cross were gleaming nearly upright over the top of a cocoa-clump on the opposite bank, for all the world like some diamond ornament; and I pointed it out to her, though I knew by the bearings of it how far the night was gone toward the middle. Its top and bottom stars flashed out of the pure face of heaven like jewels, each fit to buy the Great Mogul ten times over. The dark fringes of her two eyes showed brown over the light in them, while it looked like the hearts in violet flowers, as she turned. 'At sea,' said I, 'we mids used to know by it when eight-bells would come, to let us go below and turn in. Soon after you lose sight of the Pole-star you rise the Southern Cross--and the men had a notion it was a brooch the Virgin Mary lost from her breast, in the daylight, when she went up to heaven! 'Twas her son gave it her, they fancied, but 'twas always to be _found_ in the dark--though, meanwhile, 'tis a sign to the Flying Dutchman, as he tries to weather the Cape, that he'll be forgiven at the day of judgment--so that's the reason it has the power of showing what's o'clock until _then_, and why the Cape is the Cape of Good Hope!' 'Yes, yes!' said she; 'in Paul and Virginia, I remember, when they were so unwilling to part, _it_----' But she stopped with a blush, as her eye met mine; and we were both so confused that, before I knew, I found myself beginning to stammer out all manner of tender words, I daresay, and to whisper her first name near her ear, she scarce seeming to mark the difference--in fact _one_ bewildered sort of look was all she gave me at the moment, as if she were listening more to the hum rising out of the woods than to me. "Once or twice the still shine of the lamp up through the open skylight-frame drew my eye to it in spite of me--it was the only light burning in the ship, and you saw the gleam of it from the starboard port-window of the cuddy, drawn in as it was for air, thrown on the dusky water, not many fathoms, apparently, off the jungly bank nearest the ship. I can't tell you how, but somehow or other the appearance of it there, like a yellow break in the misty shadow, letting one see the very froth floating over it, and the muddy tint of the river on its edges--with the hush below us in the cabin--awed me more than aught besides; and whether it was from mixing the thing with what happened afterwards, or how--perhaps the missionary moved inside--but when I noticed the gleam on the water quiver and darken for a moment, then shine out again, I felt I _knew_ it was then the captain's spirit passed away. I slipped with a thrill of my blood to the skylight, and saw Macleod still asleep, the missionary settling his spectacles on his nose to read again, as if _he_ had looked up too when I did; while the cot and bedclothes were hanging white in the shade as before, except that the knees were drawn up, and the head turned away. He might be dozing, though it came into my head I had heard the captain say he should last till the _turn of the tide_; and in fact all the sick men I ever knew die, unless there was something uncommon, died as the ebb came on. As I stepped back to the young lady's side, I could mark the Southern Cross by the after-edge of the mainmast, sparkling fairly upright above the cocoa-nut trees, and Orion high up nor'-westward seemed farther away--it was midnight. The thought flashed through me how something in the sky could draw up a man's soul, as the shot at his hammock-foot would sink his body down deep through blue water at sea--but the first light plash of the ebb alongside brought me back to the case in hand, and I gave Jacobs a quiet sign to look out sharp aloft. "'Hark!' whispered Violet Hyde, suddenly, glancing sideways to me with her ear eagerly toward the shore, and putting back her hair with one hand to listen--'what is _that_?' I thought at first I could see a stir along the thick aloe-bushes, and make out the rustle of leaves; but the land-breeze was sighing in puffs through them already, and the fog beginning to creep out from over the bank, as if to meet the muddy stream from the other side; till next minute I heard what she meant, like wild cries from human creatures half choked, or out of breath, sounding along deep in the woods; then free out it rose in a clear chorus of savage screams and yells, and then seemed smothered up again. 'Twas only a pack of jackals hunting from thick bush to opening, but Violet pressed closer to me as the devilish noise drew nearer the river; and suddenly my hand met hers--to say what I felt, passes me--but the very next moment I had it fast clasped in my own, though I hadn't time enough to say what the thing was, before the entire pack of throats seemed to break out right upon the bank a little higher up than the ship, barking and yelping like the very hounds of Satan. ''Tis only the chase has taken to the water!' continued I, in a low voice, as the infernal uproar stopped at once. "However, _then_, the sweet girl was trembling like a leaf; and, by Jove! madam, take it as you will, the man who wouldn't have had one arm round her before that, could have been no sailor--that's all. 'For God's sake, dear, dear Miss Hyde,' whispered I--'dearest Violet, let me take you under shelter--we may have dangerous work before long!' "I started up from the bulwarks, in fact, for the river by this time was all aplash alongshore in the haze, and under the ship's bends, beginning to run past her side seaward, as the branches and loose stuff came floating out with the current off a point; the sedge and bulrushes opposite us moaning and clattering, as the breeze rushed through them, bringing the fog rolling down stream. The mist was closing overhead from both sides already, though the stars sparkled through the middle yet; and I knew the moon must be rising, fit to show us anything that came out of the upper reach. 'No--no!' faltered out Violet, in tears, as she slid herself quickly out of my hold, drawing the shawl over her with a shudder; 'I cannot go inside till we see them come back--my dear, dear father, I must see that he is safe!' 'By heaven! though,' exclaimed I, jumping upon the carronade to look out, 'those brutes are swimming after the deer, and the stream is bringing them down on our stern!' The Indiaman was swinging her stern down to the ebb, and through the dusk I fancied I just saw their black heads tipping here and there out of the water, amongst the driftwood and froth, where the light from the cabin port swung slowly into the mist, with the ship. However, they went past; and she hadn't got her bow fair to the current, when a man from the bow sung out, 'Hurrah! here's the boats now!' "'Where, where?' said I, springing forward to the fore-chains, while the young lady stood as if her life hung on the next word. 'There, sir, right ahead almost as she swings,' said the sailor; and thick as the blue fog was close to us, the cream- haze filling up the reach of the river beyond, was lighting up like white gauze with the moon, in which I saw two or three black objects come dropping out as if from the creek, their oar-blades flashing in it. But I thought they crowded together awkwardly, like maimed craft, and the weight seemed to keep them down, unless, as I hoped, they were waiting for the others. 'No, no, Mr Collins!' whispered Jacobs, suddenly sliding down a topmast backstay to my side, 'they're canoes, sir!' 'By the Lord! so they are,' said I, seeing a flourish of the paddles that betrayed them. 'They're hanging on yet, though, to catch us napping--keep cool, Bob, my man,' continued I, for my spirits rose, to find my fears mistaken as yet about our boats. 'But the cable--the cable!' added I hastily--'by George, they'll try to cut it, as sure as fate! Ready there--don't fire a shot till they're close--nothing but stupid <DW65> heathens after all, my lads! Quick, a couple of you,' said I, 'bowse up the jib at once, and down fore-topsail sheets--brace the yard sharp up, to cast her head down if they do cut! If we go aground, Jacobs, we're gone!' "'Twas vain to think of hindering them, few as we were, and scarce able to see what they did for the fog; but the land-breeze already blew pretty fresh, and the ebb rushing on her bows made the Indiaman heave to it as her jib rose from the boom. I had no time to stand upon ceremony--to think of the pilotage again--with the savages, the narrow channel in the dusk, and the breakers together, was quite enough. "In the very nick of such a breathless moment, I had just fancied I caught the stroke of their paddles coming on--when all at once, out of the open cabin-skylight aft, rose a sound, the like of which I never heard in my life--between a yell and a cry; but the mouth of the skylight seemed to send it up higher than the mast-heads, loud and long, into the slit of starlight between the fog. For a single second the marrow curdled in my bones, and I lost all thought even of the canoes ahead, 'twas so unearthly; till, catching a glimpse of Violet's white figure crouching in terror to the round-house door, I rushed aft, and looked down at the cuddy. It was all black as midnight below, the stink of the swinging lamp coming out; but by the horrible tumbling, staggering, struggling sound inside, you'd have thought it full of some awful thing, doing God knows what in the place--then a thump and a groan. I scarce believe I could have mustered heart to go down the companion and see--till next moment the Scotch mate's bare head and his shoulders came thrusting up out of the stair, wrestling wildly with three or four pitch-black naked figures--the narrow booby-hatch hindering them from sticking together to him, except one that leapt out almost on his back, aiming a fierce stroke with a club at his skull. Quick as thought, however, my coolness had come back to me, and I just sent the bullet from the ship's musket I had snatched up fair flash through his lungs, the blood spouting out of his mouth almost over us, as he spun round with his club in the air, and fell back--while smash after smash I brought the stock of my piece down on the crowns of the others, trying to get on deck too thick together; and Macleod was doing the same like a man, at the skylight, where they were catching at the edge of the frame. The shrieks of the ladies came off the poop above; and as for the men, they were dodging under the forecastle bulwarks as they fired at the canoes ahead, from the spears and arrows that came whistling over, and quivering into the planks near me. What else the fiendish wretches might be doing I didn't know, but I had no sooner managed to shove the scuttle over the booby-hatch, the second mate loading as fast as he could, and blazing away down into the skylight like a perfect devil, lighting up the black faces and sharp teeth of the savages below at every shot, rushing back, than I felt the Indiaman was broadside on to the tide and current, sweeping down to open the next reach with her jib and topsail full to the land-breeze. I sprang back to seize the wheel, near which Violet Hyde stood cowering with her two hands over her eyes, when, in the midst of it all, you may fancy my horror to catch a glimpse of one hideous black stealing round towards her in the shadow of the round-house, with a hatchet gleaming in one hand, and the other stretched out to clutch her. 'Twas the work of a second. I made one leap, and barely caught the blow on my gun-stock, as he took hold of her dress; then over he and I rolled on the deck, first one uppermost, then the other, till I found his strength was too much for me, breathless as I was. "The fellow had his huge hand round my throat, choking me, and ready to spring up with the hatchet in his other fist--'twas the mulatto that had been with the Portuguese--when I saw Violet Hyde dart forward between me and the stars, throwing her large shawl round his head and arm from behind him, and holding it tight, her face turned away white as death. The mulatto loosened his grasp and jumped up, throwing her reeling back to the door; but I was on my feet as soon as he, twisting his hatchet from his grip, and sent the edge of it with all my force clean down into his brain, through cashmere and everything. Ere he had time to pull it off, he was stretched, breast and knees up, over the carronade-slide at my feet. "The dear girl had fainted. I lifted her, and hurried with her to the sofa in the round-house, my heart swelling toward her in a way no man can tell, though there was not a moment to stay, for when I reached the wheel again, a sight broke upon me that showed the fearful danger we were in. The savages in the cuddy could be heard plunging out of the port to swim ashore; and though the ebb-tide was taking the ship apparently clear round the woody turn, she had no sooner opened the wide reach, where the fog was scattering before the breeze, than we began to see a stretch of the nearest bank, off our starboard bow, glimmering out to a huge fire on the edge, that lighted up the thick white haze like sulphur--throwing a bloody red glow on the eddies in-shore, with two or three black canoes dipping up and down in them; a crowd of dark naked <DW64>s rushing round the fire, bringing logs and branches to throw in, till up it blazed again; the sparks flying into the smoke, the feathery black jungle sinking back behind, and the banyan branches shooting out into it, as if they were alive, licking the crimson gleams with their sharp leaves; while a horrible noise of tree-drums beating and buffalo-horns blowing floated off to us. "The wretches seemed to expect we were coming straight in to them, and they waited for us. And no wonder; for it wasn't till Jacobs came running aft, to tell the mate and me, that, to our horror, we found the canoes had got the rest of the cable fastened somehow or other low down to her cutwater, and were coolly towing us in by it. We could neither cut it nor dispose of them, as at every shot there were plenty more to fill places; while the helm was only enough to steer her, had she been free. "'Jacobs,' said I, 'for heaven's sake bear a hand with two or three of these heavy shot in a hammock--let's sling it out to the flying-jibboom end, and I'll stand by to drop it fair over them--quick!' Three of us ran out from the bowsprit, with the end of the line, swinging out the weight and hauling it up, till we were nearly over their heads in the foggy gleam from the blaze ashore. The cable tautened fair under us as the blacks gave a stroke ahead together with their paddles, and 'Watch!' I sung out above them, in a voice that made them huddle all three canoes in a lump, peering up at us. 'Let go, my lads,' whispered I, and down went the weight of shot full slap upon them, crash through their gunwales, leaving no more than the bits, with the woolly heads bobbing about in the stream. The second mate whirled round the spokes of the wheel, on deck, and her jib and topsail drawing the breeze right again, she began to stand out toward the middle once more. I watched the glare of the fire sinking back into the blue fog, while the hubbub of wild cries showed that they had taken the alarm, and were pushing off as fast as possible in their canoes from the bank in chase. "The next thing I saw, two or three minutes after, was the flash of a large gun away on our starboard quarter, flaring out in the mist round the strange schooner herself, as she came swiftly down astern of us, under her two boom-sails and flying-jib, the froth whitening up from her forefoot, and she crushing through amongst the canoes, letting drive at them right and left, flash after flash, and roar after roar--her deck crowded with men, too, amongst whom I thought I could make out the dark Frenchman's broad-leafed Manilla hat. However, the wreaths of thick smoke blew curling from her towards us; and directly after nothing was to be heard but the ripple under our bows, as we went surging toward the river's mouth, with the clear plash upon her copper coming nearer. "Jacobs and I, as well as the other hand, hung over the boom together for a little to loose the flying-jib, then out of pure weariness, till I sent Jacobs to take the wheel and steer by my signals; for the Indiaman had the full force of current and breeze astern of her, carrying her fast toward the bar, as I guessed; while the second mate let her yaw dreadfully, from fear of going wrong. As for the schooner, we could make out her lights through the fog, the wind bringing us the sound of her cutwater--though probably they couldn't know whereabouts we were; so I hoped she might perhaps go past us in the dark, if she were actually in chase of the Indiaman, as I feared. "However, the moment the cheep of our flying-jib hanks on the stay was heard as the sail was hoisted, a sharp hail came along the water. '_Hola!_' sang out the creaking voice of the little French skipper, who had bamboozled me so at sea. None of us answered, and I ran down the spar to be ready for what might happen, when '_Hola! ou etes-vous?_' shouted he again. 'Hullo! the _Seringapatam_, ahoy!' roared our chief officer himself; to which no sooner had Macleod replied, than we caught three hearty English cheers, and next minute the schooner's canvas was looming up from the yellow glimmer of her lanterns a few fathoms on our starboard quarter--the foam hissing off her sharp bright bows, while she raced up with us. Everyone of us started at the jovial sound of old Rollock the planter's voice, shouting, 'All's right, my boys!' as if he had risen from the dead out of the sea--the schooner slipping easily by, abreast of our high bulwarks; and the crowd of heads from stem to stern, English, French, and Kroomen, gliding past below, for all the world like a dream to most of us, with the light from the lanterns flaring up red under hats, caps, and tarpaulins, and the black shadow of their figures and small-arms thrown high in two clusters on the broad glare over her fore and main boom-sails. 'Have ye actually taken the blackguards, sir?' hailed the Scotch mate; at which a shout of laughter ran from one end of her to the other; while one of the cadets seemingly half-drunk, could be seen staggering aft to the stern as she forged swiftly ahead, just in order to call out, 'Macleod, my old cock, _comment vous portez-vous_?' The little French master jumped up on the schooner's taffrail, waving his hand politely: '_J'aurai l'honneur pour vous conduire en debouchant, Messieurs!_' shouted he; 'follow de light een my starn!' "In fact, by this time we were already in the suck of the channel, so that longer speaking was out of the question, as the boom of the surf could be heard wide ahead of the ship. Suddenly a broad gleam of light off the sea struck over our starboard bow, beyond the tumbling water upon the bar, and to starboard the rocky headland broke through the fog rolling out with the breeze: the schooner's stern lifted glimmering before our figure-head, and we lost sight of her again, till we had swept safe round the point. Five minutes more, and both Indiaman and schooner were heaving on the waves from the shadow of the high land, the dark-blue swells cresting up all round against a bank of cloud on the horizon, and the long _send_ of the sea to be felt once more under you--the moon rising out of the river, while a fresh breeze blew in the offing, and promised to get a good deal stronger. "The schooner soon hove to, and before we could have beaten up to her, being to leeward, we saw one boat after another dropped astern or off the side, till the whole five could be made out pulling for the ship; but the minute after they were alongside, she filled away again, standing almost right before the breeze up to north-westward. "Well, you can fancy the confusion on board of us for a short time, what with questions and explainings, and what with seeing worthy old Rollock again, Ford, Winterton, the Brigadier, and Mrs Brady, after being parted for a number of days in such a way. The young lady Miss Fortescue's meeting with her mother was touching enough to witness, though of course the gentleman had got it all over before; and in fact they seemed to have made pretty merry aboard the French craft, while we were fighting for fair life with those infernal Congo savages. The dead blacks on deck and below had been thrown overboard already, and the Indiaman crowding sail on her course; but I saw the judge for a minute before the round-house door was shut, with his daughter sobbing on his neck; and as soon as the rest met below in the cuddy, a scene was to be found there which one doesn't easily forget--the steward lying in one doorway, dead, with his head smashed by a club; the missionary under the table, still bleeding, though he was alive, and not very much hurt after all. Neither he nor Macleod could tell very well how the thing happened, plain as it was now to me; but the strangest part of it to see, horrid as it seemed at first, was the body of Captain Williamson. His cot had been knocked to the deck, some of the devilish wretches had given his forehead one gash, and his breast another, each fit to kill a man. There was little or no blood, however; his face had a peaceful look on it, almost smiling, you'd have said, by comparison with the poor steward's; and as soon as his eyelids were down, the old seaman appeared to be sleeping yet. For my part, I felt as sure as if I'd seen it, that when the savages struck _that_ body, they might as well have struck at the stars we had seen over the deck. "Still, when all was cleared away, and the passengers gone tired out to their berths, I couldn't turn in without a walk on the poop beside the planter, to hear something from him--the ship all the time rising on the brisk seas, every stitch of canvas spread, the African coast beginning to drop in the moonshine, and the schooner a dim speck to north-west through the long gleam on the horizon. I found to my great surprise, there was no reason he could think of for the French craft's detaining them, except that the Brigadier had sworn at Bonaparte in the brig's cabin, or else Mrs Brady's having said she would give the world to see him just now at St Helena; in fact she would go through fire and water only to kiss the hand of such a great hero--such an enemy to all Saxons and tyrants, she vowed. But in fact they had been sitting below at the time our boat came aboard, and knew nothing about it; the French master swore to Rollock, and to the chief officer afterwards, he had mistaken _my_ meaning--because I spoke bad French, no doubt; after which the gale came on, and they never saw the Indiaman again till to-night. As for their going into the river, and changing her rig, the little Frenchman said he found a brig's rig didn't suit a schooner's hull. For my part, however, I didn't see how their course for the Isle of France could be _north-west_. 'By-the-by, though,' added Rollock, 'Mrs Brady made some mystery about the whole affair. She seemed to have a few private discourses with that strange dark-faced passenger of theirs, who, I suspect, had more to do with the vessel than he pretended. But I daresay, Collins, my boy,' said he, laughing, 'she wanted to make us think the foreigner had taken a fancy to her.' "As we were both going below, I said, 'By-the-way, where is Mr Daniel Snout?--I haven't seen _him_ yet.' 'Ah!' said the planter, turning round, 'where is Daniel, after all! _I_ haven't seen him either, since we left the schooner's deck--no, by Jove! sir, he really hasn't come on board, now I think of it! I recollect we were the last boat, and he wasn't in it, although he was behind me just before I got down.' 'What can the man mean?' said I; and we both stood at the top of the hatchway ladder, looking toward the horizon, at the speck of a schooner. 'By jingo, Collins!' exclaimed the planter, chuckling, 'the Yankee is gone to be a pirate!'" CHAPTER XIX "More than once that night," resumed Captain Collins, "I woke up with a start, at thought of our late adventures in the river Nouries--fancying I was still waiting for the turn of tide to bring down the boats or the schooner, and had gone to sleep, when that horrible sound through the cabin skylight seemed full in my ears again. However, the weltering wash of the water under the ship's timbers below one's head was proof enough we were well to sea; and, being dog-tired, I turned over each time with a new gusto--not to speak of the happy sort of feeling that ran all through me, I scarce knew why; though no doubt one might have dreamt plenty of delightful dreams without remembering them, more especially after such a perfect seventh heaven as I had found myself in for a moment or two, when Violet Hyde's hand first touched mine, and when I carried her in after she had actually saved my life. "The broad daylight through our quarter-gallery window roused me at last altogether; and on starting up I saw Tom Westwood, half-dressed, shaving himself by an inch or two of broken looking-glass in regular nautical style--that's to say, watching for the rise of the ship--as she had the wind evidently on her opposite beam, and there appeared to be pretty much of a long swell afloat, with a breeze brisk enough to make her heel to it; while the clear horizon, seen shining through the port to north-westward, over the dark-blue heave of water, showed it was far on in the morning. 'Well, Ned,' said Westwood, turning round, 'you seemed to be enjoying it, in spite of the warm work you must have had last night on board here. Why, I thought you had been with us in the boats, after all, till I found, by the good joke the cadets made of it, that that puppy of a mate had left you still locked up, on account of some fancy he had got into his head of your being in partnership with the schooner! For heaven's sake, though, my dear fellow, wash your face and shave--you look fearfully suspicious just now!' "'No wonder!' said I: and I gave him an account of the matter, leaving out most of what regarded the young lady; Westwood telling me, in his turn, so much about their boat expedition as I didn't know before from the planter. Everything went to certify what I believed all along, till this sudden affair in the river. The schooner's people had plainly some cue in keeping hold of our passengers, but hadn't expected to see us so soon again, or perhaps at all--as was shown by their hailing the boats at once in a pretended friendly way, whenever they came in sight up the creek; while Ford and the rest shouted with delight, off her bulwarks, at sound of the mate's voice. "'I tell you what, Collins,' continued Westwood, 'this may be all very well for _you_, who are continually getting into scrapes and out of them, and don't seem to care much whether you ship on board an Indiaman or a corn-brig--you can always find something to do--but to me the service is _everything_!' 'Well, well,' said I, hastily, 'I'm much mistaken if we don't find something to do in India, Tom--only wait, and that uncle of yours will make all right; for all we know, there may be news from Europe to meet us, and I must say I don't like the notion of being born too late for turning out an admiral. I'm sure, for my part, I wish old Nap well out of that stone cage of his!' 'No, no, Ned,' said Westwood, 'I ought to clear myself at home first; and sorry I am that I gave in to you by leaving England, when I should have faced the consequences, whatever they were. Running only made matters worse, Collins!' 'No doubt,' I said; 'and as it was my fault, why, deuce take me, Tom, if I don't manage to carry you out scot-free! Depend on it, Captain Duncombe's friends would have you strung up like a dog, with the interest he had and sharp as discipline is just now.' Westwood shuddered at the thought. 'I fear it would go hard with me, Ned,' said he, 'and I shan't deny that these few weeks have brought me back a taste for life. But, in spite of all, I'd deliver myself up to the first king's ship we speak, or go home in some Indiaman from the Cape--but for one thing, Collins!' 'Ah!' said I, 'what's that?' Westwood gave me a curious half-look, and said, 'One _person_ I mean, Ned--and I shouldn't like _her_ to hear of me being----' 'Yes, yes,' said I, stiffly, 'I know.' 'It must have been by guess, then!' answered he. 'Often as we've talked of her during the voyage, I thought you didn't know we had met frequently in London before you came home, and--and--the fact is, I wasn't sure you would like _me_ to----' 'Westwood,' said I, quickly, 'Tom Westwood--what I have to ask is--do you love her?' 'If ever a man loved a woman, Ned,' was his answer, 'I do _her_; but if _you_----' 'Have you any chance, then?' I broke out. 'Ay, true--true enough, you have the best of chances--your way is as clear as could be, Westwood, if you knew it! Only I _must_ know if she is willing--does she----' 'I got leave to write to her in London,' answered Westwood, 'and I did so pretty often, you may be sure; but I only had one short little note in answer to the last, I think it was--which I had in my breast that morning on Southsea beach, when I expected the bullet would come through it!' "Here Westwood stooped down to his trunk, and took out a rose- note wrapped in a bit of paper; I standing the while fixed to the deck, not able to speak, till he was handing it to me. 'No, no!' said I, turning from him angrily, and like to choke; 'that's too much, Mr Westwood--pray keep your own love-letters for your own reading!' 'There's nothing particular in it, Ned,' answered he, flushing a little, 'only there's a few words in it I'd like you to see--don't look at it just now, but tell me afterwards what you think. You ought to see it, as the matter seems to depend on you, Ned; and if _you_ object, you may be sure, so far as I'm concerned, 'tis all over!' "Somehow or other, the look of the little folded piece of paper, with the touch and the scent of it, as Westwood slipped it into my hand, made it stick to me. I caught one glance of the address on the back, written as if fairy fingers had done it, and I suppose I slipped it into my coat as I went out of the berth, meaning to go aloft in the foretop and sicken over the thought at my leisure, of Violet Hyde's having ever favoured another man so far, and that man Tom Westwood. The strangeness of the whole affair, as I took it, never once struck me; all that I minded was the wretched feeling I had in me, as I wished I could put the Atlantic betwixt me and them all; in fact, a hundred things before we sailed, and during the passage, seemed all at once to agree with what I'd just heard; and I'd have given thousands that moment it had been someone else than Westwood, just that I might wait the voyage out coolly, for the satisfaction of meeting him at twelve paces the first morning ashore. "On the larboard side of the berth-gangway, opposite our door, I saw the old planter's standing half open, and Mr Rollock himself with his shirt and trousers on, taking in his boots. 'Hallo, Collins, my boy,' he sang out, eagerly, 'come here a moment, I've got something to show you!--Look,' said he, standing on tiptoe to see better through the half-port, 'there's something new been put in my picture-frame here overnight, I think--ha! ha!' "The first thing that caught my eye, accordingly, was the gleam of a sail rising from over the swell to windward, far away off our larboard quarter, seemingly rolling before the south-easter; while the Indiaman hove her big side steadily out of water, with her head across the other's course, and gave us a sight of the strange sail swinging to the fair wind, every time we rose on the surge. 'What is it, eh?' said the planter, turning to me, 'back or face, Collins? for, bless me, if I can distinguish tub from bucket, with all this bobbing about--great deal of capital indigo wasted hereabouts, my dear fellow!' 'Why, you may make out the two breasts of her royals,' said I--'a brig, I think, sir.' 'Not that abominable schooner in her first shape again, I hope!' exclaimed he; 'perhaps bringing back the Yankee.' 'Too square-shouldered for that, Mr Rollock,' I said; 'in fact, she seems to be signalling us; yes, by Jove! there's the long pennant at her fore-royal mast-head--she's a brig of war. They're surely asleep on deck, and we shall have a shot directly, if they don't look sharp!' 'You'd better say nothing about the Yankee's absence, Collins,' put in the planter, 'till we're fairly away. For my part, I really have no notion of waiting for anyone--particularly a fellow who _must_ have some go-ahead scheme in his noddle, which we Indians don't want. Quietly speaking, my dear fellow, I shall be glad if we're rid of him!' "On my mentioning what sort of 'notions' were found in Mr Snout's berth, and the drowning of his heathen images, the worthy planter went into perfect convulsions, till I thought I should have to slap him on the back to give him breath. 'What the deuce!' said he at last; 'Daniel must really have something worth his while to expect before he'd fail to look after such a treasure!' 'Ah,' said I, not attending to him, as I heard a stir on deck, 'there we go at last, cluing up the topsails, I suppose.' 'Seriously, now,' continued Mr Rollock, 'I can _not_ fathom that vessel and her designs; but I bless my stars at getting clear off from the company of that tall Frenchman with his moustache--can't bear a moustache, Collins--always reminds me of those cursed Mahrattas that burnt my factory once. Couldn't the man shave like a Christian, I wonder? I defy you to enjoy mulligatawny soup and not make a beast of yourself, with ever so much hair over your mouth. By-the-way, Collins,' added he, eyeing me, 'since I saw you last, you've let your whiskers grow, and look more like one of your nauticals than Ford himself!--should scarce have known you! Any of it owing to the fair one up yonder, eh?' And the jolly old chap, whose own huge white whiskers gave him the cut of a royal Bengal tiger, pointed with his thumb over his shoulder towards the round-house above, with a wink of his funny round eye, that looked at you like a bird's. 'What do you suppose the Frenchman to be then, sir?' asked I, gloomily. 'Oh, either a madman, a spy, or something worse! Just guess what he asked me suddenly one morning--why, if I weren't a distinguished _savant_, and wouldn't like to study the botany of some island! "No, monsieur, not at all," replied I, in fearfully bad French. "The geology, then?" persisted he, with a curious gleam in his fierce black eyes--"does the research of monsieur lie in that direction?" "Why, no," I answered, carelessly, "I don't care a _sacre_ about stones, or anything of the kind, indeed; indigo is _my_ particular line, which may be called botany, in a way--I'm perhaps prejudiced in favour of it, monsieur!" The Frenchman leant his tufted chin on his hand,' continued Mr Rollock, 'meditated a bit, then glanced at me again, as if he didn't care though I were studying seaweed in the depths of the ocean rolling round us, and stalked downstairs. Then he took to Mrs Brady again, and lastly to the Yankee, whose conversations with him, I fancy, had a twang of both commerce and politics.' 'What do you think of it all, Mr Rollock?' inquired I, rather listlessly. 'It didn't strike me at the time,' said the planter, 'but now I just ask you, Collins, if there ain't a certain great personage studying geology at present in a certain island, not very far away, I suppose, where there's plenty of it, and deuced little botany, too, I imagine?' To this question of the old gentleman's I gave nothing but a half-stupid sort of stare, thinking as I was at the same time of something else I cared more about. "By Jupiter! though,' cried I, on a sudden, 'instead of heaving the ship to, I do believe we've set topmast-stu'nsails, judging from the way she pitches into the water; there's the brig nearing the wind a point or two in chase, too; why, the fellow that has charge of the deck must be mad, sir!' Next minute the fire out of one of her bowchasers flashed out behind the blue back of a swell, and the sudden _thud_ of it came rolling down to leeward over the space betwixt us, angrily, so to speak; as the brig's fore-course mounted with a wave, the sun shining clear on the seams and reef-points, till you caught sight of the anchor hanging from one bow, and the men running in her lee stun'sail-booms upon the yard-arms. The planter and I went on deck at once, where we found a fine breeze blowing, far out of sight of land, the Indiaman rushing ahead stately enough; while our young fourth officer appeared to have just woke up, and the watch were still rubbing their eyes, as if every man had been 'caulking it,' after last night's work. Even Mr Finch, when he came hastily up, seemed rather doubtful what to do, till the salt old third-mate assured him the brig was a British sloop-of-war, as anyone accustomed to reckoning sticks and canvas at sea could tell by this time; upon which our topsails were clued up, stu'nsails boom-ended, and the ship hove into the wind to wait for the brig. "When the brig's main-yard swung aback within fifty fathoms of our weather-quarter, hailing us as she brought to, I had plenty to think of, for my part. There she was, as square-countered and flat-breasted a ten-gun model as ever ran her nose under salt water, or turned the turtle in a Bahama squall; though pleasant enough she looked, dipping as we rose, and prancing up opposite us again with a curtsey, the brine dripping from her bright copper sheathing, the epaulets and gold bands glancing above her black bulwarks, topped by the white hammock-cloth; marines in her waist, the men clustering forward to see us, and squinting sharp up at our top-hamper. It made one ashamed, to take in the taut, lightsome set her spars had, tall and white, with a rake in them, and every rope running clean to its place; not a spot about her, hull or rig, but all English and ship-shape, to the very gather of her courses and topgallant-sails in the lines, and the snowy hollow her two broad topsails made for the wind, as they brought it in betwixt them to keep her steady on the spot. "'His Britannic Majesty's sloop _Podargus_!' came back in exchange for our mate's answer; and though 'twas curious to me to think of meeting the uniform again in five minutes, I saw plainly this was one of the nice points that Westwood and I might have to weather. Your brig-cruisers are the very sharpest fellows alive, so far as regards boarding a merchant craft; if they find the least smell of a rat, they'll overhaul your hold to the very dunnage about the keelson; and I knew that, if they made out Westwood, they'd be sure to have me too; so you may fancy that, during the short time her boat took to drop and pull under our quarter, I was making up my mind as to the course. In fact, I was almost resolved to leave the ship at any rate, feeling as I did after what I'd heard; but while most of the passengers were running about and calling below for their shoes and what not, the judge and his daughter came out of the round-house, and I caught a single glance from her for a moment, as she turned to look at the brig, that held me at the instant like an anchor in a strong tideway. "I kept my breath as the lieutenant's hand laid hold of the man-rope at the head of the side-ladder, expecting his first question; while he swung himself actively on deck, looking round for a second, and followed by another; the wide-awake looking young middy in the boat folding his arms, and squinting up sideways at the ladies with an air as knowing as if he'd lived fifty years in the world, instead of perhaps thirteen. "The younger of the lieutenants took off his cap most politely, eyeing the fair passengers with as much respect as he gave cool indifference to the cadets; the other, who was a careful-like working first-luff, said directly to Mr Finch, 'Well, sir, you seem inclined to lead us a bit of a chase; but I don't think,' added he, smiling from the Indiaman to the brig, 'you'd have cost us much trouble after all!' Here Finch hurried out his explanation, in a half-sulky way, when the naval man cut him short by saying that 'Captain Wallis desired to know' if we had touched at St Helena. 'May I ask, sir,' went on the officer, finding we had preferred the Cape, 'if _you_ command this vessel--or is the master not on deck--Captain--Captain Wilson, I think you said?' The mate said something in a lower voice, and the lieutenant bared his head more respectfully than before, seeing the Company's ensign, which had been lowered half-apeak while the boat was under our side; after which Finch drew him to the capstan, telling him, as I guessed, the whole affair of the schooner, by way of a great exploit, with hints of her being a pirate or such-like. "The brig's officer, however, was evidently too busy a man, and seemingly in too great a hurry to get back, for listening much to such a rigmarole, as he no doubt thought it; they had been at the Cape, and were bound for St Helena again where she was one of the cruisers on guard; so that what with Finch's story, and what with the crowd round the second lieutenant, all anxious to get the news, I saw it wouldn't cost Westwood and me great pains to keep clear of notice. "There were some riots in London, and three men hanged for a horrid murder, the Duke of Northumberland's death, not to speak of a child born with two heads, or something--all since we left England. Then there was Lord Exmouth come home from Algiers; and Fort Hattrass, I think it was, taken in India, which made every cadet prick up his ears; Admiral Plampin was arrived at the Cape of Good Hope, too, in the _Conqueror_, seventy-four, and on his way steering for St Helena, to take Sir Pulteney Malcolm's place. All of a sudden, I heard the young luff begin to mention a captain of a frigate's having been shot two months ago, by his own first lieutenant, on Southsea beach, and the lieutenant being supposed to have gone off in some outward-bound ship. 'By-the-by,' said the officer to Mr Rollock, 'you must have left about that time--did you touch at Portsmouth?' 'Why, yes,' answered the planter, 'we did. What were the parties' names?' I edged over to Westwood near the head of the companion, and whispered to him to go below to our berth, in case of their happening to attend to us more particularly; and the farther apart we two kept the better, I thought. The officer at once gave Captain Duncombe's name, but didn't remember the other; on which he turned to his first lieutenant with, 'I say, Mr Aldridge, d'you recollect the man's name that shot the captain of the _N'Oreste_, as they called her?' 'What, that bad business?' said the other; 'no, Mr Moore, I really don't--I hope he's far enough off by this time!' My breath came again at this, for it had just come into my mind that Finch, who was close by, had got hold of the name, although he fancied it mine. "I was sauntering down the stair, thinking how much may hang at times on a man's good memory, when I heard the first lieutenant say, 'By-the-by, though, now I recollect, wasn't it Westwood?' 'Yes, yes, Westwood it was!' said the other. Then came an exclamation from Finch, and shortly after he and the first lieutenant stepped down together, talking privately of the matter, I suppose, to the cuddy, where I had gone myself. The lieutenant looked up at me seriously once or twice, then went on deck, and a few minutes afterwards the brig's boat was pulling towards her again, while the passengers flocked below to breakfast. I saw the thing was settled; the mate could scarcely keep in his triumph, as he eyed me betwixt surprise and dislike, though rather more respectfully than before. As for Westwood, he sat down with the rest, quite ignorant of what had turned up; notwithstanding he threw an uneasy look or two through the cuddy port at the brig, still curveting to windward of us, with her main-yard aback; for my part, I made up my mind, in the meanwhile, to bear the brunt of it. "'Twas no matter to me _now_ where I went; whereas, with Westwood, it was but a toss-up betwixt a rope and a prison, if they sent him back to England. No fear of _my_ being tried in his place, of course; but if there had been, why, to get away both from him and _her_, I'd have to run the chance! There was a bitter sort of a pleasure, even, in the thought of taking oneself out of the way--to some purpose, too, if I saved a fellow like my old schoolmate from a court-martial sentence, and a man far worthier to win the heart of such a creature than myself: while the worst of it was, I was afraid I'd have come to hate Tom Westwood if we had stayed near each other much longer. "Accordingly, I no sooner heard the dip of the gig's oars coming alongside again, than one of the stewards brought me a quiet message from Mr Finch, that he wanted to see me on deck; upon which I rose off my chair just as quietly, and walked up the companion. The fact was--as the fellow could scarce have ventured to look his passengers in the face again after a low piece of work like this--'twas his cue to keep all underhand, and probably lay it to the score of my actions aboard, or something; however, he couldn't throw any dust of the kind in the second lieutenant's eyes, who gave him a cold glance as he stepped on deck, and, picking me out at once where I stood, inquired if I were the person. The first mate nodded, whereupon the brig's officer walked towards me, with a gentlemanly enough bow, and, 'I regret to have to state, sir,' said he, 'that Captain Wallis desires to see you, _particularly_, aboard the brig.' 'Indeed, sir,' answered I, showing very little surprise, I daresay, gloomy as I felt; 'then the sooner the better, I suppose.' 'Why, yes,' said the lieutenant, seemingly confused lest he should meet my eye, 'we're anxious to make use of this breeze, you--you know, sir.' 'Hadn't Mr Collins--this gentleman--better take his traps with him, Lieutenant Moore?' said Finch, free and easy wise. 'No, sir,' said the young officer sternly, 'we can spare time to send for them, if necessary; of course you will keep the Indiaman in the wind, sir, till the brig squares her main-yard.' I gave Finch a single look of sheer contempt, and swung myself down by the man-ropes from the gangway into the boat; the lieutenant followed me, and next minute we were pulling for the brig's quarter. The moment I found myself out of the _Seringapatam_, however, my heart nigh-hand failed me, more especially at sight of the quarter-gallery window I had seen the light from, on the smooth of the swell, that first night we got to sea. I even began to think if there weren't some way of passing myself clear off, without hauling in Westwood; but it wouldn't do. Before I well knew, we were on board, and the lieutenant showing me down the after-hatchway to the captain's cabin. CHAPTER XX "The captain was sitting with one foot upon the carronade in his outer-cabin, looking through the port at the heavy Indiaman, as she slued about and plunged in the blue surge, with all sorts of ugly ropes hanging from her bows, dirty pairs of trousers towing clear of the water when she lifted, and rusty stains at her hawse-holes. A stout-built, hard-featured man he was, with bushy black eyebrows, and grizzled black hair and whiskers, not to speak of a queer, anxious, uneasy look in the keen of his eyes when he turned to me. However, he got half up on my coming in, and I saw he was lame a little of one foot, while he overhauled me all over with his eye. 'I'm sorry to have to send for you in this way, sir,' said he, rather surprised at my rig, apparently--'very sorry, sir, and no more about it; but I can't help it, confound me--_must_ do my duty.' 'Certainly, sir,' I said. 'In fact,' said Captain Wallis, 'the Admiral ordered us to see after you--_him_, that's to say--at the Cape, you know.' 'Ay, ay, sir,' said I, watching the Indiaman's poop-nettings through the port over his head, as he sat down. 'Pooh, pooh,' continued he, 'you can't be the man--just say you don't belong to the service--confound it, I'll pass you!' 'Why, sir,' said I, 'I can't exactly say _that_.' 'I hear you're Westwood of the _Orestes_, though,' said he; 'now I don't ask you to say _no_, sir; but everybody knew the _Orestes_, and I don't like the thing, I must say: so perhaps you're able to swear _he_ is not aboard the Indiaman--just now, you know, sir--_just now_, eh?' "This tack of his rather dumfoundered me, seeing the captain of the brig meant it well; but deuced unlucky kindness it was, since I couldn't swear to the very thing he fancied so safe, and his glance was as quick as lightning, so he caught the sense of my blank look in a moment--as I fancied, at least. 'The fact is, sir,' added he,'the surgeon told me just now he knows Lieutenant Westwood well enough by sight so they locked him up! You see we could have made you out at any rate, sir--however, we'll let the doctor stay till we're clear of the Indiaman, I think.' 'Then you take me for the gentleman you speak of, Captain Wallis?' asked I, faintly; for at the same moment I could see a light- dress and a white ribbon fluttering on the _Seringapatam's_ poop, the look of which sent the blood about my heart. 'Twas hard to settle betwixt a feeling of the kind, and fear for Westwood; it struck me Captain Wallis wasn't very eager in the affair, and 'twas on my lips to assure him I wasn't the man. 'Hark'ee,' broke in he, with almost a wink, and a smile ready to break out on his mouth, 'the short and the long of it is, I'll take _you_! We must have somebody to show in the case; though now I remember, there was someone else said to've gone off with you--but we won't trouble _him_! If we've brought away the wrong man, why, hang it, so much the better! If you're Westwood, I can tell you, they'll run ye up to a yardarm, sir! Much more comfortable than ten years or so in a jail, too, as--as no one knows better than _I_ do myself.' "Here the captain's face darkened, his eye gleamed, and he rose with a limp to ring a hand-bell on the table. 'White,' said he to the marine that put his head in at the door, with his hand up to it, 'desire the first lieutenant, from me, to send a boat aboard for this gentleman's things.' 'I'm afraid, sir,' continued he gravely to me, 'you'll have to reckon yourself under arrest--but you'll find the gentlemen in the gun-room good company, I hope, for a day or two, till we make St Helena.' I saw the captain's mind was made up, and for the life of me I didn't know what to say against it; but speak I could not, so with a stiff bow and a sick sort of a smile I turned out of the door, and walked along to the gun-room, which was empty. I could see the boat soon after under the ship's side, dipping and rising as they handed down my couple of portmanteaus to the man-o'-war's men; the young reefer came down again as nimble as a monkey, with some letters in his hand, took off his cap to some ladies above, and sang out to give way; five or six flashing feathers of the oars in the sunlight, and they were coming round the brig's stern. "The brig was just squaring away her main-yard at the whistle from the boatswain's mates, when the whole run of the Indiaman's bulwarks was crowded with the passengers' and men's faces, watching the brig gather way to pass ahead; I could hear the officers on deck hail the India mates, wishing them a good voyage, the ladies bowing and waving their handkerchiefs to the British Union-Jack. Some sort of confusion seemed to get up, however, about the ship's taffrail, where Rollock, Ford, and some others were standing together; the planter jumped up all at once on the quarter-mouldings nearest the brig, then jumped down again, and his straw hat could be seen hurrying towards the quarter-deck. "Next I caught a bright glimpse of Violet Hyde's face, as the sun shot on it free of the awnings--her eyes wandering with the brig's motion, I fancied, along the deck above me, till suddenly she seemed to start, and Westwood appeared behind her. The next thing I saw was the black-faced figure-head of the _Seringapatam_ rising below her bowsprit, about sixty yards from the gun-room port where I was, and down she went again with a heavy plash, as Tom Westwood himself leapt up between the knight-heads at the bow, hailing the brig's deck with a voice like a trumpet. 'Ahoy! the _Podargus_ ahoy! For mercy's sake, heave to again, sir!' he sung out. 'I'm the man you want!' 'The Indiaman ahoy!' I heard Captain Wallis himself hail back. 'What d'ye say?' The creak of our yards, with the flap of the jib, and the men's feet, drowned Westwood's second hail, as it came sharp up to windward; the sailors in the Indiaman's bows were grinning at him behind, while the first lieutenant of the brig shouted gruffly that she had no time to wait for more letters; and I heard the gun-room steward say to the marine, on going out with the dirty breakfast-cloth, he wondered if 'that parson cove thought the _Pedarkis_ wanted a chapling,' or was only 'vun of these fellers that's so troublesome to see the French Hemperor.' "'Well,' said the marine, ''twas pretty queer if he took the _Pedarkis_ for the ship to carry him there. I don't think the captain would let a rat into the island if he could help it' 'Not he,' said the steward; 'plenty on 'em in already, Vite, my man--I do think they used to swim off on board here, by the way our cheese vent.' All this time I never stirred from the port, watching with my chin on the muzzle of the gun till the Indiaman was half-a-mile to windward of us, her big hull still rising and falling on the same swells, topped with clusters of heads; her topsails lowered in honour of the flag, the ensign blowing out half-mast high for the death of Captain Williamson; a long wash of the water ran outside the brig's timbers, surge after surge, and the plunge at her bows showed how fast she began to run nor'-westward before the wind. You may well fancy my state, after all I'd done for weeks; in fact, one scarce knew the extent of what he'd felt, what he'd looked forward to, till he found himself fairly adrift from it; 'twould even have been nothing, after all, could I just have thought of Violet Hyde as I'd done two hours ago, on waking with last night in the river on my mind. "As it was, 'twould have taken little to make me jump out of the port into the sweep of blue water swelling toward the brig's counter; the _Seringapatam_ being by this time astern. I couldn't even see her, or aught save the horizon, to windward; but at this moment the young second lieutenant came below, and, seeing me, he began in a polite enough way, with a kindly manner about it, trying to raise my spirits. 'I suppose, sir,' said I, rather sulkily I daresay, 'I can have a berth just now?' 'Oh, certainly,' said he, 'the steward has orders to see to it at once. Will you come on deck a minute or two in the meantime, sir?' "I looked back from the ship astern to the brig-of-war's clean white decks, flush fore and aft, with the men all forward at their stations, neatly dressed in regular man-o'-war style, everyone alike--a sight that would have done me good at another time, small as she was by comparison; but the very thought of the Indiaman's lumbering poop and galleries was too much for me--'twas as if you'd knocked out those two round-house doors of hers, and let in a gush of bare sky instead. The ship-shape man-o'-war cut of things was nothing, I fancied, to the snug spot under those top-gallant bulwarks of hers, and the breezy poop all a-flutter with muslin of an evening, where you found books and little basket affairs stuck into the coils of rope. I thought the old _Seringapatam_ never looked so well, as she commenced trimming sail on a wind, beginning to go drive ahead, with a white foam at her bows, and her whole length broadside-on to us. All at once we saw her clue up courses and to'-gallant sails, till she was standing slowly off under the three topsails and jib; the two lieutenants couldn't understand what she was about, and the captain put the glass to his eye, after which he said something to the second lieutenant, who went forward directly. "The next thing I saw was the Indiaman coming up in the wind again for about a minute; she had her stern nearly to us, when the moment after, as she rose upon a long sea, you saw something flash white off her lee gangway in the sunlight, that dropped against it into the hollow of a wave. The next minute she fell off again with her topsails full, and the first shower of spray was rising across her forefoot, when the flash of a gun broke out of her side, and the sound came down to us; then a second and a third. The brig gave her the same number in answer, and as soon as the smoke betwixt us had cleared away, the ship could be seen under full sail to the south-westward by west. '_That_'s her poor skippers hammock dropped alongside, gentlemen,' said Captain Wallis to his officers; 'God be with him.' 'Amen,' said the first lieutenant, and we put our caps on again. 'Set stu'nsails, Mr Aldridge,' said the captain, limping down the hatchway; as for me, I leant I don't know how long over the brig's taffrail, watching the ship's canvas grow in one, through the width of air betwixt us; my heart full, as may be supposed, not to say what notions came into my head of what might happen to her under Finch's charge, ere she reached Bombay. No one belonging to the brig spoke to me, out of kindness, no doubt; and the ship was hull-down on the horizon, to my fancy with somewhat of a figure like _hers_, when she stood with the cashmere shawl over her head in the dusk. Then I went gloomily down to my berth, where I kept close by myself till I fell asleep, though the gun-room steward was sent to me more than once to join the officers. "It wasn't till the next day, in fact, when I went on the quarter-deck at noon, wearied for a fresher gulp of air, that I saw any of them; and the breeze having fallen lighter that morning, they were too busy trimming sail and humouring her to give me much notice. I must say I had seldom seen a commander seem more impatient about the sailing of his craft, in time of peace, than the captain of the _Podargus_ appeared to be; walking the starboard side as fast as the halt in his gait would let him, and the anxious turn of his eyes plainer than before, while he looked from the brig's spread of stu'nsails to the horizon, through the glass, which, I may say, he never once laid down. From where the brig spoke the Indiaman, to St Helena, would be about two or three days' sail with a fair wind, at the ordinary strength of the south-east trade; though, at this rate, it might cost us twice the time. I noticed the men on the forecastle look to each other now and then knowingly, at some fresh sign of the captain's impatience; and the second lieutenant told me in a low voice, with his head over the side near mine, Captain Wallis had been out of sorts ever since they lost sight of the island. 'You'd suppose, sir,' said he, laughing, 'that old _Nap_ was his sweetheart, by the way he watches over him; and now, I fancy, he's afraid St Helena may be sunk in blue water while we were away! In fact, Mr Westwood,' added he, 'it looks devilish like as if it had come up from Davy Jones, all standing; so I don't see why it shouldn't go down to him again some day; I can tell you it's tiresome work cruising to windward there, though, and we aren't idle at all!' "'Did you ever see the French Emperor yourself, sir?' asked I--for I must say the thought of nearing the prison such a man was in made me a little curious. 'Never, sir, except at a mile's distance,' said the second lieutenant; 'indeed, it's hard to get a pass, unless you know the governor. But I've a notion,' continued he, 'the governor's carefulness is nothing to our skipper's! Indeed, they tell a queer story of how Sir Hudson Lowe was gulled for months together, when he was governor of Capri island, in the Mediterranean. As for the captain, again, you'd seek a long time ere you found a better seaman--he's as wide awake, too, as Nelson himself; while the curious thing is, I believe, he never once clapped eyes on Bonaparte in his life! But good cause he has to hate him, you know, Mr Westwood!' 'Indeed,' said I, taking a moment's interest in the thing; and I was just going to ask the reason, when the first lieutenant came over to say Captain Wallis would be glad if I would dine with him in the cabin. "At dinner-time, accordingly, I put on a coat, for the first time, less like those the cadets in the _Seringapatam_ wore, and went aft, where I found the first lieutenant and a midshipman with the captain. He did his best to soften my case, as I saw by his whole manner during dinner; after which, no sooner had the reefer had his one glass of wine, than he was sent on deck to look out to windward. 'Well, sir,' said Captain Wallis thereupon, turning from his first luff to me, 'I'm sorry for this disagreeable business! I believe you deny being the person at all, though?' 'Why, sir,' said I, 'I am certainly no more the first lieutenant of the _Orestes_ than yourself, Captain Wallis! 'Twas all owing to a mistake of that India mate, who owed me a grudge.' 'Oh, oh, I see!' replied he, beginning to smile, 'the whole matter's as plain as a handspike, Mr Aldridge! But I couldn't do less, on the information.' 'However, sir,' put in the first lieutenant, 'there's no doubt the real man must have been in the ship, or the mistake could not have happened, sir!' 'Well--you look at things too square, Aldridge,' said the captain. 'All _you_'ve got to do, I hope, sir, is just to prove you're not Westwood; and if you want still to go out to the East Indies, why, I daresay you won't be long of finding some outward-bound ship or other off Jamestown. Only, I'd advise you, sir, to have your case over with Sir Pulteney, before Admiral Plampin comes in--as I fear he would send you to England.' 'It matters little to me, sir,' I answered; 'seeing the reason I had for going out happens to be done with.' Here I couldn't help the blood rising in my face; while Captain Wallis's steady eye turned off me, and I heard him say in a lower key to the lieutenant, he didn't think it was a matter for a court-martial at all. 'Pooh, Aldridge!' said he, 'some pretty girl amongst the passengers in the case, I wager!' 'Why,' returned Aldridge, carelessly, 'I heard Mr Moore say some of the ladies were pretty enough, especially one--some India judge or other's young daughter--I believe he was in raptures about, sir.' This sort of thing, as you may suppose, was like touching one on the raw with a marling-spike; when the captain asked me--partly to smooth it over, maybe--'By-the-by, sir, Mr Aldridge tells me there was something about a pirate schooner, or slaver, or some craft of the kind, that frightened your mates--that's all stuff, I daresay--but what I want to know is, in what quarter you lost sight of her, if you recollect?' 'About nor'-west by north from where we were at the time, sir,' said I. 'A fast-looking craft was she?' asked he. 'A thorough-built smooth-going clipper, if ever there was one,' I said. At this the captain mused for a little, till at last he said to his lieutenant: 'They daren't risk it; I don't think there's the Frenchman born, man enough to try such a thing by water, Aldridge?' 'Help _him_ out, you mean, sir?' said the luff; 'why, if he ever got as far as the water's edge, I'd believe in witchcraft, sir!' 'Give a man time, Mr Aldridge,' answered the captain, 'and he'll get out of anything where soldiers are concerned--every year he's boxed up sharpens him till his very mind turns like a knife, man! It makes one mad on every point besides, I tell you, sir--whereas after he's free, perhaps, it's just on _that only_ his brain has a twist in it!' 'No doubt, Captain Wallis,' said Aldridge, glancing over to me, as his commander got up and began walking about the cabin, spite of his halt. 'D'ye know,' continued he, 'I've thought at times what I should like best would be to have _him_ ahead of the brig, in some craft or other, and we hard in chase--I'd go after that man to the North Pole, sir, and bring him back! Without once going aboard to know he was there, I'd send word it was Jack Wallis had him in tow!' 'What is Bonaparte like, then, after all, sir?' I asked, just to fill up the break. 'I never saw him, nor he me,' replied Captain Wallis, stopping in his walk; 'but every day he may have a sight of the brig cruising to windward; and as for the island, we see plenty of _it_, I think, Aldridge?' 'Ay, ay, sir,' said Aldridge, 'that we do! For my part, I can't get the ugly stone steeples of it out of my head!' 'Well,' continued the captain, 'at times, when we're beating round St Helena of a night, I'll be hanged if I haven't thought it began to loom as if the French Emperor stood on the top of it, like a shadow looking out to sea the other way--and I've gone below lest he'd turn round till I saw his face. I've a notion Mr Aldridge, if I once saw his face, I'd lose what I feel against him, just as I used always to fancy, the first five years in the _Temple_, if he were only to see _me_, he would let me out! But they say he's got a wonderful way of coming over everyone, if he likes!' After this, Captain Wallis sat down and passed the decanters, the first lieutenant observing, he supposed Bonaparte was a great man in his way, but nothing to Nelson. 'Don't tack them together, Aldridge!' said his commander quickly; 'Nelson was a man all over, he'd got the feelings of a man and his faults; but I call _him_, yonder, a perfect demon let loose upon the world! To my mind all the blood those republicans shed, with their murdered king's at bottom of it, got somehow into him, till he thought no more of human beings, or aught concerning 'em, than I do of so many cockroaches! But the terrible thing was, sir, his infernal schemes, and his cunning: why, he'd twist you one country against another, and get hold of both, like a man bending stu'nsail halliards; there were men grew up round him quick as mushrooms, fit to carry out everything he wanted; so one couldn't wonder at him enough, Mr Aldridge, if it was only natural! I can't tell you anything like what I felt,' he went on, 'when I was in Sir Sydney Smith's ship, cruising down Channel, and we used to see the gun-boats and flat-bottoms he got together for crossing the straits; or one night with poor Captain Wright, that we stood in near enough to get a shot sent at us off the heights--the whole shore about Boulogne was one twinkle of lights and camp-fires, and you heard the sound of the hammers on planks and iron, with the carts and gun-carriages creaking--not to speak of a hum from soldiers enough, you'd have thought, to eat Old England up! And where are they now?' 'I don't know, sir, indeed,' said the first lieutenant gravely, supposing by the captain's look, no doubt, that it was a question. 'What, Captain Wallis!' exclaimed I, 'were you with Captain Wright, then, sir?' Of course, like everyone in the service, I had heard Captain Wright's story often, with ever so many versions; there was a mystery about his sad fate that made me curious to hear more of what gave the whole navy, I may say, a hatred to Bonaparte not at all the same you regard a fair enemy with. "'_With_ him, say you, sir?' repeated the captain of the _Podargus_, 'ay was I! I was his first lieutenant, and good cause I had to feel for the end he came to, as I'll let you hear. One night Captain Wright went ashore, as he'd often done, into the town of Beville, dressed like a smuggler; for the fact was the French winked at smuggling, only I must say _we_ used to land men instead of goods. I didn't like the thing that night, and advised him not to go, as they'd begun to suspect something of late! However, the captain by that time was foolhardy, owing to having run so many risks, and he was bent on going in before we left the coast; though, after all, I believe it was only to get a letter that any fisherman could have brought off. The boat was lying off and on behind a rocky point, and we waited and waited, hearing nothing but the sound of the tide making about the big weedy stones, in the shadow from the lights of the town; when at last the French landlord of the little tavern he put up at came down upon the shingle and whistled to us. He gave me a message from Captain Wright, with the private word we had between us, saying he wanted me to come up to the town on a particular business. Accordingly I told the men to shove out again, and away I went with the fellow. "'No sooner did I open the door of the room, however, than three or four gendarmes had hold of me, and I was a prisoner: as for Captain Wright, I never saw him more. The morning broke as they brought me up on horseback in the middle of them, along the road to Paris, from whence I could make out the cutter heeling to the breeze a mile or two off the land, with two or three gun-boats hard in chase. "'Well, sir, at Paris they clapped me into a long gloomy-like piece of masonwork called the _Temple_, close alongside of the river, where plenty of our countrymen were; Captain Wright and Sir Sydney Smith himself among the rest, as I found out afterwards. The treatment wasn't so bad at first; but when you climbed up to the windows, there was nothing to be seen but the top of a wall and roofs of houses all round, save where you'd a glimpse of the dirty river and some pig-trough of a boat. One day I got a letter from Captain Wright--how they let me have it I don't well know--saying he was allowed a good deal of comfort in the meantime, but he suspected some devilish scheme in it, to make him betray the British Government, or something of the kind; that he'd heard one of the French royalist generals had choked himself in his prison, but never to believe he'd do the same thing, though every night he woke up thinking he heard the key turn in the door. The next thing I heard of was that Captain Wright had made away with himself, sir!' "Here Captain Wallis got up again, walking across the cabin, seemingly much moved. 'Well, after that I slept with the dinner-knife in my breast, till the jailer took it away; for I thought at the time that poor Wright had been murdered, though I found cause to change my mind when I knew what loneliness does with a man, not to speak of the notion being put before him to take his own life. For a while, too, Captain Shaw was in the same cell; by which time we had such bad food, and so little of it, that one day when a pigeon lighted on the window, which used to come there for a crumb or two every afternoon, right along with the gold gleam of the sun as it shot over the dark houses to that window, I jumped up and caught it. Shaw and I actually tore it in bits, and ate it raw on the spot; though 'twas long ere I could get rid of the notion of the poor bird fluttering and cooing against the bars, and looking at me with its round little soft eye as it pecked off the slab. But what was that to the thought of my old father that had hurt himself to keep me in the navy, and me able now to make his last days comfortable? or the innocent young girl I had married the moment I got my commission of first lieutenant, expecting to be flush of prize-money? It even came into my head often, when I sat by myself in the cell they afterwards put me into, alone, how that little blue pigeon might have carried a letter to England for me; at any rate it was the only thing like a chance, or a friend, I ever saw the whole time I was there; and foolish as the notion may look, why the window was too high in a smooth wall for me once to reach it. "'I heard all Paris humming round the thick of the stone every day, and sometimes the sound of thousands of soldiers tramping past below, over the next bridge, with music and such like--no doubt when the First Consul, as they called him, went off to some campaign or other: then I'd dream I felt the deck under me in a fresh breeze at night, till the soul sickened in me to wake up and find the stones as still as before, and now and then hear the sentries challenging on their rounds. "'Well, one day, a fellow in a cloak, with a slouch hat over his forehead, was let in to try, as I thought, if there was anything to be got out of me, as they tried two or three times at first; some spy he was, belonging to that police devil Fouche. What did he offer me, d'ye think, after beating about the bush for half-an-hour, but the command of a French seventy-four under the Emperor, as he was by that time, and, if I would take it, I was free! On this I pretended to be thinking of it, when the police fellow sidled near me, to show a commission signed with the Emperor's name at the foot. "'In place of taking hold of it, however, I jumped up and seized the villain's nose and chin before he saw my purpose, stuffed the parchment into his mouth by way of a gag, and made him dance round the cell, with his cloak over his head and his sword dangling alongside of him, to keep his stern clear of my foot; till the turnkey heard the noise, and he made bolt out as soon as the door was opened. You'd wonder how long that small matter served me to laugh over, for my spirit wasn't broken yet, you see; but even then, in the very midst of it, I would all of a sudden turn sick at heart, and sit wondering when the exchange of prisoners would be made that I looked for. The worst of it was, at times a horrid notion would come into my head of the French seventy-four being at sea at the moment, and me almost wishing they'd give me the offer over again--I fancied I felt the very creak of her straining in the trough of a sea, and saw the canvas of her topsails over me, standing on her poop with a glass in my hand, till she rose on a crest, and there were the _Agamemnon's_ lighted ports bearing down to leeward upon us, till I heard Nelson's terrible voice sing out, "Give it to 'em, my lads!" when the flash of her broadside showed me his white face under the cocked hat, and it came whizzing over like a thirty-two-pound shot right into my breast, as I sunk to the bottom, and found myself awake in the prison. "'I don't know how long it was after, but they moved me to another berth, where a man had shot himself through the head, for we actually met his body being carried along the passage; and more than that, sir, they hadn't taken the trouble to wash his brains off the wall they were scattered on. There I sat one day after another, watching the spot marked by them turn dry, guessing at everything that had gone through them as long as he was alive in the place, till my own got perfectly stupid; I was as helpless as a child, and used to cry at other times when the jailer didn't bring me my food in time. I fancied they'd forget all about me in England; and as for time, I never counted it, except by the notion I had been two or three years in. "'At last the turnkey got so used to me, thinking me no doubt such a harmless sort of a poor man, that he would sit by and talk to me, giving accounts of the Emperor's battles and victories, and such matters. I must say I began to feel as if he was some sort of a god upon earth there was no use to strive against, just as the turnkey seemed to do, more especially when I heard of Nelson's death; so when he told me one time it wouldn't do for Fouche or the Emperor to let me out yet, I said nothing more. "Will the Emperor not let me out _now_?" asked I, a long time after. "_Diable!_" said the man, "do you think His Majesty has time to think of such a poor fellow as you, among such great matters? No, no, _pauvr' homme_!" continued he; "you're comfortable here, and wouldn't know what to do if you were out! No fear of your doing as your Capitaine _Ourite_ did, since you've lived here so long, monsieur." "How long is it now, good Pierre?" asked I, with a sigh, as he was going out at the door; and the turnkey counted on his fingers. "Ulm--Austerlitz--Jena," said he slowly; "_oui, oui_--I scarcely thought it so much--it wants only six or seven months of ten years!" and he shut-to the door. I sprang up off the bed I was sitting on, wild at the thought--I may say, for a day or two I was mad--ten years! ten years!--and all this time where was my poor innocent Mary, and the child she expected to bear when I left Exeter--where was my old father? But I couldn't bear to dwell on it. Yes, Aldridge, by the God above, they had kept me actually _ten years_ there, in that cursed Temple while _he_ was going on all the time with his victories, and his shows, and his high-flown bulletins! Yet he wasn't too high, it seems, to stoop to give out, through his tools, how Wright and I had both killed ourselves for fear of bringing in the British Government--not to offer me a seventy-four in a dungeon--_me_, a man used to wind and water, that loved a breeze at sea like life. 'Twas the very devil's temptation, sir; but I'll tell you what, both Captain Wright and myself had been with Sir Sidney Smith at Acre, when _he_ was baffled for the first time in his days--_that_ was the thing, I believe from my soul, that he hated us for. _I_ had a right to be exchanged ten times over, though he might have called Wright a spy; but what was my poor wife and her new-born baby, or my old father's gray hairs to _him_, and his great ambition to make everything his own--and when the very thought of me in my hole at the Temple would strike him in the midst of his victories, where he hadn't time, forsooth, to trouble himself about a poor man like me. The fact was, I could tell how he offered a British seaman, that had had a finger in nettling him, the command of one of his seventy-fours, which he had nobody fit to manage--and that in a prison where I'd be glad even of fresh air. "''Twas then, in fact, the purpose rose firmer and firmer in me, out of the fury that was like to drive me mad, how I'd get out of his clutches, and spend my life against the very pitch of his power I knew so well about. Till that time I used to look through the bars of the window at the Seine, without ever fancying escape, low down as it was, compared with my last cell. There was a mark in the stone floor with my walking back and forward since they put me in; and by this time I had the cunning of a beast, let alone its strength, in regard of anything I took into my head; often I used to think I saw the end of my finger, or the corner of a stone, more like the way a fly sees them, than a man. The turnkey, Pierre, would never let me have a knife to eat my food with, lest I should do as he said all we English were apt to do--kill myself--which, by-the-way, is a lie; and I think that fiend of an Emperor yonder must have taught them to blame us with their own crime. However, latterly he let me have a fork for half-an-hour at dinner; and for a quarter of an hour every day, except those when he stayed to talk to me as I ate it, did I climb up and work with that fork at the top and bottom of one of the window-bars, taking care not to break the fork, and jumping down always in time to finish the meal. It took me four whole months, sir, to loosen them! Such deadly fear as I was in, too, lest he'd find it out, or lest they moved me to another cell--you'd have thought I was fond of the walls round the place, where hundreds of men before me had scrawled their last words; and the one that shot himself had written, "_Liberte--aneantissement!_ "Liberty--annihilation!" just over where the spatter of his brains had stuck when he laid his head to the spot! If Pierre had noticed what I'd been about, my mind was made up to kill him, and then make the trial before they missed him; but _that_ I had a horror of, after all, seeing the man had taken a sort of liking to me, and I knew he had a wife. "'Well, at last, one day I had the thing finished; when midnight came I trembled like a leaf, till I began to fear I couldn't carry it through. I tore my shirt and the blanket in strips, to twist into a line, got out the bar by main force, squeezed through, and let myself down. The line was just long enough to let me swing against the cold wall, over a sentry's head going round the parapet below; as soon as he was past, I dropped on the edge of the wall, and fell along it, my fingers scraping the smooth stone to no purpose, till I was sliding off into the dark, with the river I didn't know how far below me, though I heard it lapping against some boats at the other side. "'For a few moments I was quite senseless from the fall into the water. The splash roused the sentinels, and three or four bullets whizzed into it about me, as I struck out for the shore. Still the night was thick enough to help me clear off among the dark lanes in the city; and the upshot of it was that I found out some royalists, who supplied me with a pedlar's dress; till, in the end, after I can't tell you how many ticklish chances, where my luck hung upon a hair, I reached the coast, and was taken off to a British frigate. At home, sir--at home, I found I'd been given up long ago for a dead man in Bonaparte's prisons, and--and--the old man had been buried seven years, Aldridge--but not so long as my--wife. The news of my taking my own life in the Temple saved her the rest--'twas too much for her at the time, Aldridge--both she and her little one had lain in the mould nine years, when I stood looking at the grass under Exeter Cathedral. I was a young man almost, still; but my hair was as grizzled when I got out of the Temple in 1813, as you see it now, and I'll never walk the deck fairly again. Aldridge,' added the captain of the _Podargus_, turning round and standing still, with a low sort of a deep whisper, ''tis a strange thing, the Almighty's way of working--but I never thought--in the Temple yonder, longing for a heave of the water under me--I I little thought John Wallis would ever come to keep guard over his Majesty, the Emperor Napoleon!' "When Captain Wallis stopped, the long send of the sea lifting the brig below us, with a wild, yearning kind of ripple from her bows back to her counter, and weltering away astern--one felt it, I may say, somewhat like an answer to him, for the breeze had begun to freshen: it had got all of a sudden nearly quite dark, too, as is the case inside the tropics, without the moon. 'Let's go on deck, gentlemen,' said the captain, coming to himself; 'now clap on those other topmost stu'nsails, Mr Aldridge, and make her walk, sir'--'No saying,' I heard him mutter, as he let us go up before him--'no saying what the want of the _Podargus_ might do, off the island, these dark nights--with water alongside, one can't be sure. I warrant me if _that man's_ dreams came true, as mine did, he would be at the head of his thousands again, ruining the whole world, with men rotting out of sight in dungeons while the wind blows! Ay, dreams, young gentleman!' said he to me as we stood on deck; 'I'll never get rid of that prison, in my head, nor the way that dead man's brain seemed to come into mine, off the wall! But for my part, off St Helena, 'tis Napoleon Bonaparte's dreams that enter into my head. If you'll believe it, sir, I've _heard_ them as it were creeping and tingling round the black heights of the island at dead of night, like men in millions ready to break out in war-music, as I used to hear them go over the bridge near the Temple--or in shrieks and groans; we all the time forging slowly ahead, and the surf breaking in at the foot of the rocks. I know then _who's_ asleep at the time up in Longwood!' "The brig-of-war was taking long sweeps and plunges before the wind; the Southern Cross right away on her larboard quarter, and the very same stars spread all out aloft, that I watched a couple of nights before, close by Violet Hyde. The whole of what I'd just heard was nothing to me in a single minute, matched with the notion of never seeing her more. Everything I'd thought of since we left England was gone, even one's heart for the service; and what to do now, I didn't know. I scarce noticed it commence to rain, till a bit of a squall had come on, and they were hauling down stu'nsails: the dark swells only to be seen rising with the foam on them, and a heavier cover of dull cloud risen off the brig's beam, as well as ahead; so that you merely saw her canvas lift before you against the thick of the sky, and dive into it again. 'Twas just cleared pretty bright off the stars astern of us, however, wind rather lighter than before the squall, when the captain thought he made out a sail near about the starboard beam, where the clouds came on the water-line; a minute or two after she was plain enough in the clear, though looming nearly end-on, so that one couldn't well know her rig. Thinking at first sight it might be the schooner, Captain Wallis was for bracing up, to stand in chase and overhaul her; but shortly after she seemed either to yaw a little, or fall off again before the wind like ourselves, at any rate showing three sticks on the horizon, with square canvas spread, and evidently a small _ship_. "'Some homeward-bound craft meaning to touch at the island,' said Captain Wallis, telling the first lieutenant to keep all fast; by which time she was lost in the dusk again, and I wasn't long of going below. A fancy had got hold of me for the moment, I can't deny, of its being the _Seringapatam_ after us on Westwood's owning himself; whereupon I persuaded myself Captain Wallis might perhaps take the risk on him of letting us both go. For my part, I felt by this time as if I'd rather be in the same ship with _her_, hopeless though it was, than steer this way for the other side of the line; and I went down with a chill at my heart like the air about an iceberg. "Not being asleep, however, a sudden stir on deck, an hour or two after that, brought me out of my cot, to look through the scuttle in the side. The brig had hauled her wind from aft on to her starboard quarter, making less way than _before_ it, of course; I heard the captain's voice near the after-hatchway, too; so accordingly I slipped on my clothes, and went quietly up. The _Podargus_ was running through the long broad swells usual thereabouts, with her head somewhere toward north-east; the officers all up, the whole of the crew in both watches clustered beyond the brig's fore-course, and the captain evidently roused, as well as impatient; though I couldn't at first make out the reason of her being off her course. As soon as she fell off a little, however, to my great horror I could see a light far ahead of us, right in the gloom of the clouds, which for a moment you'd have supposed was the moon rising red and bloody, till the heave of the sea betwixt us and it showed how both of us were dipping: and now and then it gave a flaring glimmer fair out from the breast of the fog-bank, while the breeze was sending a brown puff of smoke from it now and then to leeward against the clouds; through which you made a spar or two licking up the flame, and a rag of canvas fluttering across on the yard. "Twas neither more nor less than a ship on fire--no doubt the vessel seen abeam of us that evening--a sight at which Captain Wallis seemingly forgot his hurry to make St Helena, in the eagerness shown by all aboard to save the poor fellows. Suddenly there was another wild gleam from the burning craft, and we thought it was over altogether, when up shot a wreath of fire and smoke again, then a fierce flash with a blue burst of flame, full of sparks, and all sorts of black spots and broken things, as if she had blown up while she heaved the last time on the swell. Everything was pitch dark next minute in her place, as if a big blot of ink had come instead; the brig-of-war herself rolling with a flap of her headsails up against the long heavy bank of cloud that blocked the horizon. 'Keep her away, sirrah!' shouted Captain Wallis, and the _Podargus_ surged ahead as before, all of us standing too breathless to speak, but counting the heads of the waves as they flickered past her weather-beam. 'God's sake!' exclaimed the captain at last, 'this is terrible, Aldridge. If I had only overhauled her, as I meant at first, we might have helped them in time; for no doubt the fire must have been commenced when we noticed her yawing yonder a couple of hours ago, sir.' 'I think not, sir,' said his lieutenant; '_we_ were against the clear; and if they'd been in danger _then_, she'd have fired a distress-gun. There couldn't have been much powder aboard, sir--more likely rum, I think!' 'For Heaven's sake!' continued the captain, 'let's look about--she must surely have had boats out, or something, Mr Aldridge! The best thing we can do is to fire a few times as we bear down--see that bow-gun cleared away, Mr Moore, and do it!' "We might have been about a mile, as was guessed, from where she was last seen, when the brig fired a gun to windward, still standing on under everything. At the second flash that lighted up the belly of the clouds, with the black glitter of the swells below them, I fancied I caught a moment's glimpse of something two or three miles away. It was too short to say, however; and soon after the twinkle of a light, seemingly hoisted on a spar, was seen little more than half-a-mile upon the brig's lee-bow, dipping and going out of sight at times, but plain enough when it rose. Down went the _Podargus_ for the spot, sending the foam off her cutwater; and it was no long time before a wild hail from several voices could be made out almost close aboard. Ten minutes after she was brought to the wind, heaving a rope to the men on a loose raft of casks and spars, as it pitched alongside of her, with the sail hauled down on a spar they had stuck up, and a lantern at the head of it; after which the raft was cast off, and the poor fellows were safe on board. "Two of them seemed to be half-drowned, the one wrapped up in a wet pilot-coat, his face looking white and frightened enough by the glimmer of the lanterns: the other darker a good deal, so far as I could make him out for the crowd about him, and he didn't seem able to speak; accordingly both of them were taken at once below to the surgeon. The rest were four half-naked blacks, and a little chap with earrings and a seaman's dress who was the spokesman on the quarter-deck to the captain's questions--plainly American by his snuffling sort of drawl. "'Are there no more of you afloat?' was the first thing asked, to which the Yankee sailor shook his head. She was an American bark, he said, from a voyage of discovery round the two Capes; and he was mate himself, and the skipper, being addicted to his cups, had set a cask of rum on fire; so finding they couldn't get it under besides being wearied at the pumps, on account of an old leak, the men broke into the spirit-room, and got dead drunk. He and the blacks had patched up a raft in a hurry for bare life, barely saving the passenger and his servant who had jumped overboard; the passenger was a learned sort of a man, and his servant was a Mexican. Most of this I found next day, from the gun-room officers; however, I heard the mate of the burnt barque inquire of the captain whereabouts they were, as the skipper was the only man who could use a chronometer or quadrant, and the last gale had driven them out of their reckonings a long way. 'Somewhere south of the Line, I guess?' said he; but, on being told, the fellow gave a bewildered glance round him, seemingly, and a cunning kind of squint after it, as I fancied. 'Well,' said he, 'I guess we're considerable unlucky; but I consider to turn in, if agreeable!' The man had a way, in fact, half free-and-easy, half awkward that struck me; especially when he said, as he went below, he supposed 'this was a war-brig,' and hoped there 'wasn't war between the States and the old country?' 'No, my man,' said the captain, 'you may set your mind at ease on that point; but I'm afraid, nevertheless, we'll have to land you at St Helena!' "'What, mister?' said the American, starting, 'that's where you've got Boneyparty locked up? Well now, if you give me a good berth for a few, mister, I guess I'll rayther ship aboard you, till I get a better! What's your wage just now, if I may ask, captain?' 'Well, well,' said the captain, laughing, 'we'll see to-morrow, my man!'--and the American went below. 'Set stu'nsails again, Mr Aldridge,' continued Captain Wallis, 'and square yards. Why, rather than have such a fellow in the ship's company, Aldridge, I'd land him without Sir Hudson's leave!' "For my own part, next day, I should have given more notice to our new shipmates while the brig steered fair before the wind--the blacks and the mate leaning about her forecastle, and the other two being expected by the surgeon to come pretty well round before night, though the captain had gone to see them below; but a thing turned up all at once that threw me once more full into the thought of Violet Hyde, till I was perfectly beside myself with the helpless case I was in. The note Tom Westwood had shown me was still in the pocket of my griffin's coat, though I hadn't observed it till now; and what did I feel at finding out, that, instead of one from her to Westwood, it was a few words from my own sister, little Jane, saying in a pretty, bashful sort of way, that her brother Ned must come home before she could engage to anything! You may fancy how I cursed myself for being so blind; but a fellow never thinks his own sister charming at all--and what else could I have done at any rate? All I hoped for, was to get aboard of some Indiaman at St Helena, and there was nothing else I wearied to see the island again for. I may say I walked the brig's lee quarter-deck till daybreak; but anyhow the look-out from the foreyard had scarce sung out 'St Helena on the weather-bow!' when I was up, making out the round blue cloud in the midst of the horizon, with a white streak across it, like a bird afloat in the hazy blue, with the clear gleam from eastward off our starboard quarter running round to it. CHAPTER XXI "As soon as you near St Helena by a few miles, the trade-wind falls light, and making the rock, as you do from the South Atlantic, a good deal to leeward of the harbour, 'twould be pretty slow work beating round to north-east, but for the breeze always coming off the height, with the help of which one can coast easy enough along. Captain Wallis said no more than to bid the first lieutenant make the brig's number at her mast-head, while she still bore in direct upon the breast of the land, as much out of soundings as the day before; the smooth heavy swell seeming to float the island up in one huge lump ahead of us, till you saw it rolling into the very foot, with a line of surf, as if it all rose sheer out of the bottom of the sea; as grim and hard as a block of iron, too, and a good deal the same colour. By noon it hung fairly, as it were, over our mast-heads, the brig looking by comparison as tiny and as ticklish as a craft made of glass, she coasting away round, with yards braced first one way then another, and opening point after point from three hundred to two thousand feet high; while at times she would go stealing in with a faint ripple at her bows, near enough to hear the deep sound of the sea plunging slowly to the face of the rock, where the surf rose white against it without a break. "There wasn't so much as a weed to be seen, the rocks getting redder and more coppery, sending out the light like metal, till you'd have thought they tingled all over with the heat. Then as you opened another bulge in the line, the sharp sugar-loaf hills, far away up, with the ragged cliffs and crags, shot over against the bare white sky in all sort of shapes; and after a good long spell of the sea, there was little fancy needed to give one the notion that they were changing into these, as we passed ahead, to mock you. There was one peak for all the world like the top of St Paul's, and no end of church spires and steeples, all lengths and ways; then big bells and trumpets, mixed with wild beasts' heads, grinning at each other across some split in the blue beyond, and soldiers' helmets--not to speak of one huge block, like a <DW65>'s face with a cowl behind it, hanging far out over the water. Save for the colour of it all, in fact, St Helena reminds one more of a tremendous iceberg than an island, and not the less that it looks ready in some parts to topple over and show a new face; while the sea working round it, surging into the hollows below water-mark, and making the air groan inside of them, keeps up a noise the like of which you wouldn't wish to cruise alongside of every day. The strangest thing about it, however, was that now and then, as you came abreast of some deep gully running up inland, a sudden blast of wind would rush out of it, sufficient to make the _Podargus_ reel--with a savage thundering roar, too, like the howl out of a lion's mouth; while you looked far up a narrow, bare, black glen, closing into a hubbub of red rocks, or losing itself up a grey hillside in a white thread of a water-course; then the rough shell of the island shut in again, as still as before, save the light breeze and the deep hum of the surf along its foot. Curiously enough in a latitude like St Helena's, the island seems, as it were, a perfect bag of air. What with the heat of the rock, its hollow inside, the high peaks of it catching the clouds, and the narrow outlets it has, 'tis always brewing wind, you may say, to ventilate that part of the tropics--just as one may keep up cold draughts through and through a wet heap of loose stones, no matter how hot the weather is, as long as he pleases. As for a landing-place, though, there wasn't one of the gullies that didn't yawn over without falling to the sea; and, not to mention the surf underneath, where the dark swell came in unbroken from deep water without a shoal to soften it, why, watching it from the brig's side, I shouldn't have said a cat could scramble up or down the steep <DW72>s and the wreck of stones, from the water's edge to the jaws of the easiest gully you saw. "Once or twice, standing farther off, we caught sight of Diana's Peak over the shoulder of a hill, with the light haze melting about it; at last you noticed a large gun mounted against the sky on a lofty peak, where it looked like a huge telescope; and on clearing another headland, a beautiful frigate came in between us and the burst of light to seaward, cruising to windward under easy sail. She bore up and stood towards the brig-of-war, just as the line of wall was to be seen winding round the middle of Sugarloaf Point, where the sentry's bayonet glittered near his watch-box, and the soldiers' red coats could be seen moving through the covered passage to the batteries. Five minutes after, the _Podargus_ swept round the breast of Rupert's Hill into the bay, in sight of Jamestown and the ships lying off the harbour; clewing up her sails and ready to drop anchor, as the frigate hove to not far astern. "You can fancy land heaving in sight after thrice as many weeks as you've been at sea, ladies; or the view of a ship to a man that's been long laid up in bed ashore; or a gulp of fresh water in a sandy desert--but I question if any of them matches your first glimpse of Jamestown from the roadstead, like a bright piece of fairy-work in the mouth of the narrow brown valley, after seeing desolation enough to make you wish for a clear horizon again. More especially this time, when all the while one couldn't help bringing to mind one's notion of the French Emperor, how, not long ago, the sight of the French coast, or a strange frigate over the Channel swell, used to make us think of him far ashore, with half the earth for his own, and millions of soldiers. We reefers down in the cockpit would save our grog to drink confusion to Napoleon, and in a rough night near a lee-shore, it was look alive aloft, or choose betwixt cold brine and the clutch of a gendarme hauling you to land. I do believe we looked upon him as a sort of god, as Captain Wallis did in the Temple; every ship or gunboat we saw taken, or had a hand in the mauling of, why, 'twas for the sheer sake of the thing, and scarce by way of harm to Boney; while nothing like danger, from breakers on the lee-bow to a November gale, but had seemingly a taste of him. None of us any more thought of bringing him to this, than we did of his marching into London, or of a French frigate being able to rake our old _Pandora_ in a set-to on green water or blue, with us to handle her. "But _there_ was the neat little cluster of houses, white, yellow, and green, spreading down close together in the bottom of the valley, and out along the sea's edge; the rough brown cliffs sloping up on each side, with the ladder-like way to the fort on the right, mounting, as it were, out of the very street, to the flagstaff on the top, and dotted with red-coats going up and down; a bright line of a pier and a wall before the whole, the Government House dazzling through a row of spreading trees, and a little square church-tower to be seen beyond. 'Twas more like a scene in a play, than aught else; what with the suddenness of it all, the tiny look of it betwixt the huge rocks, the greenness of the trees and bushes, and patches of garden struggling up as far as they could go into the stone, and the gay little toys of cottages, with scarce flat enough to stand upon; save for the blue swell of the sea plunging lazily in through the bit of a bay, and the streak of air behind, that let you in high over the head of the hollow, up above one height and another, to a flat-headed blue rise in the distance, where Longwood could be seen from the maincross-trees I had gone to as the sails were furled. "The sunlight, striking from both the red sides of the ravine, made the little village of a place, trees and all, glitter in a lump together, out of it, like no spot in the rest of the world; while elsewhere there wasn't so much as a weed to be seen hanging from the rock, nor the sign of another human habitation, saving the bare batteries on each hand, with a few sheds and warehouses over the beach along the landing-place. Once or twice the same sudden gust as before would come slap down through the valley into the brig's bare rigging, hot as the air was, with a howling kind of a sigh you took some time to get accustomed to, lest there was a hurricane to follow: in fact, one didn't well know whether it was the wild look of it outside, or the lovely spot in its grim mouth of a landing-place, but the whole island gave you the notion of a thing you couldn't be long sure of, without fancying it would give a shake some day or other again; or else spout fire, as no doubt it had done before, if there wasn't more fear of Napoleon getting back somehow to France, and wreaking bloody vengeance on the kings that shut him up in St Helena. "There was apparently a busy scene ashore, however, both in the little town, which has scarce more than a single street, and along the quay, full of residents, as well as passengers from two Indiamen lying in-shore of us, while the Government esplanade seemed to be crowded with ladies, listening to the regimental band under the trees. The _Newcastle_ frigate, with Sir Dudley Aldcombe's flag hoisted at her mizzen, was at anchor out abreast at Ladder Hill; and our first lieutenant had scarce pulled aboard of the _Hebe_, which was hove-to off the brig's quarter, before I noticed the Admiral's barge lying alongside the _Hebe_. "Seeing Mr Aldridge on his way back shortly after, I came down the rigging, more anxious than ever to have my own matter settled; indeed, Captain Wallis no sooner caught sight of my face, uncomfortable as I daresay it looked, than he told me he was going to wait on the Admiral aboard the _Hebe_, and would take me with him at once, if I chose. For my part, I needed nothing but the leave, and in ten minutes' time I found myself, no small mark of curiosity, betwixt the waist and the quarter-deck of the _Hebe_, where the officers eyed me with as little appearance of rudeness as they could help, and I overhauled the spars and rigging aloft as coolly as I could, waiting to be sent for below. The _Hebe_, in fact, was the very beauty of a twenty-eight; taking the shine, and the wind, too, clean out of everything even at Plymouth, where I had seen her once a year or two before; our poor dear old _Iris_ herself had scarce such a pattern of a hull, falling in, as it did, from the round swell of her bilge, to just under the plank-sheer, and spreading out again with her bright black top-sides, till where the figure-head shot over the cutwater, and out of her full pair of bows, like a swan's neck out of its breast. As for the _Iris_, our boatswain himself one day privately confessed to me, almost with tears in his eyes, that she tumbled home a thought too much just in front of the fore-chains, and he'd tried to get it softened off with dead planking and paint, but it wouldn't do; everybody saw through them. The truth was, to feel this fine ship under one, with her loose topsails hanging high against the gloom of the red gully towards Longwood, and the gay little town peeping just over her larboard bow, a mile away, it somehow or other cleared one's mind of a load. "I was thinking already how, if one had the command of such a craft, to do something with her at sea--hang it! but surely that old judge couldn't be too proud to give him a fair hearing. By Jove! thought I--had one only wild enough weather, off the Cape, say--if I wouldn't undertake to bother even a seventy-four a whole voyage through, till she struck her flag; in which case a fellow might really venture to hold his head up and speak his mind, lovely as Violet Hyde would be in Calcutta. But then, again, _there_ was St Helena towering red and rough over the ships, with the grand French Emperor hidden in it hard and fast, and all the work he used to give us at an end! "Just at the moment, happening to catch sight of the American mate's sallow black visage over the brig-of-war's hammock-cloths, peering as he did from the cliffs to the lofty spars of the frigate, while his <DW64> shipmates were to be made out nearer the bows--somehow or other the whole affair of their being burnt out and picked up started into my mind again, along with our late queer adventures in the Indiaman. Not to mention Captain Wallis's story, it flashed upon me all at once, for the first time, that the strange schooner was after some scheme as regarded the island; and a man more likely to try something uncommon than the Frenchman I never had seen yet. The truth was, but for my thoughts being otherwise taken up, I'd have wondered at my own confounded stupidity in not fathoming the thing sooner; whereas now I'm not going to deny it, I half began actually to wish him good success, or else a close miss of it, where either way one couldn't well fail having a share in the squall. "At any rate, I saw it was cunningly enough gone about; this same burnt barque of the Yankee's, I perceived in a moment, was part of the plot; though as for meddling in it till I saw more, 'twas likely to spoil the whole; let alone making an ass of oneself in case of mistake. I was eyeing the shipwrecked mate, indeed, when one of the lieutenants told me politely the Admiral wanted to see me in the cabin below. "Not being much accustomed to admirals' society, as a little white-haired fellow-reefer of mine once said at a tea-party ashore, I came in at the door with rather an awkward bow, no doubt; for Sir Dudley, who was sitting on the sofa with his cocked hat and sword beside him, talking to Captain Wallis, turned his head at the captain's word, as if he were trying to keep in a smile. A tall, fine-looking man he was, and few seamen equal to him for handling a large fleet, as I knew, though his manners were finished enough to have made him easy in a king's court. As for the captain of the _Hebe_, he was leaning out of an open stern-window, seemingly a young man; but who he might be I didn't know at the moment. The Admiral had only a question or two to put, before he looked back to Captain Wallis again, remarking it was clear he had brought away the wrong man. 'I didn't think you were so dull in the _Podargus_,' said he, smiling, 'as to let an Indiaman play off such a trick on you--eh, Captain Wallis!' "Captain Wallis glanced round the cabin, and then sideways down at Sir Dudley's cocked hat, in a funny enough way, as much as to say he took all the blame on himself; and it struck me more than ever what a kind heart the man had in him--if you only set aside his hatred to Bonaparte, which in fact was nothing else but a twisted sort of proof of the same thing. 'Pooh, pooh, Wallis,' continued Sir Dudley, 'we can't do anything in the matter; though, if the service were better than it really is at present, I should certainly incline to question a smart young fellow like this, that has held His Majesty's commission, for idling in an Indiaman after the lady passengers! I am afraid, sir,' said he to me, 'you've lost your passage, though--unless the captain of the _Hebe_ will give you his second berth here, to make amends. You need not be afraid, Lord Frederick!' added he, looking toward the captain of the frigate, and raising his voice; 'you do not know him, after all, I suppose!' The captain drew in his head, saying he had been doubtful about one of the pivots of the rudder, then turned full round and looked uneasily at me, on which his face brightened immediately, and he said, 'No, Sir Dudley, I do not!' I was still in ignorance for a moment or so, myself, who this titled young post-captain might be, though I had certainly seen him before; till all at once I recollected him, with a start as pleasant to me as his seemed to him at _not_ knowing me. Both Westwood and I had been midshipmen together for a while in the _Orion_, fifty-gun ship, where _he_ was second lieutenant, several years before. As for me, I was too fond of a frigate to stay longer in her than I could help; but I remembered my being a pest to the second lieutenant, and Tom's being a favourite of his, so that he stayed behind me, and got master's-mate as soon as he was 'passed.' "The Honourable Frederick Bury he was then, and the handsomest young fellow in the squadron, as well as the best-natured aboard; I don't believe he knew how to splice in a dead-eye, and any of the masters'-mates could take charge of the ship better in a rough night, I daresay; but for a gallant affair in the way of hard knocks, with management to boot, there wasn't his match. He never was known to fail when he took a thing in hand; lost fewer men, too, than anyone else did; and whenever there turned up anything ticklish for the boats, it was always 'Mr Bury will lead.' 'The Honourable Bury,' we used to call him, and 'Fighting Free-the-deck.' Westwood was one of his school, whereas _I_ had learnt from Jacobs in a merchantman's forecastle; and many a time did we play off such tricks on the second lieutenant as coming gravely aft to him during the watch, three or four of us together, me carrying a bit of rope where a 'Turk's-head' or a 'mouse' was to be worked, while I asked him innocently to show us the way. Or else it was some dispute we contrived beforehand, as to the best plan of sending up new topmasts at sea, or running out of a 'round' gale in the Indian Ocean, on which the men forward would be all ready to break out laughing; and the second lieutenant, after thinking a moment, would quietly pitch upon me to go aloft, and study the point for two hours at the mast-head. "'What is _your_ name then, young man?' inquired Sir Dudley Aldcombe of me. The instant I told him, Lord Frederick Bury gave me another look, then a smile. 'What?' said he, 'Collins that was in the _Orion_?' 'Yes, Lord Frederick,' said I, 'the same; I was third in the _Iris_ off the West African coast since then.' 'Why,' said he, 'I recollect you quite well, Mr Collins, although you have grown a foot, I think, sir--but your eye reminds me of sundry pranks you used to play on board! What nickname was it your messmates called you, by-the-by?' 'Something foolish enough, I suppose, my lord,' replied I, biting my lip; 'but I remember clearly having the honour to steer the second cutter in-shore one dark night near Dunkirk, when your lordship carried the Dutch brig and the two French chasse-marees----' "'Faith,' broke in the captain of the _Hebe_, 'you've a better memory than I have--I do not recollect any chasse-marees at all that time, Mr Collins!' 'Why,' said I, 'I got a knock on the head from a fellow in a red shirt--that always kept me in mind.' 'Oh,' remarked the Admiral to Captain Wallis, laughing, 'Lord Frederick Bury must have had so many little parties of the kind that his memory can't be expected to be very nice! However, I shall go ashore at present, gentlemen, leaving the _Hebe_ and you to dispose of this runaway lieutenant in some way or other. Only you'd better settle it before Admiral Plampin arrives!' 'Have you seen the--the--Longwood lately, Sir Dudley?' asked the captain of the _Podargus_ carelessly. 'Yes, not many days ago I had an interview,' said the Admiral gravely; 'proud as ever, and evidently resolved not to flinch from his condition. 'Tis wonderful the command that man has over himself, Wallis--he speaks of the whole world and its affairs like one that sees into them, and had them still nearly under his foot! All saving those miserable squabbles with Plantation House, which--but, next time I shall take my leave, and wash my hands of the whole concern, I am glad to think!' "Lord Frederick was talking to me meanwhile at the other end of the cabin, but I was listening in spite of myself to Sir Dudley Aldcombe, and noticed that Captain Wallis made no answer. 'By-the-way, Wallis,' continued the Admiral, ''tis curious that he seemed anxious more than once to know what you think of him--I believe he would like to see you!' 'To see _me_!' said the commander of the _Podargus_, suddenly. 'At last, does he! No, Sir Dudley, he and I never _will_ meet; he ought to have thought of it twelve years sooner! God knows,' he went on, 'the commander of a ten-gun brig is too small a man to see the Emperor Napoleon a prisoner; but in ten years of war, Sir Dudley, what mightn't one have been, instead of being remembered after as only plain John Wallis, whom Bonaparte kept all that time in prison, and who was sent in course of time, to cruise off St Helena?' Here the Admiral said something about a British sailor not keeping malice, and Captain Wallis looked up at him gravely. 'No,' replied he; 'no, Sir Dudley, I shouldn't have _chosen_ the thing; but in the meantime I'm only doing my duty. There's a gloomy turn in my mind by this time, no doubt; but you've no idea, Sir Dudley, how the thought of other people comes into one's head when he's years shut up--so _I_ may stand for many a one Bonaparte will never see more than myself, that'll ring him round surer than those rocks there, though they're dead and in their graves, Sir Dudley!' The Admiral shook his head, observing that Napoleon was no common man, and oughtn't to be judged as such. 'Too many victories in that eye of his, I suspect, Captain Wallis,' said he, 'for either Plantation House or his own conscience to break his spirit!' "Ay, ay, sir,' answered the captain respectfully, 'excuse me, Sir Dudley, but there it is--so long as he's got his victories to fall back upon, he can't see how, if he'd regarded common men more, with all belonging to them, he wouldn't have been here! Why did Providence shut him up in a dead volcano, with blue water round it, Sir Dudley, if it wasn't to learn somehow or other he was a man after all?' Sir Dudley Aldcombe shrugged his shoulders and looked to Lord Frederick, upon which he rose, and the two captains followed him out of the cabin; in five minutes I heard the side piped for the Admiral's leaving, and soon after the captain of the _Hebe_ came below again. "'This is a disagreeable affair of your old messmate's, Mr Collins,' said he seriously. 'You are, perhaps, not aware that Captain Duncombe was a relative of my own, and the fact of his property having fallen by will to myself, rendered my position the more peculiarly disagreeable, had I been obliged not only to recognise Lieutenant Westwood here, but afterwards to urge proceedings against him, even if he were let off by court-martial. I cannot tell you how the sight of a stranger, as I thought, relieved me, sir!' 'Indeed, Lord Frederick!' replied I, too much confused in the circumstances to say more. However, his lordship's manner soon set me at my ease, the old good-humoured smile coming over his fine features again, while he went on to offer me the place of his second lieutenant, who was going home very ill by one of the homeward-bound Indiamen; adding, that Sir Dudley would confirm the appointment; indeed, he could scarce help himself, he said, as there was nobody else he could get at present. "'You must be a thorough good sailor by this time, Collins,' continued he, 'if you have gone on at the rate you used to do. I remember how fond you were of having charge for a minute or two of the old _Orion_, or when I let you put her about in my watch. Why they called you "Young Green" I never could understand, unless it was _ut lucus a non lucendo_, as we used to say at Eton, you know. Well, what do you say?' Now, as you may suppose, the idea of boxing about St Helena, for Heaven knew how long, didn't at all suit my liking--with the thought of the _Seringapatam_ steering away from Bombay the whole time, and a hundred notions of Violet Hyde in India--'twould have driven me madder than the Temple did Captain Wallis: but it was only the _first_ part of my mind I gave Lord Frederick. 'What!' exclaimed he, with a flush over his face, and drawing up his tall figure, 'you didn't suppose, _I_ should remain here? Why, the _Hebe_ is on her way for Calcutta and Canton, and will sail as soon as the _Conqueror_ arrives at Jamestown with Admiral Plampin.' 'Your lordship is very kind,' said I, looking down to cover my delight; 'and if I am not worthy of the post it shan't be my fault, Lord Frederick.' 'Ah, very good!' said he smiling; ''tis an opportunity you oughtn't to let slip, Collins, let me tell you! For my own part, I should just as soon cut out a pirate in the Straits of Malacca as a French brig in the Channel; and there are plenty of them, I hear, there. As for a chase, sir, I flatter myself you won't easily see a finer thing than the _Hebe_ spreading her cloth after one of those fast proas will be--I think you are just the fellow to make her walk, too, Mr Collins--pah! to compare a day on the Derby turf with _that_, would be a sin! You have no idea, sir, how one longs for a fair horizon again, and brisk breezes, when so ineffably tired out of all those ball-rooms, and such things as you see about town just now--only I fear I shall wish to be second lieutenant again, eh?' "The noble captain of the _Hebe_ turned to look out through the stern window to seaward, his face losing the weary sort of half-melancholy cast it had shown for the last minute, while his eye glistened; and it struck me how well matched the _Hebe_ and her commander were; you'd have said both had good blood in them, both being models to look at of their kind, and the frigate lifting under you at the moment, from the keel upward, with a check aloft in her main-topsail, that lifted her stem to the surge. A small telescope rolled off the sofa on to the cabin deck, and as I picked it up, another gust could be heard coming down St James Valley from inside the island; through the gun-port one saw the trees wave over the hot white houses in the bright- little town, while the ship's canvas gave another flutter above-decks. Lord Frederick laughed, and said, 'Then I suppose we need say no more about it, Mr Collins, except referring once for all to Sir Dudley?' I bowed, and the upshot was, that, an hour or two after, I had my acting commission sent me from the Admiral, the same boat having called at the _Podargus_ for my things; upon which Lord Frederick introduced me to the first lieutenant, and I found myself once more doing duty in the service--the _Hebe_ standing out to leeward with the last light, just as the _Podargus_ was tripping anchor to beat round again the other way. As for our friends from the burnt vessel, I must say I had forgot them already, for the time at least. "Every block, crag, and knot in the huge crust of the rock shone terribly bright for a minute or two, aloft from over the yard-ends, as she stood suddenly out into the fiery gleam of the sun going down many a mile in the Atlantic. Then up leapt the light keener and keener to the very topmost peak, till you'd have thought it went in like a living thing behind a telegraph, that stood out against a black cleft betwixt two cliffs. We saw the evening gun off Ladder Hill flash upon the deep blue of the sky, seemingly throwing up the peak and flagstaff a dozen feet higher; and the boom of the gun sounding in among the wild hills and hollows within the island, as if one heard it going up to Longwood door. Scarce was it lost, ere a star or two were to be seen in the shadow on the other side, and you listened almost, in the hush following upon the gunfire, for an echo to it, or something stranger; in place of which the _Hebe_ was already forging ahead in the dark to get well clear of the land, every wave bringing its own blackness with it up toward her fore-chains, then sparkling back to her waist in the seeth of foam as she felt the breeze; while St Helena lay towering along to larboard, with its ragged top blotting against the deep dark blue of the sky, all filling as it was with the stars. "I had the middle watch that night, the ship being under short canvas, and slowly edging down to make the most leewardly point of the island, from which she was to beat up again at her leisure by the morning. All we had to do was to keep a good look-out, on the one hand, into the streak of starlight to seaward, and on the other along the foot of the rocks, as well as holding her well in hand, in case of some sudden squall through the valleys from inside. "However, I shan't easily forget the thoughts that ran in my mind, walking the quarter-deck with the frigate under charge, the first time I noticed Orion and the Serpent begin to wheel glittering away from over Diana's Peak--the others stealing quietly into sight after them, past the leech of our main-topsail; scarce an English star to be seen for the height of the island off our quarter; some of the men on one side of the booms humming a song about Napoleon's dream, which you'll hear to this day in ships' forecastles; another yarning solemnly, on the other side, about some old sweetheart of his--but all of them ready to jump at my own least word. In the morning, however, there we were, stretching back by degrees to go round the lee side of the island again, the haze melting off Diana's Peak as before, and the sea rolling in swells as blue as indigo, to the huge red lumps of bare crag; while the bright surges leapt out of them all along the frigate's side, and the spray rose at times to her figure-head. "During the day we cruised farther out, and the _Hebe_ had enough to do in seeing off one Indiaman for home, and speaking another outward-bound craft, that passed forty miles off or so, without touching; the Governor's telegraphs were eternally at work on the heights, bothering her for the least trifle, and making out a sail sixty miles off, it was said. For my part, I was pretty well tired of it already, sincerely wishing for the _Conqueror_, with Admiral Plampin, to heave in sight; but glad enough all aboard the _Hebe_ were, when, after an entire week of the thing, it came to her turn, with the _Newcastle_ and _Podargus_, to lie at anchor off Jamestown, where half the ship's company at a time had their liberty ashore. "For my part, I had to see after the frigate's water-tanks, and a gang at the rigging, till the afternoon, when Lord Frederick took the first lieutenant and myself ashore with him in his gig; and no joke it was landing even there, where the swell of the surf nigh-hand hove her right up on the quay, while you had to look sharp, in case the next wave washed you back again off your feet. The whole place was hot as could be from the sun's rays off the rocks, slanting bare red to the cloudless sky, on both sides of the neat little gaudy houses crowded in the mouth of the valley, which narrowed away beyond the rise of the street, till you didn't see how you'd get farther. But for the air of the sea, indeed, with now and then a breath down out of the hills, 'twas for all the world like a half-kindled oven; except under the broad trees along the Government esplanade, where one couldn't have stood for people. What with blacks, lascars, Chinamen, and native 'Yamstocks,' together with liberty-men from the men-of-war and Indiamen, as well as reefers trotting about on ponies and donkeys, the very soldiers could scarce get down the foot of the road up Ladder Hill; as for the little town holding one half of them, it was out of the question, but the noise and kick-up were beyond aught else of the kind, save in a Calcutta bazaar. Accordingly, it was pleasant enough at last to come within a shady walk of thick green fig-trees, growing almost out of the rock near the main battery, above the small sound of the water far below; the very sea looking bluer through the leaves, while some birds no bigger than wrens hopped, chirruping, about the branches. "Here we met Sir Dudley Aldcombe coming down from the batteries along with some Company's officers from India, and he stopped to speak to Lord Frederick, giving the first lieutenant and me a bow in return, as we lifted our hats and waited behind. The Admiral proposed to get Lord Frederick a pass to visit Napoleon along with himself next day, as the _Conqueror_ would probably arrive very soon. 'You will oblige me greatly, Sir Dudley,' said the captain of the _Hebe_. 'He seems as fond of seeing a true sailor,' said the Admiral, 'as if we'd never done him harm. Things will be worse after I go. By-the-way,' added he suddenly, ''tis curious enough, but there's one person in the island at present has made wonderful progress in Sir Hudson's good graces, for the short time--that American botanist, or whatever he calls himself, that Captain Wallis took off the burnt vessel on his way here. Your new lieutenant was aboard at the time, you know, Lord Frederick.' 'You saw him, sir, of course?' said the Admiral looking to me. 'Only for a minute that night, Sir Dudley,' said I; 'and afterwards both he and his servant were under the surgeon's charge below.' 'Well,' continued Sir Dudley to the captain, 'they seem quite recovered now; for I saw them to-day up at Plantation House, where the philosopher was in close discourse with the Governor about plants and such things; while her ladyship was as much engaged with the assistant, who can only speak Spanish. A remarkable looking man the latter is, too; a Mexican, I understand, with Indian blood in him, apparently--whereas his principal has a strong Yankee twang; and queer enough it was to hear him snuffling away as solemnly as possible about _buttany_ and such things--besides his hinting at some great discovery likely to be made in the island, which Sir Hudson seemed rather anxious to keep quiet from _me_.' "What Sir Dudley said made me prick up my ears, as you may fancy. I could scarce believe the thing; 'twas so thoroughly rich and so confoundedly cool at once, to risk striking at the very heart of things this way with the Governor himself; but the whole scheme, so far, flashed upon me in a moment, evidently carried on, as it had been all along, by some one bold enough for anything earthly, and with no small cunning besides. All that he needed, no doubt, was _somebody else_ with the devil's own impudence and plenty of talk; nor, if I'd thought for a day together, could one have pitched easily upon a customer as plausible as our friend Daniel, who hadn't a spark of fear in him, I knew, just owing to his want of respect for aught in the entire creation. Still, I couldn't, for the life of me, see what the end of their plan was to be, unless the strange Frenchman might have been some general or other under Bonaparte, and just wanted to see his old commander once more; which, thought I, I'll be hanged if I don't think fair enough, much pains as he had put himself to for the thing. "'How!' asked Lord Frederick, 'a discovery did you say, Sir Dudley?' 'Oh, nothing of the kind _we_ should care about, after all,' said the Admiral; 'from what I could gather, 'twas only scientific, though the American called it "_a_ pretty importaint fact." This Mr Mathewson Brown, I believe, was sent by the States Government as botanist in an expedition to southward, and has leave from Sir Hudson to use his opportunity before the next Indiaman sails, for examining part of the island, and to-day he thought he found the same plants in St Helena as he did in Gough's Island and Tristan d'Acunha, twelve hundred miles off, near the Cape, showing, as he said, how once on a time there must have been land between them, perhaps as far as Ascension!' 'Why,' put in Lord Frederick,' that would have made a pretty good empire, even for Napoleon!' 'So it would, my lord,' said Sir Dudley, 'much better than Elba; but the strangest part of it is, this Mr Brown was just telling his Excellency, as I entered the room, that some of the ancient philosophers wrote about this said country existing in the Atlantic before the Flood--how rich it was, with the kings it had, and the wars carried on there; till, on account of their doings, no doubt, what with an earthquake, a volcano, and the ocean together, they all sunk to the bottom except the tops of the mountains! Now, I must say,' continued the Admiral, 'all this learning seemed to one to come rather too much by rote out of this gentleman's mouth, and the American style of his talk made it somewhat ludicrous, though he evidently believed in what may be all very true--particularly in mentioning the treasures that must lie under water for leagues round, or even in nooks about the St Helena rocks; I thought his very teeth watered. As for Sir Hudson, he had caught at the idea altogether, but rather in view of an historical work on the island, from the earliest times till now--and I believe he means to accompany the two botanists himself over toward Longwood to-morrow, where we may very likely get sight of them.' "'O--h!' thought I, and Lord Frederick Bury smiled. 'Rather a novelty, indeed!' said he; and the first lieutenant looked significantly enough to me, as we leant over the battery-wall, watching the hot horizon through the spars of the ships before Jamestown. 'What amused me,' Sir Dudley said again, 'was the American botanist's utter indifference, when I asked if he had seen anything of "The General" in the distance. The Governor started, glancing sharp at Mr Brown, and I noticed his dark companion give a sudden side-look from the midst of his talk with her ladyship; whereupon the botanist merely pointed with his thumb to the floor, asking coolly 'what it was to science?' 'At this,' added Sir Dudley to the captain, 'His Excellency seemed much relieved; and after having got leave for myself and your lordship to-morrow, I left them still in the spirit of it. It certainly struck me that, in the United States themselves, educated men in general couldn't have such a vulgar manner about them--in fact, I thought the Mexican attendant more the gentleman of the two--his face was turned half from me most of the time, but still it struck me as remarkably intelligent.' 'Ah,' said Lord Frederick carelessly, 'all the Spaniards have naturally a noble sort of air, you know, Sir Dudley--they'll never make republicans!' 'And I must say,' added the Admiral, as they strolled out of the shade up the battery-steps, 'little as I know of Latin, what this Mr Brown used _did_ seem to me fearfully bad!' "'And no wonder!' thought I, from a Yankee schoolmaster as I had found my late shipmate was, before he thought of travelling; but the valuable Daniel turning his hand to help out some communication or other, no doubt, with Napoleon Bonaparte in St Helena, took me at first as so queer an affair, that I didn't know whether to laugh at him or admire his Yankee coolness, when he ran such risks. As for the feasibleness of actually getting the prisoner clear out of the island, our cruising on guard was enough to show me it would be little short of a miracle; yet I couldn't help thinking they meant to try it; and in case of a dark night, which the south-easter was very likely to bring, if it shifted or freshened a little, why, I knew you needn't call anything impossible that a cool head and a bold heart had to do with, provided only they could get their plans laid inside and out so as to tally. The more eager I got for next day, when it would be easy enough for any of us to go up inland after Lord Frederick, as far as Hut's Gate at least. Meantime, the first lieutenant and I walked up together to where the little town broke into a sort of suburb of fancy cottages, with verandahs and green venetians in bungalow style, scattered to both sides of the rock amongst little grass-plots and garden patches--every foot of ground made use of. And a perfect gush of flowers and leaves it was, clustering over the tiles of the low roofs, while you saw through a thicket of poplars and plantains right into the back of the gully, with a ridge of black rock closing it fair up, and Side Path, as they call the road to windward, winding overhead along the crag behind the houses, out of sight round a mass of cliffs. Every here and there, a runlet of water came trickling down from above the trees to water their roots; you saw the mice in hundreds scampering in and out of holes in the dry stone, with now and then a big ugly rat that turned round to face you, being no doubt fine game to the St Helena people, ill off as they all seemed for something to do--except the Chinese with their huge hats, hoeing away under almost every tree one saw, and the Yamstock fishermen to be seen bobbing for mullet outside the ships, in a blaze of light sufficient to bake any heads but their own. Every cottage had seven or eight parrots in it, apparently; a cockatoo on a stand by the door, or a monkey up in a box--not to speak of canaries in the window, and white goats feeding about with bells round their necks: so you may suppose what a jabbering, screaming, whistling, and tinkling there was up the whole hollow, added to no end of children and young ladies making the most of the shade as it got near nightfall--and all that were out of doors came flocking down Side Path. "Both of us having leave ashore that night, for a ball in one of these same little bungalows near the head of the valley, 'twas no use to think of a bed, and as little to expect getting off to the ship, which none could do after gunfire. For that matter, I daresay there might be twenty such parties, full of young reefers and homeward-bound old East Indians, keeping it up as long as might be, because they had nowhere to sleep. The young lady of the house we were in was one of the St Helena beauties, called 'The Rosebud,' from her colour. A lovely creature she was, certainly, as it was plain our _Hebe's_ first lieutenant thought, with several more to boot: every sight of her figure gliding about through the rest, the white muslin floating round her like haze, different as her face was, made one think of the _Seringapatam's_ deck at sea, with the men walking the forecastle in the middle watch, and the poop quiet over the judge's cabins. "Two or three times I had fancied for a moment that, if one had somewhat stirring to busy himself with, why, he might so far forget what was no doubt likely to interfere pretty much with a profession like my own; and so it might have been, perhaps, had I only seen her ashore; whereas now, whether it was ashore or afloat, by Jove! everything called her somehow to mind. The truth is, I defy you to get rid very easily of the thought about one you've sailed in the same ship with, be it girl or woman: the same bottom betwixt you and the water, the same breeze blowing your pilot-coat in the watch on deck that ripples past her ear below, and the self-same dangers to strive against! At a break in the dance I went out of the dancing-room into the verandah, where the cool of the air among the honeysuckle-flowers and creepers was delightful to feel; though it was quite dark in the valley, and you couldn't make out anything but the solemn black-blue of the sky full of stars above you, between the two cliffs; or right out, where the stretch of sea, widening to the horizon, looked almost white through the mouth of the valley over the house-roofs below; one heard the small surf plashing low and slow into the little bay, with the boats dipping at their moorings, but I never saw sea look so lonely. Then up at the head of the gully one could mark the steep black crag that shut it up, glooming quiet and large against a gleam from one of the clusters of stars; the sight of it was awful, I didn't know well why, unless by comparison with the lively scene inside, not to say with one's own whole life afloat, as well as the wishes one had at heart. 'Twas pretty late, but I heard the music strike up again in the room, and was going back again, when all of a sudden I thought the strangest sound that ever came to one's ears went sweeping round and round far above the island, more like the flutter of a sail miles wide than aught else I can fancy; then a rush of something like those same blasts of wind I was pretty well used to by this time--but wind it was not--growing in half-a-minute to a rumbling clatter, and then to a smothered roar, as if something more than mortal shot from inland down through the valley, and passed out by its mouth into the open sea at once. I scarce felt the ground heave under me, though I thought I saw the black head of the ravine lift against the stars--one terrible plunge of the sea down at the quays and batteries, then everything was still again; but the whole dancing-party came rushing out in confusion at my back, the ladies shrieking, the men looking up into the sky, or at the cliffs on both sides; the British flag, over the fort on Ladder Hill, blowing out steadily to a stiff breeze aloft. It wasn't for some time, in fact, that they picked up courage again to say it had been an earthquake. However, the ball was over, and, as soon as matters could be set to rights, it was nothing but questions whether it had aught to do with _him_ up at Longwood, or hadn't been an attempt to blow up the island--some of the officers being so much taken aback at first, that they fancied the French had come. "At last, however, we, who had nothing else for it, got stowed away on sofas or otherwise about the dancing-room; for my part, I woke up just early enough to see the high head of the valley coming out as clearly as before against the morning light, and the water glancing blue out miles away beyond the knot of ships in the opening. The news was only that Napoleon was safe, having been in his bed at the time, where he lay thinking one of the frigates had blown up, they said. Not a word of his that got wind but the people in Jamestown made it their day's text--in the want of which they'd even gossip about the coat he wore that morning; till you'd have said the whole nest of them, soldiers and all, lay under his shadow as the town did at the foot of the cliffs, just ready to vanish as soon as he went down. The Longwood doctor had told someone in the Jew Solomon's toy-shop, by the forenoon, that Bonaparte couldn't sleep that night for making some calculations about a great battle he had fought, when he counted three separate shocks of the thing, and noticed it was luckily right up and down, or else Jamestown would have been buried under tons of rock. The doctor had mentioned besides that there was twice an earthquake before in the island, in former times; but it didn't need some of the townspeople's looks to tell you they'd be afraid many a night after, lest the French Emperor should wake up thinking of his battles; while, as for myself, I must say the notion stuck to me some time, along with my own ideas at that exact moment; at any rate, not for worlds would I have lived long ashore in St Helena. CHAPTER XXII "Mr Newland (the first lieutenant) and I set out early in the day, accordingly, with a couple of the _Hebe's_ midshipmen, mounted on as many of the little island ponies, to go up inland for a cruise about the hills. You take Side Path along the crags, with a wall betwixt the hard track and the gulf below, till you lose sight of Jamestown like a cluster of children's toy-houses under you, and turn up above a sloping hollow full of green trees and tropical-like flowering shrubs, round a pretty cottage called The Briars--where one begins to have a notion, however, of the bare blocks, the red bluffs, and the sharp peaks standing up higher and higher round the shell of the island. Then you had another rise of it to climb, on which you caught sight of Jamestown and the harbour again, even smaller than before, and saw nothing before your beast's head but a desert of stony ground, running hither and thither into wild staring clefts, grim ravines, and rocks of every size tumbled over each other like figures of ogres and giants in hard fight. After two or three miles of all this, we came in view of Longwood Hill, lying green on a level to north and east, and clipping to windward against the sea beyond; all round it elsewhere was the thick red crust of the island, rising in ragged points and sharp spires--the greenish sugar-loaf of Diana's Peak shooting in the middle over the high ridge that hid the Plantation House side of St Helena to leeward. "Between the spot where we were and Longwood is a huge fearful-looking black hollow, called the Devil's Punch-bowl, as round and deep as a pitch-pot for caulking all the ships in the world--except on a <DW72> into one corner of it, where you saw a couple of yellow cottages with gardens about them; while every here and there a patch of grass began to appear, a clump of wild weeds and flowers hanging off the fronts of the rocks, or the head of some valley widening away out of sight, with the glimpse of a house amongst trees, where some stream of water came leaping down off the heights and vanished in the boggy piece of green below. From here over the brow of the track it was all like seeing into an immense stone basin half-hewn out, with all the lumps and wrinkles left rising in it and twisting every way about--the black Devil's Punch-bowl for a hole in the middle, where some infernal liquor or other had run through; the soft bottoms of the valleys just bringing the whole of it up distincter to the green over Longwood Hill; while the ragged heights ran round on every side like a rim with notches in it, and Diana's Peak for a sort of a handle that the clouds could take hold of. All this time we had strained ourselves to get as fast up as possible, except once near the Alarm House, where there was a telegraph signal-post, with a little guard-hut for the soldiers; but _there_ each turned round in his saddle, letting out a long breath the next thing to a cry, and heaving-to directly, at sight of the prospect behind. The Atlantic lay wide away round to the horizon from the roads, glittering faint over the ragged edge of the crags we had mounted near at hand; only the high back of the island shut out the other side--save here and there through a deep-notched gully or two--and accordingly you saw the sea blotched out in that quarter to the two sharp bright ends, clasping the dark- lump between them, like a mighty pair of arms lifting it high to carry it off. Soon after, however, the two mids took it into their wise heads the best thing was to go and climb Diana's Peak, where they meant to cut their names at the very top; on which the first lieutenant, who was a careful middle-aged man, thought needful to go with them, lest they got into mischief; for my part, I preferred the chance of coming across the mysterious Yankee and his comrade, as I fancied not unlikely, or, what was less to be looked for, a sight of Bonaparte himself. "Accordingly, we had parted company, and I was holding single-handed round one side of the Devil's Punch-bowl, when I heard a clatter of horse-hoofs on the road, and saw the Admiral and Lord Frederick riding quickly past on the opposite side, on their way to Longwood--which, curiously enough, was half-covered with mist at the time, driving down from the higher hills, apparently before a regular gale, or rather some kind of a whirlwind. In fact, I learned after, that such was often the case, the climate up there being quite different from below, where they never feel a gale from one year's end to the other. In the next hollow I got into, it was hot and still as it would have been in India, the blackberry trailers and wild aloes growing quite thick, mixed with prickly-pear bushes, willows, gumwood, and an African palm or two; though from the look of the sea, I could notice the southeast trade had freshened below, promising to blow a good deal stronger that night than ordinary, and to shift a little round. "Suddenly the fog began to clear by degrees from over Longwood, till it was fairly before me, nearer than I thought; and just as I rode up a rising ground, out came the roof of a house on the <DW72> amongst some trees, glittering wet as if the sun laid a finger on it; with a low bluish- stretch of wood farther off, bringing out the white tents of the soldiers' camp pitched about the edge of it. Nearly to windward there was one sail in sight on the horizon, over an opening in the rocks beyond Longwood House, that seemingly let down toward the coast; however, I just glanced back to notice the telegraph on the signal-post at work, signalling to the _Podargus_ in the offing, and next minute Hut's Gate was right ahead of me, not a quarter of a mile off--a long-shaped bungalow of a cottage, inside of a wall with a gate in it, where I knew I needn't try farther, unless I wanted the sentries to take me under arrest. Betwixt me and it, however, in the low ground, was a party of man-o'war's-men under charge of a midshipman, carrying some timber and house-furniture for Longwood, as I remembered, from seeing them come ashore from the _Podargus_ that morning; so I stood over to give my late shipmates a hail. But the moment I got up with them, it struck me not a little, as things stood, to find three of the four blacks we had taken aboard from that said burnt barque of the American mate's trudging patiently enough under the heaviest loads of the gang. Jetty-black, savage-looking fellows they were, as strong as horses, and reminded me more of our wild friends in the Nouries River, than of States <DW65>s; still, what caught my notice most wasn't so much their being there at all, as the want of the fourth one, and where _he_ might be. I don't know yet how this trifling bit of a puzzle got hold on me, but it was the sole thing that kept me from what might have turned a scrape to myself--namely, passing myself in as officer of the party; which was easy enough at the time, and the tars would have entered into the frolic as soon as I started it. On second thoughts, nevertheless, I bade them good-day, steering my animal away round the slant of the ground, to see after a good perch as near as possible; and I daresay I was getting within the bounds before I knew it when another sentry sung out to me off the heights to keep lower down, first bringing his musket to salute for my uniform's sake, then letting it fall level with a ringing slap of his palm, as much as to say it was all the distinction I'd get over plain clothes. "At this, of course, I gave it up, with a blessing to all lobster-backs, and made sail down to leeward again as far as the next rise, from which there was a full view of the sea, at any rate, though the face of a rough crag over behind me shut out Longwood House altogether. Here I had to get fairly off the saddle--rather sore, I must say, with riding up St Helena roads after so many weeks at sea--and flung myself down on the grass, with little enough fear of the hungry little beast getting far adrift. This said crag, by-the-way, drew my eye to it by the queer colours it showed, white, blue, grey, and bright red in the hot sunlight; and being too far off to make out clearly, I slung off the ship's glass I had across my back, just to overhaul it better. The hue of it was to be seen running all down the deep rift between, that seemingly wound away into some glen toward the coast; while the lot of plants and trailers half covering the steep front of it, would no doubt, I thought, have delighted my old friend the Yankee, if he _was_ the botanising gentleman in question. "By this time it was a lovely afternoon far and wide to Diana's Peak, the sky glowing clearer deep-blue at that height than you'd have thought sky could do, even in the tropics--the very peaks of bare red rock being softened into a purple tint, far off round you. One saw into the rough bottom of the huge Devil's Punch-bowl, and far through without a shadow down the green patches in the little valleys, and over Deadwood Camp--there was _nothing_, as it were, between the grass, the ground, the stones, and leaves, and the empty hollow of the air; while the sea spread far round underneath, of a softer blue than the sky over you. You'd have thought all the world was shrunk into St Helena, with the Atlantic lying three-quarters round it in one's sight, like the horns of the bright new moon round the dim old one; which St Helena pretty much resembled, if what the star-gazers say of its surface be true, all peaks and dry hollows--if, indeed, you weren't lifting up out of the world, so to speak, when one looked through his fingers right into the keen blue overhead! "If I lived a thousand years, I couldn't tell half what I felt lying there; but, as you may imagine, it had somewhat in it of the late European war by land and sea. Not that I could have said so at the time, but rather a sort of half-doze, such as I've known one have when a schoolboy, lying on the green grass the same way, with one's face turned up into the hot summer heavens; half of it flying glimpses, as it were, of the French Revolution, the battles we used to hear of when we were children--then the fears about the invasion, with the Channel full of British fleets, and Dover Cliffs--Trafalgar and Nelson's death, and the battle of Waterloo, just after we heard _he_ had got out of Elba. In the terrible flash of the thing altogether, one almost fancied them all gone like smoke; and for a moment I thought I was falling away off, _down_ into the wide sky, so up I started to sit. From that, suddenly I took to guessing and puzzling closely again how I should go to work myself, if I were the strange Frenchman I saw in the brig at sea, and wanted to manage Napoleon's escape out of St Helena. And first, there was how to get into the island and put _him_ up to the scheme--why, sure enough, I couldn't have laid it down better than they seemed to have done all along: what could one do but just dodge about that latitude under all sorts of false rig, then catch hold of somebody fit to cover one's landing? No Englishman _would_ do it, and no foreigner but would set Sir Hudson Lowe on his guard in a moment. Next we should have to get put on the island--and really a neat enough plan it was to dog one of the very cruisers themselves, knock up a mess of planks and spars in the night-time, set them all ablaze with tar, and pretend we were fresh from a craft on fire; when even Captain Wallis of the _Podargus_, as it happened, was too much of a British seaman not to carry us straight to St Helena! Again, I must say it was a touch beyond me; but to hit the Governor's notions of a hobby, and go picking up plants round Longwood, was a likely enough way to get speech of the prisoner, or at least let him see one was there! "How should I set about carrying him off to the coast, though? That was the prime matter. Seeing that even if the schooner--which was no doubt hovering out of sight--were to make a bold dash for the land with the trade-wind, in a night eleven hours long--there were sentries close round Longwood from sunset, the starlight shining mostly always in the want of a moon; and at any rate there was rock and gully enough, betwixt here and the coast, to try the surest foot aboard the _Hebe_, let alone an emperor. With plenty of woods for a cover, one might steal up close to Longwood, but the bare rocks showed you off to be made a mark of. Whew! but why were those same blacks on the island? I thought; just strip them stark-naked, and let them lie in the Devil's Punch-bowl, or somewhere, beyond military hours, when I warrant me they might slip up, gully by gully, to the very sentries' backs! Their colour wouldn't show them, and savages as they seemed, couldn't they settle as many sentries as they needed, creep into the very bed-chamber where Bonaparte slept, and man-handle him bodily away down through some of the nearest hollows, before anyone was the wiser? The point that still bothered me was, why the fourth of the blacks was wanting at present, unless he had his part to play elsewhere. If it was chance, then the _whole_ might be a notion of mine, which I knew I was apt to have sometimes. If I could only make out the fourth black, so as to tally with the scheme, on the other hand, then I thought it was all sure; but of course this quite checked me, and I gave it up, to work out my fancy case by providing signals betwixt us plotters inside and the schooner out of sight from the telegraphs. "There was no use for her to run in and take the risk, without good luck having turned up on the island; yet any sign she could profit by must be both sufficient to reach sixty miles or so, and hidden enough not to alarm the telegraphs or the cruisers. Here was a worse puzzle than all, and I only guessed at it for my own satisfaction--as a fellow can't help doing when he hears a question he can't answer--till my eye lighted on Diana's Peak, near three thousand feet above the sea. There it was, by Jove! 'Twas quite clear at the time; but by nightfall there was always more or less cloud near the top; and if you set a fire on the very peak, 'twould only be seen leagues off: a notion that brought to mind a similar thing which I told you saved the Indiaman from a lee-shore one night on the African coast--and again, by George! I saw _that_ must have been meant at first by the <DW64>s as a smoke to help the French brig easier in! Putting that and that together, why it struck me at once what the fourth black's errand might be--namely, to watch for the schooner, and kindle his signal as soon as he couldn't see the island for mist, I was sure of it; and as for a dark night coming on at sea, the freshening of the breeze there promised nothing more likely; a bright white haze was softening out the horizon already, and here and there the egg of a cloud could be seen to break off the sky to windward, all of which would be better known afloat than here. "The truth was, I was on the point of tripping my anchor to hurry down and get aboard again, but, on standing up, the head of a peak fell below the sail I had noticed in the distance, and, seeing she loomed large on the stretch of water, I pretty soon found she must be a ship of the line. The telegraph over the Alarm House was hard at work again, so I e'en took down my glass and cleaned it to have a better view, during which I caught sight, for a minute, of some soldier-officer or other on horseback, with a mounted red-coat behind him, riding hastily up the gully a good bit from my back, till they were round the red piece of crag, turning at times as if to watch the vessel. Though I couldn't have a better spy at him for want of my glass, I had no doubt he was the Governor himself, for the sentries in the distance took no note of him. "There was nobody else visible at the time, and the said cliff stood fair up like a look-out place, so as to shut them out as they went higher. Once or twice after, I fancied I made out a man's head or two lower down the gully than the cliff was, which, it occurred to me, might possibly be the botanists, as they called themselves, busy finding out how long St Helena had been an island; however, I soon turned the glass before me upon the ship, by this time right opposite the ragged opening of Prosperous Bay, and heading well up about fourteen miles or so off the coast, as I reckoned, to make Jamestown harbour. The moment I had the sight of the glass right for her--though you'd have thought she stood still on the smooth soft blue water--I could see her whole beam rise off the swells before me, from the dark side and white band, checkered with a double row of ports, to the hamper of her lofty spars, and the sails braced slant to the breeze, the foam gleaming under her high bows, and her wake running aft in the heave of the sea. She was evidently a seventy-four; I fancied I could make out her men's faces peering over the yards toward the island, as they thought of 'Boneypart'; a white rear-admiral's flag was at the mizzen-royal-mast-head, leaving no doubt she was the _Conqueror_ at last, with Admiral Plampin, and, in a day or two at farthest, the _Hebe_ would be bound for India. "I had just looked over my shoulder toward Longwood, letting the _Conqueror_ sink back again into a thing no bigger than a model on a mantelpiece, when, all at once, I saw someone standing near the brow of the cliff I mentioned, apparently watching the vessel, with a long glass at his eye, like myself. 'Twas farther than I could see to make out anything, save so much; and, ere I had screwed the glass for such a near sight, there were seven or eight figures more appearing half over the <DW72> behind; while my hand shook so much with holding the glass so long, that at first I brought it to bear full on the cracks and blocks in the front of the crag, with the large green leaves and trailers on it flickering idly with the sunlight against my eyes, till I could have seen the spiders inside, I daresay. Next I held it too high, where the Admiral and Lord Frederick were standing by their horses, a good way back; the Governor, as I supposed, sitting on his, and two or three others along the rise. At length, what with kneeling down to rest it on one knee, I had the glass steadily fixed on the brow of the rocks, where I plainly saw a tall dark-whiskered man, in a rich French uniform, gazing to seaward--I knew him I sought too well by pictures, however, not to be sadly galled. "Suddenly a figure came slowly down from before the rest, with his hands behind his back, and his head a little drooped. The officer at once lowered the telescope and held it to him, stepping upward, as if to leave him alone--what dress he had on I scarce noticed; but there he was standing, single, in the round bright field of the glass I had hold of like a vice--his head raised, his hands hiding his face, as he kept the telescope fixed fair in front of me--only I saw the smooth, broad round of his chin. I knew, as if I'd seen him in the Tuileries at Paris, or known him by sight since I was a boy--I _knew_ it was Napoleon! "During that minute the rest of them were out of sight, so far as the glass went--you'd have supposed there was no one there but himself, as still as a figure in iron, watching the same thing, no doubt, as I'd done myself five minutes before, where the noble seventy-four was beating slowly to windward. When I _did_ glance to the knot of officers twenty yards back, 'twas as if one saw a ring of his generals waiting respectfully while he eyed some field of battle or other, with his army at the back of the hill; but next moment the telescope fell in his hands, and his face, as pale as death, with his lip firm under it, seemed near enough for me to touch it--his eyes shot stern into me from below his wide white forehead, and I started, dropping my glass in turn. That instant the whole wild lump of St Helena, with its ragged brim, the clear blue sky and the sea, swung round about the dwindled figures above the crag, till they were nothing but so many people together against the <DW72> beyond. "'Twas a strange scene to witness, let me tell you; never can I forget the sightless, thinking sort of gaze from that head of his, after the telescope sank from his eye, when the _Conqueror_ must have shot back with all her stately hamper into the floor of the Atlantic again! "Once more I brought my spy-glass to bear on the place where he had been, and was almost on the point of calling out to warn him off the edge of the cliff, forgetting the distance I was away. Napoleon had stepped, with one foot before him, on the very brink, his two hands hanging loose by his side, with the glass in one of them, till the shadow of his small black cocked hat covered the hollows of his eyes, and he stood, as it were, looking down past the face of the precipice. What he thought of, no mortal tongue can say, whether he was master at the time over a wilder battle than any he'd ever fought--but just then, what was the surprise it gave me to see the head of a man, with a red tasselled cap on it, raised through amongst the ivy from below, while he seemed to have his feet on the cracks and juts of the rock, hoisting himself by one hand round the tangled roots, till no doubt he must have looked right aloft into the French Emperor's face; and perhaps he whispered something--though, for my part, it was all dumb show to me, where I knelt peering into the glass. I saw even _him_ start at the suddenness of the thing--he raised his head upright, still glancing down over the front of the crag, with the spread hand lifted, and the side of his face half-turned toward the party within earshot behind, where the Governor and the rest apparently kept together out of respect, no doubt watching both Napoleon's back and the ship of war far beyond. The keen sunlight on the spot brought out every motion of the two in front--the _one_ so full in my view, that I could mark his look settle again on the other below, his firm lips parting and his hand out before him, like a man seeing a spirit he knew; while a bunch of leaves on the end of a wand came stealing up from the stranger's post to Napoleon's very fingers. "The head of the man on the cliff turned round seaward for one moment, ticklish as his footing must have been; then he looked back, pointing with his loose hand to the horizon--there was one minute between them without a motion, seemingly--the captive Emperor's chin was sunk on his breast, though you'd have said his eyes glanced up out of the shadow of his forehead; and the stranger's red cap hung like a bit of the bright- cliff, under his two hands, holding amongst the leaves. Then I saw Napoleon lift his hand calmly, he gave a sign with it--it might have been refusing, it might have been agreeing, or it might be farewell, I never expect to know; but he folded his arms across his breast, with the bunch of leaves in his fingers, and stepped slowly back from the brink towards the officers. I was watching the stranger below it, as he swung there for a second or two, in a way like to let him go dash to the bottom; his face sluing wildly seaward again. Short though the glance I had of him was--his features set hard in some bitter feeling or other, his dress different, too, besides the moustache being off, and his complexion no doubt purposely darkened--it served to prove what I'd suspected: he was no other than the Frenchman I had seen in the brig, and, mad or sensible, the very look I caught was more like that he faced the thunder squall with than aught besides. Directly after, he was letting himself carefully down with his back to my glass; the party above were moving off over the brow of the crags, and the Governor riding round apparently to come once more down the hollow between us. "In fact, the seventy-four had stood by this time so far in, that the peaks in the distance shut her out; but I ran the glass carefully along the whole horizon in my view, for signs of the schooner. The haze was too bright, however, to make sure either way; though, dead to windward, there were some streaks of cloud risen with the breeze, where I once or twice fancied I could catch the gleam of a speck in it. The _Podargus_ was to be seen through a notch in the rocks, too, beating out in a different direction, as if the telegraph had signalled her elsewhere; after which you heard the dull rumble of the forts saluting the _Conqueror_ down at Jamestown as she came in; and being late in the afternoon, it was high time for me to crowd sail downward, to fall in with my shipmates. "I was just getting near the turn into Side Path, accordingly, after a couple of mortal hours' hard riding, and once more in sight of the harbour beneath, when the three of them overtook me, having managed to reach the top of Diana's Peak, as they meant. The first lieutenant was full of the grand views on the way, with the prospect of the peak, where one saw the sea all round St Helena like a ring, and the sky over you as blue as blue water. 'But what do you think we saw on the top, Mr Collins?' asked one of the urchins of me--a mischievous imp he was himself, too, pock-marked, with hair like a brush, and squinted like a ship's two hawse-holes. 'Why, Mister Snelling,' said I, gruffly--for I knew him pretty well already, and he was rather a favourite with me for his sharpness, though you may suppose I was thinking of no trifles at the moment--'why, the devil, perhaps.' 'I must say I thought at first it was him, sir,' said the reefer, grinning; ''twas a black <DW65>, though, sir, sitting right on the very truck of it, with his hands on his two knees, and we'd got to shove him off before we could dig our knives into it!' '_By_ the Lord Harry!' I rapped out, 'the very thing that----' ''Twas really the case, though, Mr Collins,' said the first lieutenant; 'and I thought it curious; but there are so many <DW64>s in the island.' 'If you please, sir,' put in the least of the mids, 'perhaps they haven't all of 'em room to meditate, sir!' 'Or sent to the mast-head, eh, Roscoe?' said Snelling. 'Which you'll be, sirrah,' broke in the first lieutenant, 'the moment I get aboard, if you don't keep a small helm.' We were clattering down over Jamestown by this time, the sun blazing red off the horizon, into it and the doors of the houses, and the huge hull and spars of the _Conqueror_ almost blocking up the harbour, as she lay anchored outside the Indiaman. The evening gun fired as we pulled aboard the _Hebe_, which immediately got under weigh by order, although Lord Frederick was not come down yet; but it fell to her turn that night to supply a guard-boat to windward, and she stood up under full sail round Sugarloaf Point, just as the dusk fell like a shadow over the island. "The _Newcastle's_ boat was on the leeward coast that night, and one of our cutters was getting ready to lower, nearly off Prosperous Bay, to windward, while the frigate herself would hold farther out to sea. One of the master's mates should have taken the cutter; but after giving the first lieutenant a few hints as far as I liked to go, I proposed to go in charge of her that time, myself--which was laid to the score of my freshness on the station; and the mate being happy to get rid of a tiresome duty, I got leave at once. "The sharp midshipman, Snelling, took it into his ugly head to keep me company, and away we pulled into hearing of the surf. The moment things took the shape of fair work, in fact, I lost all thoughts of a late kind. In place of seeing the ragged heights against the sky, and musing all sorts of notions about the French Emperor, there was nothing but the broad bulk of the island high over us, the swell below, and the sea glimmering wide from our gunwale to the stars; so no sooner did we lose sight of the _Hebe_ slowly melting into the gloom, than I lit a cheroot, gave the tiller to the mid, and sat stirring to the heart at the thought of something to come, I scarce knew what. As for Bonaparte, with all that belonged to him, 'twas little to me in that mood, in spite of what I'd seen during the day, compared with a snatch of old Channel times; the truth was, next morning I'd feel for him again. "The night for a good while was pretty tolerably starlit, and in a sort of way you could make out a good distance. One time we pulled right round betwixt the two points, though slowly enough; then again the men lay on their oars, letting her float in with the long swells, till the surf could be heard too loud for a safe berth. Farther on in the night, however, it got to be dark--below at least--the breeze holding steady, and bringing it thicker and thicker; at last it was so black all round that on one side you just _knew_ the rocks over you, with the help of a faint twinkle of stars right aloft. On the other side there was only, at times, the two lights swinging at the mast-head of the _Podargus_ and _Hebe_, far apart, and one farther to sea than the other; or now and then their stern-window and a port, when the heave of the water lifted them, or the ships yawed a little. One hour after another, it was wearisome enough waiting for nothing at all, especially in the key one was in at the time, and with a long tropical night before you. "All of a sudden, fairly between the brig and the frigate, I fancied I caught a glimpse for one moment of another twinkle; then it was out again, and I had given it up, when I was certain I saw it plainly once more, as well as a third time, for as short a space as before. We were off a cove in the coast, inside Prosperous Bay, where a bight in the rocks softened the force of the surf, not far from the steep break where one of these same narrow gullies came out--a good deal short of the shore, indeed; but I knew by this time it led up somewhere toward the Longwood side. Accordingly the idea struck me of a plan to set agoing, whether I hit upon the right place or not; if it _was_ the schooner, she would be coming down right from windward, on the look-out for a signal, as well as for the spot to aim at; the thing was to lure her boat ashore there before their time, seize her crew, and take the schooner herself by surprise, as if we were coming back all right; since signal the ships we couldn't, and the schooner would be wary as a dolphin. "No sooner said than done. I steered cautiously for the cove, fearfully though the swell bore in, breaking over the rocks outside of it; and the reefer and I had to spring one after the other for our lives, just as the bowman prized her off into the back-wash. "As for the cutter, it would spoil all to keep her off thereabouts; and I knew, if a boat did come in of the kind I guessed, why she wouldn't lay herself out for strength of crew. Snelling and I were well armed enough to manage half-a-dozen, if they fancied us friends; so I ordered the men to pull clear off for an hour, at least leaving fair water. In fact there were sentries about the heights, I was aware, if they could have heard or seen us; but the din of the surf, the dark, and the expectation of the thing, set us both upon our mettle; while I showed the boat's lantern every now and then, like the light I had noticed, such as the Channel smugglers use every thick night on our own coast. I suppose we might have waited five or ten minutes when the same twinkle was to be caught, dipping dark down into the swell again, about opposite the cove; next we had half-an-hour more, every now and then giving them a flash of the lantern, when suddenly the reefer said he saw oars glisten over a swell, which he knew weren't man-o'-war's strokes, or else the fellows ought to have their grog stopped. I had the lantern in my hand, slipping the shade once more, and the other to feel for my cutlass-hilt, when the mid gave a cry behind me, and I turned just in time to see the dark figure of a black spring off the stones at our backs. One after another three or four more came leaping past me out of the gloom--the Frenchman's red cap and his dark fierce face glared on me by the light of the lantern; and next moment it was down, with him and me in a deadly struggle over it in the thick black of the night. Suddenly I felt myself lose hold of him in the heave of the swell, washing away back off the rock; then something else trying to clutch me, when down I swept with the sea bubbling into my mouth and ears. "I came up above water again by the sheer force of the swell, as it seemed to me, plunging into the shore; with the choice, I thought, of either being drowned in the dark, or knocked to a jelly on the rocks; but out I struck, naturally enough, rising on the huge scud of the sea, and trying to breast it, though I felt it sweep me backwards at every stroke, and just saw the wide glimmer of it heave far and wide for a moment against the gloom of the cliffs behind. All at once, in the trough, I heard the panting of someone's breath near alongside of me, and directly after I was caught hold of by the hair of the head, somebody else grabbing at the same time for my shoulder. We weren't half-a-dozen fathoms from the stranger's boat, the blacks who had fallen foul of me swimming manfully together, and the boat lifting bow-on to the run of the sea, as her crew looked about for us by the light of their lantern. I had just got my senses enough about me to notice so much, when they were hauling me aboard; all four of the <DW64>s holding on with one hand by the boat's gunnel, and helping their way with the other; while the oars began to make for the light, which was still to be caught by fits, right betwixt those of the two cruisers, as the space widened slowly in the midst of them, standing out to sea. Scarce had I time to feel some one beside me as wet as myself, whether the reefer or the Frenchman I didn't know, when crash came another boat with her bows fairly down upon our gunwale, out of the dark. "The spray splashed up betwixt us, I saw the glitter of the oar-blades, and heard Snelling's shrill voice singing out to 'sink the villains, my lads--down with 'em--remember the second lieutenant!' The lantern in the French boat flared, floating out for a single instant amongst a wreck of staves and heads, bobbing wildly together on the side of a wave. One of my own men from the cutter pulled me by the cuff of the neck off the crest of it with his boat-hook, as it rose swelling away past, till I had fast grip of her quarter; the blacks could be seen struggling in the hollow, to keep up their master's body, with his hands spread helplessly hither and thither above water. The poor devils' wet black faces turned so wistfully, in their desperation, towards the cutter, that I gasped out to save him. They kept making towards us, in fact, and the bowman managed to hook him at last, though not a moment too soon, for the next heave broke the unlucky wretches apart, and we lost sight of them; the cutter hanging on her oars till they had both him and me stowed into the stern-sheets, where the Frenchman lay seemingly dead or senseless, and I spitting out the salt water like a cockney after a bathe. "'Why, Mr Snelling,' said I, as soon as I came fully to myself, 'I can't at all understand how I got into the water.' 'Nor I either, sir,' said he; 'I'll be hanged, sir, if I didn't think it was a whirlwind of <DW65>s off the top of Diana's Peak, seeing I made out the very one we found there this afternoon--the four of them took you and this other gentleman up in their arms in a lump, as you were floundering about together, and took to the water like so many seals, sir!' I looked down into the Frenchman's face, where he lay stretched with his head back and his hair dripping. 'Is he gone?' said I. 'Well, sir,' said the mid, who had contrived to light the lantern again, 'I'm afraid he's pretty near it. Is he a friend of yours, sir?--I thought as much, by-the-way, you caught him the moment you clapped eyes on each other, sir.' 'Silence, sirrah!' said I. 'D'ye see anything of the light to seaward?' "For a minute or two we peered over the swells into the dark, to catch the twinkle of the signal again, but to no purpose; and I began to think the bird was flown. All of a sudden, however, there it was once more, dipping as before beyond the heave of the sea, and between the backs of it, sliding across the open space, with the blind side to the cruisers. 'Hallo, my lads!' said I, quickly, and giving myself another shake as I seized the tiller, 'give way seaward--stretch your backs for ten minutes, and we have her!' We were pulling right for the spot, when the light vanished, but a show of our lantern brought it gleaming fairly out again, till I could even catch a glimpse by it of some craft or other's hull, and the iron of one boom-end, rising over the swells. 'Bow-oar, there!' whispered I. 'Stand by, my lad, and look sharp!' 'Hola!' came a short, sharp hail over the swells, '_d'ou venez-vous?_' '_Oui, oui!_' I sang out boldly, through my hand, to cover the difference as much as possible; then a thought occurred to me, recollecting the French surgeon's words on board this very craft the first time we saw her--'De la cage de l'_Aigle_,' I hailed; 'bonne fortune, mes amis!' 'C'est possible! c'est possible, mon capitaine!' shouted several of the schooner's crew, jumping upon her bulwarks, 'que vous apportez _lui-meme_?' "We are pulling for her side as lubberly as possible, all the time--a man ran up on her quarter with a coil of line ready to heave--but still the main boom of the schooner was already jibbing, her helm up, and she under way; they seemed half doubtful of us, and another moment might turn the scales. 'Vite, vite!' roared I, choosing my French at hap hazard. 'Oui, oui, jettez votre corde--venez au lof, mes amis!'--luff, that was to say. I heard somebody aboard say it was the American--the schooner came up in the wind, the line whizzing off her quarter into our bows, and we came sheering down close by her lee-quarter, grinding against her bends in the surge, twenty eager faces peering over at us in the confusion; when I sung out hoarsely to run for brandy and hot blankets, as he was half-drowned. 'Promptement--promptement, mes amis!' shouted I, and as quickly there was a rush from her bulwarks to bring what was wanted, while Snelling and I made dash up her side, followed by the men, cutlass in hand. Three minutes of hubbub, and as many strokes betwixt us, when we had driven the few that stood in our way pell-mell down the nearest hatchway. The schooner was completely our own. "We hoisted up the cutter, with the French captain still stretched in the stern-sheet--hauled aft the schooner's headsheets, let her large mainsail swing full again, and were soon standing swiftly out toward the light at the frigate's mast-head. "When the _Hebe_ first caught sight of us, or rather heard the sound of the schooner's sharp bows rushing through the water, she naturally enough didn't know what to make of us. I noticed our first luff's sudden order to clear away the foremost weather-gun, with the rush of the men for it; but my hail set all to rights. We hove-to off her weather quarter, and I was directly after on board, explaining, as simply as possible, how we had come to get a hold of a French craft thereabouts in such a strange fashion. "Accordingly, you may fancy the surprise at Jamestown in the morning, to see the _Hebe_ standing in with her prize, let alone the Governor's perfect astonishment at suspecting some scheme to carry off Napoleon, apparently, so far brought to a head. The upshot of it was, to cut this bit of my story short, he and the military folks would have it, at last, that there was nothing of the kind, but only some slaver from the African coast wanting to land a cargo, especially as there were so many blacks aboard of her; and the Frenchman at once took the cue, the little Monsieur of a mate swearing he had been employed by several of the islanders some months before to bring them slaves. For my own part, all things considered, I had nothing to say, and after some likelihood of a shine being kicked up about it at first, the matter was hushed up. However, the schooner was of course condemned in the meantime, as the _Hebe's_ fair prize, till such time as the Admiralty Court at the Cape should settle it on our outward-bound voyage. "As the _Hebe_ was to sail at once for India, the Governor took the opportunity to send two or three supernumeraries out in the vessel along with us to the Cape of Good Hope, amongst whom was the Yankee botanist; and though being in the frigate I didn't see him, I made as sure as if I had, it was my old shipmate Daniel. "Well, the morning came, when we weighed anchor from St James's Bay for sea, in company with the prize. It wasn't more than ten or eleven days since we had arrived in the _Podargus_, but I was as weary with the sight of St Helena as if I'd lived there a year. The frigate's lovely hull, and her taut spars, spreading the square stretch of her white canvas sideways to the Trade, put new life into me. Slowly as we dropped the peaks of the island on our lee-quarter, 'twas something to feel yourself travelling the same road as the Indiaman once more, with the odds of a mail coach, too, to a French diligence. What chance might turn up to bring us together, I certainly didn't see; but that night, when we and the schooner were the only things in the horizon, both fast plunging, close-hauled, on a fresh breeze, at the distance of a mile, I set my mind, for the first time, more at ease. 'Luck and the anchors stowed!' thought I, 'and hang all forethoughts!' I walked the weather quarter-deck in my watch as pleasantly as might be, with now and then a glance forward at Snelling, as he yarned at the fife-rail beside a groggy old mate, and at times a glimmer of the schooner's hull on our lee-beam, rising wet out of the dusk, under charge of our third lieutenant. "It was about a week afterwards, and we began to have rough touches of Cape weather, pitching away on cross seas, and handing our gallant-sails oftener of a night, that Lord Frederick said to me one evening, before going down to his cabin, 'Mr Collins, I really hope we shall not find your Indiaman at Cape Town, after all!' 'Indeed, Lord Frederick!' said I respectfully enough; but it was the very thing I hoped myself. 'Yes, sir,' continued he; 'as I received strict injunctions by Admiral Plampin to arrest Lieutenant Westwood if we fell in with her there, and otherwise, to send the schooner in her track, even if it were to Bombay.' 'The deuce!' I thought, 'are we never to be done with this infernal affair?' ''Tis excessively disagreeable,' continued the captain, swinging his gold eyeglass round his finger by the chain, as was his custom when bothered, and looking with one eye all the while at the schooner. 'A beautiful craft, by-the-way, Mr Collins,' said he, 'even within sight of the _Hebe_.' 'She is so, my lord,' said I; 'if she had only had a sensible boatswain, even, to put the sticks aloft in her.' 'I say, Mr Collins,' went on his lordship, musingly, 'I think I have it, though--the way to get rid of this scrape!' "I waited and waited, however, for Lord Frederick to mention this; and to no purpose, apparently, as he went below without saying a word more about it." CHAPTER XXIII "Well, ma'am," continued our narrator, addressing himself, as usual, to his matronly relative in the chair, and with the accustomed catch-word, which was like the knotting together of his interrupted yarn: "well--it was between a fortnight and three weeks after losing sight of St Helena, that, being at last fairly in the latitude of the Cape, the frigate and schooner tacked in company, and stood close-hauled on a wind to the eastward. By the middle watch that night, when the moon set, we could make out the long flat top of Table Mountain heaving in sight off the horizon over against her. Next day, in fact, we were both of us quietly at anchor outside of the shipping in Table Bay; Cape Town glittering along on the green flat amongst the trees to southward, with the hills on each side of it like some big African lion lying on guard close by; while Table Mountain hove up, square-shouldered, blue to the left, four thousand feet high, as bare and steep as a wall, with the rocks and trees creeping up from the foot, and the wreaths of light cloud resting halfway, like nothing else but the very breakwater of the world's end. The sea stretched broad off to north and west, and a whole fleet of craft lay betwixt us and the land--half of them Indiamen--amongst which, you may be sure, I kept a pretty sharp look-out with the glass, to see if the _Seringapatam_ were there still. "I was soon saved further pains on this head, however, when shortly afterwards the frigate was beset by a whole squadron of bumboats, shoving against each other, and squabbling in all sorts of <DW65> tongues, who should be first: the chief of them being in evident command of a fat old Dutch Vrouw, with an immense blue umbrella over her, two greasy-looking Hottentot rowers in blankets, and a round-faced Dutch boy, the picture of herself, steering the boat; as the old lady made a clear berth for herself, by laying about her with her blue umbrella, till she was close under our quarter, sitting all the while with the broad round stern of her bright- gown spread over a couple of beer-barrels, like a peacock's train. In two minutes more the little fellow was up the side, flourishing a bundle of papers under the first lieutenant's very nose, and asking the ship's custom, even whilst the sentries were ordering them all off. A midshipman took this youth by the cuff of the neck, and was handing him rather roughly along to the care of the purser's steward, when I stepped betwixt them; and a bumboat being the best directory on the point, of course, I soon found the old lady had had dealings with the _Seringapatam_, which her bluff-built little progeny described as a very good ship indeed, all having paid their bills, except one young officer, who had left a balance standing, for which he had given a letter to his brother in a ship that was to come after. As for the Indiaman herself, the Dutch boy said she had sailed about a week before our arrival, along with two others; and he was anxious to know if we were the vessel in question. I accordingly unfolded the open letter, which was addressed: 'Thomas Spoonbill Simm, Esquire, of His Britannic Majesty's ship _Nincompoop_ (or otherwise)'; and it ran somehow thus:--'_Hon. East India Company's ship_ Seringapatam, _Table Bay, September 1, 1816_.--My dear Brother,--This is to certify that I have eaten four dozen and a half of eggs, supplied by the worthy Vrouw Dulcken, the bearer of this, whom I can recommend as an old screw, and am due her for the same the sum of nine shillings and sixpence sterling, which you will kindly pay her, taking her receipt or mark, unless you are willing to forfeit our family watch, herewith deposited by me in the hands of said Mother Dulcken. I may add that, in justice to the worthy Vrouw, three of the above-mentioned eggs ought to be charged as _fowls_, which, by-the-way, I did not consume; and, with love to all at home, remain your affectionate brother, JOHN SIMM, H.E.I.C.S.--_P.S._ The watch I have discovered to be pinchbeck, and it does not go; so that a sad trick must have been originally played upon our venerated uncle, from whom it descended.--J. S.' "This precious epistle was, without doubt, a joke of the fat mid Simm, who used to come such rigs over Ford the cadet, and that jumped overboard one night by mistake out of the Indiaman's quarter-boat, during the voyage. As for the existence of his brother Thomas, or the chance of his touching at that port, I set them down with the coming home of Vanderdecken; though the thought of this young scamp of a sea-lawyer breakfasting for a fortnight so comfortably, only a few feet distant from my charmer's state-room, sent me all abroad again, and right into the Indiaman's decks, by this time far out of sight of land. Piece of impudent roguery though it was, I was actually loath to part with the scrawl, which the reefer had fisted, no doubt, on the lid of his chest--probably with a pipe in his mouth at the time, it smelt so of tobacco--only seven days before: I could even see the grin on his fat face as he wrote it below in the steerage, with his chin up, and his eyes looking down past his pipe; while the little Dutch boy's round flat frontispiece glistened as he peered up at me, in the evident notion of my being the brother expected. "In fact, ma'am, I was so soft as to intend paying the nine-and-sixpence myself, and keeping the letter, when I was startled to see the old lady herself had contrived to be hoisted on board amongst her cabbages; and having got wind of the thing, seemingly, she came waddling towards me to hand over Simm's watch to boot. In another half-minute the letter was being read aloud in the midst of the whole gun-room officers, amongst roars of laughter; the honest old Dutchwoman holding aloft the precious article, and floundering through to find out the rightful owner, as everyone claimed it and offered the nine-and-sixpence; while for my part I tried first to get down one hatchway, then another; and Lord Frederick himself came up on the starboard side of the quarter-deck in the height of the scene. Indeed, I believe it was a joke for months after in the _Hebe_, of a night, to say it was 'the second lieutenant's watch'; the sole revenge I had being to leave Mother Dulcken and her boy to expect the 'ship that was coming after.' "A Government boat came aboard in the afternoon; and as soon as it left us Lord Frederick took his gig and steered for a frigate lying some distance off, which had the harbour-flag hoisted at her main, being the only man-o'-war besides ourselves, and commanded by a senior captain. "Till it got dark I could see the crews of the nearest merchantmen looking over their bulwarks at us and our prize, apparently comparing the schooner with the frigate, and speculating on her character, as she lay a few fathoms off the _Hebe's_ quarter, both of us rising and falling in turn on the long heave of the Cape swell from seaward. 'Twas hard to say, in fact, so far as their hulls went, which was the most beautiful sample of its kind; though the schooner's French-fashioned sticks and offhand sort of rigging, showed rather like jury-gear beside the tall regular sticks aloft of the _Hebe's_ decks, with all her hamper perfect to a tee. The _Hebe's_ men very naturally considered their own ship a model for everything that floated--a sort of a Solomon's temple, in short; and to hear the merciless way they ran down the Indiamen all round would have raised the whole homeward-bound fleet against us; whereas the schooner was our own, at any rate, and she was spoken of much in the manner one mentions an unfortunate orphan, as good as already christened by the name of the _Young Hebe_. "This our learned chaplain said was quite improper, and he gave another name in place of it--the _Aniceta_--which meant, as he observed, the _Hebe's_ youngest daughter; so the _Aniceta_ she was called, happening to be a title that went, according to the boatswain, full as sweetly through the sheave-hole. "Next day the schooner had landed not only her passengers from St Helena, but the prisoners also, as we still understood the French and their Kroomen to be. Not long after that Lord Frederick came back from Cape Town, looking grave, and went straight down to his cabin, or 'cabins,' as his lordship preferred to have it said. The first lieutenant dined that day with the captain; but they could scarcely have finished when the 'young gentlemen,' who had been as usual from the reefer's mess, came up with a message from the captain, that his lordship would be glad if I would join the first lieutenant and himself in a glass of wine. I found them sitting at the side of the table nearest the open port, with the decanters between them, and the broad bright bay in full sight to the shore and the foot of Table Mountain, which rose up blocking the port with the top of it beyond view; the sounds of the merchantmen clicking at their heavy windlasses, and hoisting in water-casks, floated slowly in from every side, while the schooner had hauled on her cable more abreast of the frigate, leaving the sight clear over the eddy round her low counter. "'A lovely piece of workmanship, certainly!' observed Lord Frederick thoughtfully, as he leant back swinging his eyeglass round his finger, with the other hand in the breast of his waistcoat, and looking out at what was seen of the schooner. 'And how one might have improved her spars, too!' said Mr Hall, wistfully. 'I should have recommended longer lower-masts altogether, Lord Frederick, and a thorough overhaul, I may say, from the combings upwards!' 'I would not have her hull touched for the world, Mr Hall!' said the captain; ''tis too----excessively provoking, at least! But pass the bottles to Mr Collins, if you please.' I had taken a chair, and quietly filled my glass, wondering what could be the matter, when his lordship turned to me and said, 'Do you know, Mr Collins, this schooner of ours is likely to be laid up in Chancery, heaven knows how long. The Admiralty Court ashore are doubtful of condemning her, apparently, and she must either be sent home or to Monte Video, or somewhere, where the master of her claims to belong!' 'Indeed, my lord,' said I, setting down my glass, 'that is curious.' 'Curious, indeed, sir!' replied he, biting his lips, 'though, after all, we really can scarce say what she is to be condemned for--only in the meantime I sail to-morrow for India.' 'She's French to the backbone, that I'll swear, Lord Frederick!' I said; 'and what's more, she was----' 'Ah,' broke in the captain, 'I know, I know; but the less we say of that, in present circumstances, the better! Once get her entangled with politics, and we may give her up altogether.' Lord Frederick twisted his eyeglass round his forefinger faster than before, still watching the schooner; the first lieutenant held up his claret betwixt himself and the light, and I sipped mine. 'I tell you what, gentlemen,' exclaimed his lordship, suddenly, 'I _must_ have that schooner at any cost!--What is to be done, Mr Hall?' 'She'd be of great service in the China seas, my lord, certainly,' said the first lieutenant, looking thoughtfully into his empty glass; 'a perfect treasure for light service, especially if new sparred and----' I noticed Lord Frederick glancing sideways at me, as I thought, with a slight gleam in his eye; and accordingly I suggested that he might buy her from the Frenchman himself; a very poor idea, no doubt, as both the captain and first luff seemed to think, and we all three kept eyeing her doubtfully through the port, without a word. "At this time the schooner's counter had been slowly sheering towards the frigate's beam, owing to the ebb-tide, and her holding only by a single cable, till her stern began to show right opposite the cabin, I should say not twenty feet off. Lord Frederick put his glass to his eye, and was peering through it, when he remarked that they had brought up rather too near, leaving scarce room for the schooner to swing as she did, earlier than we, so that she would be in danger in getting foul of the frigate's cables. 'The worst of it is, Lord Frederick,' said I, 'that in case of a gale from seaward here, she might have to slip and run upon very short warning, whereas the _Hebe_ has plenty of ground-tackle to let her ride it out. Considering it was Table Bay, at this season, he ought to have kept her a clearer berth for herself, or else have gone well outside!' 'Ah!' said Lord Frederick quickly, meeting my eye for half-a-minute, till the gleam came into his again; and somehow or other mine must have caught it, though I must say the notion that struck me then all at once wasn't in my head before. 'Do you know, that's well thought of, Collins!' said his lordship. 'You've weathered the Cape before, by-the-by?' 'A dozen times, Lord Frederick,' said I; when a regularly jovial roar of laughter broke fair through the port into the cabin from the schooner's taffrail, as she sheered end-on to the frigate's quarter, and Lord Frederick leant forward with the glass screwed into his right eye to see along their decks, which were covered aft with an awning like the open gable of a tent at a fair. 'Singular!' said he; 'by the Lord Harry, who or what can that be Mr Hammond has got there?' Dangling over the French schooner's taffrail were to be seen the soles of two immense boots, with calves and knees to match, and a pair of tightish striped trousers worked up more than halfway, till you saw the tops of the stockings; just beyond the knees was the face leaning back in the shade of the awning and a straw hat together, out of which a huge green cabbage-leaf hung like a flap over one eye, while the other kept gazing in a half-closed sleepy sort of way at the sky, and the red end of a cigar winked and glowed in the midst of the puffs of smoke lower down. The first lieutenant started up shocked at the sight, the noble captain of the _Hebe_ sat with his eyeglass fixed, between amusement and wonder; for my own part, when the voice of this same prodigy broke all of a sudden on us out of the awning, in a mixture of stuttering, hiccuping, Yankee drawling, and puffs at the cigar, 'twas all I could do to hold on, with the knowledge of where I was. 'Wall now, general,' said the American, as if he were talking to someone aloft or in the sky, 'ye-you're qui-quite wrong--I ki-kick-calc'late I've fit a deal more be-be-battles than you have--I re-respect you, Ge-Ge-General Washington; but I ho-ho-hope you know who--hic--who I am!' Here Mr Daniel Snout, who was in a state of beastly intoxication, swayed himself up bodily into the schooner's taffrail, and sat with his arms folded, his long legs swinging over the stern, and his head trying to keep steady, as he scowled solemnly aloft over the frigate's mizzenroyal-mast-head; while the third lieutenant, Mr Hammond, and the master's mate he had aboard with him, could be heard laughing at his back, as if they had gone mad--Hammond being a wild sprig of an Irishman, who would go any length for a piece of fun. "Just then the American's one eye lighted on the side of the frigate, till it settled lazily on the port of the captain's cabin: first he seemed to notice Lord Frederick Bury, and then myself, the first lieutenant having just recovered himself enough to rush toward the door to get on deck. Daniel himself surveyed me scornfully for a moment, then with a sort of doubtful frown, and a gravity that passes me to describe, unless by the look of an old cock a-drinking--evidently trying to recollect me. 'Hallo, mister!' shouted he suddenly, 'you haven't touched those _notions_ of mine, I hope.' With that he made a spring off where he sat, as if to come towards us--no doubt thinking of the _Seringapatam_, and the valuables he had left aboard, without seeing the water between; and a pretty deep dive Mr Snout would have made of it, into an ebb-tide that would have swept him under the frigate's bottom, if Mr Hammond and the midshipman hadn't both sprung forward in time to catch him by the neck of the coat. There, accordingly, was the Yankee hanging like a spread eagle over the schooner's taffrail, yelling and turning round at the same time like a fowl on a spit--the third lieutenant's and the mate's faces two pictures of dismay, as they held on, at finding for the first time where the schooner had shied them round to, with their two pairs of eyes fair in front of the captain's eyeglass--while Mr Hall was singing out like thunder from the deck above us, 'The schooner ahoy!--d'ye see where you've got to, sir? Haul ahead on that cable, d'ye hear, you lubbers, and keep clear of the ship!' "'Mr Collins,' said his lordship quietly to me, as soon as he could keep his countenance, and looking the sterner for the trouble he was put to in doing it, 'you will get your things and go aboard the schooner directly--take her in charge, sir, and send Mr Hammond back here.' 'Very well, my lord,' said I, waiting in the doorway for something more, which, from something in Lord Frederick's look, I had reason to expect, knowing it of old. 'I can only spare you a dozen of the men she has,' added he; 'but if you choose, you can send ashore at once to pick up a few makeshifts, or anything you find!' 'Ay, ay, my lord,' said I; 'the best hand for that would be Mr Snelling, if I may take him, Lord Frederick?' 'Oh, certainly,' was the answer; 'and harkye, Collins, you had better shift your berth a few cable-lengths farther off, or more, if you please.' 'One thing, my lord,' said I, stooping down to see through the port, 'I don't much like the heavy ground-swell that begins to meet the ebb, and I fancy it won't be long ere Table Mountain spreads its supper-cloth--in which case I'd consider it necessary to slip cable and run out at once, though I mightn't get in again so easily. Am I to find the frigate here again, Lord Frederick?' 'Deuce take it, man--no!' said his lordship. He turned his back to hide the evident twinkle of his eye. 'Should we part company, of course you make for the Bay of Bengal! You can't be sure of the _Hebe_, short of the Sandheads--and if not there, then opposite Fort William, at Calcutta.' 'Very good, my lord,' said I, and had made my bow to go on deck, when Lord Frederick called me back. 'By-the-by,' said he hastily, 'about that Indiaman of yours, Collins--she is here no doubt?' 'No, Lord Frederick,' answered I, 'I believe she sailed a week ago.' 'Dear me, the deuce!' exclaimed he; 'why, I meant to have sent to-morrow to have your friend Westwood arrested and brought aboard!' I started at this, on which his lordship explained that if Westwood got to Bombay, whither the _Seringapatam_ was bound, the authorities there would have news of the thing by this time, and could send him overland at once to England, which would be far worse for him than being carried to Calcutta, where his uncle the Councillor's interest might do something for him. 'The best thing you can do, Collins,' added Lord Frederick, 'if you are obliged to run out to sea, is to look after that Indiaman! With such a neat thing of a sea-boat under you, you might do anything you please; so cruise to windward or leeward in chase, find her out and take out Westwood bodily--lose him afterwards in the Hoogley, if you like--carry away those old spars of hers, and send up new ones--only don't lose the schooner, I beg; so good-bye to you, my dear fellow, lest we should not meet on this side the line again!' 'Good-bye, my lord!' said I cheerfully, and hurried on deck, understanding all he wanted as well as if I'd been ordered to set her jib that moment and heave up anchor. In ten minutes I was over the frigate's side, and in ten more Hammond was back in her, with the men who were to leave; while I sent my baggage below, set the hands to work shifting the schooner's berth, and by sundown we were lying beyond hail of the ship, opposite the custom-house, and a long line of a main street in Cape Town, where we could see the people, the carriages, and the Dutch bullock-carts passing up and down; while Table Mountain hove away up off the steep Devil's Hill and the Lion's Rump, to the long level line a-top as blue and bare as an iron monument, and throwing a shadow to the right over the peaks near at hand. "Our friend from the United States being by this time in quite an oblivious condition, the first thing I did was to have him put quietly into the boat with which Mr Snelling was to go ashore for fresh hands, and I instructed the reefer to get clear of him anyhow he liked, if it was only above tide-mark. When they were gone I walked the schooner's little quarter-deck in the dusk by myself, till the half-moon rose with a ghostly copper-like glare over the hollow in the Lion's Rump, streaking across the high face of Table Mountain, and bringing out all its rifts and wrinkles again. The land-breeze began to blow steadily with a long sighing sweep from the north-east, meeting the heavy swell that set into the broad bay; and the schooner, being a light crank little craft, got rather uneasy; whereas you could see the lights of the frigate heaving and settling leisurely, less than half-a-mile off. I had only six or seven good hands aboard altogether at the time, which, with those the midshipman had, were barely sufficient to work her in such seas; so with all I had to do, with the difficulty of getting men in the circumstances, a long voyage before us, and things that might turn up, as I hoped, to require a touch of the regular service, why the very pleasure of having a command made me a good deal anxious. Even of that I didn't feel sure; and I kept watching Table Mountain, eager for the least bit of haze to come across the top of it, as well as sorry I had sent Snelling ashore. 'I'd give a hundred pounds at this moment,' thought I, 'to have had Bob Jacobs here!' "As the moon got higher, I could see the swell washing up between the different merchantmen in sight, into their shadows, and heavy enough some of them seemed to roll round their cables, betwixt a breeze and a swell running the contrary ways; first one let go a second anchor, and then another, to help their heads shoreward; but still there was no danger, as things went. It wasn't long before I made out two boats coming from toward the town, round the stern of one of the ships, the frigate lying betwixt her and us, so that they took her by the way, and a good deal of hailing seemed to pass between them. I could even see epaulets glisten over the _Hebe's_ quarter, as if there was a stir made aboard; after which the boats were plainly pulling for the schooner. What all this might mean I couldn't very well conceive, unless it were either Snelling come back already, or else some hands Lord Frederick himself had provided before this, as I saw both boats were full of people. 'Forward there!' I sung out, 'hail those boats.' 'Ay, ay, the schooner ahoy!' was the answer in a sharp voice from the headmost of them, 'from the shore--all right! Stand by to heave us a line, will ye?' Next came a hail from Snelling, in our own gig; so I at once gave orders to heave them a rope and have both boats brought under the gangway, naturally supposing the sharp little fellow had come some marvellous good speed in shipping hands. As soon as he jumped on deck, I accordingly inquired how many men he had brought, when to my great surprise he informed me there was only one, 'a scuffy sort of a swab,' as he expressed it, 'who would do for cook!' 'The devil he will! you young rascal,' I broke out. "'Hush, sir, for heaven's sake,' said he, making some extraordinary sign, which I didn't understand; 'it'll all be right in the end, Mr Collins. Now then, sir,' to someone in the boat alongside, as he carefully handed him the accommodation-ropes, 'here you are--hold on, sir--so-o!' This was a rather youngish fellow in a huge pilot-coat and a glazed cap, with some kind of uniform inside, and a large breastpin in his shirt, who handed me a paper the moment he stood firm on deck, without speaking a word; though, by the light of the deck-lantern, I didn't much like the look of his foxy sort of face, with the whiskers on it coming forward from both cheeks to his mouth, nor the glance he gave round the schooner with his pair of quick sharp little eyes. 'Much more like a custom-house officer than a cook!' thought I, 'unless we mean to have a French one'; but what was my astonishment, on opening the paper, to find him called 'Gilbert Webb, harbour master's assistant, hereby authorised by the Admiralty Court, sitting in Cape Town, to take charge of the doubtful vessel described in her papers as the _Ludovico_, belonging to Monte Video--from the officer commanding the prize crew of his Brittanic Majesty's ship _Hebe_.' My first thought was to have Mr Gilbert Webb pitched over into his boat again, when Lord Frederick's own signature met my eye at the bottom of the paper, addressed below to 'Lieutenant Collins of His Majesty's schooner _Aniceta at sea_.' "A wonderfully mysterious squint from Snelling, behind the officer, was sufficient to clinch the matter in my own mind, showing that the reefer was as sharp as a needle; and I handed back the document to the harbour gentleman, with a 'Very well, sir, that will do.' 'I suppose I'd better have my men up, Lieutenant Collins?' said he, with a quick pert kind of accent, which made me set him down at once for a Londoner, while at the same time he seemed impatient, as I thought, to get the management. 'Why, sir,' said I, 'I suppose you had.' "Hereupon up mounted four or five decent enough looking _stevedores_[24]--one or two of whom had rather the air of sailors, the rest being broad-beamed, short-legged Dutchmen, with trousers like pillow-slips--followed by a whole string of fourteen or fifteen Indian Lascars, their bundles in their hands, and an ugly old _serdug_ at their head; while a lame, broken-down, debauched-like fellow of a man-o'-war's-man, that Snelling had found sitting on a timberhead ashore, got aboard with our own boat's crew. Our gangway was choke-full, to my fresh dismay, for, to get rid of such a tagrag-and-bobtail, in case of running to sea, was impossible; even if they weren't odds against us, here was it likely to get a thick night, the swell growing under the schooner till she began to jerk at her anchor, head to wind, like a young filly at a manger; so that dropping them back into their boat when needful, as I intended at first, was out of the question for the present. I found from the harbour officer that the number of hands would all be required with the morning tide, when his orders were to have the schooner towed in opposite the Battery Dock, especially as there was much chance of the wind blowing strong from seaward next day. The swell on the water, he said, was such that, after putting off, he thought of going back again till the tide began to turn; if he had not been encouraged to stick to it and keep on by the midshipman, whom he fell in with near the quay. This piece of news was the finish to the rage I felt brewing in me, vexed as I naturally was to give up the notion of a free cruise, in command of a craft like the schooner; and as soon as Mr Webb was comfortable in the cabin, over a tumbler of stiff grog and some cold beef, I sent for Snelling to my own cupboard of a state-room. [24] Men employed in the stowing of ship's cargoes. "'You cursed unlucky little imp, you!' I burst out, the moment he made his appearance, 'what's the meaning of this, sirrah, eh?' 'What is it, if you please, sir?' said Snelling, pretending to hold down his shock-head like a frightened schoolboy, and looking up all the time both at me and the lamp at once, while he swayed with the uneasy heave of the deck in such a way as made me grip him by the arm in a perfect fury, fancying he had got drunk ashore. 'You young blackguard, you!' said I, shaking him, 'didn't I tell you to get hands--didn't you know I meant to--to----' 'Oh yes, Mr Collins,' gasped the reefer, 'I did indeed--you meant to cut and run--I saw it by your eye, sir, and--don't shake me any more, sir, or you'll spoil my hair--and I don't deserve it--it's--all right!' And on my letting him go, the ugly little scamp sunk down on a chair with his eyes starting from his head, and a leer like a perfect demon incarnate: but so perfectly laughable it was, not to mention the air of complete confidence between us that he threw into it, that I sat down myself, ready to grin at my bad luck. 'Well, Mister Snelling,' said I quietly, 'you _are_ a touch beyond me! Let's have the joke, at least--out with it, man, else another shake may be----' "The reefer pointed with his thumb over his shoulder to the cabin, shoved his chin forward, and whispered, 'Why, sir, I'm only doubtful whether you could make him third officer--but at any rate, he'll always be useful at a rope, Mr Collins--won't he, sir?' I gave Snelling one look, meant to be as grave as an Old Bailey chaplain's, but it wouldn't do--my conscience wouldn't stand it--in fact the very self-same notion seemed to me to have been creeping into my mind. 'You--young--rascal!' was all I could manage to say, before making bolt to go on deck. 'By-the-by, Mister Snelling,' said I, turning and looking down from the hatchway, 'you must want a glass of grog--tell the boy to let you have some--and go and keep the officer company, sir.' "By this time it was raining hard, the half-moon coming out at moments and shining through it with a sudden sharp gleam, in some gust of the wind off the land--showing the swell in as far as the wet white custom-house and the bare quays, the ships with their hazy lights all hither and thither, while Table Mountain was to be seen now and then peering half over the mist, first one corner and then another, of a colour like dead ashes. One time I looked down toward the dusky little cabin, where the midshipman, quite in his element, was sitting with the harbour officer, the lamp jerking and making wild swings betwixt them, while Snelling evidently egged on his companion to drink; then I gave a glance seaward, where there was nothing but a glimmer of rain and spray along the dark hollows of the water. "I couldn't make up my mind, all I could do--it was too barefaced a thing to slip from the roadstead with a breeze blowing off-shore; but the worst of it was, that I didn't feel easy at the idea of parting with an anchor in the circumstances, not to say carrying off the Government people, unless forced to it. I accordingly went below to mix myself a stiffener, and found the officer a cool head, for, in spite of all Snelling could do, the reefer himself had got provoked, whereas the sharp Mr Webb was only a little brisker than before. 'A rough sort of night,' said I, nodding to him, as I knocked the water out of my cap. 'Well, it seems,' said he, free and easy. 'S'pose I go on deck then, gentlemen--I've refreshed, I assure you, so you needn't trouble about this 'ere schooner no farther--glad to get quit of it and turn in, I desay lieutenant?' 'No trouble in the world, Mr Webb,' said I, going on with my mixture, 'far from it; but sit down a minute, pray, sir--Mr Snelling here will take charge of the deck for us in the meantime'; and Snelling vanished at once, Mr Webb apparently flattered at my wishing his company. 'Will that cable of yours hold, think ye, Lieutenant Collins?' asked he, filling up another glass. 'Why,' said I, almost laughing, 'to tell you the truth, I begin to feel rather doubtful of it.' 'What!' broke out the harbour officer, starting up, 'then I must 'ave another put down immediately: why, what's the effect, sir--we'll be carried out to sea!' 'You said it exactly, Mr Webb,' I said: ''twould have been much worse, I suppose, if we were driven ashore, though! Now look you, if I were to let go a second anchor at present, I couldn't light upon a better plan either to break her back or lose both anchors in the end, from the difference of strain on the two cables with this ground-swell. The fact is, my good fellow, you're evidently not fit to take charge at present.' "'What, lieutenant!' said he, looking fierce and foolish at the same time, 'here's strange lang'age to a Gov'ment officer, sir; I hask the meanin' of it _at once_, mister!' 'But I depend a good deal on your knowledge of Table Bay weather,' I continued, leaning back with my weather eye screwed to bear upon him. 'D'ye think this wind likely to moderate soon, sir? come now.' 'No,' replied he sulkily, 'I'm sure it won't; and to-morrow it's certain to blow back ten times worse.' 'Then, Mr Webb,' said I, rising, 'you oughtn't to have come aboard to-night; as the short and the long of it is, I shall get the schooner an offing the first possible moment!' The officer stared at me in a bewildered manner; and as for the schooner, she seemed to be bolting and pitching in a way worse than before, with now and then a plunge of the swell on her broadside, as if she had been under weigh. Suddenly Snelling lifted the skylight-frame and screamed down into the cabin: 'Mr Collins, Mr Collins! she's been dragging her anchor for the last ten minutes, sir!' "I sprang on deck at two bounds; the schooner had somehow or other got her anchor out of hold at the time, with the cable as taut as a fiddle-string. It was quite dark aloft, and not a vestige of Table Mountain to be seen, though the moonshine, low down to westward, brought out two or three tracks of light along the stretch of water, and you saw the lights in the ships slowly sweeping past. Where we happened to be, it blew two ways at once, as is often the case in Table Bay, round the bluffs of the mountain, and as soon as she brought up again with a surge at the windlass, the heave of a long swell took her right on the quarter, lifting her in to her anchor again with a slack of the hawser, at which every second man sung out to 'hold on!' Over she went to port, a sea washing up the starboard side, and throwing a few dozen bucketfuls at once fair into the companion, where our friend the harbour officer was sticking at the time; so down plumped Mr Webb along with it, and the booby hatch was shoved close after him, while the poor devils of Lascars were huddled together as wet as swabs in the lee of the caboose forward. 'A hand to the wheel!' shouted I, as soon as I recovered myself; when to my great surprise I saw Snelling's new hand, poor creature as I'd thought him, standing with a spoke in each fist, as cool and steady as possible, and his eye fixed on me in the true knowing way which I felt could be trusted to. 'Jib there!' I sung out, 'see all clear to run up a few hanks of the jib--stand by to cut the cable at the bitts!' 'Ay, ay, sir,' answered Snelling, who was working away with the harbour men, his bare head soaked, and altogether more like an imp than a young gentleman of the navy--'all's clear, sir.' "Five minutes I daresay we stood, everyone in the same position, while I waited for a good moment in the run of the swell looking into the binnacle; till she hung slack, as it were, in a wide seething trough of the sea, when I signed to the man behind me to put the helm gradually to starboard. I glanced at the fellow again, caught his sharp weatherly eye once more--then putting both hands to my mouth I sung out to bowse on the jib-halliards. 'Now--cut--the cable!' shouted I, springing forward in my anxiety. "The schooner rose away from her anchor on the heavy roll of the sea; I saw two quick strokes of the axe on the instant, and she was spinning head off from the wind, heeling over betwixt the force of it and the ground-swell together, while the mass of black water was washing bodily away with us; the new helmsman showing down below me he as leant to the wheel, like somebody at the foot of a slide. If he had'nt helped her at the moment with a back turn of the spokes to port, 'twould have been all up with us. As it was, the schooner fell off gallantly in his hands, with a sliding surge into the lee of the next swell, that buried her sharp bows in the green sea till it foamed about our very shoulders as we hung on like grim death to the weather bulwark. She was just shaking herself free, and rising like a buoy over the broad tops of the waves, when Snelling, myself, and two or three of the men staggered down to her mainmast to swing up the throat-halliards, letting her feel a little of the boom mainsail; and we had scarce belayed, as the last glimpse of the frigate's lights was caught astern of us, heaving and setting, as she rode with her two bower anchors down; we had driven past close enough to have heard the creak of her hamper aloft. After that I had the fore-staysail set on her, then the reefed mainsail, and the lively schooner yielded to the long rolling seas so well, as very soon to make her own weather of it, especially since--clear of the high land about Table Bay--it was blowing only a strong breeze; and the more I began to feel master of her, the more inclined I was to let her show her good qualities. "Such a craft I never had had the full management of before in my life; and you may easily fancy how I felt at dividing the hands into the two watches, giving little Snelling command of one, as first mate, and picking out our men in turn. I looked round amongst mine, rather at a loss for one to make a second mate for the cruise, though there were three prime enough man-o'-war's-men, and I had chosen one of the Government officer's gang for his activity. As for the Lascars, we slumped in half of the number to each of us, for make-weights--when Snelling's fresh hand, who had fallen to my share, caught my eye again as he stood at the wheel. Every half-spoke he gave the schooner told; she was topping the heavy seas as they rose, and taking them just where they melted one to the other, with a long floating cleave that carried her counter fairly free of the after-run, though nearly right before the wind: the main-boom had been guyed over to the lee-quarter, till a third of the sail hung clear of her hull, and the breeze swept into the hollow of it, thick with spray. The light from the little binnacle shone up distinctly on the man's face, and with all the desperate, used-up, marbled sort of look of it, like one getting the better of a long spree ashore, I thought there was something uncommonly promising about him, not to say greatly above the run of foremast men. The wet, the wind, and the work he was at took off the seediness of his clothes; even the old rag of a handkerchief round his hairy neck had got a gloss to it, and he stood handling the wheel with a strange mixture of recklessness and care, as he glanced from the compass to the gaff of the mainsail against the scud, and down again. "The very contrast between the man's manner and his outward rig was sufficient to strike one, though plenty of seamen are to be found in the like state ashore; but what fixed me to him above all was the expression in those two keen, searching, _living_ eyes of his, when they once or twice met mine on their way from aloft to the compass-boxes. 'Twas as if they'd woke up since he came aboard out of a sleepy, maudlin condition, with the 'blue-devils,' or scarce fully out of 'em; like a sick man's in the lull of a fever, suddenly seen watching you out of the dusk of the bed, when one happens to glance up from the nurse's seat. "'What's your name, my man?' asked I, stepping aft to the binnacle. 'My name is Jones, sir,' said he readily. 'And your first name?' I said. 'Jack,' was the answer in an offhand way, with a hitch of one shoulder, and a weather-spoke to the wheel; spoken in an accent you'd have expected more in a West-End drawing-room than from a common sailor. 'Ah,' said I sharply. 'Jack Jones? I wonder how many Jack Joneses there are afloat! An able seaman, I think, Jones?' 'Why, sir,' replied the man, 'I never rate myself, sir--'tis all one to me, able, ordinary, landsman, or boy--I carry no papers, and leave my betters to rate me.' 'Where were you last, my man?' I asked; whereupon I met such a cool, steady, deep look out of the fellow's strange light- eyes, bloodshot as they were with drinking, that I felt almost our very two souls jostle in it; as much as to say: To all eternity fathom me if you can! 'Well, I forget where, sir,' said he, lowering his look to the compass-box again; 'always the way with me after a trip, a cruise, a voyage, or whatever it may be. I've got--ha!' and he yielded his body coolly to a jerk of the schooner's wheel. 'A sweet craft this, sir, but a little ticklish!' 'You've got what?' said I, not unwilling to wear out the time. 'I've got--no memory!' "Still there was somewhat so gloomy and mournful in the next glance aloft, I don't know how it was, but I felt inclined to offer him a mate's place on trial, and so I hinted, if he knew half as well how to handle a craft as he did of steering her. To my own surprise, Jones's wonder didn't seem to be roused at the notion, except that he gave me another quick glance, from head to foot, with a queer smile that struck me as if I were being questioned, instead of _him_; then he looked down over his own outfit, judging by which you'd have said he'd been shipwrecked. 'Well,' said I, 'I daresay you've been hard put to it, somehow, Jones--so as soon as you leave the wheel, you can go below to the steward, and get a seagoing suit of my own, till we see Calcutta, when your mate's wages will set you all right again.' The man touched his battered old straw hat; but I noticed his eyes gleam for a moment by the binnacle light, and a strange twitch run round his mouth at the mention of the mate's wages, the only way I could account for it at the time being his late hard-up condition; and nothing to my mind was more deucedly pitiable than to see the thought of a few paltry additional rupees light up a head like that, with the glistening sort of expression of a miser as I fancied. "The man had a head on him, in fact, when you eyed him, fit for a gentleman's shoulders, or more--his hair and his whiskers curly and dark, draggled though they were with the rain, not to say Cape Town mud--while the wearing away of the hair about the temples, and the red grog-streaks in the veins of his face, made him, no doubt, a dozen years older to appearance than he was. For my part I was quite convinced already, this same Jack Jones hadn't been sent out a cabin boy; there was not only a touch of high blood in him at bottom, but I'd have sworn he had been some time or other in the place of a gentleman, afloat or ashore, though plainly now 'going to the devil.' "Meanwhile the breaking look of the clouds away on our larboard bow showed it wasn't far off dawn; so, sending another hand to the wheel, and finding a snug spot under a stern-grating for a snooze on deck, I told Jones to begin with taking charge of the deck for me. 'One thing, sir,' said he, touching his hat again, as I lay down, 'I've only shipped for the outward voyage, and leave at the first port.' 'Why, what!' said I, lifting my head; 'what do you mean to do there, eh?' 'I--I want to go ashore,' answered he, eagerly; 'ay, if we're years on the cruise, so much the better, sir, but so soon as she drops anchor off Calcutta, I'm my own master?' 'Have your own way, then,' said I; 'at any rate I'll try you in the meantime--so Mister Jones, let's see how you mind the schooner till eight bells!' Whereupon I turned myself over to sleep, and it was as broad daylight as we had any likelihood of about the Cape, when I woke. CHAPTER XXIV "It still blew a stiff breeze, but the waves rose with a length and a breadth in them you find in no other sea; deep-blue sparkling hills of water, with green gleams about the crests, of which every single wave had a hundred or so; and a long seething, simmering, glassy hollow of a still valley between, where the flecks of foam slid away glittering out of the shadow. But, oh! it was glorious to feel the schooner rising quietly in the trough, with the mount of a wave, to the very ridge of it; then with a creak of all her timbers and bulkheads below, a slight shake to windward, and a jerk at her bows, lean over to leeward again, and go hissing through the breast of a huge sea, till you thought she'd go down into it; while there she was, however, lifting head up, with a swift flash of her cutwater, on the cross half-wave that joined every first and third one--'billow' and 'sea,' as you may say. The breeze having drawn more easterly toward morning, Jones had braced her more upon a wind, with reefed main and foresails, and fore-staysail set, which brought out the _Aniceta's_ weatherly qualities to a marvel, as, notwithstanding almost a head-wind and a swelling sea, she went nearly as fast as the frigate would have done before the breeze, and not a sign of the land was to be seen from her cross-trees. "It was not till the afternoon, when the midshipman and I had both been busy together seeing various things done about the rigging, as well as having preventer-braces and guys clapped on the booms and gaffs, that we had time to look about us; the schooner still driving along with the breeze strong abeam, and a floating plunge from one wide dark-blue sea to another, as if they handed her onward. "Jones had got himself made decent below, as I told him, till what with different clothes, and a shave together, besides refreshment from sea weather, he was quite a different man to look at. Even Snelling owned to his sailor-like appearance, though rather surprised at my notion of making him a mate; while as for the men, they didn't know but he had come aboard as such, and to tell the truth, he was having the main-staysail got up and ready to bend at the time, like one accustomed to give orders. By this time I remembered the harbour officer, Webb, whom we'd carried off so unceremoniously, and found he was still in his 'bunk' below, half-sulky and half-sick, consoling himself with brandy and water till we should get into Table Bay again, as he said. 'Only put him into my watch, Mr Collins,' said Snelling gravely, 'and I'll work him up, sir.' The reefer himself, in fact, had all of a sudden turned out in a laughingly dignified style, to meet his new post--in full midshipman's rig, dirk and all, with his cocked hat which I sent him down immediately to change; but he had brushed up his mop of hair, and begun to cultivate the down on his upper lip; while being a deep-shouldered, square-built, short-armed little fellow, as muscular as a monkey, you'd have thought from the back of his coat he was a man cut shorter, and for his face, he had contrived to put such a sour effect into it--meant for great experience, no doubt--that it was only by his eyes one saw he was a boy of sixteen or so; and _they_ were brimful of wild glee, as he jumped about wherever he was needed, doing the work of a couple of ordinary men, and actually delighted when a spray came over the weather bulwarks on top of him, seeing that, instead of the frigate, she was 'our schooner' that did it. "'I think she walks, Mr Collins!' observed Snelling, holding up his head stiffly, and looking aloft as we went aft, after shaking ourselves from one of these same sprays. 'No denying that, Mr Snelling,' said I as gravely; 'I only wish your fond parents could see you just now, first mate of such a smart craft, Mr Snelling!' His father was a country baronet, who had sent him off to sea with an allowance--I daresay because his looks were no ornament, and there were plenty more coming, though Snelling always pretended his worthy progenitor was an old man. 'Fond, be blowed!' said he, starting; 'I just see him at this moment at the foot of that blessed old mahogany, proposing my health before the ladies go, and----' Here the schooner rose on a sharp, short wave, making a plunge through it that sent the helmsman swinging to the lee-side of the wheel, while a sea washed up over her forecastle, and away aft with the tubs, buckets, and spars, knocking everybody right and left. Snelling and I held on by the weather main-rigging with our feet in a bath, till she lifted bodily through it, careering to her lee-gun'ale. "'By George, though!' broke out the reefer, smacking his lips as we drew breath, 'I wish he _did_ see me--wouldn't it cheer his declining years, when I got to hand the governor carefully below! And such a rough night as we're going to have of it, too, sir!' 'You unfilial young dog,' said I; 'but so I'm afraid we shall--and no joke either!' Jones was standing near us, watching the looks of the weather, with evident uneasiness, and I asked him what he thought of it. 'In my opinion, sir,' said he, 'you'll have some pretty sudden shift of wind ere long, of a kind I have seen more than once off the Cape before--and that as furious as a south-easter ordinarily is hereabouts. Look away yonder, sir!' "It had got to a clear, dry north-easterly gale that shook our canvas every time she lifted, singing through the ropes, and bitter cold. Long and heavy as the roll of the sea was, the sky was as keen and clear as glass all round about and aloft, save the mist kicked up by the spray off a wave here and there. If a rag of white cloud appeared, it was blown away, and you saw the black wrinkled side of one wave at a time, a mile wide, you'd have said, freckled all over with spots of foam, and its ridge heaving against the eye of the blast. The waves had begun to break shorter. The schooner, buoyant as she was, and sharp as a dolphin, pitched and rolled at times like mad, and the men forward were standing by to let go the fore-halliards, throat and peak, to ease her a little; when Jones pointed out the bank of gray cloud ahead of us, scarce to be seen through the troughs of the water, except when she lifted well upon a swell of sea. The sun going down in a wild red glare to leeward of us, threw a terrible glitter across the huge slant of one single wave, that rose stretching away far and wide from her very bow, then brought out the sulky wrinkled blue in it; the hissing green crests curled over to the very sunset, as it were, while we sank slowly into the long dark lulling trough, and saw the broken shaft of a rainbow stand glimmering for a moment or two into a black hollow right ahead, when the gale drove it back upon us like an arrow, as the schooner surged through the breast of the next wave. I looked from Snelling to the new mate, who still held on by a belaying-pin and watched the clouds, giving me back a glance that showed he thought the matter more serious than ordinary. 'The sooner we strip her to the storm-staysails,' said I quickly, as we fell into the trough again, 'the better, I think. If it blows harder, we must lie-to with her at once.' My eye was anxiously fixed on Jones, for large as the schooner was, between two and three hundred tons, yet no craft in the world is so nice to bring to the wind in a gale with a heavy sea running. Scudding before it might have done for the frigate, with her full bows, and spars high enough to keep her main-topsail full in spite of the troughs; but even that would have taken us out of our course after the Indiaman. Besides that, to tell the truth, I didn't sufficiently understand fore-and-aft rigged craft in all weathers yet, to be quite sure of what I did at a pinch like the present. 'Yes, yes, sir,' answered he; 'but if you'll take an older man's advice, before that you'll wear her round on the other tack to it. We've the worst to come, or else I'm mistaken, sir.' 'You're accustomed to schooners?' asked I firmly, and gazing him in the face. I saw his lips open in the sweep of the wind through our after-rigging, and he made a sign with his hand, while a gnawing sort of spasm, as it were, shot through the muscles of his jaw, and for a moment he gave me a fierce, keen glance, almost a glare, from under his strong straight eyebrows--then turned away. 'Take the trumpet then, Mr Jones,' said I, singing out into his ear; 'I'll leave her to you, sir. Mr Snelling, let's see the hatches all fast!' And we scrambled along by the belaying-pins. "'Are you all ready fore and aft?' came Jones's voice like thunder in the next dip she made, and he leapt up bareheaded on the breech of one of the small carronades aft, holding on with one hand by the weather mainshrouds, and watching the run of the waves as they glimmered off our lee-beam into the dusk, for full five minutes. I had hold of a rope near him, and his eye was as steady as if he were picking out hills in a view. I had full confidence in the man; but I must say it was a nervous moment to me, when I saw him lift the trumpet to his mouth--and furiously as the wind shook the schooner, you heard his hoarse cry, 'Put your helm up--slack off the mainsheet--brail up the mainsail--ease down the weather boom-guy--main-staysail sheet.' And the rest was lost in the wild shriek of the north-east gale. We were hard at it, however, staggering as we hauled and held on, even to the poor half-drowned, terrified Lascars, whom the midshipman had roused out of the caboose and long-boat, shoving the ropes into their leathery hands. But I knew little else till I saw the schooner had payed off before the wind, shearing with a hiss like red-hot iron right through the ridge, betwixt two tremendous combing waves. It swelled green over her larboard bulwark as she heeled over, and she gave a heavy dead lurch with it, as if she would let the next sea break aboard. "'Now! now!' shouted Jones, at a pitch of voice like no earthly sound; 'aft the mainsheet, for your lives!' He jumped to the wheel himself, at a single bound. We were in two floundering heaps, as we dragged at the main-boom aft, and the headsheets on the forecastle, while she came trembling up in the long bight of the sea, and took the gale steadily before her other beam. It was blowing harder than ever; and the awful 'scud' of the sea rolled her bodily away, as she met it with her weather-bow, washing white over the head-rail, with spray from cathead to bowsprit; the gale heaving her down on the lee-beam till she plunged to the brim on that side, at every forward pitch, so that all hands on deck had to keep crowded together aft. Still it was keen starlight overhead, the gale dry, though it was bitter cold, and the seas long and pretty regular. The schooner behaved wonderfully, being as tight as a bottle; and at the same time we were not only lying our course either for the Mozambique or Indian Ocean, but instead of running farther into the gale, as before, and getting more into the wild Cape latitudes, why at present she tended to clear out of them. I accordingly agreed with Jones to hold on with everything as long as possible, in spite of the way she was sometimes flung off with the crest of a wave, as it were, making a clear dive with her nose under water through a white seething sea that seemed to swell round the whole horizon; the black bank of cloud off our weather-beam towered like icebergs against the cold green sky to south-east, the stars glittering and twinkling over it, with little hazy rings round them, after a fashion that one of us liked no more than the other. "About midnight, we had got everything off her to the two small storm-staysails, main and fore, the wind blowing great guns, and the half-moon shining right over the long bank, as if the back of it were dead white; while betwixt it and the washing glimmer of moonlight halfway you'd have thought the black heave of the ridges vanished into a bulk of shadow ten times blacker, save for the heads of spray tossing dimly over in it here and there. All at once, in the very height of the gale, as the black floating clouds from the bank began to cross over the gray scud flying fast aloft, a blue flash of lightning shot zigzag into the very comb of a wave ahead of us, then came the clap of thunder, loud enough to be heard above the wind, and in half-a-minute there was a sudden lull. You saw the fleecy rags of scud actually settling together under the dark vapour moving above them, and heard nothing but the vast washing welter of the billows rising and seething for miles round, as if the world were water, while the schooner rolled helplessly away, with her storm-staysails flapping, into the trough. The midshipman almost gasped as he looked to me--not from fear, but as much as to say, 'What next?' Our strange mate stood against the fife-rail of the mainmast, apparently too intent on the sky and sea for speaking. For my own part, I let go my belaying-pin, and half-tumbled to the wheel, almost knocking the sailor down in my haste to put the helm hard up--for I saw how the blast was to come, fairly before the beam, upon us. 'Hard a-starboard with it!' shouted I; 'haul down the main-staysail there--let her fall as she rises.' "The last words were never heard, for next moment there was another flash of lightning, this time a blaze all round into the troughs of the sea; I saw a body of mist coming down upon us from south-east, through which the gale struck her on the starboard beam, having suddenly shifted eight points or so. The heavy rolling swell from north-east was close aboard, and as soon as I knew what I was about, here she was leaning over to the full tremendous force of the storm, without power to surge ahead, though struggling to rise like a carthorse down on his knees with a load uphill of him. 'Twas by instinct, as they say, I found myself scrambling along to her weather main-channels, where I managed to get out on the side, slippery as it was, and drenched with the blinding showers of spray. I had got my knife at work, cutting the lanyards of the shrouds to let the mainmast go, when I saw Snelling creep after me, like a fearless little fellow as he was, dirk in hand; although what was come of Jones I couldn't see, unless he had lost heart and skulked. All at once, to my great joy, the main-staysail blew inway to leeward out of the bolt-ropes, like a scrap of paper, the main-topmast crashed at the cap and went alongside, when the schooner righted to her keel, with a wild bolt forward through the whole width of an immense wave--one of the 'third waves' it was, commonly the last and the hugest in a single roll of the sea off the Cape, before you sink into a long gliding valley, with a sort of a lull in it. The scene was so terrible at the moment, though we bore up for full half-a-minute to the fair steady stroke of the awful gale, nothing but a yeast of mist, scud, and darkness ahead, the spray torn off the ridge of the wave and flying with us, while the triple run of the heavy seas astern was in danger of sweeping her decks from over the poop--that I felt we must try lying-to with her at once. "Indeed, Snelling and I hardly knew whether we were holding on or not, as we were half washed in-board and half crawled round the rigging; but Jones had already seized the exact point--when she sank in the hollow--to have the helm eased down to leeward. Meanwhile he had got the reefed foresail balanced and set, with the sheet hauled aft beforehand--a tackle hooked on to the clue, and bowsed amidships--everything else was off her; and with this sail she came slowly up close to the wind on the slant of the next wave, lying-to nearly head toward the force of the sea, as her helm was kept fast two or three points to leeward. I never had seen a craft, of the kind hove-to in a gale before, and a very nice matter it is, too. We drew breath, scarce able to credit our eyes, while the schooner rode apparently safe on a sea rolling mountain-high; rising and falling off from the breasts to the sides of the waves, so far as leeway went, and forging ahead a little at the same time through the fierce spray that showered out of the dark over her weather-bow. "Cape weather as bad I had seen before, but always in good-sized ships; and I owned to Snelling I would rather have handled any one of them, even with a lee-shore near, ten times over, than this schooner of ours in the present case. However, none of us were in any mood for speaking at the time, let alone the waste of breath it was. The best thing we had to do, after getting somewhat satisfied of her weathering it this way, was to have the grog served out to the men, swig off a stiff pannikin oneself, and make oneself as comfortable as possible with his pea-coat in the lee of something. "The sight of the sea ridging up with a dim glimmer against the dark, kept your eye fixed to it; first you thought it would burst right aboard, crash down upon the decks; then she lifted with it, swelling broad under her, while the long steady sweep of the gale drove just over the bulwarks with a deep moan; for half-a-minute, perhaps, a shivering lull, when you heard the bulkheads and timbers creak and strain below from stem to stern, and the bilge-water yearning, as it were, to the water outside. Then, again, it was a howl and a shriek, a wide plunge of sea bore up her weather-bow, and the moment ere she came fairly to, one felt as if the schooner were going to pitch God knows where. Her whole bulwarks shook and shivered, the wind found out every chink in them, whistling round every different rope it split upon, while all the time the loose, wet, dreary spars behind the long-boat kept slatting and clattering against each other in the lashings, like planks in a woodyard of a November night. This was the way we stuck till the morning watch showed it all in a drizzling, struggling sort of half-light, blowing as hard as ever, the Cape seas rolling and heaving mountain-high, of a pale yeasty hue, far and wide to the scud; the spray drifting from the crests, and washing over her bare forecastle, with now and then the white wings of a huge albatross to be seen aslant to windward, riding on the breast of a long wave down into the trough. "Well, the whole blessed day did this sort of thing continue, only varied by now and then a huger sea than ordinary lifting close aboard of us, and we being hove up to get a glimpse of the long glaring streak of horizon through the troughs of the waves; sometimes an unluckier splash than usual over the bow and through the fore-chains, that made us look sharp lest the canvas of the foresail should go, or the schooner broach end-on to the sea. Otherwise, all we had to do was to watch the binnacle, hold on with one hand to a rope, and with the other to our caps; or turn out and in with each other down the booby-hatch for a snatch of sleep, and a bit of biscuit and cold beef, with a glass of grog. Mr Webb, the harbour officer, was to be seen below in his berth all this time, lying as peaceable as a child; whether he was dead sick or only confoundedly afraid I didn't know; but I must say I felt for the poor fellow when I heard him ask Snelling in a weak voice, if he would get somebody to stand off the bull's-eye in the deck over his berth, as it always made him think there was a new hurricane coming on. 'You low, skulking hound!' said the reefer, who had wonderfully little pity in his make, 'it can't be worse--what d'ye want light for, eh?' 'Only to see the opposite wall,' said Webb meekly; 'do, sir--oh now!' 'Oh, you lubber, ye!' said Snelling, 'don't you know a bulkhead from a wall yet? If you'd come on deck to bear a hand like others, you wouldn't need light; and _I_ thought you might do for a mate aboard, too--pah, you scum!' "'Mr Snelling,' said I sharply, as he came through the cabin, 'a worm will turn when it's trod upon, and so you may find yet, sir!' 'Well, Mr Collins,' said he, as confidently as if I hadn't meant to give him a set-down, 'I don't like the fellow's eye. I'll look after him, sir!' "Not to mention the young rogue's power of face, which was beyond brass, he had a way of seeing you in two places at once with that upward squint of his, as if his eyes were the points of a pair of compasses, that made the officers of the _Hebe_ always send him to the mast-head directly, for fear it should take the frown out of them. In fact, when Snelling's twinkling weather-eye lighted on one's neck, without the other, you almost felt it tickle you, and as usual I turned away with a 'Pshaw!' "On the second morning, the gale at last began to break, shifting southward; on which, as soon as the sea ran a little easier, I had the helm cautiously put up at a favourable moment, the reefed mainsail, fore-topmast-staysail, and square fore-topsail set as she got before the wind, and away the schooner went; rising on the wide deep-blue swells with a long roll in them, then shearing ahead through their breasts, wrinkled and seething pale-green, till she sank with the fall of the wave--the stump of her aftermast standing, and the fore one shortened by the to'gallant-mast. You may easily believe there was no one aboard more eager to get clear of this weather than myself; as in ordinary circumstances, with a craft like this, in two or three days more we might have been in a high enough latitude to begin looking out for the Indiaman. For my part, I can't deny that the wish for having Tom Westwood safe out of harm's way, and with me in the schooner, strong as it was, played second to the notion of seeing sweet Violet Hyde in any way again, if it was only the last time before she went out of reach altogether; for her getting amongst East India ways of doing, high-flying civilians and soldiers, shows, and sights, either in Calcutta or up-country, was equal to anything else, in my mind. Still, we had six or seven days longer of the heavy seas and hard gales, before north-easting enough could be made to take us beyond the Cape winter, just then coming on, and which the _Seringapatam_ had very likely escaped by two or three days, so that she would have a considerable start of us. "By this time we were standing well up for the Mozambique Channel, which I had heard the Indiaman intended to take in company; a piece of information that made me the more anxious to overtake the _Seringapatam_, at latest, by the time they reached open water again, where, being the only ship for Bombay, she would no doubt part from her consorts. We had a cruiser that year, as I knew, in the Mozambique, where there were some rumours of pirates after the war, so that in case of her happening to speak the _Seringapatam_ close, and having got any word of Westwood's affair, he ran a chance of being picked off. However, that wasn't by any means the thing that troubled me most; somehow or other, whenever the picture of Violet's face brought the Indiaman's decks clear into my mind, with all about her, I couldn't get rid of the notion that some ill-luck would come across that ship before she got into port. If any pirate craft were to dodge the whole bevy of Indiamen up the head of the channel, as was pretty sure to be the case, he would probably wait for some signs of separating, and be down upon a single one not long after she cleared the Leychelles Islands, where a lonely enough stretch of the Indian Ocean spreads in. The more I entered upon the thought of it, the more unsufferable it got; especially one day in the mouth of the Mozambique, when it fell a dead calm with a heavy up-and-down swell, fit to roll the sticks out of her; the high blue land of Madagascar being in sight, sometimes to starboard, sometimes to port, then astern, and the clear horizon lying away north-west, dark with a breeze from round the coast. As the hot sun blazed out above us, and the blue water came plunge up over the rail, blazing and flashing, first one side dipped, then the other, I could fancy the passengers on the Indiaman's poop in a light breeze with a suspicious lateen-rigged sail creeping up on her quarter. I thought I saw Violet Hyde's eyes sparkle against the glare of light, and her lips parting to speak--till I actually stamped on the deck, my fists clenched, and I made three strides to the very taffrail of the schooner. All at once I met my second mate's eye coolly fixed on me, which brought me to my senses in a moment, the more so as there was something about this man Jones I couldn't make out, and I had made up my mind to keep a sharp eye on him; though the fact was, it annoyed me most to feel him seeing into _me_, as it were, without troubling himself. 'We shall have the breeze before long, sir, round Cape Mary yonder,' said he, stepping forward. 'So I expect myself, Mr Jones,' said I, 'though you evidently know the coast better than I do.' With that I gave him a careless side-look, but to all appearance there was nothing particular in his, as he told me he had seen it two or three times before. CHAPTER XXV "With the evening we were once more running sharp on a wind up channel; and when she did get her own way in a good breeze, the schooner's qualities came out. 'Twas a perfect luxury to look over the side and see the bubbles pass, her sharp bows sliding through it like a knife, she eating into the wind all the time, in a way none but a fore-and-aft clipper could hope to do, with a glassy blue ripple sent back from her weather-bow as far as the fore-chains; then to wake of a morning and feel her bounding under you with a roll up to windward, while the water gushed through and through below the keel, and ran yearning and toppling away back along the outer timbers into her boiling wake, working with the moving rudder. And our man-o'-war's-men were quite delighted with the Young _Hebe_, as they still called her. Snelling was in his element while we were having the new spars sent up aloft--a set of longer sticks than before--till she had twice the air, as well as a knowing rake aft. Next thing was to get the long brass nine-pounder amidships from under the boat, where the Frenchmen had kept it, besides which we found another in her hold; so that, added to six small carronades already on deck, we made a pretty show. Meanwhile, for my own part, I kept cracking on with every stitch of canvas that could be clapped upon the spars, including studding-sails. Jones himself didn't know better than I did by this time how to handle the craft, schooner though she was, in the way of making her use what weather we had to the best purpose. Variable as it proved, too, I was aware the Indiamen would have pretty much the same now as we had; so that, on going aloft with the glass, as I did every watch in the day, I soon began each time expecting one or other of them to heave in sight. "As for the five hands from Cape Town, they seemed to have fallen in cheerfully enough with our own, and as soon as the fine weather came, the gang of Lascars were set to duty like the rest. Snelling would have them even trained to work the guns, although, if it blew at all hard, not one could be got to go aloft, except their old _serang_ and the _tindal_, his mate. What surprised me most was the harbour officer himself at last asking, as Mr Snelling told me, to be put in a watch; but as the midshipman said there was no doubt Webb had made a voyage or two before, somewhere or other, I agreed to it at once. 'I'm not sure, sir,' added the midshipman, with one of his doubtful double looks, 'but the gentleman may have seen blue water the first time at Government expense, and not in the service either--he don't look fore and aft enough, Mr Collins, harbour officer though he be; but, never mind, sir, I'll see after him!' 'Pooh,' said I, laughing; 'if he does turn to, Mr Snelling, it shan't be in the watch _you_ have to do with! Hand him over to Mr Jones.' By this time I had changed the mid into my own watch, and given Jones charge of the other--so to him the harbour officer went. "The main character aboard of us, to me at anyrate, was this Jones himself. The fact was, at first I had my doubts of him altogether, partly owing to the queer way we got hold of him, partly on account of his getting the upper hand so much through chance, in the tremendous weather we had at the outset, till I wasn't sure but it might come into the fellow's head of itself, to be upon some drift or other that might cost me trouble, as things stood. However, I no sooner felt where I was, and got the craft under my own spoke, than I came to set him down for nothing but one of those strange hands you fall in with at sea sometimes, always sailing with a 'purser's name,' a regular wonder of a shipmate, and serving to quote every voyage after, by way of a clincher on all hard points, not to say an oracle one can't get beyond, and can't flow sky-high enough. To tell the truth, though, Jones was as thorough a seaman as ever I met with--never at a loss, never wanting on any hand; whether it was the little niceties we stood in need of for setting the schooner's rigging all right again, which none but a blue-water long-voyage sailor can touch, or, what comes to be still better in tropical latitudes, a cool head and a quick hold, with full experience for all sorts of weather, 'twas much the same to him. He was all over like iron, too, never seeming to stand in need of sleep, and seeing like a hawk. At any hour I came on deck in his watch, there was Jones, all awake and ready, till hearing him walk the planks over my head of a fine night made me at times keep my eyes open, listening to it and the wash of the water together. I fancied there was something restless in it, like the sea, with now and then an uneven sort of a start; and at last it would come to full stop, that gave me the notion of how he was standing quiet in the same spot; whether he was looking aloft, or thinking, or leaning over the side, or what he was going to do, troubled me wonderfully. The only want in his seamanship I noticed, he evidently wasn't used to handle a large ship; but craft of some kind I was pretty sure he had commanded in the course of his life. As for taking observations, he could do it better than I could then, while the knowledge he had on different heads, that came out by chance, made you think more of a Cambridge graduate than a common sailor, such as he had shipped for with us. The strangest part of all about him, though, was what I couldn't well name, not to this day; 'twas more grained in with his manner, and the ring of his voice at particular moments, as well as his walk, though these were the smart seaman's no less; but one couldn't help thinking of a man that had known the world ashore some time or other, in a different enough station from now--ay, and in a way to bring out softer lines in his face than reefing topsails or seeing the main-tack ridden down would do. The nearest I could come to calling it, far apart as the two men stood, was to fancy he reminded me of Lord Frederick Bury himself; especially when he looked all of a sudden to the horizon in that wide, vacant kind of fashion, as if he expected it farther off than it was; only Jones's face was twice the age, like a man's that had had double the passions in it at the outset, and given them full swing since then; with a sleeping devil in his eye yet, besides, as I thought, which only wanted somewhat to rouse it. Only for that, I had a sort of leaning to Jones myself; but, as it was, I caught myself wishing, over and over, for something to make us fall regularly foul of each other, and get rid of this confounded doubtful state. One hitch of a word to take hold of, and, by Jove! I felt all the blood in my body would boil out in me to find how we stood, and show it; but nothing of the kind did Jones let pass--and as close as the sea itself he was in regard to his past life. As for the men from the frigate, at least, they seemingly looked on him with no great fondness, and a good deal of respect, in spite of themselves, for his seamanship; whereas, if he had been left in the fore-peak in place of the cabin, I've no doubt in a short time it would have been no man but Jones. You light now and then upon a man afloat, indeed, that his shipmates hold off from, as healthy dogs do from a mad one; and you saw they had some sort of an inkling of the gloomy close nature Jones had in him by the way they obeyed his orders. Webb's three Cape Dutchmen seemed to have a notion he was some being with mysterious powers, while the Lascars ran crouching at his very word--some of them being, as I found, Malays, and the rest Mussulmans from Chittagong; but Jones could send them about in their own language, Dutchmen and all--a part of the matter which did not tend to keep me less careful over him. Still I observed, since his coming aboard, that Jones never once touched liquor, which had plainly enough been his ruin ashore; whether on account of meaning to pull up once for all and mend, or only to have a wider bout at next port, or else to keep himself steady for aught that might turn up, I couldn't settle in my own mind. Though deucedly doubtful of its being the first, the very idea of it made one feel for the man; and, in case of his doing well, I had no small hopes of something in the upshot to save a real sailor like him from going to the devil altogether, as he seemed doing. "Now, after our getting clear of the rough Cape weather, and the dead-lights being taken out of the stern-windows, I had given a look, for the first time, into the schooner's after-cabins, which were pretty much as the people she belonged to before had left them, except for the rough work the gale had played. There were two of them, one opening into the other; and I must say it was a melancholy sight to meet the bright sunlight streaming into them from off the water astern, with all the little matters either just as if the owners were still inside, or else tumbled about at sixes and sevens. One drawer, in particular, had come out of a table, scattering what was in it on the deck: there was a half-open letter, in a woman's hand, all French, and showing a lock of hair, with a broken diamond cross of the French Legion of Honour, besides a sort of paper-book full of writing and two printed ones bound in morocco. I picked up the letter and the cross, put them in again, and shoved the drawer back to its place, though I brought the books away with me to have a glance over. What struck me most, though, was a plaster figure of the French Emperor himself, standing fastened on a shelf, with one hand in the breast of his greatcoat, and looking calmly out of the white sightless eyes; while right opposite hung a sort of curtain which you'd have thought they were fixed upon. When I hauled it aside, I stared--there on a shelf to match the other, was a beautiful smiling child's head to the shoulders, of pure white marble, as if it leant off the bulkhead like a cherub out of the clouds. "Spite of all, however, the touch of likeness it had to the head I got such a glimpse of at Longwood, even when the hot sunlight showed it in my spy-glass so pale and terrible, was sufficient to tell me what _this_ was--Napoleon's own little son, in fact, who was made King of Rome, as I remembered hearing at the time. The thought of the schooner's strange French captain and his desperate scheme came back on me so strong, joined to what I saw he had an eye to in fitting out his cabins, that, for my own part, I hadn't the heart to use them myself, and at first sight ordered the dead-lights to be shipped again, and the door locked. "'Twas a good many days after this, of course, and we had made a pretty fast run up the Mozambique, in spite of the sharp navigation required, sighting nothing larger than the native and Arab craft to be seen thereabouts; we were beginning to clear out from amongst the clusters of islands and shoals at the channel-head, when two large sail were made in open water to nor'-eastward. Next morning by daybreak we were to windward of the weathermost--a fine large Indiaman she was, crowding a perfect tower of canvas. Shortly after, however, the schooner was within hail, slipping easily down upon her quarter, which seemed to give them a little uneasiness, plenty of troops as she seemed to have on board, and looming like a frigate. After some show of keeping on, and apparently putting faith in the man-of-war pennant I hoisted, she hove into the wind, when we found she was the Company's ship _Warringford_, and the other the something _Castle_, I forget which, both for Calcutta. The next thing, as soon as they found we were tender to His Majesty's frigate _Hebe_, was to ask after the _Seringapatam_; on which I was told she was three or four days' sail ahead with the _Mandarin_, bound to China, neither of them having put in at Johanna Island to refresh. "I was just ready to put our helm up again and bid good-bye, when the tiffin-gong could be heard sounding on the Indiaman's quarter-deck, and the old white-haired captain politely asked me if I wouldn't come aboard with one or two of my officers to lunch. Mr Snelling gave me a wistful glance--there were a dozen pretty faces admiring our schooner out of the long white awnings; but even if the notion of bringing up Snelling himself as my first officer hadn't been too much for me, not to speak of either Jones or Webb, why the very thoughts that everything I saw recalled to me, made me the more eager to get in sight of the _Seringapatam_. 'Thank you, sir,' answered I. 'No--I must be off after the Bombay ship.' 'Ah,' hailed the old captain, 'some of your Admiral's post-bags, I suppose. Well, keep as much northing as you can, sir, and I daresay you'll find her parted company. She's got a jury fore-topmast up, for one she lost a week ago; so you can't mistake her for the _Mandarin_, with a good glass.' 'Have you noticed any suspicious craft lately, sir?' asked I. 'Why, to tell you the truth, lieutenant,' sang out he, looking down off the high bulwarks at our long nine-pounders and the knot of Lascars, 'none more so than we thought _you_, at first, sir!' The cadets on the poop roared with laughter, and an old lady with two daughters seemed to eye Snelling doubtfully, through an opera-glass as the reefer ogled both of them at once. "'By-the-by,' sang out the captain of the Indiaman to me again, 'I fancy the passengers in that ship must have got somehow uncomfortable--one of our Bengal grandees aboard of her wanted a berth to Calcutta with us, t'other day in the Mozambique; but we're too full already!' 'Indeed, sir?' said I; but the schooner's main-boom was jibbing over, and with two or three more hails, wishing them a good voyage, and so on, away we slipped past their weather-bow. The _Warringford_ got under weigh at her leisure, and in an hour or two her topsails were down to leeward of us. On I cracked with square and studding-sails to the quartering breeze, till the schooner's light hull jumped to it, and aloft she was all hung out of a side, like a dairyman's daughter carrying milk; with the pace she went at, I could almost say to an hour when we should overhaul the chase. "Still, after two or three days of the trade-wind, well out in the Indian Ocean, and not a spot to be seen, we had got so far up the Line as to make me sure we had overrun her. Accordingly, the schooner was hauled sharp on a wind to cruise slowly down across what must be the Indiaman's track, judging as we could to a nicety, with a knowledge of the weather we had had. For my part, I was so certain of sighting her soon, that I ordered the after-cabins to be set to rights, seeing a notion had taken hold of me of actually offering them to Sir Charles Hyde for the voyage to Calcutta--fancy the thought! 'Twas too good to be likely; but Violet herself actually being in that little after-cabin and sleeping in it--the lively schooner heading away alone for India, and they and Westwood the sole passengers aboard--why, the very idea of it was fit to drive me crazy with impatience. "Well, one fine night, after being on deck all day, and the whole night before, almost, I had turned into my cot to sleep. From where I lay I could see the moonshine off the water through the stern-light in that after-cabin, by the half-open door. I felt the schooner going easily through the water, with a rise and fall from the heave of the long Line-swell; so close my eyes I couldn't, especially as the midshipman could be heard snoring on the other side like the very deuce. Accordingly I turned out into the after-cabin, and got hold of one of the Frenchman's volumes to read, when, lo, and behold! I found it was neither more nor less than Greek, all I knew being the sight of it. Next I commenced overhauling the bundle of handwriting, which I took at first for a French log of the schooner's voyage, and sat down on the locker to have a spell at it. So much as I could make out, in spite of the queer outlandish turn the letters had, and the quirks of the unnatural sort of language, it was curious enough--a regular story, in fact, about his own life, the war, and Bonaparte himself. "At another time I'd have given a good deal to go through with it at odd hours--and a strange affair I found it was some time afterwards; but meanwhile I had only seen at the beginning that his name was _Le Comte Victor l'Allemand, Capitaine, de la Marine Francais_, and made out at the end how there was some scheme of his beyond what I knew before, to be carried out in India--when it struck me there was no one on the quarter-deck above. I listened for a minute through the stern-window, and thought I heard someone speaking, over the schooners lee-quarter, as she surged along; so slipping on jacket and cap, I went on deck at once. "It was middle-watch at the time; but as soon as I came up I saw all was quiet--Webb near the gangway talking to the old Lascar serang, and breaking the English wonderfully betwixt them; while the Lascars of the watch were sitting like tailors in a ring on the forecastle planks, each waiting for his turn of one cocoa-nut hookah, that kept hubble-bubbling away gravely under the smoker's nose, as he took a long suck at it, while the red cinder in the bowl lighted up his leathery Hindoo face and moustache like a firefly in the root of a banyan, till he handed it, without even a wipe, to his neighbour. These fellows had begun to get much livelier as we made the tropics; and this same serang of theirs had put out his horns once or twice to Snelling lately, though he drew them in again the moment he saw me--a sulky old knotty-faced, yellow-eyed devil I thought him at any rate, while his dish-cloth of a turban, his long blue gown and red trousers, reminded you at sea in a gale of a dancing dervish. The day we spoke the Indiaman, in fact, I noticed there was something in the wind for a minute or two with him and his gang, which put in my head at first to offer them to the captain for a couple of good English hands; and as I passed him and Webb this time the serang stopped his talk and sidled off. "However, a beautiful night it was, as ever eye looked upon even in the blue Indian Ocean: the heavens cloudless, the full round moon shining high off our weather-beam again, the stars drawn up into her bright light, as it were, trembling through the films of it like dewdrops in gossamer of a summer morning: you saw the sea meet the sky on every hand, without a speck on the clear line of horizon, through the squares of our ratlins and betwixt the schooner's too long fore-and-aft booms. A pretty strongish breeze we had too, blowing from east to west with a sweep through the emptiness aloft, and a wrinkling ripple over the long gentle swells as deep in the hue as if fresh dye came from the bottom, and crisping into a small sparkle of foam wherever they caught it full. Something pleasant, one could not say what, was in the air; and every sheet being hauled taut to hold wind, the slant gush of it before her beam drove her slipping ahead toward the quarter it came from, with a dip down and a saucy lift of her jibs again, as if she were half balanced amidships, but little noise about it. I took a squint aloft and an overhaul all round, and nothing was to be seen. The size of the sky through the moonlight looked awful, as it were, and the strength of the breeze seemed to send a heavenly blue deep into the western quarter till you saw a star in it The night was so lovely, in fact, it somehow made one think of one's mother, and old times, when you used to say your prayers. Still I couldn't see the mate of the watch on the weather quarter-deck, which surprised me the more in Jones's case, since he was always ready for me when I came up; and, to tell the truth, I shouldn't have been sorry to catch him napping for once, only to show he was like men in common. I walked aft by the weather-side of the large mainsail, accordingly, till I saw him leaning with his head over the lee-bulwark, and heard him again, as I thought, apparently speaking to someone down the schooner's side; upon which I stepped across. "Jones's back was to me as I looked over too; but owing to what he was busy with, I suppose, and the wash of the water which was louder there than in-board, while you heard the plash from her bows every time she forged he evidently didn't hear me. You may fancy my wonder to find he was reading aloud out to himself from the other of the Frenchman's volumes, which I had no doubt left in the dining-cabin--the book open in both hands, he giving it forth in long staves, with a break between--and regular Greek it was too. You'd have thought he timed them to the plash alongside; and I must say, as every string of long-tailed words flowed together like one, in Jones's deep voice, and the swell rose once or twice with its foam-bells near his very hands, I almost fancied I made a meaning of them--each like a wave, as it were, sweeping to a crest, and breaking. The gusto the man showed in it you can't conceive, and, what was more, I had no doubt he understood the sense of it, for all of a sudden, after twenty staves or so of the kind he stopped. 'There!' said he, 'there, old Homer--women, wine, and adventure--what could the devil ask more, blind old prater, with a sound in you like the sea? Ay, wash, wash, wash away, lying old blue-water, you can't wash _it_ out--and wine--no, not the strongest rum in Cape Town--can wash _you_ out!' With that Jones laid his head on his arms, with the book still in one hand, muttering to himself, and I listened in spite of me. 'Still, it rouses the old times in me!' said he. 'Here comes this book across me, too. Ay, ay, and the rector fancied, sitting teaching me Greek out of old wild Homer all weekday--and--and his girl slipping out and in--'twould do to don the cassock of a Sunday and preach out of the pulpit against the world, the devil, and the flesh--then warn me against the sea--ha!' "The laugh that came from him at that moment was more like a dog than a human being; but on he went muttering 'Women, wine, and adventures, said ye, old Greek, and a goddess too; still he _was_ a good old man, the rector--no guile nor evil in him, with his books in the cases yonder, and the church-spire seen through the window over the garden, and his wife with--ah, the less of that the better.--Twas in me, though, and all our blood--and in _her_ dark eyes, too, Mary though she was!' He broke out again, after a bit, as if he'd been arguing it with something under the side: 'I didn't take her the first time I came home--nor the second--but-but--ay, I came _back_! Oh that parting-stile in sight of the sea--and that packet-ship--but O God! that night--that night with the schooner forging ahead through the blue--blue----' And he stopped with a groan that shook him as he leant over. 'Hellish!' he said, suddenly standing upright and looking straight aloft with his bare head and face to the wide empty sky, and the moonlight tipping the hair on his forehead, from over the high shadow on the lee-side of the mainsail, where it glistened along the gaff. 'She was pure to the last!' I heard him say, though I had walked to the other side of the boom; 'ay, though I rot to perdition for it!--Down, old fiend!' as he lifted his one hand with the book, and drove it alongside, seemingly watching it settle away astern. "Now I had heard nothing from Jones that I couldn't have fancied before, and there was even a humour to my mind in the notion of clapping it all on old Homer, if Homer it was, and heaving him overboard with such a confoundedly complimentary burial-service. But some of the words that dropped from him shot through one's veins like icicles; and now there was something fearful in the sight of him standing straight again, with a look right into the heavens, as if he'd have searched them up and up--in that lovely night too, spread far and wide--the very rays of the moonlight sparkled down the weather-side of the sail I was on, trembling on the leech-ropes and brails as they swayed, and into the hollows they made in the belly of the taut canvas; the long shining spot of it wavered and settled on the same two planks of the quarter-deck, beyond the shadow of the bulwark from the moon's eye, fast as the schooner moved through the water, and it was like a hand laid upon her, with the air and wind stretching between. Of a sudden I saw Jones wheel slowly round where he stood, like a man turned about by main strength, with his eyes fixed aloft, and his one arm raising from the shoulder till his forefinger pointed to something, as I thought, about the fore-to'gallantsail. His face was like ashes, his eye glaring, and I sprang across to him under the main-boom. 'See!' said he, never turning his head, and the words hissed betwixt his teeth, 'look at that!' "'For Heaven's sake, _what_, Mr Jones?' said I. '_Her--her_,' was his answer, 'coming against the wind--dead fore-and-aft in the shade of the sails!' On the lee-sides of them the high boom-sails made a sort of a thin shadow against the moonshine off the other beam, which came glimpsing through between them out of a world of air to the south-east, with a double of it flickering alongside on the water as it heaved past to leeward; and whether it was fancy, or whether it was but the reflection aloft from below, I thought as I followed Jones's finger, I saw something like the shape of a woman's dress floating close in with the bonnet of the fore-topmaststaysail, from the dusk it made to the breast of the fore-topsail, and even across the gush of white light under the yard--long and straight, as it were, like a thing lifted dripping out of water, and going, as he said, right against the schooner's course. 'Now in the foresail!' whispered Jones, his eye moving as on a pivot, and a thrill ran through me at the notion; for I made out one single moment what I thought a face against the sky at the gaff-end, white as death, shooting aft towards the mainsail--though next instant I saw it was but a block silvered by the moon as the schooner lifted. 'Now the mainsail!' said he, huskily, 'and now--now by the heavens--rising--rising to the gaff-topsail--away! O Lord! _Mary!_' "He was leaning aft toward the width of the sky, with both hands clutched together before him, shuddering all over. For the first minute my own blood crept, I must say; but directly after I touched him on the shoulder. 'This is strange, Mr Jones,' said I; 'what's the matter?' 'Once in the Bermudas!' said he, still wildly, 'once in the Pacific--and now! Does the sea give up its dead, though, think ye?' 'You've a strong fancy, Mr Jones, that's all,' I said sternly. 'Fancy!' said he, though beginning to get the better of himself; 'did ye ever fancy a face looking down--down at you in the utterest scorn--down sideways off the shoulder of the garment, as it sticks wet into every outline like life? All the time gliding on the other way, too, and the eyes like two stars a thousand miles away beyond, as kind as angels'--neither wind nor sea can stop it, till suddenly it rises to the very cope of heaven--still looking scornfully down at you!--No, sir, fancy it _you_ couldn't!' "The glance he gave me was somehow or other such as I couldn't altogether stomach from the fellow, and he was turning to the side when I said quietly, 'No, nor Homer either, I daresay!' Jones started and made a step towards me. 'You heard me a little ago!' rapped out he, eyeing me. 'Yes,' I said; 'by Jove! who could help being curious to hear a sailor spout Greek as you were doing, Mr Jones?' 'The fact is, Mr Collins,' answered he, changing his tone, 'I was well brought up--the more shame to me for bringing myself to what you saw me. I had a sister drowned, too, on her passage to America one voyage, when I was mate of the ship myself. No wonder it keeps my nerves shaking sometimes, when I've had too long about shore.' 'Well, well, Jones,' said I, rather softening, 'you've proved yourself a first-rate seaman, and I've got nothing to complain of; but I tell you fairly I had my doubts of you! So you'll remember you're under the Articles of War aboard here, sir,' added I, 'which, as long as I have this schooner under hand, I'll be hanged if I don't carry out!' All at once the thought struck me, a little inconveniently, of my carrying off Webb, and his people, and I fancied Jones's quick eye wandered to the Lascars forward. 'I know it, sir,' said he, looking me steadily in the face; 'and what's more, Mr Collins, at any rate I couldn't forget you picked me out, confounded low as I looked, to come aft here. 'Tis not every captain afloat that has such a good eye for a seaman, as _I_ know!' 'Oh, well, no more about it,' I said, walking forward on the weather-side, and leaving him on the lee one as distinctly as Lord Frederick Bury could have done to myself in the frigate. Jones no doubt thought I didn't notice the slight wrinkle that gathered round his lee eye when he gave me this touch of butter at the end; but I put it down for nothing more, gammon though it was. "It was near the end of the watch, the moon beginning to set, while it still wanted three hours of daybreak in those latitudes, when the look-out on the topgallant-yard, who was stationed there in man-o'-war cruising fashion, reported a sail to windward. Just then the midshipman came on deck to his watch, wonderfully early for him indeed, and on my remarking it was probably the Indiaman at last, Jones himself went aloft with the night-glass to make her out. 'Mr Snelling,' said I, 'see the hands on deck ready for going about.' Next minute I saw him rousing up the rest of the Lascars, who slept watch and watch on the forecastle. Only five or six of the _Hebe's_ men were up, and all of them, save the man at the wheel, ran aloft to rig out stunsail-booms to windward, as soon as the schooner was fairly on the starboard tack, standing to nor'-eastward. Suddenly I saw a scuffle between the midshipman and the tindal,[25] a stout, dark-faced young Bengalee, with a jaunty skull-cap and frock, whom Snelling had probably helped along with a touch of a rope's end, and in a moment two or three more of them were upon him, while the reefer drew his dirk, and sung out to me, scarce before I was with him, the Lascars rolling into the lee-scuppers at two kicks of my foot. [25] Lascar boatswain's mate. "Webb and three of the men from Cape Town were hoisting a stunsail at the time, the smart man-o'-war's-men aloft singing out to them to bear a hand. What with the noise of the sail flapping, and its being betwixt my own men and the deck, they could know nothing of the matter; and the Lascars let go the halliards in a body, making a rush at Snelling and myself with everything they could pick up in the shape of a spar. "This would have been nothing, as in two or three minutes more the men would have been down, and the cocoa-faced rascals dodged every way from the handspike I got hold of; but I just caught a glimpse on one side of the sly old serang shoving on the fire-scuttle to keep down the watch below; and on the other, of Webb looking round him, evidently to see how matters stood. Two Dutchmen seized the first sailor that came down the rigging, by the legs, and I saw the affair must be finished at once, it had so much the look of a regular plot on Webb's part, if Jones wasn't concerned in it too. I made one spring upon my Cape Town gentleman, and took him by the throat with one hand, while I hit the biggest Dutchman full behind the ear, felling him to the deck, on which the man-o'-war's-man grappled his watch-mate, and Webb was struggling with me sufficiently to keep both my hands full, when I had a pleasant inkling of a Malay Lascar slipping toward my back with a bare kreese in his fist. "I just looked over my shoulder at his black eyes twinkling devilishly before he sprang, when someone came sliding fair down from the fore-topmast-head by a back-stay, and pitched in a twinkling on top of his head--a thing enough to break the neck of a monument. Directly after, I saw Jones himself hitting right and left with his night-glass, from the moonlight to the shadow of the foresail, while Snelling tumbled over a Lascar at every slap, standing up in boxer-style. By the time the rest of the men came down all was settled--the Dutchmen sulking against the bulwarks, and Webb gasping after I let him go. 'Boatswain,' said I to one of the sailors,' clap that man in irons below. Mr Snelling, see the watch called, sir.' 'I 'ad the law with me,' said Webb, gloomily. 'You plotted it, then, Mr Webb?' I said. 'Didn't you carry us off illegally?' said he. 'I only meant to recover the vessel--upon my honour, nothing more, sir; and if you're 'ard with me, you'll have to answer for it, I assure you!' Here he looked round to Jones in a strange way, as I fancied, for a moment; but Jones turned on his heel with a sneer. 'Why, Mr Webb,' answered I, 'you lost that tack by offering yourself in a watch, which makes the thing neither more nor less than mutiny--so take him below, do ye hear, bo'sun!' And down he went. "'Now, Mr Jones,' said I, as soon as all hands were on deck, 'you'll be so good as have half of these Lascars seized to the rigging here, one after the other, and see a good dozen given to each of their backs; then these two Dutchmen, each three dozen--then pipe down the watch, sir.' "Jones glanced at me, then at the fellows, then at me again. I thought he hung aback for an instant; but do it I was determined he should, for a reason I had; and I gave him back the look steady as stone. 'Ay, ay, sir,' said he, at last, touching his hat. I walked aft to the capstan, and stood there till every mother's son of them had got his share, the Lascars wriggling and howling on the deck after it, and the Dutchmen twisting their backs as they walked off. 'Twas the first time I did that part of duty in command, and I felt, in the circumstances, I was in for carrying it out with a taut hand. "By this time the moon was setting, and in the dusk we lost sight of the sail to windward; but as we were heading well up to weather upon her, and going at least ten knots, I turned in below for a little, leaving the midshipman. Accordingly, it wasn't very long before Snelling called me in broad daylight 'She's a large ship, Mr Collins,' said he, 'standing under all sail on a wind. I hope to goodness, sir, it's that confounded Indiaman at last!' I hurried on deck, took the glass aloft, and soon made out the jury fore-topmast shorter than the main, as the old captain mentioned. Accordingly, it was with somewhat of a flutter in me I came down again, watching the schooner's trim below and aloft, to see if I couldn't take an hour or so off the time betwixt that and once more setting eyes on the judge's daughter. CHAPTER XXVI "After breakfast-time the breeze freshened again, and the ship had evidently perceived us, as well as the fact of our having hauled on a wind to make up with her course; for we could see her hoisting out one stunsail after another to the lee-side, and keeping off in order to give them full play. This was what I was afraid of, in fact, that our looking her way in the circumstances would make her show her heels; and being hull down, almost dead to windward of us, with her spread of sail to such a breeze as the present, it was like to be a troublesome matter ere we got within signalling distance; especially if she had kept hold of her wind a little more, instead of falling off before it as she did, which tended the schooner always steadily to weather upon her, the sharper we kept her nose to the sun in the spray. Indeed, the wind during the forenoon came gradually round more in our favour, till it stood south-east by east or so; by which time, however, we had dropped her topsails from the deck, then her to'gallant-sails, to a white speck far down on the lee-bow. We weathered fast upon her, and I fancied I made out the yellow India patches in her canvas; when, on turning about, I caught Jones's glance at me, as if he couldn't understand my eagerness, or else had got curious what the schooner wanted with the ship at all. 'She loses, I think, sir,' said he looking off to her again. 'Little doubt of that, Mr Jones,' said I. 'I know that Indiaman's sailing to a tee--but we shan't overhaul her at this rate an hour too soon, before she might have a chance of dropping us in the dark, or our running to leeward of her again.' 'Why, yes,' said Jones, carelessly, 'if they knew how to do it, sir.' 'By George! Mr Collins,' exclaimed Snelling, 'I see her stern-gallery sparkling in the run of the surges.' "In a little while we could notice her canvas darken slowly from the courses to the to'gallant-sails, leaving the royals and studding-sails whiter than before: they were wetting her sails. 'She must take us for something bad, Lieutenant Collins!' remarked Jones, as if the thing were at all doubtful. 'A pirate, in fact,' added the reefer, with a grin. 'Why, sir,' said he, 'these Company's men seem to think the sea swarms with pirates, though I'm blessed if we've been so lucky as to sight even the tail-feather of one--my eye! though, how the griffins must be skipping about just now!' "The truth was, the nearer we got, the more it struck me that, altered as the schooner was aloft, our red streak and lead- sides were just as the first time I saw them; which wouldn't do much toward settling the Indiaman's doubts of us, for they couldn't fail to remember her the moment our hull came in sight; and as for my own character all along aboard the _Seringapatam_, why, neither first nor last did it seem to stand in good odour. 'Mr Jones,' said I, as we slipped quietly through the water, 'have you got any old canvas at hand, sir?--be so good as have it ripped up in lengths, and fast clapped outside from stem to stern along that red streak of ours, up as far as the plank sheer, missing the ports--give her a good broad white stripe, sir, instead!' 'Ay, ay, sir!' answered he, with a gleam in his eye as he turned off, half knowing, half in surprise. 'And, Mr Snelling,' continued I, 'hark ye, see all the hammocks stowed over the bulwarks in her waist--and run both those long-guns forward, chock in to the eyes of her, to bring her down by the head a little--keep the men on the foc'sle too--she looks rather rakish at present, I must confess!' "All this the young gentleman seemed to do with as rueful a look as if he were putting knee-breeches and gaiters in place of white ducks, on his own lower timbers; and presently he came aft to ask if he mightn't stick a shot into each of the guns. 'What for?' said I. 'Oh,' said the midshipman, 'won't she show fight at all, sir, then?' Just then the white range of the Indiaman's heavy quarter-gallery came into view, then the bulge of her big hulking body half on to us, with a port-lid or two raised in the white band: we were to windward of her already, stealing up on her quarter. 'My eye!' said Snelling, 'she could blow us out of water, if she choose, Mr Collins, and only had pluck enough.' 'Why, that's all you know about it, Mr Snelling,' said I, with a laugh, 'since she don't carry long muzzles in her side, and in a light breeze like this we could--however, as we happen to be friends, that's of no moment, Mr Snelling.' 'After all, though,' I added, 'you _may_ load once, and stand by to fire across her course, if required; but, for the life of you, Snelling,' said I, seriously, 'in any case, if I give the word to fire, don't let anything in the shape of iron go near that ship's hull! By Jove! sir, I'd let her blow us out of the water first, or else show her our heels, myself!' "Well, about four in the afternoon, there we were coming down actually on the ship's quarter, from windward; when we took in our flying-kites, clued up gaff and fore-topsails, and to'gallant-sail, leaving St George's flag fluttering bright at the main-peak, and our long coach-whip streaming from the mast-head, while she kept gliding easily ahead under nothing but the two boom-sails and large jib. Still the Indiaman gave no other sign except showing the British ensign, then her striped Company's flag under it, at the mizzen-peak: she went jogging steadily on, as I was afraid she would, like a fellow giving you the go-by in the street. 'Nothing else for it, after all, Mr Snelling,' said I, walking forward, as we got within long range. 'The confounded fools!' I couldn't help saying, 'do they think a piratical craft would give herself the trouble of hoisting all the flags in Christendom one after the other, and she, of course, with a long-Tom on a pivot amidships? Mr Jones, oblige me by pitching a shot right across her forefoot?' Jones stepped forward, had the gun slued, and blew the match. 'Are you ready?' said I--'now mind your eye--fire!' and the ball went spinning from the top of one swell to another beyond the Indiaman's bows, rather wide of the mark, as I thought: when, all at once, the smoke had scarce cleared away betwixt us ere I saw her jib-sheets fly, and the Indiaman luffing up in the wind. Jones started, as almost next moment we could see the spritsail-yard hanging in two across the spars--I must say, rather to my own surprise, in spite of a good deal of old cruising practice. "'A good aim, sir!' remarked he, turning round. 'There goes her main-yard, now!' said Snelling; and she seemed to be heaving-to, when the mainsail filled again, and on she stood as before; then actually broached-to, all aback, and gathering stern-way with her bows fairly facing us; while the black figure-head under the bowsprit showed me his turban again once more, like a fellow leaning over a horse he couldn't manage. 'What the mischief _are_ the lubbers about!' I said, 'can't they heave-to at once and be done with it, now that I fancy they see their mistake?' "Here Jones, who had got aft and stood up on the taffrail, jumped down again all at once, and met me at the capstan. 'Lieutenant Collins,' said he in a low voice, and looking me straight in the face with a very queer expression, 'the ship has _struck_!' 'Struck!' repeated I, starting; and he, Snelling, and I sprang to the taffrail together. There was the Indiaman, in fact, at length heaving into the wind, about three-quarters of a mile off our lee-beam, with her two ensigns hauled down, and something flying instead of them at the gaff-end, which I couldn't make out. Our helm was put up, and the schooner edged swiftly down to her, slipping along in sight of her stretch of bulwarks till we had hove-to abreast of her starboard bow. 'What ship is that?' hailed I from abaft, as we ran past in the shadow of her sails; and I saw my gentleman 'first officer,' Finch, standing up in her mizzen-chains with the trumpet, more dashing than ever, as he had poor Captain Williamson's uniform coat and hat on, apparently, and a sword by his side: her whole quarter-bulwark bristling with spy-glasses and gun-barrels turned upon the schooner, though not another head could be seen. 'The Honourable East In----' began Finch; but that moment there was a perfect hubbub of cries and cheers, as a dozen faces I knew well showed themselves popping up from the quarter-deck: Old Rollock in a huge straw hat and his shirt-sleeves, with a ship's musket in his fists; Ford, Winterton, and the cadets--the long-faced Scotch surgeon, and Macleod's screwed nose and red whiskers--every eye fixed on me, as I fancied, not to say three or four rusty barrels. Their confusion and bewilderment was rare to witness; and being forty hands of us--the Lascars' outlandish physiognomies and all--why, the schooner must have looked rather respectable as she still slid ahead. "In the meantime, the look of our smart _Hebe's_ men, with the frigate's name shining in front of their regular-built hats, and everything about us, not to say the reefer's naval uniform and mine, seemed to have set the Indiaman's people more at their ease; till, when our gig's crew was ready to lower away, there was even a glimpse of ladies to be seen along toward her poop. Every moment I expected the sight of a certain face to flash on me from over the black rail, as the ship rolled and plunged in the heave of water opposite us, showing her broad white band, with the drips of rust across it from her chain-plates. 'We made somewhat of an awkward mistake, sir!' hailed Finch, eyeing me queerly enough, and trying to appear at his ease. 'So I supposed, sir,' said I; 'I shall send a boat aboard of you directly'; and I turned to the midshipman, who stood surveying the ship from stem to stern with his nose turned away from her, and his hands in the tails of his coat, speaking all the time to Mr Jones, though the latter was apparently the least interested of the two, for he had his eye seaward. "'Mr Snelling,' said I, 'd'ye see that gentleman yonder near the main-rigging, with the black hat on? You'll go aboard in the gig, sir, give your commanding-officer's compliments to the captain of the Indiaman, and mention to him that that gentleman is wanted here--Westwood his name is.' "To tell you the truth, my head was in a perfect whirl at knowing that, if I chose, five minutes could set me within speaking distance of Violet--yet you'd scarce believe I actually almost made up my mind not to go on deck again till our sheets were hauled aft, and we leaving the ship astern. Bless your heart! I wasn't aware till that minute _what_ I felt for her; everything about the voyage from Portsmouth came back so fresh on me, at sight of the different parts about the old _Seringapatam's_ bulwarks, to the very odds-and-ends of ropes hanging alongside that blessed lumbering coach-house of hers amidships, and the live-stock cackling and bleating in it between times! And there was I glancing aft into our little stern-cabins, which I fancied two or three days ago might serve for _their_ passage. But now, though I had a pretty sharp guess these same cabins were meant originally for neither more nor less than an emperor himself, why, I saw the very notion was too ridiculous to mention! 'Mr Jones,' said I, speaking up the skylight, 'as soon as you see that passenger is in the boat, have the head sheets hauled aft, sir, and the helm put up to make sail.' 'Ay, ay, sir,' said he; but directly after, he added in a low voice, 'I believe though, sir, we are not likely to part company from this ship so soon!' 'How, sir!' exclaimed I sharply, and starting up off the chair to see him, for something in the cool, collected tone of his voice jarred on me the more on account of the state I was in myself--'what do you mean by that?' I had merely to catch sight of my mate's broad throat and hairy chin, however, as he stood with his full chest thrown back, and one hand in his waistcoat, looking aloft by the skylight, when, following his eye to our main-gaff, it was easy to know the last fanning of the wind; which, taken together with the schooner's yerking motion abaft, was sufficient to give you word of a calm. 'We have lost the breeze for to-night, at any rate, sir,' said Jones, letting his eyes suddenly fall upon me, and meeting the flicker of pleasure I couldn't help showing on my face. 'Confound the thing! you don't say so, Mr Jones!' rejoined I quickly. 'Then as long as she has a foot's steerage-way, sir, let her slip off the Indiaman's bow at once--else the two of us will be grinding together ere daylight like a couple of mill-stones without corn!' "On deck there were twenty things worth noticing, that struck one at the same time. The schooner's light spars and white canvas seen sharp against the white glare of light in the west, as she settled round on the ship's other bow; while the light air high aloft in the Indiaman's royals still kept steadying her with her lee-side to the sunset, where it made a red trough along the horizon down through a golden cloud or two, that looked like bright-winged things whirling off and about the sun. "Our gig was holding off by the boat-hook from her lee-quarter, the oars up-ended, and two or three sailors, with their heads shoved out under a port-lid on the main deck, talking to the boat's crew, while a few of the men hung over the high black top-sides, peering aft at the gig; the rest being gathered in the ship's bows, with their eyes fixed on the schooner. The huge round of the sun went down astern like the mouth of a furnace, sending a broad stream of red light across the face of the water with every wet streak and wrinkle shown heaving in it, right up to the Indiaman's white band and her pitch-black bulwarks. Her quarter-galleries lashed out, and you saw the passengers' heads aft through the red arch under the wide mainsail-foot, till every face shone crimson-bright out of the awning below; and I could see the midshipman's gold band glisten as he took his cap off to some ladies coming down the poop-stair, amidst a hubbub of cadets turning round to eye the schooner. For half-a-minute the smooth sea all astern of the ship seemed to wash to her water-line in a flood of light and blood almost, as if the horizon vanished; then the tip of the sun went down like a burning ruby, the blue heave of water sank away from the copper at the Indiaman's bows, giving us an easy lift at the other side of the swell, and the whole compass of the sea appeared to slide round cool and clear against the soft flush of all possible tints in the west; till the deep indigo hue of the calm spread melting off from both of us. "What I gave most heed to was the knots of men's faces on the _Seringapatam's_ forecastle, as the golden gleam of light and the red glare struck across them with all sorts of queer touches, that brought back every one of them clearly to mind at once; and, stepping forward where Mr Jones's figure was to be seen dark against the pale glow in the west, I could easily make out ugly Harry's big buffalo head, as he leant his chin on his two hands, and surveyed us up and down, with his dirty tarpaulin on the back of his head as usual, and his shaggy black hair like thatch over his forehead, almost down to the meeting of his thick eyebrows. The moment I appeared, Mister Harry Foster shifted himself with a start, looked aloft to his own ship, and began to whistle as if for wind; the same moment Jones turned and noticed me, too, and the difference of the two men's faces struck me the more, that I couldn't help thinking extremes met. 'That fellow there seems to like us so well, Mr Jones,' said I, laughing, 'that I've half a mind to bring him aboard, as I _could_!' 'Who--which, sir?' said the mate, looking to every part of the Indiaman but the right one. 'Why, that misbegotten-like rascal you were looking at,' said I; 'I know a little of him, and a more thorough blackguard doesn't walk planks!' 'There's the boat, though, Lieutenant Collins!' said Jones suddenly: the boat-hook struck our mizzen-chains on the other side in the dusk, and next minute Tom Westwood swung himself on board, with the midshipman and Old Rollock the planter following in his wake; the last, to my surprise, carrying two hat-boxes and an umbrella. "'Why, Ned Collins!' broke out Westwood, 'what is the meaning of all this--what wind has blown you here?' 'My _dear_ fellow!' shouted the planter, almost jumping on top of me, 'I never in my life saw the like of you--the very same infernal schooner, too! Come, let's hear--have you taken 'em all then, head and tail--have you----' "'For Heaven's sake, Mr Rollock,' said I, sheering out of his way as well as I could, 'come below, sir, if I must answer all these questions!' 'So you are actually in command?' said Westwood; and hereupon I gave him the bearings of his own affair, with the fact of my falling in with Lord Frederick Bury, of course; and of all men in the world, I believe, the 'Honourable Bury' was the one Westwood could feel comfortable under, as his face showed at the time. 'Whether I _lose_ you or not in the Hooghly, Tom,' said I, 'I daresay you'll find yourself in the end aboard the _Hebe_, in some shape or other! and meantime I shall be glad of you here for a first mate.' 'Well, well,' put in the planter again, impatiently, after having kept questioning me every now and then for the last ten minutes, which I answered without well knowing what he said--'then you hung him, of course?' 'Hung whom?' asked I, obliged to attend by Mr Rollock's perseverance. 'Why, El Americano, to be sure--the Yankee--Snout!' said he, trying to lengthen his face for the news. 'Hung him--no!' said I, laughing; 'when I saw him on deck there, last, he was lively enough, and anxious to get those images of his out of the _Seringapatam_.' The planter's rosy gills turned a shade or two paler, and he started off his seat. 'God bless me!' said he, in a low voice, and looking over his shoulder, 'you don't mean to say you've brought the man back on me. I declare to you I lost a few pounds of my weight here before, by his actually conceiving a friendship for me!' Old Rollock's dismay was so comical that I could scarce find in my heart to ease his mind, as I did. "'Why, my dear fellow,' said Westwood, with a smile, 'I assure you that disappearance of yours took me by surprise. Indeed, I only guessed, from something Captain Finch let drop afterwards, how it came about; and till the very moment the brig-of-war got under way, I fancied you had some other plan in view, or else you never would have carried it out. The fact was, Ned, if your heart was bound for India, mine was ashore in old England, and I'd rather have run the risk to go back!' Here Tom caught my glance, and looked shyly into one waistcoat pocket, then into another, fidgeting on his chair, poor fellow! in a way that brought my sister Jane's grey eyes, and her demure little arch face, distinctly before me, thousands of miles as there were between us and Croydon. The thought of the _Seringapatam_ being so near, on the other hand, somehow rushed on me at the same time, and I felt wonderfully mild toward Tom. 'Hang it, Tom!' said I, 'never mind thinking of it--mix your grog, man, and confound all care to the bottom of the sea. You're well off! For my part,' said I, 'I had no notion at all how _that_ case stood, so I made a cursed mistake in the matter--but here's luck!' "'However,' said he, 'I saw _your_ drift by that time; and the young lady herself was in the fore-cabin when I told her father the whole story, not long after you went off. 'Twas no use with Sir Charles, though, to say you were only carrying out the joke to screen me, and amuse yourself at the same time--he was sure you were after some scheme; and all the while Miss Hyde sat sewing on the sofa behind us, as quiet and careless as if she didn't hear a word, or trouble herself about the matter. When I came upon your vanishing so suddenly in the brig, however, and said I was sure, by that time, you did so in order to let me clear off, I had my eye on the looking-glass opposite the young lady; and whatever you may make of it, Ned, I can tell you she started and glanced up at that point.' 'Well, and what of that?' I asked. But Westwood went on--'It was all one to Sir Charles, nevertheless, whatever way I turned it. According to him, this was just of a piece with the rest of your doings, which showed the bad effects of the naval service. 'Twas no use my standing up for you, saying how fast you had risen, and would rise, if you had the right thing to do--for the old gentleman allowed everything, adding it was so much the worse for such fellows to be set loose. "I tell you what, Mr Westwood," said he, looking round sharply, as if he were speaking _at_ somebody else, "there is a soul of mischief in that young man that nothing will root out, unfitting him for everything else, however admirably it may be suited to maritime pursuits or to savage warfare. In short," added the judge, drawing himself up, "it is my conviction he will either be drowned or knocked on the head----"' 'The precious old curmudgeon!' I rapped out, betwixt laughter and rage at the thought of _her_ hearing all this pretty character of me. '"And I must say, my young friend," said the judge, "I felt much relieved at finding Councillor Westwood's nephew so different an individual--exceedingly relieved! Besides that, you cannot, of course, continue in the navy!" Just at this moment,' continued Westwood, 'I saw the young lady gather up her work behind us with a sparkle in her eye, rise off the sofa, and walk straight aft through the cabin-door.' "'Was _that_ all?' said I, biting my lip. '_All_, you heathen!' answered Tom, laughing. 'Why, what would you have? I'll be bound the judge didn't mean all that for my use, my dear fellow. But the worst of it was, that next day, when I met her with the Brigadier's lady on the poop, the young beauty passed me with as scornful an air as possible; and for a week or so, whenever the judge happened to ask me into the round-house cabins, either she wasn't there, or took an opportunity of walking out--the most I got was a bow or a "good-morning"; so you see the real Simon Pure didn't prosper half so well as the false one!' 'Pooh!' said I, gloomily, thinking of the little ground I had made myself, 'all contradiction--the fact is, you're too simple for women's ways, Westwood.' Westwood looked down and gave a queer smile--as much as to say, I suppose, the case stood just the contrary; and I must own, it struck me _he_ must be rather a knowing fellow that could fathom my sister, seeing that, for my part, I understood her no more than my mother's housemaid did, with her high-flown music and poetry, and all that sort of thing. "'However,' said Westwood, 'I contrived by degrees to get over all this, and for the last week or two we were as good acquaintances as before--in fact, the judge was evidently bent on it. And I tell you what it is, Ned, as charming a girl, in her way, as Violet Hyde I can't well fancy--but one more hopeless to deal with, for a fellow that hasn't got hold of her heart, I believe doesn't breathe! Why, young as she is, you'd feel her playing you round her pretty forefinger as a woman would, looking at you all the time under her soft eyelids with those bright eyes of hers, as if you could fancy her falling in love in a moment with someone else, but never with yourself!' 'By Jove, yes!' said I, feeling as dismal as I daresay I looked. 'Do you know,' Westwood went on, 'her figure and walk always remind me of a Hindoo girl's, all over English as her face and hair are, with a touch of the tropical, you can't say where, about it--owing to her being born in India, as I believe she was; and altogether, Ned, I'm glad to----' Here Westwood shrugged his shoulders, and I poured myself out another glass of grog in pure despair. "'The truth is,' said I, 'I wish I had never _seen_ that confounded _Seringapatam_! Didn't she say any--didn't you--in fact, Tom, what do you think of the matter, plump and plain, stem and stern?' said I manfully. 'Why,' said Tom, in a thoughtful way, 'not to set you at all wrong on either side, the thing that strikes me is, I don't think she ever once mentioned you, Ned, except in passing. But to my mind, in the circumstances, that's not so much against you. The young lady can say little when she pleases, I assure you; for only last night, in that fine moonlight, we happened to touch on that affair in the river--you know?' 'Yes,' I said, for it wasn't easy to forget. 'Now I always thought that night a turning-point with you,' Westwood said; 'and it was the last night you were aboard; so I spoke of you a good deal, and never a word did Miss Violet utter, save "Yes" and "No," while her face being in the shadow, I couldn't see it. Oh, by-the-by, though,' continued he, 'she _did_ say one thing!' "'For Heaven's sake, what was it?' I broke out eagerly. 'Well, then, Ned,' answered he, leaning back on the two back legs of his chair, and eyeing me with a comical air, which surprised me a little; 'do you consider yourself good-looking?' I started up. 'What do you mean by that, Tom?' said I; but next moment I sat down again with a sulky 'No, I'll be hanged if I do! so----' 'No more does your lady-love, then,' said Westwood, 'for she made the remark very coolly, and even without my asking her--but don't be down-hearted at that, my dear Ned, for I think more of that little sentence, in the way it was said, than of all she did _not_ say!' 'The greater the difference between us, I suppose,' said I savagely. 'Why,' replied Tom, ''tis my conviction you never hear a woman say the man she likes is handsome--and from a perverse young gipsy like----' 'Well, by Jove! Westwood,' said I, losing my temper altogether, and giving the table a slap with my fist that sent my glass crash to the deck, 'you beat everything! I suppose if she'd called me a fool and a blessed lubber, you'd turn it to my favour. But the truth is, I don't understand your niceties--I want something broad and above-board, that a fellow can lay hold of--and the short and the long of it is----' With that I laid my face on my arms down in the spilt grog on the table, and fairly groaned. My head reeled till I scarce knew it was myself that was sitting there, as all of a sudden one thought after another crowded on me. Somehow I seemed for a single moment to be out and out in the open sea, the different faces I'd seen along the ship's bulwarks rushing past me, with Jones's face, and the look of the Indiaman in the sunset; through all sorts of weather, too, in that confounded moment. "Then, I can't say why, but my hair crept as I came back to the thought of the Indiaman and the schooner in the calm at the time, and I almost fancied I heard a whisper at my ear. I looked up, and saw Tom Westwood sitting opposite me, with a musing air, and rather melancholy. The sight of my wild stare, with the grog I suppose trickling down my forehead, and dripping off my nose, appeared to startle him, and our eyes met queerly enough for half-a-minute--till all at once the notion seemed to strike both of us, of the absurdity of two fellows hobnobbing and lackadaisying away this fashion in a hole of a schooner's cabin, thousands of miles from land; and I'm blessed if we didn't both burst at the same moment into regular roars of laughter--first one broadside, then 'bout ship, as it were, to deliver the other, gun after gun. By George! though, I felt it do me good, as if something deadly went off with it. 'Hallo!' sung out the planter, blocking up the moonlight that shone misty-white down the steps of the companion, to a blue glimmer at the foot of them; 'both surviving _yet_, I declare'; and we felt the scent of his cheroot in the hot calm as he walked aft again. "'Well, Ned,' said Westwood, still laughing, 'there's one thing more I _did_ contrive to get out, and it is certainly broad enough to lay hold of, as you say. Do you know, from some hints the judge let drop in course of the passage, after he got to know me, I have a rather sharp suspicion he has someone in view for his daughter already!' At this I gasped once more. 'Whether she knows it herself or not, I'm not sure,' added Tom; 'but, very naturally, the gentleman I mean was often enough mentioned in Sir Charles's cabins--for who do you imagine, of all persons in the world, it is?' "I made no trial at a guess, but sat eyeing Westwood in perfect silence, and he went on--'Who but--don't look so fierce, my dear fellow--just this--this said nabob of an uncle of mine, the Bengal Councillor! Why, you've no conception,' said Westwood, 'what presents of pearl necklaces, fans, cashmere shawls, and China ivory work-boxes, and so on, the Councillor must have sent home to her at different times, for the _Seringapatam_ to bring back again. I didn't see her wear any of them; but every now and then Sir Charles would point to something that lay about, telling me it came from my uncle! He is a bachelor, you know, not so old as Sir Charles himself, who isn't so old as he looks, and they seem to be sworn friends!' 'Tuts, man!' said I, brightening a bit, 'can't you see he wants to adopt her?' 'So I should have imagined,' answered Westwood; 'but the fact is, two or three times, as I told you, Sir Charles Hyde hinted as much as that it was an idea of long standing between himself and his friend the Councillor, so----' 'The old villain!' I roared. 'Begging your pardon, Westwood--but I must say you are the pattern of a Job's comforter, and no mistake!' 'Well,' answered he, 'if you had heard the way in which the young lady mentioned my uncle to me, you wouldn't be much afraid of your rival, Ned. Why, she said she thought she remembered him when she was a little girl, bringing her Indian sweetmeats from the bazaar in his carriage--she actually supposed he must be older than her father, when the judge set her right eagerly enough--but, you must know, he no more seems able to say a sharp word to _her_, than Jacobs yonder would. So what did she say next, after apparently thinking a little, but that, now she recollected, my uncle used to have gray hair and white whiskers, like Mr Rollock, which for my part I knew no more about than the table, when her father broke out describing him as warmly as possible; and suddenly Miss Hyde looked at him with a little turn of her pretty lip, and a twinkle in her eye, that sent the old gentleman fiddling about his coffee-cup, and stopped him in a moment as if she had been a little witch!' "'What's to be done, Tom?' I faltered out, after a long stop. 'I'm sure I don't know, Ned,' said he gravely; 'let's go on deck at any rate, for it's too hot here to sleep.' The moment the sight of the calm burst upon us, however, with the two vessels together in the midst of it, in the hazy sort of moonlight, the same notion seemed to strike both of us in a different way. 'I'll tell you what, Collins,' said Westwood, half-jokingly, half in earnest, 'uncle though he be, if you can contrive to cut out the Councillor anyhow, I'll forgive you, for one!' 'How, though--_how_, by Jove!' replied I--'if they go to Bombay in the Indiaman, by the time they reach Calcutta, I shall be in the Pacific!' ''Tis a difficult case,' said Westwood, 'no doubt. And even suppose you had the opportunity, 'twould be hard to manage an elopement ashore in India, travelling "dauk" in two palanquins. Seriously speaking, Ned, I see nothing for it but to wait till you come _back_ from the Pacific.' "I looked hopelessly round: the calm and heat together gave one a helpless feeling, and every notion of an active sort appeared desperate. A perfect calm it was, too: there was some filmy scum of a haze aloft, that served to spread the moonlight all over, shutting out the shape of the sky, and softening off the horizon; with the moon standing slant up in it, like a brighter spot, and a few stars low down in the east. But for the long wide tremble of the water, in fact, as it glanced up with a blue flicker, you'd have fancied we mightn't be far from land; while the big Indiaman lay off the schooner's bow, without the least motion one could see; the moonshine edging round her spars and ropes from the other side, and her sails hanging shadowy against it, except below, under her brailed-up courses, where the masts, the thick of the rigging, and the tops of her deck-lumber, glistened as if they were newly wet. Half of her watch were on the bowsprit, sending out a 'fished' spritsail-yard, the same we had set dangling about their ears that afternoon, and we could hear them speaking plain enough; every time they sang out at a haul, it went far away on all sides--ho-ho-ho-he-ho-ho-o--till you lost it in the dead calm, as if somebody had gone there. Now and then the _Seringapatam_ made a slight plunge by the head, as the wide soft swell floated up with her; and the glossy black shadow, that seemingly gave her hull the height of a tower, came wavering in quicksilver circles to our very cutwater, while the lights from her after-windows went twisting away round her heavy counter to the moonshine, like yellow snakes; the schooner all the time lying as quiet as if she were on a pond, except that by little and little she kept shifting her bearings to the Indiaman, and things were confoundedly like our both sticking together in course of the morning, if the calm held. I went forward to the forecastle and desired Jones to get all hands down into the boats, and have her towed off to safe distance, seeing that the worst of it would be sure to fall to our share. "This was doing, and we drew slowly off the ship's bow, where her men coolly knocked off working to watch ours, and pass jokes on our gang of Lascars, as they handled the oars in awkward style; in fact, by the way the Indiaman's watch carried on, most of them seemed to have passed the grog-can pretty freely, being Saturday night, which we could hear they were still keeping up below in the forecastle, when our quarter came abreast of her larboard bow. 'Hurrah!' said one, waving his tarpaulin; and 'Pull, you beggars!' roared another; when my old customer, ugly Harry, all at once leant out of her fore-chains, and sung out to Jones, who was next him in the stern-sheets of our gig: 'I say, mate, so ye're clearing off, are ye? The better for that 'ere nutshell of a schooner o' yours, I reckon!' Jones made no answer, and the fellow added; 'Come aboard when you've got a safe berth, anyhow, and drink "sweethearts and wives," will ye?' I saw Jones start, and turn his face fiercely into the shadow of the ship's main-course on the water, rising half-up with one fist clenched, but he said nothing. 'Oh, you're blasted proud!' Foster called out: 'you forgets a man, blow me! D'ye think I doesn't know a fellow I got glorious with myself, in old Van Stinkoff's, at Cape Town? Sink me, mates,' said he, as loud as before, turning round on the rail of the bulwarks to the rest, 'I picked him out o' the street scuppers, under the sign of the Flying Dutchman, an' I'm blowed if I didn't think it beneath me at the time!' Here the end of our main-boom opened us in sight of the ugly ruffian, and he was sinking down in-board, when I hailed the Indiaman's quarter-deck, where the Scotch mate was to be seen. 'Ay, ay, the schooner ahoay!' sung out he, coming to the gangway. 'Did you hear that man's impertinence, sir,' said I sternly, 'to my officer on duty there? I expect you to see him punished, sir.' The Scotchman said he'd inquire into it; but shortly after he came back, saying he 'doubted' he couldn't be sure of the man; and, at any rate, he could have 'meant no ill.' The boats had towed us by this time almost out of fair hearing, but Harry Foster was to be seen coolly eyeing us from the midst of his watchmates, as he slung a couple of blocks over his shoulder; when he turned away with as much indifference as if we had been a Thames collier, growling some two or three words or other that brought a loud laugh from the Indiaman's forecastle to her bowsprit, where the men were turning lazily to their business again. "Being now clear off the ship, with the rake of her hull in our command if I chose, and free of her broadside at the same time, I hailed the boats to leave off towing and come aboard. As Jones came on deck, I saw that in his face to make me think he took the thing to heart, seeing he met my first look with his lips set together and a steady gleam of his eyes. The truth was, I never in my life came across a man that struck me so much with the notion of his having a devil in him, seeking to get the better of what was good. "'I think we shall do, Mr Jones?' I said. 'Quite safe, sir,' said he, quietly; at that moment, standing as we did out of earshot, with the setting moon in sight past the Indiaman, shining in a rusty yellow glare to her hanging sails, 'twas strange how the odds of our different stations passed off. We were foot to foot, in fact; I was fully aware, if never before, what an enemy Jones would make--he had great daring and knowingness in him, and all on the wrong side of the hedge for me at the time, seeing I had such a ticklish part to play with the Indiaman. I caught myself, on the instant, measuring youth and activity, not to say regular breeding to the service, and a clear conscience besides, against him and his thews and sinews; but as for turning and twisting with the man before me, I saw it was the tack likely to throw him to windward of me. My voice changed, and I lowered it as I said: 'Mr Jones, I happened to sail half the voyage as a passenger in that ship, and I've no common reason to be anxious about her getting safe into port. There's one single being in her at this moment I'd willingly lose my life to save from anything like what one could fancy--ay, so help me God, suppose I'd no chance of ever setting eyes on her again!' Jones never stirred a feature, but looked past me into the gleam of the moon over my shoulder. "'Well, Mr Jones,' I said, 'I'll acknowledge to you frankly, as from one seaman to another, the question is, Are you for me--or _not_?' 'We speak as man with man, it seems, Mr Collins!' said Jones quietly; 'then I am--_for_ you!' and he struck his hand all at once into mine; 'here's a hand that never lied, whatever the tongue may have done--bad or good; I am for you, sir, and no more of it! I knew as well as if you'd told me, Mr Collins, by the looks of the passengers, that you had sailed aboard that ship in some way or other--and what's more, sir, I _saw_----' here he stopped, looking at me with his back to the sinking gleam of light beyond the ship's hull, from the moon as she touched the water, and I saw nothing but the shape of his head under the straw hat, with a shadow blurring his face together, though I felt him eyeing me out of it all the time--'what some would think more worth while than if you were a Spanish plate-ship,' he went on; and he lowered his voice nearly to a whisper as he added, 'I tell you what, Mr Collins, 'tis my conviction that, _if you chose_, you might do what you liked in the end with that Indiaman and _all_ aboard her!' I stepped back with a shiver through me, as the sudden setting of the moon blended everything black in with Jones's shoulders, leaving his head instead of her against a glimmer of light, till for a moment it seemed peering at me off the horizon with the whole lump of shadow betwixt the two craft for a body; and I must say I thought of old stories about the Tempter in human form. 'Devil!' said I hoarsely, while the last gleam to westward went out, and it got so dark I could have fancied Jones had vanished from the bulwarks without stirring a foot; in fact, on my moving to the place I touched the cool planks with my hand--he was actually gone! Nothing was visible beyond our own decks, save a slight glimmer such as one would make in sculling with a single oar; and I saw at once he had taken the small boat alongside to go aboard the Indiaman! All the rest was that thick heavy darkness only to be found in a calm in the Indian Ocean, towards morning: you may not only say you see it, but could stir it, as it were, with a stick. "A horrid notion of Jones's purpose crept through my mind at first; but on second thoughts I easily saw this wasn't the occasion for him to choose, if he had really meant ill, and accordingly there was more the reason to trust him. Indeed, as I stood listening and watching, after Westwood and the planter went below, the Indiaman's binnacle lamp seemed to go slowly out, while at the same time the sound of her watch speaking on the forecastle apparently got distincter, till I could hear them clear of the ship's hull and rigging, like low voices muttering in the air betwixt her and us. 'Twas only her having sheered gradually bow-on to the schooner again, however, as a calm near the equator has always something like a _pulse_ in it--but it struck me there were men out on her jib-boom, which being of course the very privatest part of any in a ship for talk--why, to find more than one going out there, of a dark night, and with no work to do, never looks otherwise than suspicious. Nothing of this kind surprised me at present in the _Seringapatam_, with the opinion I had of her; but the curious thing was, that the fellows must have supposed it the farthest point they could get out of sight of us, as well as from their own decks, she having had her beam to the schooner when the moon set. "The desperate feelings that steal upon a man in such a case, and the fearful notions that breed in his head, with the quickness of his senses and the way he holds on by a single rope, you can scarcely conceive, though if a cry had come from the Indiaman at that moment I daresay I should have sprung in head foremost to get to her, when all at once, from up in the air again, I thought I heard the smart click of a flint and steel; at any rate, I saw the sparks showering from it in the midst of the black space before me--even the pair of fists as they knocked together, then a mouth blowing the match, till there was a light in a lantern between four heads leaning towards each other over the spar. Queer enough it would have been to see, in ordinary circumstances, but you'll readily fancy what a thing it looked all of a sudden, right out in the midst of the pitch-black night, one didn't know how or where--in fact, two of them faced each other in the stream of light from one side of the lantern, like the two edges of a rent in the dark, and another was like a sprawling blot in the centre--you just saw they were faces and heads, with a foot or two of the thick round boom slanting up betwixt them; but as for their bodies, they were all of a piece with the perfect blackness beyond. I could see one of them hold up the lantern and pass it round the three others' faces, bringing out their chins and noses, as if to be sure who they were--a piece of caution which served almost equally well for me, for I remembered each of them by headmark amongst the crew, only I didn't see the said fellow himself, even when he drew out some paper or other in one hand, seemingly unfolded it with the help of his teeth, and spread it over the jib-boom under the lantern, whereupon the whole four of the heads drew close together in a black lump round the light, peering down upon the paper, and muttering away as much at their ease, no doubt, as if they'd been in a tap-room. All I wished for was a good rifle-barrel in my hand at the time, to have knocked the light out from the midst of them, and sent the bullet by accident through the tarpaulin hat behind it--especially when a glaring red flipper was shoved out on the white paper, and the thumb planted steadily on a particular spot. All at once, however, the light was put out in the lantern, and I heard them going in-board, as the noise of the morning watch being called, at four o'clock, got up round the forehatchway. CHAPTER XXVII "In about half-an-hour the faint glimmer of Jones's oar in the water showed how hard it was to find the schooner again; however, he managed to get aboard at last, by which time I was walking carelessly past the binnacle in the dark, and as soon as he sought me out and began to speak, I saw it was all right. Mr Snelling came on deck to his watch, blowing up the men for letting out the only light aboard, as he didn't know fore-and-aft from 'thwart-ships, nor north from south. The cabin lamp under the skylight had gone out too for want of oil, without being noticed as long as the moon shone, and not even the planter's cheroot was to be seen. From the snatches of their conversation he had time to gather, I agreed with Jones that, whatever the four fellows on the jib-boom might have intended beforehand, their present cue wasn't at all to try seizing the ship; in fact, the schooner's sudden appearance in this latitude, with what they knew of her before, had naturally enough brought out a number of the crew in different colours to what they'd stick to after getting a fright and finding their mistake--though by this time I had no doubt in my own mind that the villain who bent on his silk neckerchief to the signal halliards in that hurry the afternoon before actually meant it for the _black flag_, while the absurdity of an Indiaman _striking_ at all to a cruiser that wanted her just to heave-to, was a sign how most of the crew's minds went, as long as they fancied us pirates. However, Jones had seen sufficient of the lantern affair on the boom to explain it to my great relief; the ringleader of them, no other I was sure than ugly Harry himself, seemed to scrub trousers ordinarily for one of the quarter-deck officers, and had got hold of an old chart in his berth that same evening, which the four had come out there to get a private overhaul of. All Jones could get room to see was that it was a chart of some islands, with a particular mark at one of them, on which the fellow with the lantern put his thumb, when another asked if there weren't any trees on it. 'Trees, ay, trees enough to hang all the blasted lubbers afloat!' said the first, as Jones listened. 'I'd as soon think of sailing in a craft without spars as aboard a dazart ileyand without trees!' One was tired of the Indiaman, another sick of the world, and a third, with Jack down on the bowsprit, wanted to chase buffaloes and shoot birds. As for the rest, the head of the gang assured his mates there were plenty of other islands not far off, and natives in them; whereupon the light was put out, and, in short, they made it up amongst them to take one of the ship's boats quietly some night as soon as she got in the latitude of the Maldives, and steer for this said island; although, in case of their being dogged about by the schooner, of which the chief scoundrel seemed, by Jones's account, to have a wholesome fear, it wouldn't be so easy a matter. Indeed the last words he was heard to say, as they crept inward down the boom, were to the effect that he thought there were _some aboard_ as anxious to drop the cruiser as they were. ''Faith, Mr Jones,' said I, glad to find this was what they wanted, 'if that's all, I shan't stand in their way--so as soon as the breeze springs up, we'd better clear off altogether. The smoothest way is to let them take themselves quietly off and I've no fear of the ship--only, before fairly shaping our own course for Bengal, we must manage to have another sight of her under full sail for Bombay!' "Neither of us thought of turning in, for by the next half-hour, in fact, the Indiaman's hull and canvas began to blacken out of the gloom on one side--the blue of the water spread round till it glittered against the ring of light kindling and kindling on the horizon, till it rose seemingly in a perfect fire at one spot in the rim of it, blazing up toward the cool blue aloft; then the sun was out. As long as we had to stick to your niceties and fine manners, in fact, I felt as much afraid of meeting Violet herself as a country booby would--I'll be hanged if I wasn't in doubt of her cutting me dead, suppose I met her, and I shouldn't have had a word to say; whereas with a spice of the rough work I thought of all night, or even a chance of something desperate behind, why, a fellow needn't to mind much how he went about it--seeing that in the midst of a hubbub the words come into your mouth of themselves, and you're not expected to stand upon ceremony. "The Scotch mate, being now first officer, had the side-ropes handed us civilly enough, having just seen the decks washed down in his own thorough manner, carronades, ropes, and all; but as the captain wasn't turned out yet, I went up the poop, where a couple of boys were still swabbing up the wet. The moment I reached it, the sight of the only two passengers that were out so early, rather took me aback, one of them being the last I cared to meet--namely, the Irish Brigadier's lady, who was walking the deck in pattens, the boys evidently keeping clear of her with their swabs; and the stout red-faced Brigadier himself, buttoned up to the throat, while he stalked dismally fore-and-aft with her on his arm. At the first glimpse of me, General Brady stopped short and stared--I daresay he was doubtful whether to call me out or not. 'Glad to _say_ you again, sir!' said he. 'Well, now,' said his lady, 'you're the very man I wanted to see!' I still looked at her, unable to say the like of herself, but terrified to speak a wrong word, with the knowledge of her confounded temper: the Brigadier had planted himself betwixt me and the poop-stairs, and never having fairly come across her since the affair about her dog and the shark, why, absurd as it was, I didn't know what the woman might make of my connection with the same craft that carried her off so soon after. "'Yes, indeed, and 'twas foolish of me not to see it in ye at first!' she went on, shaking her parasol at me in a knowing way, and eyeing the schooner again. 'Howiver, _I heard_ of you!' said she, with another look that set me all alive, 'and a mighty bold sort of admirer you are!' 'Faith, sir,' said the Brigadier, 'if I'd commanded the batthery down there last night, I'd have waited till ye got nearer, and blown you out of the wather.' ''Tis only a lieutenant you are?' said his lady, speaking without scruple in the midst of his words, and frowning him quiet. 'Nothing more, ma'am,' I said. 'Well, now, Mister Lieutenant,' said the lady suddenly, 'what d'ye mean to do? You didn't find us out here, I suppose, and actually take these cowardly ship-people of ours by _say_ge-like a bold fellow, for nothing?' After a few words more, Mrs Brady all of a sudden vanished down the little quarter-gallery stair near the ship's taffrail; though I had scarce missed her ere she appeared again, making me a signal. 'Hush, now!' said she in a whisper out of the stairway, 'and step after me like a cat amongst broken b_h_ottles, for he's shaving yonder just now on the opposite side--I saw his kitmagar taking in the hot water.' Next moment I had followed her into the small state-room in the larboard quarter, where she opened an inner door and left me. By Jove! I could have hugged that Irishwoman on the spot, vixen as she was--no matter though the very ship might be out of sight in a few hours, and I never set eyes on her again; I thought no more of it at the moment than I did of her skipper waiting for me--everything was lost in the notion of seeing Violet Hyde's face come out of that door. All the time there was a whispering, a rustling, and a confusion in the berth, as if she were taken by surprise, naturally enough--then I caught a word or two of the young lady's own, that made me think it was all up. "The door-handle turned, and the door half opened, then it shut to again, and I heard Mrs Brady's voice in a coaxing sort of strain, till at last she opened the door wide and said: 'Then you won't, my dear? So Mister Lieutenant what's-his-name,' added she, 'you may be off to your vessel, and----' Suddenly I saw Violet's figure shrinking back, as it were, behind the Brigadier's lady, into the berth; but all at once she walked straight out to the state-room, half frowning and half laughing, with an angry kind of blush all over her face. Her hair was only looped up on the side, and braided on the other, as if it weren't rightly ship-shape yet for the day; while as for her dress, I remember nothing except its being some brown cloak or other wrapped so close about her that one couldn't even see her hands, like the picture of a nun. 'Mrs Brady seems so astonished to see you here again, Mr Collins,' said she, rather sharply, as I thought, 'that she cannot rest without all the passengers meeting you, I suppose, before you go?' With that she looked back, but Mrs Brady had walked out, though I heard the young lady's waiting-girl moving about inside the berth yet. ''Twas all an accident, my happening to come on board just now, Miss Hyde,' said I, anxiously, 'or, indeed, my having orders to speak the Indiaman at all!' 'Ah!' she answered--'and it was so strange of Mrs Brady to--to persist!' The lovely girl had scarce condescended to look at me yet, but here she glanced past me through the quarter-gallery window at the schooner, where there was nothing betwixt her and the gay little state-room save the blue heaving water and the light--then her eye seemed to pass from the epaulet on my shoulder to the other that had none, till it lighted for the first time on my face, with a smile. "'How beautiful your schooner looks just now, Mr Collins!' said she, turning hastily again; 'it is the--the same that--that we saw before?' Now there was something in those blue eyes of hers, with the dark lashes over them and under them, that made me lose sight at the moment of everything in the way of my success, fear and all--a sort of a flying glance it was, that I couldn't help turning to my favour. 'For God's sake, Miss Hyde,' said I, 'let me have something one way or other to know my fate by--it's no use telling my mind after all that's come and gone; but as I mayn't see you again--and the breeze will be up directly--why----' Violet stood all the while gazing down on the state-room carpet, making no answer: there was a dead stop, and I heard the first ripple of the breeze work against the ship's rudder below--by Jove! I could have hanged myself at that moment--when I saw her shoulder tremble as she looked down, her soft eyelids just lifted till I caught the blue of her eye, and the smile came over her lip. How I got hold of her hand--for that confounded cloak, or whatever it was, I really don't know; but so it was, and out I came with the words, 'Violet--I love you to the last drop of my blood, that's all!' I said; 'and I only wish I had the chance of showing it!' Violet Hyde drew her hand gently out of mine, and looked me straight in the face for a moment with a merry sort of a quizzical air, as if I meant some other adventure--and 'Oh no! I hope not!' added she, with a shudder, and then a blush, no doubt thinking of the African river. 'But Violet, Violet!' said I, eagerly, as she made a move toward the nearest door, 'won't you say, then--_something_, for Heaven's sake, to keep one in hope?' 'Why, what would you have, sir?' said she, quickly, still turning away--but bless me! I don't exactly remember what followed, in the desperation I felt--nor how near she was to me when I heard her begging me to 'go, go, if I really loved her!' 'Dearest girl!' I said, 'I shall be far enough off in a short time!' 'Do you actually sail so soon, then?' said Violet, in a low voice. 'Why, they're bracing round the ship's yards already, I hear,' answered I; 'but indeed I think the schooner might keep near for a few days, too----' 'No--no!' said she anxiously, 'go altogether, else my father will be still more set against--against----Perhaps,' she added, 'we may see you in Calcutta, when--you are'--and her eye glanced from one shoulder of my uniform to the other. 'When I've got my epaulet shifted to the right shoulder?'[26] asked I, eagerly; '_then_ may I see you?' '_See_--yes,' was the whisper I caught--and 'Dearest, _dearest_ Violet,' said I, almost going down on the deck before her, 'suppose I manage to ship them on _both_, in this confounded peace, will you----' Hush!' said Violet, listening, and all in a flutter, 'indeed you must go, else _I_ must!' 'For God's sake, Violet,' I went on, keeping hold of her hand as she tried to get away, 'will you wait a year or two and give me the chance of a war in China--or up the Mediterranean--or----' But here the wild notions I had for a moment left me. [26] At that period the distinguishing mark of a commander, as the epaulet on the _left_ shoulder, of a lieutenant, and the epaulet on _both_, of a post-captain. "Somehow or other at that instant a terrible glimpse, as it were, of Bonaparte standing up on the crag in St Helena flashed across me; and as the folly of the thing, let alone the impudence of it, struck me, I nigh-hand groaned, while Violet Hyde's fingers slipped out of mine. Just then she turned full round with a soft look of her eyes, and was going to say something, as I thought; but the handle of the aftermost door turned, and the Brigadier's lady hastened in. As I glanced round, something or other dropped lightly into the palm of my hand, and next moment Violet was gone. 'Twas only a little knot of white ribbon I'd got, though the scent and the warm touch of it together were enough to startle one--I almost thought she'd changed into it; and to this day, ma'am, I'll be hanged if I know what _that_ was the scent of--unless it was sandal wood! "'Quick!' said Mrs Brady, in a hurry, 'what d'ye stand staring there for, man alive? Sir Charles is upstairs, and you can't go this way; so through the cabins with ye, lieutenant, and out on the quarther-dheck!' Before I well knew what I was doing, accordingly, we were in the judge's main-cabin, where the ship's masts and the men gathering about the ropes could be seen through the round-house doors as they stood open. 'Mrs Brady,' said I, suddenly stepping back to her, 'you're an angel, ma'am, and----' 'You unprincipled young villain ye!' said she, springing aft with her fingers spread, and begining to raise her voice, 'what would ye do! Brigadier.--D'ye think 'tis deaf I was in the stair yonder, you promiscuous young----' However, I gave her one bewildered look, and heard no more of it, bolting as I did through the nearest door right against the man coming to the wheel; while the midshipman was on the look-out for me everywhere to say that the captain of the Indiaman was waiting for me below in his cabin. "Indeed she was moving slowly through the water already, as the light cat's-paws ruffled it here and there, and drew aloft into her royals; our own little craft beginning to slip gently along to leeward of the ship, with the dark Lascars' faces under the foot of her white fore-topmast-staysail, giving her a doubtful enough air, I must own. I had nothing particular to say to Finch, in fact; but, captain as he was of the Indiaman for the time, 'twas the least I could do to see him; besides that somehow or other, I had a sort of feeling as I came on board half-an-hour before, I couldn't exactly say why, that made one anxious for a near sight of him. If he suspected anything wrong amongst his crew, why at any rate he would have an opportunity of mentioning it ere we parted company; but, awkward as our meeting each other again was, of course, and both being on such different footing from before, while my own mind was naturally full of what had just happened, it turned out much as might be expected. Finch was evidently not the same man he had been a few weeks before, except in his puppy fine gentleman manners and way of dress, which were twice as high-flown; with his hair curled, a white handkerchief hanging half out of his breast-pocket, a regular East India uniform, and everything showing the tiptop skipper. The thing that set me less at my ease with him was, that I was sure, by one glance of his eye, he had a pretty fair guess of where I had been last, and saw it in my manner--which made me the more careful, as matters stood, to give no signs of more meddling with the Indiaman. However, I threw in a hint or two, when Finch out and told me quite frankly, there _had_ been a little disorderly conduct on board after they left the Cape, but he had thoroughly put it down, without letting the passengers know anything about it, as he said: only, the very day before, at the time when the schooner fired, there were a few of the men, he told me, that seemed inclined to disobey orders--fellows he wished he could get rid of. "'Now, Captain Finch,' said I, as I looked over my shoulder at them from the capstan, 'will you point out the men you spoke of, sir, that showed themselves mutinous?' Finch drew back at this, however, and hummed and hawed at the word. 'Yes, _mutinous_,' repeated I; 'there's no use mincing the matter, I suppose. Just be so good as let me see the fellows, and I'll rid you of them at once!' Finch's glance followed mine as it lighted on Harry Foster's shaggy head watching us with the eye of a buffalo, past a knot of slouching, hulking, foremast-men of his own kidney. The moment I caught sight of Jacobs' broad, hearty, brown face, standing apart a bit with his friends, Tom, Bill, the red-haired Irish topman, and three other honest-like man-o'-war's-men, I took my cue for the meantime. 'My lads,' said I, walking quietly forward, 'I want a few hands for the _Hebe_ frigate--you know her, I daresay--and that's enough; for a model like the _Hebe_ doesn't float the water--now, I can't press any of you!' Here a general laugh ran along both rows, and I heard a growling chuckle from ugly Foster. 'But,' added I, laughing too, 'you can _volunteer_!' "There was a dead silence, in the midst of which Tom, the fore-topman, the most dashing fellow in the ship, stepped aft with his hat in his hand, then Jacobs, then Bill, and my acquaintance the 'Savage,' then the three others. In place of grumbling, in fact, there began to be a hurrah amongst the rest, except some of Foster's chums; a few more seemed inclined to follow, and as for my gentleman captain, he appeared not to know what to do. 'Now, my man,' said I, stepping straight up to ugly Harry, and eyeing him right in the face as he stood, 'you're a fine seaman-like fellow--true-blue, I'm sure--I've taken a particular fancy to ye--won't you ship for the _Hebe_--eh?' Foster didn't know where to look, twisting himself round, hitching up his trousers, and altogether taken fairly aback; every eye was on him, and I'll be hanged if I don't think he turned it in his mind to agree. 'Come, Foster,' said I, in a low voice, 'I know you, my man, but if you ship I'll look over the whole!' All at once Captain Finch walked up to me, saying, 'If you persist in taking these men, sir, you'll have to answer for it, I can tell you!' 'I know my own meaning, sir,' said I firmly; 'I am in the regular course, and answer for it I will! Say the word, my man, and ship?' said I again. 'Blowed if I do!' said Harry, turning on his heel with a grim scowl; 'none o' yer frigates for me!' and he walked off. Jacobs and the others came on the gangway with their bags, however, and pitched them to the men in the boat, without anyone offering to interfere; indeed, Finch had seemingly given it up sooner than I expected. "'Now, Captain Finch,' said I, before stepping over the side after Mr Snelling and the men, 'I'd much rather we could have hit upon the right men; however, the more need for my keeping in sight of you to windward, as I shall do at least till we steer for the Bay of Bengal. I couldn't do less, you see,' added I, on getting no answer, 'than make myself strong enough to help you if needful!' 'I shall report to the Admiral at Bombay, sir!' said he fiercely. 'You may do that, Captain Finch,' I said, 'as soon as possible; but, in the meantime, you can't be sure of what may turn up of a dark night, and a couple of lights at your main-yardarm, or anywhere, will bring the schooner down in half-an-hour or so if there's a breeze. As for a calm,' said I, turning round--but such a strange white look had come over Finch's face as he glanced after me, that, thinking he was beside himself with rage, I went down the side without another word. 'Take your own way!' I fancied I heard him mutter betwixt his teeth; but next moment we were pulling off. "Well, the breeze ere this time was steady, though light, and we drew gradually to windward of the Indiaman, till by the afternoon the white band on her hull was just awash with the water, and there I kept her, with a little variety, pretty near the whole night, and most of the following day. "The next night came almost as dark as it had been that night of the calm; but the breeze freshened again pretty strong, and accordingly I kept the schooner down to get nearer the ship, which we had seen in the first dog-watch dead to leeward. I was rather uneasy for a while at not being able to make out her lights, and we slipped fast through the water, when all at once both Jones and Westwood called out from forward that they saw them, and I walked to the bows. "'All right,' said I, 'but, no, by heaven! That's the signal I named to the captain! Set stunsails, Mr Jones, and make her walk, for God's sake!' _Two_ lights it was aloft in the gloom, right to leeward as before: there was something wrong, or else she wanted to speak us; so away we flew before the wind, under everything that could be set. I looked and looked, when a thought struck me; not another light was to be seen below, and they weren't high enough from the heave of the sea for even a ship's lower mast. "Yes, by George!' said I hurriedly to Westwood and Jones, 'that's a _trick_! The fellow means to give us the slip. Clap the helm down, Mr Snelling, and haul aft the sheets there--luff, luff!' We were losing our weather-gage; in fact, the Indiaman must actually be to windward of us ere then, and if the breeze freshened we might lose them altogether. The thing that troubled me most was, that I couldn't believe the man had thought of such a plan himself; and if he once took a hint from any of the scoundrels I knew were aboard, why, there was no saying what might be the upshot in the end. Finch was a common enough character at bottom; but with such notions as I was sure were working in his head about Miss Hyde, one step might lead him on to another, till any chance occasion might make a desperate villain of him, especially if he suspected myself of aught like good fortune with the young lady. It wasn't much past midnight, the air was wonderfully heavy and sweltering, and the swell going down, when we heard a murmur amongst the men on the forecastle, and saw a red fire-ball pass high over to nor'ard for half-a-minute, leaving a trail in the dark sky beyond the headsails. "A queer ghastly sort of ruddy gray streak opened out in the black of the horizon, where some of them thought they made out the ship; but soon after we could hear a low hollow kind of a hum, rushing as it were from east to west, till it grew almost like the sound of waves on a beach; which made us begin to look to ourselves. There was a bright line of light directly in the opposite quarter, and the sea far away seemed getting on fire, with a noise and hubbub coming along below, that nobody appeared to know the meaning of; while aloft it was as still as a church. For a moment I saw the _Seringapatam_ quite plainly several miles off; but from the confusion, I never could say whether it was north or east; in fact, we kept watching the canvas, expecting to have a hurricane into it next minute. Suddenly the sea came gleam-gleaming and flickering on, as it were, with a washing bubble and a hissing smother of foam, till it splashed right against our larboard bulwarks, heaping up like perfect fire upon the schooner's side, and running past both stern and bows, away with a long rolling flash to the other horizon. All was pitch-dark again after that, and a whisper went about our decks and round the binnacle lamp of 'The _ripples_!--It's the ripples!'[27] 'Nothing more, sir!' said Jones, even he seemingly taken by surprise at first. Twice again we had it, though each time fainter, right out of the midst of the gloom; after which it was as calm as before. 'Thank God!' said I, breathing hard, 'we'll have that Indiaman in the morning, at any rate!' 'Why, sir,' answered Jones, thoughtfully, 'after this we are likely to have the south-west monsoon upon us ere long--'tis just the place and the season for it.' [27] The "Ripples"--a marine phenomenon peculiar, apparently, to the Indian Ocean. "And so it was. Instead of sighting the _Seringapatam_ at daybreak, I had a strong suspicion she had gone to eastward; but of course the faster the schooner was, why if it were the wrong way we should only get from her the farther, and miss her altogether, without ever knowing how matters went, even if she got quietly into port; so, being the best plan I could think of for the meantime, away we drove north-westward, sweeping the horizon with the glass every morning. We had run so far, indeed, without success, that I was sure she couldn't be ahead; when one day I asked Mr Jones to bring me up the chart for those parts, as we took the latitude. We were a long way to westward of our own course at the time, and Jones's finger went along eastward till it stopped right upon the Maldive islands, while he looked up with a sudden sharp glance. 'By heaven,' said I, 'yes!--I forgot that story altogether--be so good as to send that man there, Jacobs, to me. Jacobs,' said I, 'which of the officers' clothes did that fellow Foster use to scrub lately, in the Indiaman?' Jacobs gave his hair a rub, recollected a moment, and answered, 'Why, sir, the captain's own.' 'Oh!' I said, 'well, that'll do, Jacobs'--and Jacobs walked forward again. 'Mr Jones,' said I, quickly, '_that_ chart belonged to the captain!--I'll have a look at that said desert island, sir!' We found something answering to it on the chart; and in a few minutes the schooner was bowling before the dregs of the monsoon to eastward. "'At all events,' added I, 'we'll see if these vagabonds mean to keep their word and turn hermits--either we catch them there, Mr Jones, or else we must find that Indiaman, though she were in sight of Colibah[28] lighthouse!' Jones's eye lighted, and he turned his nostrils to the monsoon as if he snuffed it in; in fact, he was that sort of man that needed somewhat out of the common way to keep him right." [28] Outside the harbour of Bombay. CHAPTER XXVIII "'No, Westwood,' said I, 'it can't be the right one--nor any of these, indeed!' And on looking at the chart, which was one not meant for anything but navigation in open water, with the channels laid down clearly enough, but evidently rather offhand as to the islands, Jones himself seemed to get uncertain about the matter; partly owing to the short glimpse he'd had of the other chart, and partly to its being, as he thought, an old one made for a purpose, by a hand that knew the islands well. After two or three days' sail, we were getting into the thick of the Maldives, where the reefs and sandbanks stretching out on every side, and beginning to lap in upon each other, made it more and more dangerous work; but at any rate the islands we saw were either very small, or else low and muddy-like, with a few scrubby-looking cocoas upon them, like bulrushes growing out of a marsh. No runaway sailors would ever think of taking up their quarters hereabouts, even if we hadn't caught sight of a smoke now and then, and once of some native craft with a couple of brown mat-sails, and an out-rigger, that showed the clusters hereaway to have people about them. Besides, there was no pretext any Indiaman could have for steering near enough to such a jungle of mud and water, to give a boat the chance of making towards it with any certainty. "I saw at once that the spot in question must lie tolerably for the course of a ship to Western India, otherwise they wouldn't have appeared so sure of their mark as Jones said they did. All this, at the same time, kept me the more bent on searching the matter out ere I did aught else, seeing that in fact the Indiaman's attempt to get rid of the schooner was the very thing likely to bring her on this track; fancying, as she would, that we were either in chase of her toward Bombay, or off on our own course again. Now, on the one hand, nothing could fit better for the said runaway scheme of Harry Foster's; and on the other hand, nothing would have pleased me more, and greatly eased my mind too, than to catch him and his chums on their spree ashore. The worst of it was, that I began to have my doubts of Jones again. He was the only man that could put us on the right scent; yet he seemed either to have lost it, or to have something creeping on his mind that made him unwilling to carry it out. "'Mr Jones,' said I, as the schooner was hove-to, and he stood musing gloomily by the binnacle, with a glance now and then in at the compass, and out at the chart again, 'if you're at a loss now, sir, just say--and I shall try my own hand for want of a better!' "'No, Lieutenant Collins!' answered he suddenly, in a husky voice--'no, sir, that's not it, but--God help me! no, there's no use standing against fate, I see. Whatever it costs me, Mr Collins,' he went on firmly, 'I'm with you to the end of it; but--there _is_ something horrible about all this!' 'How! what do you mean?' said I, startled by the difference in his manner, and the quiver of his lip. 'Oh,' said he, 'as for the present matter, there may be nothing more in it than what I heard on the ship's boom yonder. The truth is, I didn't know at first but this cluster here might have been the one--though I see now there is only _one_ island in the whole chain that can answer the description, and that is not here.' With that he pointed to another piece of the chart, showing no more than a few spots upon the paper, not to speak of shades in it standing for reefs and shoals, towards the 'Head' of the Maldives; one spot lying away from the rest, with the single name of Minicoy for them all. I asked him hastily enough what it was called, and all about it, for the whole affair made me more and more uneasy; but on this point Jones seemed inclined to keep close, plainly not liking the topic, except that I found it went by several names, one of which I had heard before myself--White-water Island. "About the time I was a boy in a merchantman's forecastle, 'twas a sort of floating yarn amongst some seamen, this White-water Island, I remembered; but I never met with a man that had seen it, every one having had it from a shipmate last voyage, though a terrible place it had been, by all accounts, without one's knowing exactly where it was. One craft of some kind had gone to find out a treasure that was buried in it, and she never was heard of more; a man took a fancy to live ashore in it, like Robinson Crusoe, and he went mad, while the reason there were no 'natives' was owing to the dreadful nature of it, though at the same time it was as beautiful as a garden. The right name, however, according to Jones, was Incoo. 'There's no good in blinding one's self to it, Mr Collins,' he went on; 'that's the island the men meant, only their chart set me wrong owing to the greater size of it--you had better beat out of this at once, and keep up for the eight-degrees channel there.' "We were in open sea again, out of sight of land from the mast-head, steering for somewhere about north-north-east, with a very light breeze from nearly the monsoon quarter, and sometimes a flying squall, sometimes no more than a black pour of rain, that left it hotter than before. The clear, deep blue of the Indian Ocean got to a sickly heavy sort of dead colour towards noon, like the bottoms of old bottles, and still we were standing on without signs of land, when, almost all at once, I noticed the water in the shadow of the schooner had a brown, coffee-like tint I had never exactly seen hitherto; indeed, by the afternoon, it was the same hue to the very horizon, with a clean seaboard on all sides. I had the deep-sea lead-line hove at length, and found no soundings with a hundred and fifty fathoms; there was neither land nor river, I knew, for hundreds and hundreds of miles to the coast of Arabia; as for current, no trial I could think of showed any; and there were now and then patches of small glittering sea-jellies and sea-lice to be seen amongst a stalk or two of weed on the soft heave of the water, going the way of the breeze. A dozen or so of Portuguese men-of-war, as they call them, held across our bows one time; little pink blubbers, with their long, shining roots seen hanging down in the clear of the surface, and their little blue gauze sails with the light through them, ribbed like leaves of trees, as they kept before the wind. Westwood and I both fancied we could feel a queer sulphury smell as we leant over the side, when a surge came along the bends. Not a single fish was to be seen about us, either, except the long big black-fish that rose one after the other at a distance, as the wind got lighter. One while you heard them groaning and gasping in the half-calm, as if it were the breathing of the sea far and wide every time it swelled; another, one saw them in a cluster of black points against the bright sky-line, like so many different shaped rocks with the foam round them, or a lot of long-boats floating bottom up, with their back-horns for humps on the keel. As for Jones, he looked graver and graver, till all of a sudden we saw him go below; but after a little he came up with an almanack in his hand, and his finger fixed where the time of the next new moon was given, as I found when I took it from him, for he seemed not inclined to speak. 'Why, what has that to do with the thing?' I said. 'We are heading fair for the Minicoy cluster, I think.' 'Yes, sir,' said he; 'if one needed anything to prove that, he has only to look at the sea; at this season, I _knew_ how it would turn out.' 'Well, that's what I can't understand, Mr Jones,' said I; 'the water seems as deep as St Paul's Cathedral thrice over!' "'Do you not know then, sir, why that island is called--what it is?' was the answer. 'But, wait--wait--till _night_!' And with that Jones turned round to the bulwarks, leaning his arms on the rail. In the meantime Jacobs and some of the men had drawn a bucket of water, which we noticed them tasting. A pannikin full of it was handed along to the quarter-deck, and the taste struck you at once, owing to the want of the well-known briny twang of real blue water, and instead of that a smack as it were of iron, though it was as clear as crystal. Everyone had a trial of it but Jones himself; indeed, he never once looked round, till it had occurred to me to pour the tin of water into a glass, and hold it with my hand over it inside the shade of the binnacle, when I thought I made out little specks and sparks shooting and twisting about in it, as if the water had a motion of itself; then it seemed to sink to the bottom, and all was quiet. Just then I looked up and caught Jones's scared, restless sort of glance, as if he were uneasy. There was a strange life in that man's brain, I felt, that none could see into; but owing as it plainly was to something far away from the present matter, I knew it was best to let him alone. In fact, his doing as he did showed well enough he meant fair by ourselves. Nothing on earth ever gave me more the notion of a wreck in a man than the kind of gaze out of Jones's two eyes when he'd turn to the light and look at you, half-keen, half-shrinking, like a man that both felt himself above you, and yet, somehow or other, you'd got him under you. "I'm blessed if I didn't trust him more because he had been too desperate a character in his deeds beforehand to turn his mind to little ones now, than for anything good in him; being one of those fellows that work their way from one port to another in ships' forecastles, and get drunk ashore, though, all the time, you'd say there wasn't one aboard with them, from the skipper to the chaplain, knew as much or had flown as high some time. Some day at sea the hands are piped round the grating, hats off, and the prayer-book rigged--down goes 'Jack Jones' with a plash and a bubble to his namesake, old 'Davy,' and you hear no more of him! "Well, just after sundown, as the dusk came on, Westwood and I left the deck to go down to supper with the planter, the midshipman being in charge. There was nothing in sight, sail or land; indeed, the queer dark-brown tint of the horizon showed strongly against the sky, as if it had been the mahogany of the capstan-head inside its brass rim; the night was cloudy, with a light breeze, and though the stars came out, I expected it to get pretty dark. As I went down the companion, I heard nothing but the light wash of the water from her bows, and the look-out stepping slowly about betwixt her knight-heads on the forecastle; while it struck me the smooth face of the sea seemed to show wonderfully distinct into the dusk, the completer it got, as if a sort of light rose up from off it. Down below we felt her stealing pleasantly through all, and Tom and I sat for I didn't know how long, trying to settle our differences on the main point--about the _Seringapatam_, of course, and which way she was likely to be gone. Tom plumed himself mightily on his common-sense view of a thing, and having by this time got back a good deal of his cheerfulness, he and Mr Rollock almost laughed me over to his line of thinking. "We then agreed that the ship must be at present edging up on one side or other of the Maldives, but both of them thought the less we had to say to her the better. 'I say, though,' exclaimed the planter, whose face was turned the opposite way to ours, 'I'd no idea it was moonlight!' 'Moonlight! there's no moon till morning,' I said. 'Look into the stern-cabin there, then!' said Rollock; and I turned round, seeing into the door of the after-cabin, where, to my no small surprise, there was a bright white glare through the little square stern-light, gleaming on the rim of the sill, and seemingly off both the air and the water beyond. Quite confounded, as well as wondering what Snelling could be about, I hurried up the companion, the planter and Westwood hard at my heels. "For so long as I had kept at sea, and a good many different latitudes I had been into, yet I must say I never in my life before saw such a strange sight as broke on us the instant we put our heads out of the booby-hatch, fresh from the lamp-light in the cabin. Indeed, I can't but own to my first feeling being fright; for what it was I couldn't understand, unless we were got into a quarter of the world where things weren't natural. There were a few stray clouds in the sky, scattered away ahead, and clearing eastward to settle along before the breeze; all aloft of us, high over the sharp dark edge of the sails and gaffs, the air seemed to open away out, pale and glimmering like a reflection in the ice; all round you caught a glimpse of the stars weakening and weakening toward the horizon. "But the water itself--that was the sight that bewildered one! On every side the whole sea lay spread out smooth, and as white as snow--you couldn't fancy how wide it might stretch away astern on our lee-beam, for not a mark of horizon was to be seen, save on the north-west, where you made it out, owing to the sky there being actually darker than the sea--but all the time the wide face of it was of a dead ghastly paleness, washing with a swell like milk to our black counter as we forged ahead. It wasn't that it shone in the least like blue water at night in the ordinary tropics--by Jove! that would have been a comfort--but you'd have thought there was a winding-sheet laid over all, or we were standing across a level country covered with snow--only when I stood up, and watched the bows, there was a faint hissing sparkle to be seen in the ripple's edge that first brought me to myself. The Lascars had woke up where they lay about the caboose, and were cowering together for sheer terror; the men standing, each one in his place, and looking; while Jones, who had relieved the midshipman, leant by himself with his head on the capstan, as if to keep out the sight of it all; the schooner's whole dusky length, in fact, with every black figure on her decks, and her shape up to the lightest stick or rope of her aloft, appearing strange enough, in the midst of the broad white glare, to daunt anyone that wasn't acquainted with the thing. 'Mr Jones,' said I quickly, on going up to him, 'what the devil is this?' I'll be hanged if I didn't begin to believe in witchcraft or something. 'Where are we getting to?' 'Nothing, nothing, sir,' said he, lifting his head; ''tis natural enough; only the milk-sea, as they call it--the white-water, sir, that comes down twice a year hereabouts from God knows where--you only see it so at--at _night_!' "'Oh, then, according to that,' I said, 'we shan't be long of sighting your island, I suppose?' 'No,' said he; 'if the breeze freshens at all, keeping our present course, the mast-head ought to hail it in two or three hours; but, God knows, Lieutenant Collins, natural though the sight is, there's something a man can't get rid of, especially if----' He stood up, walked to the side, and kept facing the whole breadth of the awful-looking sea, as it were, till it seemed to blind him. 'I tell you what, sir,' said he, slowly, 'if that water had any use, a priest would say 'twas sent to wash that same island clean of what's been done on it; but it couldn't, Mr Collins, it couldn't till the day of judgment!' He leant over till his dark face and his shoulders, to my notion, made the milk-white surge that stole up to the schooner's bends take a whiter look. 'If that water could wash _me_ now,' muttered he, 'ay, if it could only take the soul out of me, but I'd go down, down this moment to the bottom!' With that he gave a sudden move that made me catch him by the arm. 'No, no, Mr Collins,' said he, turning round; 'the truth is, I mean to go through with it; I'll let it carry me where I am bound for! Wasn't I born without asking my leave, and I'll kick the bucket the same way, if it was on a blasted dunghill!' 'Come, come, Mr Jones,' said I, in a soothing sort of a way, 'go below for a little, and sleep; when we hail the land I'll have you called.' 'I'd rather not, sir,' said Jones, quietly; 'the truth is, it strikes me there's something strange in my happening to be aboard here, at this particular season, too; and see that same island, _now_, I must! It's fate, Lieutenant Collins,' added he; 'and I must say, I think it's the more likely something may turn out there. Either you'll see that ship, or the men, or else _I'll_ be there myself, in some way or other!' "Now there was something in all this that began at moments quite to bewilder one, the more excited the state was it put you in. There was nothing for it but to push on, and see what might come of it. Indeed, the weather favoured us better on our present course than on any other; and I felt, if I didn't keep active, I should go distracted. 'Twas almost as if what Jones said had a truth in it, and a sort of a power beyond one were drawing the schooner the way she steered; while at the same time there was every little while somewhat new in the extraordinary looks of things to hold you anxious. Even a flying touch of a squall we had about midnight didn't the least do away with the whiteness of the water all around; on the contrary, as the dark cloud crept down upon us, widening on both sides like smoke, the face of the sea seemed to whiten and whiten, casting up a ghastly gleam across the cloud, with its ripples frothing and creaming; till, not knowing _how_ things might go hereabouts, you almost expected the first rush of the wind to send it all in a flame to our mast-heads. "Then up she rose on a surge like a snowdrift, and off we drove heeling over to it, gaffs lowered and canvas down, everything lost sight of, save the white sea heaving up against the mist; while the clear- plash of it through our weather bulwarks showed it was water sure enough. The squall went off to leeward, however, the rain hissing like ink into the swell it left, and spotting it all over till the last drops seemed to sink in millions of separate sparkles as far as you could see. The schooner rose from one heave to another to an even keel on the smooth length of it, hoisting her spanking gaffs, hauling aft the sheets, and slipping ahead once more to a breeze fed by the rain. As the sky cleared, the dead white glare the water sent up into it was such you didn't know the one from the other toward the horizon; and in the midst there was only the smooth faint service, brushing whiter with the breeze, as if it was nothing else kept it from going out of sight; with a few streaky clouds turning themselves out like wool in a confused rift of the air aloft; the schooner walking in it without ever a glimpse of a shadow on one side or another; while, as for seeing a sail on the horizon, you might as well have looked for a shred of paper. It wasn't light, neither nor was it haze; nothing but a dead colour off the very sea's face--for the schooner rose and plunged without letting you see a hair's-breath of her draught below the water-line. Every man rubbed his eyes, as if it were all some kind of a dream, and none the less when suddenly we were right upon a long patch of black stripes winding away through the white, like so many sea-serpents come up to breathe, with both ends of them lost in the faintness. Nobody stirred, or said, 'Look-out'; stripe after stripe she went slipping through them as if they'd been ghosts, without a word or an extra turn of the wheel. I daresay, if we had commenced to rise in the air, every man would have held on like grim death, but he wouldn't have wondered much; 'twas just, 'whatever might happen to please them as had the managing of it,' which was Jacobs' observation when we talked of it after. "Mr Snelling was the only one that ventured to pass a joke; when Jones, who I thought was out of hearing, looked at the reefer with such a fierce glance, and so scornful at the same time, that I couldn't help connecting what happened the very next moment with it--for without the slightest warning, both of us were flung to leeward, and Snelling pitched into the scuppers, as a huge rolling ridge of the white water came down upon our beam; while the schooner broached-to in the wind, floundering on the swell with her sails aback. Had the breeze been stronger, I think it would have fairly swamped us with the stern-way she had; and heave after heave swelled, glaring and weltering out of the pale blind sky, till our decks swam with light in the dusk under the bulwarks, and about the dark mouths of the hatchways. Just as suddenly the rollers seemed to sink in the smooth of the sea, and at last we payed off with the breeze as before, at the cost of a good fright and a famous ducking. Two or three times in the course of the middle watch did this happen, except that we were taken less by surprise, and had the hatches closed, with every rope ready to let go; the breeze strengthening all the time, and the same sort of look continuing all round and aloft.[29] [29] The description of this peculiar phenomenon of the Indian Ocean, as given by Captain Collins, surprised us as much as the reality seems to have done him. However, on consulting a seafaring old gentleman of much experience in all parts of the world, we are informed that such an appearance is periodically to be met with for some distance between the Laccadive and Maldive Islands, as he had reason to know. The old Dutch Captain Stavorinus also furnishes an account substantially similar, having particularly attended to the cause of it in his voyage to the East Indies. It reaches also to some of the south-eastern islands at a great distance from India, near Java--or at all events appears there. In the Atlantic, Humboldt says there is a part of the sea always milky, although very deep, in about 57 degrees W. longitude, and the parallel of the island of Dominica. Of the same nature, probably, are the immense olive-green spaces and stripes seen in blue water by Captain Scoresby and others, toward the ice of the north polar regions. The pale sea alluded to is supposed either to move from the shores of Arabia Felix, and the gulfs in that coast, or, by some to arise, from sulphureous marine exhalations--appearing to rot the bottoms of vessels, and to frighten the fish. Both at the Laccadives and near Java it is seen twice a year, often with a heavy rolling of the sea and bad weather. The first time, at the new moon in June, it is called by the Dutch the "little white-water"; again, at the new moon in August, the great "white-water"; by English seamen, generally, the milk-sea, or the "blink." "About four o'clock or so, the appearance of the sky near where the horizon ought to be, right ahead, struck Westwood and me as stranger than ever; owing to a long lump of shadow, as it were, lying northward like the shape of a bow or the round back of a fish miles long, though it softened off at one end into the hollow of the air, and the gleam of the white water broke past the other like the streaks of the northern lights on a frosty night toward the Pole, save for the thin, shadowy tint of it, and the stars shining plainly through. I'd have fancied it was high land; when suddenly the half-moon was seen to ooze like a yellow spot out of the shapeless sort of steam to eastward, like a thing nobody knew, shedding a faint brown glimmer far below where you hadn't seen there was water at all. "The bank of shadow softened away towards her, till in little more than five minutes the dark rippling line of the sea was made out, drawn across the dusk as if it had been the wide mouth of a frith in the polar ice, opening far on our weather-bow. A soft blue shimmering tint stole out on it by contrast, leaving the milk-white glare still spread everywhere else, astern, ahead, and on our lee-beam, into the sightless sky: 'twas the old blue water we caught sight of once more, with the natural night and the stars hanging over it; and the look-out aloft reported blue water stretching wide off to the nor'ard. There was one full hurrah from the seamen in the bows, and they ran of themselves naturally enough to the ropes, standing by to haul the schooner on a wind--to head up for the old salt sea, no doubt. "'Lieutenant Collins,' said Jones in a low voice, 'do you mean to steer for that island, sir?' 'Yes,' I said, 'certainly, Mr Jones--I shall see this matter out, whatever the upshot may be!' 'Then keep on, sir,' said he firmly, 'keep in the white water--'tis your only plan to near it safely, sir!' This I didn't well understand; but, by Jove! there was so much out of the common way hereabouts, that I had made up my mind to follow his advice. Another hail from aloft, at length--'Something black on our lee-bows, sir--right in the eye of the white it is, sir!' We were now running fast down in the direction where there was least possibility of seeing ahead at all, although, in fact, the little moonshine we had, evidently began to make this puzzling hue of the surface less distinct--turning it of a queer ashy drab, more and more like the brown we noticed by daytime; while the light seemed as it were to scoop out the hollow of the sky aloft, when a dark spot or two could be observed from the deck, dotting the milky space over one bow--you couldn't say whether in the air or the water, as they hung blackening and growing together before us through below the foot of the jib. "Larger and larger it loomed as we stood before the breeze, till there was no doubt we had the bulk of a small low island not far to windward of us, a couple of points or thereabouts on our larboard bow when she fell off a little--lying with the ragged outline of it rising to a top near one end, its shape stretched black and distinct in the midst of the pale sea; while the white water was to be seen taking close along the edge of the island, showing every rock and point of it in the shadow from the moon, till it seemed to turn away all of a sudden like a current into the broad, dreamy glimmer that still lay south-eastward. On the other side of the island you saw the dark sea-ripples flickering to the faint moonlight, and some two or three more patches of flat land just tipping the horizon, with the thin cocoa-nut trees on them like reeds against the stars and the dusk; while the one nearest us was sufficiently marked out to have saved me the trouble even of the look I gave Jones, which he answered by another. 'You have seven or eight fathoms water here, sir,' added he; 'and as soon as she rounds the point yonder, we can shoal it by degrees to any anchorage you like, as long as we keep in the white water--but we must hold to _it_!' It was accordingly found so with the lead, and ere long, having kept past the point, the same milky hue could be noticed as it were jagging off through the darker water, and winding away hither and thither all round the other side, till you lost it. "However, here we brailed up and hauled down everything, letting go an anchor little more than half-a-mile from a small sloping beach, where the strange water actually surged up through the shadow of the land in one glittering sheet, like new-fallen snow, while the back-wash seethed down into it all along the edge in perfect fire. Nothing stirred on it, apparently; not a sound came from it, save the low wash of the surf on that lonely bare beach; and you only made out that part of the island was covered with trees, with the ground rising to a flat-topped hummock toward one end. So being pretty wearied by this time, impatient though I was for a clearer view of matters, most of us turned in, leaving the deck to a strong anchor-watch, in charge of Jones--especially as it was towards morning, and the breeze blowing fresh over the island through our ropes. But if ever a man walked the deck overhead in a fashion to keep you awake, it was Jones that morning: faster and faster he went, till you'd have thought he ran; then there was a stop, when you felt him _thinking_, and off he posted again. No wonder, by George! I had ugly dreams! CHAPTER XXIX "I could scarce believe it wasn't a dream still, when, having been called half-an-hour after daybreak, I first saw the change in the appearance of things all about us. The horizon lay round as clear as heart could wish--not a speck in sight save the little dingy islets at a distance; the broad blue ocean sparkling far away on one side, and the water to windward, in the direction we had come, showing the same brownish tint we had seen the day before, while it took the island before us in its bight, and turned off eastward with the breeze till it spread against the open sky. The top of the land was high enough to shut out the sea-line, and being low water at the time, it was plain enough now why Jones wished to keep the white streaks overnight; for, where the dingy- ripples melted on the other side towards the blue, you could see by the spots of foam, and the greenish breaks here and there in the surface, that all that coast of the island was one network of shoals and reefs, stretching out you didn't know how wide. White-water Island, in fact, was merely the head of them--the milky stream that had so startled us just washing round the deep end of it, and edging fair along the side of the reefs, with a few creeks sent in amongst them, as it were, like feelers, ere it flowed the other way: we couldn't otherwise have got so near as we were. But the island itself was the sight to fasten you, as the lovely green of it shone out in the morning sun, covering the most part of it close over, and tipping up beyond the bare break where it was steepest, with a clump of tall cocoas shooting every here and there out of the thick bush; indeed, there was apparently a sort of split lengthways through the midst, where, upon only walking to the schooner's bow, one could see the bright greenwood sinking down to a hollow out of sight, under the clear gush of the breeze off a dark blue patch of the sea that hung beyond it like a wedge. "As the tide made over the long reefs, till the last line of surf on them vanished, it went up the little sandy cove opposite us with a plash on the beach that you could hear; the place was just what a sailor may have had a notion of all his life, without exactly seeing it till then; and though as yet one had but a rough guess of its size, why, it couldn't be less than a couple of miles from end to end, with more than that breadth, perhaps, at the low side toward the reefs. Not a soul amongst the man-o'-war's men, I daresay, as they pressed together in the schooner's bows to see into it, but would have taken his traps that moment, if I'd told him, and gone ashore on the chance of passing his days there; so it wasn't hard to conceive, from the state it seemed to put their rough sunburnt faces in, honest as they looked, how a similar fancy would work with Master Harry Foster, even if it tried his virtue a little. "I had no more doubt in my mind, by this time, of its being the fellow's intended 'hermitage,' than I had of its being the same White-water Island I had heard of myself, or the spot which Jones seemed to know so well; 'twas likely the foremast-man had got an inkling of it somewhat in the way I did; and, lying, as it happened to do, between no less than three channels which the Indiaman might take, after dodging us in this fashion round the long cluster of the Maldives, she couldn't make north-westward again for the open sea without setting Foster and his mates pretty well upon their trip. "Indeed, if she were to eastward of the chain at present, as I was greatly inclined to believe, the course of the breeze made it impossible for her to do otherwise; but there was one thing always kept lurking about my mind, like a cover to something far worse that I didn't venture to dwell upon--namely, that Captain Finch might get wind of their purpose, and drive them on another tack by knocking it on the head, either at the time or beforehand, without the courage to settle _them_. Nothing in the world would have pleased me better than to pounce upon ugly Harry at his first breakfast ashore here; but the bare horizon, and the quiet look of the island since ever we hove in sight of it, showed this wasn't to be. At any rate, however, I was bent on seeing how the land lay, and what sort of a place it was; so, accordingly, as soon as the hands had got breakfast, Westwood and I at once pulled ashore, with a boat's-crew well armed, to overhaul it. We found the sandy beach covered, for a good way up, with a frothy slime that no doubt came from the water on that side, with ever so many different kinds of blubber, sea-jelly, starfish, and shell, while the rocky edge round to windward was hung with weed that made the blocks below it seem to rise out of every surge, like green-headed, white-bearded mermen bathing. Glad enough we were to get out of the queer sulphury smell all this stuff gave out in the heat, letting the men take every one his own way into the bushes, which they enjoyed like so many schoolboys, and making ourselves right for the highest point. Here we saw over, through the cocoa-nut trees and wild trailing-plants below, down upon a broad bushy level towards the reefs. "It was far the widest way of the island; indeed making it apparently several miles to go round to the different points; and as the men were to hold right to windward, and meet again after beating the entire ground, Westwood and I struck fair through amongst the tangle of wood, to see the flat below. "We roused out a good many small birds and paraquets, and several goats could be noticed looking at us off the grassy bits of crag above the trees, though they didn't seem to know what we were. As for most of the wood, it was mainly such bushes and brush as thrive without water, with a bright green flush of grass and plants after the rain at the monsoon, the prickly pear creeping over the sandy parts, till we came on a track where some spring or other apparently oozed down from the height, soaking in little rank spots amongst the ground leaves, with here and there a small rusty plash about the grass-blades, as if there were tar or iron in it. Here there were taller trees of different kinds on both sides, dwindling off into the lower bush, while, to my surprise, some of them were such as you'd never have expected to meet with on an island of the size, so far off the land--bananas, mangoes, a shaddock or two, and a few more, common enough in India; though here they must evidently have been planted, the cocoas being the only sort natural to the place, and of them there were plenty below. Suddenly it led down into a shady hollow, out of sight of the sea altogether, where we came on what seemed to have been a perfect garden some time or other; there were two or three large broad-leaved shaddock-trees, and one or two others, with a heap of rubbish in the midst of the wild Indian corn and long grass, some broken bamboo-stakes standing, besides a piece of plank scattered here and there about the bushes. "Right under the shade of the trees was a hole like the mouth of a draw-well, more than brimful at the time with the water from the spring, for, owing to the late rains, it made a pool close by the side, and went trickling away down amongst the brushwood. Every twig and leaf grew straight up or out, save in a narrow track toward the rising ground--no doubt made by the goats, as we noticed the prints of their hoofs on the wet mud. 'Twas evident no human being had been there for heaven knew how long, since, by the care that had been taken with the place, it was probably the only spring in the island--perhaps for leagues and leagues round indeed. Trees, branches, green grass, and all--they had such a still, moveless air under the heat and light, in the lee of the high ground, with just a blue spot or two of the sea seen high up through the sharp shaddock-leaves, and the cool-looking plash of water below them, that Westwood and I sat down to wait till we heard the men. Still, there was a terribly distinct, particular cast about the whole spot, which, taken together with the ruin and confusion, as well as the notion of Foster and his shipmates actually plotting to come there, gave one almost an idea of the whole story beforehand, dim as that was--the longer you looked the more horrid it seemed. Neither natives nor a single man could have brought the different trees to the island, or contrived a tank-well of the kind, seeing it was apparently deep enough to supply a ship's casks, while at the same time I couldn't help thinking someone had lived there since it was made, or perhaps much used. "By the space taken up with the hut that had been there, and the little change in the wild state of things, most likely it was by himself he had been, and for no short time. It looked, however, as if he had been carried off in the end, otherwise his bones would have been hereabouts; probably savages, as Westwood and I concluded from the scatter they had made of his premises. For my own part, I wondered whether Jones mightn't have been the man, in which case most of that disturbed mind he showed lately might come of remembering the dreary desolate feeling one must have, living long on a desert island. No doubt they had 'marooned' him for something or other, such as not being a bloody enough captain; and I could as easily fancy one having a spice of madness in him, after years ashore here, as in Captain Wallis after a French prison. Still it startled one to see one's face in the black of the well; and we couldn't make up our minds to drink out of it. Even the pool at its side had a queer taste, I thought--but that may have been all a notion. All at once, by the edge of this same pool, Westwood pointed out two or three marks that surprised us both, being quite different from what the goats could have made; and on observing closer, they were made out to be more like the paws of a wild beast stamped in the mud. 'By Jove!' I said, 'no wolves on the island, surely!' 'All of them seem to stick to the pool in preference to the well, at any rate,' said Tom; 'they appear to have the same crotchet with ourselves, Ned!' 'Strange!' said I, 'what the devil can it be?' "Westwood eyed the prints over and over. 'What do you think of--a _dog_?' he asked. 'Good heavens!' exclaimed I, looking down--'yes!' and there we sat gazing at the thing, and musing over it, with somehow or other a curious creeping of the blood, for my part, that I can't describe the reason of. At last we heard the men hallooing to each other on the level beneath, when we hurried down, and coasted round till we came upon the boat again, where the coxswain was amusing himself gathering shells for home--and we pulled back to the schooner. "My first resolve after this was to keep before the breeze again, try to get sight of the ship, and tell Finch out and out, as I ought to have done at once, what was afoot amongst his crew; or else to let Sir Charles Hyde know of it, and make him a bold offer of a passage to Calcutta. However, I soon saw this wouldn't do; and a regular puzzle I found myself in, betwixt inclining to stick to the island and catch Foster if he came, and wishing to know how the Indiaman stood on her course if he didn't. Jones must have read my thoughts as I leant upon the capstan, looking from White-water Island to the horizon and back again; for he stepped aft, and said in a low voice, 'Lieutenant Collins, there's one thing I didn't tell you about that island before, because, as I said, I wasn't at first sure it was the one the men meant; it may help to decide you, sir,' said he gravely. 'Ah?' I said. 'In that island,' he went on, his ordinarily dark face as pale as death, 'there is enough gold, at this moment, to buy half an English county--ay, and better than gold, seeing that only one man knows the spot where it is, and _he_ would rather sail round the world without a shirt to his back than touch one filing of the--hell's dross!' "I looked at Jones in perfect amaze as he added, 'You may fancy now, Mr Collins, whether if a man of the kind happened to get wind of this, he would not stir heaven and earth to reach the place? But, rather than that gold should come into living hands,' said he fiercely, 'I would _wait for them_ by myself--ay, alone--alone'; and a shudder seemed to run through him again as he gave another glance to the island. For my part, I drew a long breath. What he mentioned had all at once relieved my mind wonderfully; for if this was Master Foster's cue, as I now saw it must have been the whole voyage over, why, he would be just as sure not to spread the thing widely, as he would be to get here some time, if he could. On second thoughts, it wasn't so plain how the rest of the crew might work with it, on the least inkling; but inclined as I naturally was to look upon the best side of the matter, you needn't wonder at my making up my mind as I did. The short and the long of it was that, in an hour more, Jones and myself, with Jacobs and four other good hands--and, somewhat to my annoyance, Mr Rollock, who persisted in coming--were pulling back for the island; while the schooner, under care of Westwood and Snelling, was hauled on a wind to stand up across the Nine Degrees Channel, which the Indiaman would no doubt take as the safest course for Western India, if all went well, and supposing I had reckoned correctly why we missed her so long. In that case, three or four days at most couldn't fail to bring her up; and on first sighting her at the horizon, they could easily enough strip the schooner to her sticks, keeping her stern on so as to let the ship pass without noticing the loom of so small a craft; whereas if they didn't see her at all, in that time, they were to bear up before the wind again for the island. Of all things, and every circumstance being considered, I agreed with Westwood it was best not to come across her again, if we could help it. "For our own part, in the boat, we were fully provisioned and armed for all the time we could need, not to speak of what the island itself afforded; and after watching the schooner stand heeling off to sea, round the deep end of it, we cruised close along, not for the beach this time, but seeking for a cove in the rocks where the boat could be hauled up out of sight, and safe from the surf at high water. This we weren't very long of finding behind some blocks that broke the force of the surge, where the wild green trailers from above crept almost down to the seaweed; and after helping them a little to hide her perfectly, the whole of us scrambled ashore. The first thing was to post a look-out on the highest point, the sharp little peak next to the reef-side, overlooking the spring and the level ground between; on the other side of the long green valley, full of bush in the midst, was the flat-topped rise towards the brown water, from which I and the planter watched the schooner softening for an hour or two, till she reached the blue sea-gleam, and lessened to a speck. By that time, the men had pitched a little canvas tent on the <DW72> opposite to us, over the hollow--Jones evidently being anxious to keep clear of the spot, which somebody else had picked out beforehand; in fact the highest ground was betwixt us and it; and on coming down through the thicket to our quarters, after a stroll in which Rollock shot a couple of rose- paroquets, declaring them to be splendid eating, we found Jones had had to send over the other way for water. CHAPTER XXX "I woke up in the tent perhaps an hour before midnight, as I judged on looking through the opening at the stars that shone in the dark sky through the north-east end of the valley above the sea. At the other end, being higher, you just saw the scattered heads of the bushes against a pale floating glimmer of air, with a pale streak of horizon. Behind us was the height where we had the look-out, and in front the flat top of the crag drawn somehow or other as distinct as possible upon the faint starlight in that quarter, roughening away down on both sides into the brushwood and dwarf cocoa-nut trees. With the stillness of the place all round, the bare sight of that particular point gave me a dreamy, desolate, ghastly sort of feeling, beyond aught I ever saw in my life before: it was choking hot and heavy inside, and seemingly throughout the hollow, though a good deal of dew began to fall, glistening on the dark-green bushes nearest us, and standing in drops on the fern-like cocoa-leaves which Jacobs and the other men had roofed themselves with. They were sound asleep; and the glimpse of the soles of their shoes and their knees, sticking out of the shadow you saw their rough faces in, with the sight of their cutlass-hilts, served to give one a still wilder notion of the place. One felt scarce sure of being able to wake them, in case of anything turning up; and, at any rate, a dread came over you of its being possibly somewhat unnatural enough to make the thing useless. "On the other hand, the planter kept up such a confounded snoring inside the canvas close by me, that although there was no doubt of his being alive, the sound of it put stranger thoughts into your head. Sometimes his breath would be jogging on like that of a tolerably ordinary mortal, then get by degrees perfectly quiet; and then all of a sudden go rising and rising, faster and faster, as if some terrible dream had hold of him, or there was some devilish monster hard in chase of his soul, till out it broke into a fearful snort that made your very heart jump--whereupon he'd lie as if he were finished, then go through the whole story again. I can't tell you how that cursed noise troubled me; 'twas no use shoving and speaking to him, and all the time the old boy was evidently quite comfortable, by something he said at last about 'indigo being up.' The best I could do was to get out and leave him to himself; in fact, where Jones had gone at the time I didn't know, till suddenly I caught sight of his dark figure standing on the rise at the back of our post, and went up to him. Jones was certainly a strange mixture, for here had he been all round the low side of the island by himself, yet I found him leaning bareheaded on the barrel of his musket, listening like a deer. He assured me solemnly he thought he had heard voices for the last hour on the other side, where he hadn't been, and asked me if I would go with him to see. Then down came our look-out from the peak, rolling through the bushes like a sea-crow, to report his not having seen anything, and to say they'd forgot to relieve him aloft; so rousing up Jacobs, I sent them both back together, while Jones and I held the opposite way for the other height. "The moment we had got to it, _there_ was the same faint blotted-out horizon as we had had all astern of us the night before, the same strange unnatural paleness cast off the face of the sea, making it look black by contrast to north-eastward and east, against the blue shadow with the bright stars in it, where the sea rippled as usual; while the keenest glare in the middle seemed to stream right to the breast of the island, like the reflection of daylight down a long break in the ice--only it was dead and ghastly to behold. The white water washed round under the black edge of the rocks before us, to the bare sloping beach, where it came up fairly like a wide plash of milk, glimmering and sparkling back amongst the little sea-creatures you fancied you saw moving and crawling out or in: till it ran along by where the reefs were, and turned off to the dim sky again. Everything else was still, and Jones drew a breath like one relieved: 'Nothing after all, I think, sir!' said he. But to my mind there was something a long sight more awful in the look of that unaccountable white water bearing down like snow upon the island, as it were, with the wrinkles and eddies to be seen faintly in it here and there back toward the glaring breadth of it, and the floating streaks in the sky above; especially when he told me he thought it was owing to millions upon millions of living things in it, that made the same show there at two different seasons in the year, for a week or so at a time--the appearance of it getting less distinct every night. "However, I had begun to grow uneasy again about the Indiaman, and the schooner too, as well as doubtful of the fellows coming to the island at all; on the contrary, as I said to Jones, if they saw the schooner, and Westwood didn't manage as I told him, why both she, the ship, and ourselves might possibly get the finishing-stroke altogether. 'The more I think of it,' said I, 'the more foolish it seems to be here instead of aboard!' 'Why it is, Mr Collins, I don't know,' replied Jones, 'yet I feel as sure these men will land here as if I heard them in the woods; and if I wasn't aware how one crime breeds another, for my part I shouldn't be here at present, sir. Many a night afloat has the thought of this place weighed on me, lest there was something new doing in it; but what's buried here I'm resolved no man shall stir up, if I can help it, sir!' A little after, as we got up and went down to the beach, all of a sudden--like a thing he couldn't avoid--Jones began to give me some snatches of what had happened here some years before, which, according to him, he had got from a shipmate of his that died; and I must say it made the blood creep in me to listen to it. "'At the beginning of the war,' he said, 'the island had been a nest of regular pirates, who had taken pains to make it, from a mere muddy head of a reef with some cocoas upon it, probably into a resort on occasions--especially as even the wild Maldive natives to southward had somehow a dislike to it. The whole gang being taken by some cruiser or other at sea, however, too far off to leave any clue to their harbourage hereabouts, they were all hanged, and the place lost sight of, till, a good many years after, a country Arab craft, bound for Dacca up the Ganges, was driven in a gale upon the reefs some way off, without seeing the island at all till the sea went down, and she was going to pieces. "'There were only two Europeans aboard, both having turned Mussulmans, and the youngest of them was mate. There was a passenger, a native Indian merchant, and his servants, with, as was believed, his harem below in the after-cabins, for nobody ever had seen them; but the Arab _rais_ of the vessel and several more being washed off when she struck, the other Mussulmans took to the only boat they had, and got ashore, leaving the two Englishmen with the passenger. Next day the two men had contrived a raft of the spars, whereupon the Hindoo at last brought up his three women, veiled from head to foot, and the whole got safe to the island. Here all the Mahometans herded together amongst themselves, forcing the two Englishmen to keep on the other side of the island, as they had no firearms, while the old Hindoo merchant and his native servant got a tent pitched on the highest point for the women, where they were no more seen than before, and a flag hoisted on a stick all the time for a signal to ships--poor simple devil!' as Jones said with a laugh. 'Every day he offered the Arab crew more of the gold and jewels he had with him, to make for India and get him brought of, till at last some of the Arabs came round to the mate and his companion, wanting them to take the boat and go instead, otherwise they would kill both of them at once. The two men accordingly had provisions given them, and hoisted sail on the boat before the breeze to eastward; they had almost dropped the island, when all at once the one in the boat's bows stepped aft to him that had the tiller, and said it struck him the Arabs couldn't mean well to the Hindoo and his wives, in trying to get clear of others. "'All his companion did,' Jones said, 'was to ask if he was man enough to go back, face them boldly, and offer to take the passenger and his harem too, when some craft or other might come back for the Arabs, since they weren't seamen enough to venture first in the boat. "I tell you what," said the first, '"try the two largest breakers of water there!" The water for use next after the open one was tasted, and it was _salt_. '"Will you stand by me?" the second man said, after awhile. The other had a dog with him of his own, that had swam ashore from the vessel after the raft he landed upon, and it was sleeping in the boat's bow at the moment, near him; the dog lifted its head as they spoke, eyed the two, and lay down again with a low sort of growl. "Ay," answered the other, "to the last I will--as long as you stick by _me_!" They hauled over the sheet, laid the boat sharp on a wind, and as soon as it was dusk began to pull back toward the island, where they got ashore in the dark before morning.' "Here Jones stopped, turned suddenly round to the glare of the white water plashing upon the beach, and said no more. 'Why, Jones,' said I, 'is that all you've to tell? What came of them? For God's sake, yes--what was the upshot?' ''Tis enough to show how one bad thing breeds another, as I said, sir,' answered he. 'Probably in the end, though--at any rate I only fancy the rest--'tis a horrible dream to me, for a--a--squall came on when that shipmate of mine got so far, and we had to reef topsails. He went overboard off the yard that very night,' said Jones wildly. "'The man must have been _there_,' said I, in a pointed way, 'to give all the particulars--_he_ was the mate himself, Mr Jones!' He made no answer, but kept gazing out to sea. 'And how long was this ago?' I asked. 'Oh,' answered he, 'years enough ago, no doubt, sir, for both of us to be children, if _you_ were born, Mr Collins'--and he turned his face to me as ghastly as the water toward the horizon he was looking at before--'at least I hope to God it was so--the man was a poor creature, sir, bless you, and old, as it seems to me--twice my own age at the time, Lieutenant Collins! At all events, though,' he went on, rambling in a strange way that made me think he was going out of his mind, 'he remembered well enough the first time he saw the white water coming down upon the island. He was hunting--_hunting_--through the bushes and up and down, and came up upon the crag.' 'Hunting?' I said. 'Yes, you didn't know how it lived, or where it kept, but every night it was on the look-out there. There was no one else, save the girl sleeping over beyond in the hut, and the man almost fancied the water of the sea was coming down to the rocks and the beach, like the Almighty himself, to show He was clear of all that had happened--if he could but have finished that brute, testifying like the very devil, he'd have been happy, he felt! Harkye,' said he, sinking his voice to a whisper, 'when he went back at daylight the woman was dying--she had borne a--what was as innocent as she was, poor, sweet, young heathen!' "And if I hadn't guessed pretty well before that Jones was the man he'd been speaking of, his glittering eye and his stride from the beach would have shown it; apparently he forgot everything besides at that moment, till you'd have thought his mind gloated on this piece of his history. 'The woman!' I couldn't help saying, 'what woman? Had the rest left you in the boat, then?' "Jones looked upon me fiercely, then turned away; when all of a sudden such a long unearthly quaver of a cry came down through the stillness, from somewhere aloft in the island, that at first I didn't know what to think, unless one of our look-out men had met with an accident, and tumbled down. 'Twas so dark where they were, however, there was no seeing them. Without looking for himself, Jones faced me, shivering all over. 'What is that, Mr Collins?' whispered he, catching my arm with a clutch like death; '_is_ there anything yonder--behind--behind--sir?' On the flat head of the crag north-westward, black against the pale glimmer over the very spot where we had stood half-an-hour before, to my utter horror, there was some creature or other sitting as if it looked toward the sea; and just then another wild, quivering, eddying sound came evidently enough from it, like a thing that would never end. It wasn't a human voice, that! my brain spun with it, as I glanced to Jones. 'Good heavens!' I said, '_what_? But, by Jove! now I think of it; yes--'tis the howl of a _dog_--nothing else!' 'Eight--ten years!' said Jones, hoarsely, 'without food, too, and enough in that well to have poisoned whole gangs of men for twenty years--_can_ it be an earthly being, sir?' The stare he gave me at the moment was more frightful than aught else, but I mentioned what Westwood and I had observed the day before. "Before I well knew what he meant, Jones was stealing swiftly up the rising ground to the shoulder of it. I saw him get suddenly on a level with the creature, his musket aiming for it--there was a flash and a shot that left the height as bare as before--and next minute, with a short whimpering howl, the animal flew down the hill, while I heard Jones crashing through the bushes after it, till he was lost in the dark. Such a terrible notion it gave me of his strange story being true, whereas before I had almost fancied it partly a craze of his, from having lived here alone--that for a moment or two it seemed to my mind we were still in the midst of it. I hurried back to our post, and close upon morning Jones came over and lay down by himself, without a word, haggard and covered with sweat. "All next day the horizon on every side was clear of a single speck; no signs either of ship or schooner, till I began to wish we were out of it, hoping the _Seringapatam_ had, after all, kept the old course for Bombay, in spite of us. I found Jones had warned the men not to get our water out of the tank; it being poisoned in a way fit to last for years, as the pirates knew how to do. For our parts, we had to amuse ourselves the best way we could, waiting for the schooner to come down again for us, which was the only thing I looked for now. That night the white appearance of the water to north and windward seemed a good deal gone, save where it hung like a haze in the direction it took off the island: the stars shone out, and in two or three nights more I found from Jones there would be nothing of it, which I hoped I should have to take on his word. "At daybreak, however, our look-out could all of a sudden be seen hoisting the signal for a sail in sight, and waving his hat for us to come. No sooner had we hurried up, accordingly, than a sail could be made out in the south-east, hull down; and the schooner not being likely thereaway, a certain flutter in me at once set it down for the Indiaman at last, on her way far past the island for the open channel. Being broad daylight, too, with a fresh breeze blowing, we saw that Foster and his party, if they carried out their scheme, would have to wait till she was a long way to windward at night-time, in order to get clear off. In fact, I had everyone kept down off the height, lest the ship's glasses might possibly notice something; while, at the same time, we hadn't even a fire kindled to cook our victuals. I was watching her over the brow of the hill, through the telescope, when she evidently stood round on the other tack to get up to windward, which brought her gradually nearer. She was a large ship, under full canvas; and at last she rose her hull to the white streak below the bulwarks, till I began to think they intended passing the island to eastward to make the channel. I went down for Jones, and asked him how far the reefs actually ran out, when he told me there would probably be signs enough of them in such a strong breeze; besides, as he reminded me, if she was the Indiaman, it was the captain himself that had a chart of them; in which, from the particular nature of it--being an old buccaneering chart, as he thought--they would be laid down quite plainly. "Indeed, when we both returned to the height, there were lines of surf to be noticed here and there, more than three miles out; and seeing her by that time so distinctly, a new uneasiness began to enter my head. There were no signals we could make, even if they didn't serve the other way; and, to tell the truth, I didn't much like the idea of being found there. Still, it was terrible to see her getting nearer and nearer, without the power of doing the least thing to warn her off; spreading and heightening before you, till you counted her sails, and saw the light betwixt them, with the breeze always strengthening off that side the island, and of course making it the safer for her to pass it to leeward. The blue surges rose longer to the foam at their crests, till one's eye got confused between them and the spots of surf rippling greenish over the tongues of reef; in fact, it wasn't far off being low-water at the time, and the whole was to be seen better from the height than elsewhere, stretched out like a floor that the breeze was sweeping across, raising a white dust where the blue melted into the light-brown tint of the sea to leeward. The breeze came so fresh that she even hauled down her sky-sails and fore-royal, railing off to go to leeward of the island. At the same moment, I made out with the glass that she was actually the _Seringapatam_, and also that she'd got a leadsman at work in the chains. Five minutes more, and she'd have gone time enough into the distinct brown- swells to stand past the deep end: without help from the glass, I saw the sun sparkle in the spray from her black bows; she made a sliding forge ahead with her whole beam on to us; when, next moment, as if she had taken a sudden yaw and broached-to in the wind, she came fairly end on, showing the three piles of canvas in one. A wild boding of the truth crept on me as I sprang on the peak, waving my arms and stamping like a lunatic, as if they could hear me. "The next instant she had fallen a little over, her foretopmast and main-to'gallantmast gone out of their places at the shock, and the heavy blue swells running to her highest side in a perfect heap of foam; while the spray rose in white jets across her weather bulwarks at every burst of them. The Indiaman had struck on a rib of reef, or else a spit of sand, near the very edge of the whole bank: had it been only high-water--as I had reason to believe afterwards--she'd have gone clear over it. As soon as the first horror of the thing was a little past, I looked, without a word, to Jones, and he to me. 'The fellows have come at last, certainly!' said he, in a serious enough tone. 'Mr Collins,' he added, 'the moment I set foot on ground here, I felt sure something would come out of it!' 'Get the men down at once, sir,' I said, 'and let's pull out to the ship!' 'Why, sir,' answered he, 'the breeze is likely to keep for some time as it is, and if she's completely gone, they'll be able to bring all hands safe ashore. If you take my advice, Mr Collins, you'll hold all fast, and show no signs of our being here at all, in case of having something or other to manage yet that may cost us harder!' It didn't need much thought to see this, in fact; and in place of going down, ten minutes after we were all close amongst the bushes on the <DW72>, watching the wreck. What was at the bottom of all this I didn't know; whether Captain Finch had really got wind of Foster's scheme, and been playing with some hellish notion his heart failed him to carry out, or how it was; but what he was to make of _this_ was the question. "Well, toward afternoon, the wreck seemed pretty much in the same state, though by that time they had evidently given her up, for the boats were beginning to be hoisted out to leeward. We couldn't see what went on there, till one of them suddenly appeared, pulling out for the island, about three miles off; then the large launch after it. There were ladies' dresses to be made out in both, their cloaks and shawls fluttering bright to the breeze as the boats dipped in the short swells; and they were full an hour ere they got out of our sight, near the broad beach, on the level side, where the tide was ebbing fast again, making it a hard matter to pull the distance. Two more boats came off the ship, filled full of casks and other matters, save the crews; the rest of the passengers and men no doubt waiting for the launch and jolly-boat to go back and take them ashore--for, soon after, they both could be seen rounding the point on their way out. On coming within hail of the fresh boats, however, they apparently gave in, since we could see the two of them, to our great surprise, strike round, and make for the beach again with their shipmates, spite of signals from the wreck, and shots even fired after them. The breeze by that time flagged, leaving less of a sea against the ship's hull in the dead water from the other reefs, and she had fallen over again to leeward--a proof of her sticking fast where she struck, without much fear of parting very soon in such weather; but the sun was going down, and this being the first sign of foul play we had observed, it was plain at all events we should have to look sharp about us. We kept close up the height, bolted our cold junk and biscuit, washing down with a stiff caulker, and looked every man to his tools. "To my great satisfaction, the planter, who had watched everything seemingly in pure bewilderment, woke up out of it when he knew how matters stood, and handled his double-barrel as cool as a cucumber, putting in two bullets above the small shot he had got for the birds, and ramming down with the air of a man summing up a couple of bills against a rascally debtor. For my own part, I must say I was longer of coming to feel it wasn't some sort of a dream, owing to Jones's broken story; till the thought of _who_ was to all likelihood on the very island below, with the rest of the ladies, amongst a set of all sorts of foremast-men thrown loose from command--half of them probably ruffians, with some hand in the matter--it came on me like fire at one's vitals. Meantime we sat there patiently enough for want of knowing what was to do first, or which way we had best keep to avoid bringing matters to a head, worse than they yet were. CHAPTER XXXI "The night came out of the dusk a fine starlight to seaward, beyond the reefs where the Indiaman lay, the high side of the island glooming back against the deep blue glistening sky, till you didn't see how large it might be; while the white water hung glimmering off to leeward from the rocks. The ship's crew had kindled a fire on the long strand near the boats, and we heard their noise getting louder and louder above the sound of the sea plashing upon it--evidently through their making free with liquor. Jones, being no doubt well acquainted with every part of the ground, proposed to go over and see how things stood, and where the passengers might be; at the same time, as Mr Rollock was more likely to come conveniently to speech of them, both for explaining our being here and putting them on their guard, he agreed to go too. "One or other of them was to hurry back as quickly as possible, while the men and myself waited in readiness for whatever might turn up. Hour after hour passed, however, till I was quite out of patience, not to say uneasy beyond description. All was still, save below toward the water's edge--the seamen's voices at times mixing with the washing hum of the surge on the sand, then rising over it in the chorus of a forecastle song, or a sudden bit of a quarrelsome uproar; notwithstanding which they began apparently to settle down to sleep. "At last the planter came skirting round the hill through the trees, quite out of breath, to say they had discovered the spot where the ladies had no doubt been taken by their friends, as Captain Finch himself, with one of the ship's officers, and two or three cadets, were walking about on the watch, all of them armed. To judge by this, and the fact of the other gentlemen being still apparently on the wreck, Finch mistrusted his men. However, the planter thought it better not to risk a hasty shot through him by going nearer; and, to tell the truth, I thought it better myself to wait till daylight, when we should see if the rest got ashore; or possibly, as I wished to Heaven were the case, the schooner might heave in sight. 'Where is Mr Jones, though?' asked I; on which I found he had gone over for the first time towards the well for some water, as he told Mr Rollock. Indeed, the passengers were settled near the thick of the wood on this side of the watering-place, none of the Indiaman's people seeming to know as yet there was such a thing on the island. "We each of us held our breath, and listened to hear Jones come back. I was just on the point of leading my party that way, when I caught the sound of some one panting, as it were up the ridge from the shore, and next moment saw, to my great surprise, it was the creature Jones had such a horror of--the dog that had run wild on the island, sniffing with his nose to the ground as if he were in chase of something; while the straw hats and tarpaulins of half-a-dozen fellows with ship's muskets and cutlasses followed him over the hill, not thirty paces above us. "I signed to Jacobs to keep quiet, as they halted together, looking at the dog; and, from what I could catch of their words, they had noticed it ever since sundown, sitting at the foot of the hill watching what went on, till the animal ran toward them as if they were friends, every now and then turning and making for the heights with a bark and a whimper, as it did at present. One of the men was Foster. 'I tell ye what it is,' said he, 'there's some fellow on the island already, mates. If we ketch him, why, we'll have it out of him--then down with it quietly to the shore, and go off in the long-boat, seeing as how this blasted fool of a skipper of ours has spoiled our pleasure!' The dog turned again, wagged his tail, and put his nose to the ground. I thought at first he'd bring them right upon us, when suddenly he broke off with a yelp exactly into the track Jones had taken with Mr Rollock on leaving us. The sailors kept away in his wake, down through the bushes into the thick dusk of the trees; upon which the planter and I started to our feet at once, and held cautiously after them, the five man-o'-war's-men following at our heels, Indian file. "Jones, however, had either heard the dog, or got an inkling of the thing, and he had taken a long round so as to join us from behind: the Indiaman's men keeping on for a quarter of an hour or so, when they brought up again, seemingly doubtful whether to follow the creature or not; and we dropped like one man into the shadow, till they made sail once more. Soon after, the planter pointed to the trees where the passengers were, and, on a sign from me, the whole of us edged down to the spot, till we were standing within sight of the half-finished fire, where the Judge's kitmagar was sitting asleep, tailor-fashion, with his flat turban sunk to his breast. One of the cadets stood down the <DW72> a little, betwixt that and the beach where the crew were, leaning sleepily on his gun, and nodding, while in the midst was a sort of shed, run up with branches and cocoa-nut leaves, where you could see a glimpse of the different ladies' dresses, young and old, asleep on the ground. "The starlight fell right down into the opening, and showed the glistening edges of the leaves, with the sea broad out beyond the cocoas at the foot of the rising ground; so bidding Jones look out sharp, I stepped carefully through. My eye lighted at once on Sir Charles Hyde lying in one nook of the shelter, wrapped up in his pilot-coat--the first time in the old gentleman's life for a good while, I daresay, that he had passed his night on the ground, especially with such a lot of berths taken up beside him. Still, he was sound enough at the time, to judge by his breathing, trifle as it was to the planter's; and close by him was his daughter, with her cloak drawn half over her head in the shadow--her hair confused about her cheek as it pressed white into the bundle of red bunting she had for a pillow, and one hand keeping the cloak fast at the neck, as if she dreamt of a stiff breeze. The sight went to my heart, and so did the notion of waking her; but I heard sounds below on the beach, as if the rest of the crew missed their shipmates, probably getting jealous after their booze, and not unlikely to seek them up the island, so the more it struck me there was no time to be lost in coming to an understanding. Accordingly, I stooped down quietly, and touched her on the shoulder. "Violet Hyde opened her eyes at once, and looked at me; but whether it was the starlight showing my uniform, or her fancying it was still the Indiaman in the Atlantic, in place of crying out, why, there was almost a smile on her lips as she saw me from the ground. Next moment, however, she drew her hand across her eyelids, sat up with the help of the other arm, and gazed on me in a bewildered way, naming me at the same time below her breath. 'Yes, Miss Hyde!' I said hastily; and a few words served to give her a notion of the case as well as to advise her to wake up the Judge, with the rest of the ladies, and be ready to move the moment we came back. My first thought was to take Foster's own plan, and secure the long-boat, if we could only get betwixt the Indiaman's crew and the water; or even try our own, or the opposite side of the island, and carry off the other boats to the wreck; after which we might keep off till the schooner appeared, as she couldn't be long of doing in this weather. "I had just stolen back to the men and Mr Rollock, when all at once there was a wild cry, not twenty yards off, among the brushwood. A heavy blow and a struggle, in the midst of which three shots, one after the other, were heard from the cadets; next minute, with oaths and curses to the mast-head, and a crash through amongst the branches in the dark, Foster and his shipmates came making for the opening. Something horrible flashed through my mind as I fancied I had caught Finch's voice, whether one way or the other I couldn't say, for I had no thought at the time excepting for Violet. Shriek upon shriek broke from the ladies ere I well knew I had big Harry himself by the hairy throat of him, as he was aiming a left-handed stroke of his cutlass at the Judge, who had sprung betwixt him and his daughter. The strength of that ruffian was wonderful, for he flung me off and levelled Sir Charles Hyde at the same moment, the Judge's body tripping me. "Jones and my own men, as well as the planter, were hard at work with the other five desperate villains, while the cadets and the second officer of the _Seringapatam_ rushed in from the trees--all of it passing in half-a-minute. As I started to my feet, Foster had lifted Violet Hyde in his arms, and was dashing through the darkest of the wood with her toward the hollow, when, just as I was hard upon him, doubly to my horror, above all the screams of the ladies I could hear the wild drunken shouts of the crew below coming up from the beach like so many devils. Foster had got as far as the next opening where the rubbish of the hut was, and, no doubt catching the sound as well as myself, all at once he dropped the young lady on the grass--in a faint as she was, and her white dress stained with blood, as I thought from _herself_. 'Now, ye----' shouted he, turning bolt round till her moveless figure lay betwixt us, with a flourish of his cutlass, which I fancied was bloody too, 'who are _you_? You'll have a dozen on ye directly, but what's meat for the skipper's meat for the passenger, so----' 'Devil!' said I, through my teeth, as I edged round; and Foster was in the very act of rushing at me, whether he trod on her or not, when my voice or dress seemed to strike him in the dusk. 'How the bloody comfort did _you_----' said he, shrinking back for a moment; 'so much the better,' and he sprang forward again right upon me, with a swinging boarder's blow at my head, which flashed off my blade with a force enough to have shivered it, had it not been a first-rate old cut-and-thrust I had tried pretty stiffly before. If I hadn't been in such a fury of rage and a hurry at once, 'twould have been Harry's last hit; but, at the third he made, I caught him fair under it, the point going through and through his body, as I thrust him back stride by stride--his cutlass waving fiercely all the time in the air clear of my head, for the stroke came under his arm. The moment he fell, though I knew nothing before that of where we were, there was a heavy plunge; I had nearly followed on top of him, as he went head-foremost down the tank-well under the trees; but next moment, without a thought more to him in the heat of the struggle, I was lifting Violet off the grass. What I did or what I said, to see if she would revive, I don't really know; but I remember as well as if it were last night the very sound of her voice as she told me she wasn't hurt. The affair in the wood below us had suddenly ceased during these five or ten minutes--indeed, as I found afterwards, Jones and my party had settled every one of the five, either altogether or for the time; but the uproar of more than twenty fierce voices could be heard beyond them, cursing and yelling as they came stumbling and crashing up amongst the brushwood in a body; while the ladies and their companions struggled up from all sides toward the height, wild with terror. I met Sir Charles Hyde hurrying to seek his daughter, however; and the moment he had her in his arms, I rushed down, pistol in hand, to join my men, who were standing firm below, as the mutineers burst into the opening, no doubt with the notion they had only the cadets to do with. "'Here, my lads!' I sang out; 'make every man of them prisoner--down with 'em to the schooner!' And as I broke suddenly through in the starlight in the midst of them, Jones, Jacobs, the planter, and the other four man-o'-war's-men sprang after me, one by one--taking the cue, and shouting as if to ever so many behind us, 'Here they are, shipmates--this way--settle the blackguards!' In fact, the moment I appeared, the gang of half-drunken fellows were taken aback. One of them roared as if he saw the very devil; and giving them no time to think, we drove them scattering down toward the beach. One of Foster's party, however, being only stunned, had contrived to get down amongst them; and in a little while, seeing we didn't follow, the whole lot of them appeared to get an inkling of the truth, on which they rallied. It wasn't long ere I saw they had got desperate, and were planning to divide, and come somewhere over upon us round the heights; so that, in the dark, with our small party, not knowing their numbers, the best we could do was to gather up toward the peak, and secure the ladies. Accordingly, we passed an uncomfortable enough time during the rest of the night, till daybreak, when still no signs of the schooner, as we saw in the clear to north-eastward. Frightful notions came into my head of something having happened to her; the mutineers below were on both sides of the island, and they held the watering-place. We hadn't provisions for a single breakfast to half the party of us--and the fellows being now fairly in for it, they could starve us out if they chose. You may conceive, accordingly, what a joyful sight met my eyes, when, on the dusk lifting off to northward, we could see the lovely craft under all sail not six miles off, bearing down before a fresh breeze for the deep end of the island! "The wind had headed her off on her way back; and, knowing nothing of the wreck, Westwood might have landed at the mercy of the villains in the bush. But the minute we saw his boat out, the whole of us, save the Judge and the planter, made a clean charge down upon them--the schooner's men joining us with the oars and boat-stretchers; and in half-an-hour the whole gang, having lost heart, were taken and lashed fast by the wrists on the beach, to a single man. "On searching the watering-place during the day, we found someone had covered the mouth of the tank with sticks and leaves, through which Harry Foster had gone when he fell. The stuff had fallen in over him; and the well being evidently made deep into the rock, to hold water the longer, with the roots of the trees growing out into it, his body never came up. Somehow or other, no one liked to sound it to the bottom; but the thing that horrified all of us the most was to find Captain Finch himself lying quite dead amongst the brushwood near where the passengers had pitched their quarters, with a cut through his skull enough to have killed an ox. It was supposed Foster had suddenly come upon him, as he and his shipmates looked out for the hoard they thought the pirates had in the island, while Finch was on guard over the ladies. Whether the fellow took a new notion at the moment, or what it was, the whole gang of them made their rush upon the second mate and the cadets, the minute after the captain met his death. "As for Jones, he told me he had noticed the dog watching the seamen below, and the idea got into his head of what might happen. There was that about the animal to give one a dread you couldn't describe. How it had lived all this time, and how the customs came back on it, after growing perfectly wild, of carrying on like what it did that night, was a mystery; but Jones said he hadn't heard it bark before, neither had the man he knew of, since the time he was first left _alone_ on White-water Island. In fact, the whole of us might have hunted it down before we left. But 'No!' Jones said; 'there's a perfect fiend in the brute, I do believe--yet it strikes me by this time, the creature belongs to--to the Almighty, sir!' The men and passengers had been taken off the Indiaman's wreck, which there was no chance of getting off the reef; so, taking out the best of her stores and the passengers' property, we had every soul aboard the schooner, and at last set sail to the south-east, meaning to go in at Madras, where a sloop might be sent to recover more from the ship. 'Twas with no ordinary state of things, from stem to stern, that we dropped White-water Island astern. CHAPTER XXXII "Well, ma'am, the rest you may easily fancy. We made Madras Roads, and there I expected to lose sight of the Judge and his daughter again, as we did of most of the other passengers; but to my perfect delight Sir Charles preferred carrying out the voyage on to Calcutta in the schooner, where they had the after-cabins to themselves. The Indiaman's crew I kept, prisoners and all, till we should meet the frigate off the Sunderbunds. "Just conceive standing up the hot Bay of Bengal with flagging south-westerly breezes, shifting at times to a brisk south-easter, or a squall, as we've done ourselves this week. The moon wasn't at the full then, of course, so we only had it like a reaper's sickle in the dog-watches; but it was fine weather, and you may imagine one sometimes contrived, betwixt Westwood and myself, to have Violet on the quarter-deck of an evening without the Judge. Tom would step forward suddenly to see a small pull taken on a sheet, and Snelling knew pretty well not to walk aft of the capstan; so I could lean over the taffrail near her, and look at the schooner's wake glimmering and sparkling up in the bubbles astern. "Then, to save trouble, you need but picture to yourselves some such sort of a daybreak as we had this morning; a cool blue cloudless sky all aloft, dappled to eastward with a mighty arch, as it were, of small white spots and flakes, as a perfect sea of light flows up into it before the sun under the horizon, and a pale slanting shaft of it seems to hang grey in the yellow above him.[30] [30] The zodiacal light, seen at sunrise and sunset. "The sea heaves deep-blue and deeper blue under the schooner; the wide flock of small clouds burn from gold to fire; the slanting streak of light fades and vanishes, and the sun comes up like a gush of flame--sending a stream of glittering radiance along the water to our starboard bow, while it shows a long flat line of land far on the other beam. The planter is smoking his first cheroot for the day at the stern gratings, when we make out three or four faint points over the streak of land shining like gold in the dawn; while at the same time three hazy pillars, as it were, are seen standing up betwixt sea and sky, beyond the rippling blue in the north-eastern board. 'Tis the spires of Juggernaut pagoda on one side; and as the brisk morning breeze drives the water into short surges, till the schooner rises the ship upon the other, all of a sudden she looms square and white upon our starboard bow. As the hull lifted higher and higher under her canvas, there was less doubt every few minutes of her being a frigate; and by the time Violet and her father were standing together on the quarter-deck, the glorious old _Hebe_ was signalling us from her fore-royal-mast-head, as she kept close on a wind to cross our course. "We spoke the pilot-brig that evening, took out the pilot, and stood up into the mouth of the Hooghly with the night-tide in the moonlight--dropping the _Hebe_ at Diamond Harbour next day; while Lord Frederick, and a Government gentleman he had with him from St Helena, went up to Calcutta with us in the schooner. The whole of the Indiaman's late crew and officers were left in the frigate till further notice, notwithstanding which we were pretty well crowded on our way up; Westwood and I were glad of a couple of hammocks in the half-deck; and, in fact, I saw little more of Violet Hyde till they went ashore opposite Fort William. "In half-an-hour we were lying at anchor in the midst of the crowd of Indiamen, country ships, Arab craft, and all sorts of craft besides, stretching far up to the next reach; the long front of flat-topped buildings, with their green venetians and balustrades, shining white over the row of trees on the right bank, like a string of palaces spreading back through the huge mass of the city to the pale, hot eastern sky--a tall cocoa-nut tree or a sharp spire breaking it here and there; while the pile of Government House was to be seen dotted with adjutant-birds; and the opposite shore showed far off in a line of green jungle, faced by a few gay-looking spots of bungalows. All the rest of the day Jones busied himself seeing all made regular and ship-shape below and aloft, till I began to think he had taken a fancy to the schooner, and meant to go with her and the frigate to the China seas. Next morning, however, as soon as breakfast was over in the cabin, he came to me and said that, as there was nothing more to be done at present aboard, according to our agreement he would bid us good-bye. Nothing I could say was of the least use, so at last I had to give it up. Having little money about me, however, except in bills, and intending to go ashore myself, I told him I should pay him his mate's wages at once at a banker's in the town. By the time I came on deck, Jones had hailed a dingey, and the native boatman paddled us to the ghaut below the Sailors' Home together. "I had shaken hands with him, and stood watching him from the bank verandah, as his manly figure, in the blue jacket, white duck trousers, and straw hat, passed away down Flag Street, stepping like a seaman fresh from blue water through a stream of Hindoos in white muslin, Mussulman servants, tall-capped Armenians, Danes, Frenchmen, Chinamen, Arabs, and Parsees. Three or four Coolies with painted umbrellas were shouting and scrambling in his way, mentioning their names, salaaming, and s'ahbing him to the nines; a couple of naked black boys were trying to brush his shoes in the dust; a tray of native sweetmeats seemed to be shoved every now and then under his nose; and two or three children with heads as big as pumpkins were stuck before him, their mothers begging for 'Buckshish! buckshish!' Jones held on like a man accustomed to every sort of foreign scenes in the world; and, out of curiosity to see where he would go, I followed him for a little towards the thick of the noise and crowd, through Tank Square, where the water-carriers were sprinkling the ground from the sheep-skins on their backs as they walked, serpent-charmers and jugglers exhibiting, and a dirty Fakir rolling at the corner in seeming agony, with a crowd of liberty-men in Sunday toggery all round him. "Jones looked up at the church steeping in the white heat, and across the glare of light to the city beyond, standing like a man that didn't know what to do, or hadn't seen Calcutta before; then passed carelessly by the half-slued sailors, who hailed him as if he were a ship. At length he got to the turn of a street running into the native town, where you caught a glimpse of it swarming this way and that with turbans in the close overhanging bazaars. Some Hindoo procession or other was coming along with tom-toms, gongs, tambourines, and punkahs, sweeping on through a babel of heathenish cries and songs; a knot of dancing-girls, with red flowers in their sleek black hair, could be seen in a hackery drawn by two hump-backed bullocks; and a white Brahmin bull was poking its head amongst the heaps of fruit at a stall; whilst you heard a whole ship's crew hurrahing and laughing amongst the confusion, as they drove along. Suddenly, I saw Jones hail a palanquin near him, and get in. The four mud- bearers took the pole of it on their shoulders, fore and aft--greasy-looking fellows, with ochre-marks on their noses and foreheads, a tuft of hair tied back on their heads like women, and as naked as they were born, save the cloth round their middle--and next moment away they trotted, grunting and swinging the palanquin, till I lost sight of them in the hubbub. 'Twas the last I saw of Jones." * * * * * Here the captain stopped; the _Gloucester's_ crew were getting the anchors off her forecastle to her bows for next day, when the light-ship off the Sandheads was expected to be seen; and, from his manner and his silence together, he evidently considered the yarn at an end. "That's all then?" carelessly asked the surgeon, who was a chess-player, and had heard only this part of the Captain's adventures, and the first two, so that he appeared to perceive a slight want of connection. "All?" was the unanimous voice of the lady passengers, most of whom had been faithful listeners--the younger ones were obviously disappointed at something. "Why, yes," said Captain Collins, with a look which might be interpreted either as modest or "close"--"the fact is, I fancied the affair might serve to while away a single evening or so, and here have I been yarning different nights all this time! 'Tis owing to my want of practice, no doubt, ma'am." "Come, come," said the matron of the party, "you must really give us some idea of a _denouement_. These girls of mine won't be satisfied without it, Captain Collins; they will think it no story at all, otherwise!" "An end to it, you mean?" answered he. "Why, ma'am, if there were an _end_ to it, it couldn't be a 'short' yarn at all--that would be to finish and 'whip' it, as we say, before it's long enough for the purpose: whereas, luckily, my life hasn't got to a close yet." "Oh!" said the lady, "no sea casuistry for _us_; besides, _I_ am aware of the sequel, you know!" "Why, ma'am," answered the Captain, looking up innocently, "it wasn't for two years and a half afterwards that I--I settled, you know! Do you mean me to tell you all that happened in that time, about the Frenchman, and what befell the schooner in the China seas? 'twould last the voyage home; but if you'll go _back_ with me, I've no particular objection, now I've got into the way." "No, no, my dear Captain," said the lady, "we have had enough for the present of your nautical details--I beg pardon--but tell us how you succeeded in----" "Well," interrupted the narrator, rather hastily, "'twas somewhat thus: I was at home at Croydon, being by that time first lieutenant of the _Hebe_; but she was just paid off. One morning, at breakfast, the letter-bag from the village was brought in as usual, my mother taking them out, reading off all the addresses through her spectacles, while Jane made the coffee. My mother handed Jane a ship-letter, which she put somewhere in her dress, with a blush, so that I knew in a moment it must be from Tom Westwood, who was in the Company's civil service in India, up-country. 'None for me, mother?' asked I eagerly; for the fact was, I had got one or two at different times, at Canton and the Cape of Good Hope, during the two years. 'Yes, Ned,' said my mother, eyeing it again and again, anxiously enough, as I thought; 'there is--but I fear it is some horrid thing from those Admirals'--the Admiralty, she meant--'and they will be sending you off immediately--or a war, or something. Oh dear me, Ned,' exclaimed the good woman, quite distressed, 'won't you do as I wish you, and stay altogether!' By the Lord Harry! when I opened it, 'twas a letter from Lord Frederick Bury, who had succeeded to his eldest brother's title while we were out, saying he had the promise of a commandership for me, as soon as a new brig for the West-India station was ready. 'I shan't have to go for six or seven months at any rate, mother,' said I, 'by which time I shall be confounded tired of the land, _I_ know!' She wanted me to buy a small estate near Croydon, shoot, fish, and dig, I suppose; while Jane said I ought to marry, especially as she had a girl with money in her eye for me. Still, they saw it was no use, and began to give it up. "Why I never heard at all from a certain quarter, I couldn't think. Till that time, in fact, I had been as sure of her proving true as I was of breezes blowing; but now I couldn't help fancying all sorts of tyranny on the Judge's part and her mother's, not to speak of Tom's uncle, the Councillor. I went down the lane for the twentieth time, past the end of the house they had lived in, where the windows had been shuttered up and the gates close ever since I came. All of a sudden, this time, I saw there were workmen about the place, the windows open, and two servants washing down the yellow wheels of a travelling-carriage. I made straight back for our house, went up to Jane, who was at her piano in the drawing-room, and asked, quite out of breath, _who_ was come to the house over the park behind us. 'Did you not know that old Nabob was coming back from India?' said Jane. 'His face was getting too yellow, I suppose; and, besides, his wife is dead--from his crossness, no doubt. But the young lady is an heiress, Ned, and as I meant to tell you, from good authority'--here the sly creature looked away into her music--'passionately fond of the sea, which means, you know, of naval officers.' 'The devil she is, Jane!' I broke out; 'what did Westwood mean by that?--but _when_ are they coming, for Heaven's sake?' 'Why,' said Jane, 'I believe, from what I heard our gardener say, they arrived last night.' 'Then, by Jove, my dear girl!' said I, 'I'll tell you a secret--and mind, I count on you!' "My little sister was all alive in a moment, ran to the door and shut it, then settled herself on the sofa to hear what I had to say, as eagerly as you please. So I told her what the whole matter was, with the state of things when we left Calcutta. Jane seemed to reckon the affair as clear as a die; and you've no notion what a lot of new ropes she put me up to in a concern of the kind, as well as ways to carry it out ship-shape to the end, in spite of the Judge--or else to smooth him over. "The long and short of it was, I didn't leave till about seven months after, when the _Ferret_ was put in commission; but by that time it was all smooth sailing before me. The Judge had got wonderfully softened; and you may be sure, I continued to see Violet Hyde pretty often before I went to sea. You'd scarce believe it, but, after that twelve months' cruise, I actually didn't leave the land for two years, which I did owing to the chance I had of seeing sharp service in the Burmese war, up the rivers, while General Campbell had tough work with them inland. So that's all I can say, ma'am!" * * * * * "Very good, sir!" was the surgeon's cool remark. "And, in fact, sir, I fancy if every one of us were to commence telling his whole life over, with everything that happened to him and his friends, he must stop short somewhere--however long it might be!" The Captain smiled; they sat on the poop talking for awhile, sometimes saying nothing, but watching the last night at sea. The pilot-brig is spoken to windward next morning, even while the deep-sea lead-line is being hove to sound the bottom. Falling sudden from the foreyard, the weight takes the long line from hand after hand back to the gangway, till it trembles against the ground. 'Tis drawn up slowly, the wet coil secured, and the bottom of the lead showing its little hollow filled with signs of earth--"Grey sand and shells!" They stand on till the pilot is on board, the low land lifts and lengthens before the ship; but the flow of the tide has yet to come, and take them safely up amongst the winding shoals into the Indian river's mouth. A new land, and the thoughts of strange new life, the gorgeous sights and fantastic realities of the mighty country of the Mogul and Rajahs, crowd before them after the wide solitary sea. The story is already all but forgotten.--AND THE ANCHOR IS LET GO! THE END. +BOOKS+ PUBLISHED BY ALEXANDER GARDNER, PAISLEY. Publisher & Bookseller by Special Appointment [Illustration] To Her late Majesty Queen Victoria. A LIST OF BOOKS PUBLISHED BY ALEX. GARDNER, PAISLEY. _Aitken._--Love in Its Tenderness. By J. R. Aitken. 3s. 6d. _Anderson._--Morison-Grant.--Life, Letters, and Last Poems of Lewis Morison-Grant. By Jessie Annie Anderson. 4s. 6d. _Anderson._--Verses at Random. By "Thistle" M. C. Anderson. 2s. 6d. nett. _Anton._--The Flywheel: and What Keeps Us Steady. By Rev. Peter Anton. 3s. 6d. nett. ----Staying Power: Reconsiderations and Recreations. By Rev. Peter Anton. 3s. 6d. nett. _A. O. M._--Two Brothers. By A. O. M. 2s. 6d. _Auld._--Lyrics of Labour and other Poems. By Thomas C. Auld. _Ayles._--Gillicolane. By Grueber Ayles. 4s. 6d. _Aytoun._--The Braes o' Balquhidder. By Douglas Aytoun. 6s. _Ballingal._--A Prince of Edom. By J. Ballingal, B.D. 2s. 6d. _Barclay._--A Renewal in the Church. By Rev. P. Barclay, M.A. 2s. 6d. nett. _Beatty._--The Secretar. By W. Beatty. 6s. ----The Shadow of the Purple. By W. Beatty. 2s. 6d. _"Belinda's Husband."_--Plain Papers on Subjects Light and Grave. By "Belinda's Husband." 2s. 6d. nett. _Beveridge._--Sma' Folk and Bairn Days. Translated from the Norse by the Rev. John Beveridge, M.A., B.D. 4s. 6d. _Bilton._--The Four Gospels. By Ernest Bilton. 2s. 6d. _Blair._--The Paisley Thread Industry and the Men who Created and Developed It. By Matthew Blair. 6s. nett. ----The Paisley Shawl and the Men who Produced It. By Matthew Blair. 7s. 6d. nett. _Bogatsky._--A Golden Treasury for the Children of God. By Rev. C. H. V. Bogatsky. Cloth, 2s. Cloth gilt, 2s. 6d. _Boston._--A Soliloquy On the Art of Man-Fishing. By Mr. Thomas Boston, A.M. 1s. 6d. nett. _Brown._--To Those About to Marry: Dont! Without a Practical Guide. By M. Harriette Brown. 1s. nett. _Brownlie._--Hymns of the Holy Eastern Church. Translated by Rev. John Brownlie. 3s. 6d. nett. ----Hymns from the Greek Office Books: Together with Centos and Suggestions. Translated by Rev. John Brownlie. 3s. 6d. nett. ----Hymns from the East. Translated by Rev. John Brownlie. 3s. 6d. nett. _Buchan._--The Ballad Minstrelsy of Scotland. By Patrick Buchan. 5s. The Songs of Scotland. Chronologically Arranged. 5s. Uniform with above. _Bute._--Coronations--Chiefly Scottish. By the Marquess of Bute, K.T. 7s. 6d. nett. ----Essays on Foreign Subjects. By the Marquess of Bute, K.T. 10s. 6d. ----Seven Essays on Christian Greece. Translated by the Marquess of Bute, K.T. 7s. 6d. _Caird._--Sermons. By the late Rev. J. Renny Caird, M.A. With Memoir, by Rev. Robert Munro, B.D. 3s. 6d. nett. _Campbell._--Notes on the Ecclesiastical Antiquities of Eastwood Parish. By the late Rev. George Campbell. 12s. 6d. and 25s. nett. _Campbell._--Popular Tales of the West Highlands. By the late J. F. Campbell, Islay. Four vols. 7s. 6d. each. _Campbell._--The Elder's Prayer-Book. By Rev. Wm. Campbell, B.D. 1s. _Carslaw._--Heroes of the Scottish Covenant. By Rev. W. H. Carslaw, D.D. Vol. I.--James Guthrie, of Fenwick. II.--Donald Cargill, of the Barony, Glasgow. III.--James Renwick, the last of the Martyrs. 1s. 6d. nett each. The three vols, in one, 3s. 6d. nett. ----Six Martyrs of the First and Second Reformations. By Rev. W. H. Carslaw, D.D. 2s. nett. ----Exiles of the Covenant. By Rev. W. H. Carslaw, D.D. 2s. nett. _Chalmers._--Chalmers' Caledonia. 25s. and 40s. per vol. Vol. VIII.--the Index--sold separately, 15s. and 25s. nett. _Cheviot._--Proverbs, Proverbial Expressions, and Popular Rhymes of Scotland. By Andrew Cheviot. 6s. nett. "_Claverhouse._"--Gretna Green and Its Traditions. By "Claverhouse." 1s. nett _Colvin._--Bell Roger's Loon, and other Stories. By Margaret Colvin. 1s. 6d. _Cook._--In a Far Country. By Rev. Thomas Cook, M.A. 3s. _Craib._--America and the Americans. By Rev. A. Craib. 3s. 6d. _Craigie._--Scandinavian Folk Lore. By W. A. Craigie, M.A., F.S.A. 7s. 6d. _Crawley-Boevey._--Beyond Cloudland. By S. M. Crawley-Boevey. 5s. _Darling._--Songs from Silence. By Isabella F. Darling. 2s. 6d. nett. _Downie._--The Early Home of Richard Cameron. By J. Downie, M.A. 1s. nett. _Drummond._--Life of Robert Nicoll. By the late P. R. Drummond, Perth. 5s. _Edgar._--Old Church Life in Scotland. By Andrew Edgar, D.D. 7s. 6d. ----The Bibles of England. By Andrew Edgar, D.D. 7s. 6d. _Eyre-Todd._--The Glasgow Poets. Edited by George Eyre-Todd. 7s. 6d. nett. _Fergusson._--Alexander Hume. By R. Menzies Fergusson, M.A. 5s. nett. ----A Student of Nature. By R. Menzies Fergusson, M.A. 4s. nett. ----A Village Poet. By R. Menzies Fergusson, M.A. 3s. 6d. nett. ----Rambles in the Far North. By R. Menzies Fergusson, M.A. 3s. and 2s. _Fergusson._--Logie: A Parish Histery. By R. Mensies Fergusson, M.A. 2 vols. 15s. nett. each vol. ----The Viking's Bride, and other Poems. By R. Mensies Fergusson, M.A. 3s. _Ferguson._--The King's Friend. By Dugald Ferguson. 3s. 6d. _Ferguson._--The Poems of Robert Ferguson. Edited by Robt. Ford. 5s. nett. _Fife._--And I Knew It Not. By David Fife. 3s. 6d. nett. _Findlay._--Medici Carmina. By William Findlay, M.D. 3s. 6d. nett. ----Ayrshire Idylls of Other Days. By "George Umber." 5s. ----In My City Garden. By "George Umber." 6s. ----Robert Burns and the Medical Profession. By William Findlay, M.D. ("George Umber.") 6s. nett. _Fittis._--Curious Episodes in Scottish History. By R. Scott Fittis. 6s. ----Heroines of Scotland. By R. Scott Fittis. 6s. ----Romantic Narratives from Scottish History and Tradition. By R. Scott Fittis. 6s. _Fleming._--Ancient Castles and Mansions of Stirling Nobility. By J. S. Fleming, F.S.A. 21s. nett. _Ford._--American Humourists. Selected and edited by Robert Ford. 3s. 6d. ----Auld Scots Ballants. 6s. ----Ballads of Bairnhood. Selected and edited by Robert Ford. 5s. ----Ballads of Babyland. Selected and edited by Robert Ford. 5s. ----Children's Rhymes, Games, Songs, and Stories. By R. Ford. 3s. 6d. nett. ----Ford's Own Humorous Scotch Stories. 1st and 2nd Series, 1s. each nett. Both Series in 1 vol., 2s. 6d. nett. ----Poems and Songs of Alexander Rodger. Edited by Robert Ford. 3s. 6d. nett. ----Tayside Songs and other Verses. By Robert Ford. 3s. 6d. nett. ----The Harp of Perthshire. Edited by Robert Ford. 15s. and 7s. 6d. ----Thistledown. By Robert Ford. 3s. 6d. and 1s. nett. ----Vagabond Songs and Ballads of Scotland. Edited by R. Ford. 5s. nett. ----Miller's "Willie Winkie," and other Songs and Poems. Edited by Robert Ford. 3s. 6d. nett. ----The Heroines of Burns. By Robert Ford. 3s. 6d. nett. ----Popular American Readings. Popular English Readings. Popular Irish Readings. Popular Scotch Readings. Edited by Robert Ford. 1s. each. Also in one vol., 4s. Gardner's Verse for Schools. Parts I. and II. 6d. nett each part. _Gentles._--A. Plea for the Restoration of Paisley Abbey. By Rev. T. Gentles, D.D. 1s. _Gough._--Scotland in 1298. Edited by Henry Gough. 21s. ----The Itinerary of King Edward the First, as far as relates to his Expeditions against Scotland, 1286-1307. By Henry Gough. 2 vols. 30s. nett. _Granger._--The Average Man, and other Sermons. By the late Rev. William Granger, M.A., Ayr. 3s. 6d. nett. _Greethead._--Our Future. Edited by Miss Greethead. 1s. 6d. _Grey._--The Misanthrope's Heir. By Cyril Grey. 2s. nett. _Grey._--The Manse Rose. By Cyril Grey. 3s. 6d. _Grosart._--The Verse and Miscellaneous Prose of Alexander Wilson, the Ornithologist of America. Edited by Rev. A. B. Grosart, LL.D. 12s. 6d. _Hall._--The Art of Being Happy. The Art of Being Healthy. The Art of Being Successful. By Rev. Charles A. Hall. 1s. nett each. In one vol., 3s. nett. _Hall._--Edith Watson. By Sydney Hall. 3s. 6d. _Harvey._--Scottish Chapbook Literature. By William Harvey. 3s. 6d. nett. _Hatherly._--A. Treatise on Byzantine Music By Rev. S. G. Hatherly, Mus. Bac. (Oxon.). 6s. and 4s. "God Save the Queen." Supplementary to Dr. Hatherly's Treatise. 2s. _Henderson._--Anecdotes and Recollections of A. K. H. B. By Rev. D. R. Henderson, M.A. 6d. nett. _Henderson._--Lady Nairne and Her Songs. By Rev. George Henderson, M.A., B.D., Monzie, Crieff. 2s. 6d. nett and 2s. nett. _Hewat._--Half-Hours at the Manse. By the Rev. Kirkwood Hewat, M.A., F.S.A. (Scot.), Prestwick. 3s. 6d. ----In the Olden Times. By Rev. Kirkwood Hewat, M.A., etc. 4s. nett. Hill-A-Hoy-O. By a "Country Cousin." 2s. 6d. ----Memoir of James Hogg, the Ettrick Shepherd. By his daughter. 5s. _Holmes._--The Teaching of Modern Languages in Schools and Colleges. By D. T. Holmes, B.A. 2s. nett. _Hume._--The Practice of Sanctification. By Alexander Hume, B.A. 1s. nett. _Hutcheson._--Maisie Warden. By J. D. Hutcheson. 5s. Isobel Burns (Mrs. Begg). By her Grandson. 2s. 6d. _James._--Poems and Fragments. By Charles James. 3s. 6d. _Jamieson._--Jamieson's Scottish Dictionary. Edited by David Donaldson, F.E.I.S. 5 vols., L8 17s. 6d.; Large Paper, L14. ----New Supplementary Volume (being Vol. V. of above). Edited by David Donaldson, F.E.I.S. 27s. 6d. and 42s. _Johnson._--A Journey to the Western Islands of Scotland in 1773. By Samuel Johnson, LL.D. New Edition. 2s. 6d. nett. _Kennedy._--David Kennedy, the Scottish Singer: Reminiscences of his Life and Work. By Marjory Kennedy. And Singing Round the World: a Narrative of his Colonial Tours. By David Kennedy, Jun. 7s. 6d. _Kennedy._--Reminiscences of Walt Whitman. By William Sloane Kennedy, Camden, N.J. 6s. _Ker._--Mother Lodge, Kilwinning, "The Ancient Lodge of Scotland." By Rev. W. Lee Ker, Kilwinning. 4s. 6d. _Kilgour._--Twenty Years on Ben Nevis. By Wm. T. Kilgour. 2/6 & 1/6 nett. ----Lochaber in War and Peace. By Wm. T. Kilgour. 5s. nett _Laing._--The Buke of the Howlat. By Dr. Laing. 12s. 6d. _Latto._--Hew Ainslie: a Pilgrimage to the Land of Burns. Edited by Thomas C. Latto. 6s. _Latto._--Memorials of Auld Lang Syne. By Thomas C. Latto. 4s. 6d. and 2s. 6d. _Law._--Dreams o' Hame, and other Scotch Poems. By James D. Law. 6s. _Lumsden._--Thoughts for Book Lovers. By Harry S. Lumsden. 2s. _Macbremen._--Breezes from John o' Groats. By MacBremen. 3s. 6d. ----The Death of Lady Wallace: a Poem. By MacBremen. 1s. _Mac Cormick._--Oiteagan 'o n Iar (Breezes from the West). By J. Mac Cormick. Edited by M. Mac Farlane. 2s. 6d. _M'Cormick._--Three Lectures on English Literature. By W. S. M'Cormick, M.A. 3s. 6d. nett. _Macdonald._--The Husband to Get and to Be. Edited by G. G. Macdonald. 1s. nett. ----The Wife to Get. 2s. 6d. nett. _McClelland._--The Church and Parish of Inchinnan. By the Rev. Robert McClelland, minister of the Parish. 3s. 6d. nett. _M'Ewen._--Life Assurance. What to Select. By Robert M'Ewen, Cambus. 3d. _Macfarlane._--The Harp of the Scottish Covenant. Poems, Songs, and Ballads collected by John Macfarlane. 6s. _Macintosh._--Irvindale Chimes. By John Macintosh. 4s. nett. ----A Popular Life of Robert Burns. By John Macintosh. 2s. 6d. nett. _Mackay._--Where the Heather Grows. By George A. Mackay. 2s. 6d. _Mackean._--The King's Quhair. Done into English by Wm. Mackean. 3s. 6d. _M'Gown._--Ten Bunyan Talks. By G. W. T. M'Gown. 2s. nett. ----A Primer of Burns. By G. W. T. M'Gown. 1s. nett. _M'Kean._--The Young Naturalists. A Book for Boys and Girls. By Minnie M'Kean. 1st and 2nd Series. 1s. each. _M'Kellar._--Greece: Her Hopes and Troubles. By Campbell M'Kellar. 1s. _M'Kerlie._--History of the Lands and their Owners in Galloway. By the late P. H. M'Kerlie, F.S.A. Scot., F.R.G.S., etc. 2 vols. 25s. nett. _MacKenzie._--History of Kilbarchan Parish. By Robert D. MacKenzie, minister of the Parish. 21s. nett. Large Paper, 35s. nett. _MacKenzie._--History of the Outer Hebrides. By William C. MacKenzie. 12s. 6d. nett. Large Paper, 21s. ----The Lady of Hirta. By Wm. C. MacKenzie, F.S.A. Scot. 6s. ----A Short History of the Scottish Highlands and Isles. By Wm. C. MacKenzie. New Edition. 5s. nett. _Macleod._--Wallace: a Poem. By Neil Macleod. 1s., post free. _McMillan._--Mainly About Robert Bruce. By Alec McMillan, M.A. 1s. nett. _Mackintosh._--The History of Civilisation in Scotland. By John Mackintosh, LL.D. 4 vols. L4 4s. Calf Extra, L5 5s. Large Paper, L6 6s. _MacNicol._--Dare MacDonald. By E. R. MacNicol 5s. _Macpherson._--History of the Church in Scotland. By Rev. John Macpherson, M.A. 7s. 6d. _Macrae._--A Feast of Fun. By Rev. David Macrae. 3s. 6d. ----Book of Blunders. By Rev. David Macrae. 1s. ----National Humour. By Rev. David Macrae. 3s. 6d. ----The Railway Chase, and other Sketches. By Rev. David Macrae. 1s. ----Popping the Question, and other Sketches. By Rev. David Macrae. 1s. The above two volumes in one, 2s. _Mather._--Poems. By James Mather. 4s. ----Poems. Second Series. By James Mather. 5s. nett. _Maughan._--Rosneath: Past and Present. By W. C. Maughan. 5s. ----The Garelochside. By W. C. Maughan. 7s. 6d. ----Picturesque Musselburgh and Its Golf Links. By W. C. Maughan. Cloth, 1s. 6d. Paper covers, 1s. nett. _Menzies._--National Religion. By Rev. Allan Menzies, D.D., St. Andrews. 5s. _Menzies._--Provincial Sketches and other Verses. By G. K. Menzies. 2s. 6d. nett. _Menzies._--Illustrated Guide to the Vale of Yarrow. By James M. Menzies. 1s. 6d. nett. _Metcalfe._--SS. Ninian and Machor--the Legends of, in the Scottish Dialect of the Fourteenth Century. By W. M. Metcalfe, D.D. 10s. 6d. nett. On Whatman Paper, 15s. nett. ----A History of the Shire of Renfrew from the Earliest Times down to the Close of the Nineteenth Century. By W. M. Metcalfe, D.D. F.S.A. 25s. nett. On Whatman Paper, 40s. ----History of Paisley. By W. M. Metcalfe, D.D. Illustrated. ----Charters and Documents relating to the Burgh of Paisley. By W. M. Metcalfe, D.D. 21s. nett. ----Ancient Lives of the Scottish Saints. Translated by W. M. Metcalfe, D.D. 15s. On Whatman Paper, 25s. ----Pinkerton's Lives of the Scottish Saints. Revised and enlarged by W. M. Metcalfe, D.D. 2 vols. 15s. per vol. ----The Natural Truth of Christianity. Edited by W. M. Metcalfe, D.D. 5s. ----The Reasonableness of Christianity. By W. M. Metcalfe, D.D. 5s. _Metcalfe._--The Great Palace of Constantinople. Translated from the Greek of Dr. A. G. Paspates, by William Metcalfe, B.D. 10s. 6d. _Miller._--Selections from the Works of Hugh Miller. Edited by W. M. Mackenzie, M.A., F.S.A. (Scot.). 3s. 6d. _Mitchell._--A Popular History of the Highlands and Gaelic Scotland. By Dugald Mitchell, M.D., J.P. 12s. 6d. nett. _Mitchell._--Jephtha: a Drama. Translated by A. G. Mitchell. 3s. 6d. nett. ----John the Baptist: a Drama. Translated by A. G. Mitchell. 3s. 6d. nett. _Morison-Grant._--Protomantis, and other Poems. By L. Morison-Grant. 6s. _Motherwell._--Poems and Songs. By William Motherwell. 6s. _Mowat._--Search Light. By G. H. Mowat. 2s. 6d. nett. _Munro._--Burns' Highland Mary. By Archibald Munro. 3s. _Munro._--Schleiermacher. By Robt. Munro, B.D., Old Kilpatrick. 4s. 6d. nett. _Murray._--A Handbook of Psychology. By J. Clark Murray, LL.D., F.R.S.C., M'Gill College, Montreal. 7s. 6d. ----An Introduction to Ethics. By J. Clark Murray, LL.D., etc. 6s. 6d. ----A Sketch of the Life and Times of the late David Murray, Esq., Provost of Paisley. By his son, J. Clark Murray, LL.D., etc 4s. ----Solomon Maimon. Translated by J. Clark Murray, LL.D., etc. 6s. _Murray._--Kilmacolm: a Parish History. By Rev. Jas. Murray, M.A. 6s. nett. ----Life in Scotland a Hundred Years Ago. By Rev. James Murray, M.A. Second and Enlarged Edition. 3s. 6d. nett. _Murray._--The Black Book of Paisley and other Manuscripts of the Scotichronicon. By David Murray, LL.D., F.S.A., Scot. 12s. 6d. _Mursell._--The Waggon and the Star. By Walter A. Mursell 2s. 6d. nett. _Naismith._--The Young Draper's Guide to Success. By W. Naismith. 1/6 nett. _Nicoll._--Warp and Woof: Heaps of Homespun Yarns. By David M. Nicoll. 1s. Cloth, 1s. 6d. _Nicolson._--Tales of Thule. By John Nicolson. 2s. _Ochiltree._--Redburn. By Henry Ochiltree. 5s. On Heather Hills. 2 vols. 21s. _Paton._--Honouring God. By Rev. James A. Paton, M.A. 4s. 6d. ----Balmanno: a Study in Social Regeneration. By Rev. James A. Paton, D.D. 1s. 6d. Paper Covers, 1s. _Patterson._--The "Cyclops" of Euripides. Edited by John Patterson, B.A. (Harvard), Louisville, Kentucky, U.S.A. 4s. 6d. _Perin._--Divine Breathings. By Christopher Perin. 1s. _Phelps._--The Still Hour. By Rev. Austen Phelps. 6d. _Phillips._--Cora Linn. By J. G. Phillips. 3s. 6d., post free. ----James Macpherson, the Highland Freebooter. By J. G. Phillips. 3s. 6d. _Philp._--The River and the City. By Rev. George Philp, Glasgow. 6d. _Rae-Brown._--The Shadow on the Manse. By Campbell Rae-Brown. 3s. 6d. _Reid._--A Cameronian Apostle. By Professor Reid, D.D. 6s. _Reid._--Poems, Songs, and Sonnets. By Robert Reid (Rob Wanlock). 5s. _Reid._--Problems of this Life--Social and Sacred. By W. Reid. 2s. 6d. nett. Renfrewshire. Archaeological and Historical Survey of the County, under the direction of several eminent antiquaries. Lochwinnooh. With numerous Plates. 2 vols. 25s. per vol., Large Paper, 37s. 6d. Renfrewshire--Geographical and Historical 3d. _Renwick._--Poems and Sonnets. By James Renwick. 2s. 6d. _Rigg._--Nature Lyrics. By James Rigg. 2s. 6d. nett. _Roberts._--A Short Proof that Greek was the Language of Christ. By the late Professor Roberts, D.D., St. Andrews. 2s. 6d. _Robertson._--Jockie, and other Songs and Ballads. By A. S. Robertson. 1s. 6d. _Robertson._--Practical First Aid. By Wm. Robertson, M.D., D.P.H. 1s. 6d. nett. ----The Stone of Dunalter. By Wm. Robertson, M.D., D.P.H. 3s. 6d. _Robertson._--The Lords of Cuningham. By Wm. Robertson. 5s. _Ross._--Highland Mary. Edited by John D. Ross. 2s. 6d. ----Random Sketches on Scottish Subjects. By John D. Ross. 2s. 6d. ----Round Burns' Grave. The Paeans and Dirges of Many Bards. Gathered together by John D. Ross. 3s. 6d. _Ross._--In the Highlands, and other Poems. By G. R. T. Ross. 3s. 6d. nett. _Ross._--Kingcraft in Scotland. By Peter Ross, LL.D. 6s. _Roy._--Lilias Carment; or, For Better for Worse. By Gordon Roy. 6s. _Russell._--Three Years in Shetland. By Rev. John Russell, M.A. 3s. 6d. Scotland Eighty Years Ago. Thirty-two Fine Copperplate Etchings of the Chief Towns and their Surroundings. L5 5s. to subscribers only. _Scott._-Lectures for Club and Cloister. By A. Boyd Scott 3s. 6d. nett. _Seath._--Rhymes And Lyrics. By Wm. Seath. 3s. 6d. nett. Silver Aims and Golden Anchors. A Text-Book. 1s. nett. _Simpson._--Familiar Scottish Birds. By A. Nicol Simpson, F.Z.S. 2s. ----Familiar Scottish Animals. By A. Nicol Simpson, F.Z.S. 2s. ----Bobbie Guthrie: a Scotch Laddie. By A. N. Simpson, F.Z.S. 2s. 6d. nett. _Skinner._--That Loon o' Baxter's. By Rev. J. Skinner. 2s. _Smith._--Scottish Athletic Sports. By W. M'Combie Smith. 1s. 6d. _Smith._--The Dalbroom Folks. By Rev. J. Smith, M.A., B.D. 2 vols. 6s. _Smith._--The New Testament in Braid Scots. Rendered by Rev. Wm. Wye Smith. New Edition. 6s. nett. _Snodgrass._--Wit, Wisdom, and Pathos, from the Prose of Heinrich Heine. Selected and translated by J. Snodgrass. 6s. _Stephen._--Divine and Human Influence. By Rev. R. Stephen, M.A. 5s. nett. _Stewart._--The Church of Scotland. By Richard Morris Stewart. 7s. 6d. _Story._--Health Haunts of the Riviera and South-West of France. By Very Rev. Principal Story, D.D. 3s. ----St. Modan of Rosneath. By the Very Rev. Principal Story, D.D. 2s. _Sturrock._--Our Present Hope and Our Future Home. By Rev. J. B. Sturrock. 2s. 6d. nett. _Sutherland._--The Selected Works of Robert Burns. Edited by Rhona Sutherland. Crown 4to. 430 pp. With Illustrations. Price 5s. nett. Or in various Bindings--Prices on application. _Symington._--Hints to Our Boys. By A. J. Symington. 1s. 6d. _Tannahill._--Poems and Songs of Robert Tannahill. Edited by the late David Semple, F.S.A. New Edition. 3s. 6d. nett. _Taylor._--The Autobiography of Peter Taylor. 3s. 6d. _Taylor._--Twelve Favourite Hymns: their Messages and their Writers. By Rev. Wm. Taylor, M.A. 2s. nett. The Knight of Snowdon; or, The Saxon and the Gael. 2s. 6d. The Leading Aisles: Volume One. 2s. 6d. _Tweeddale._--Dunty the Droll. By John Tweeddale. 1s. _Urie._--Reminiscences of 80 Years. By John Urie. _Veitch._--The Dean's Daughter. By Sophie F. F. Veitch. 3s. 6d. _Warrick._--The History of Old Cumnock. By Rev. John Warrick, M.A., Free Church, Old Cumnock. 7s. 6d. nett. _Watt._--Selected Metrical Psalms and Paraphrases. Selected and edited by R. MacLean Watt, M.A., B.D. 1s. nett. _Whyte._--Naigheachdan Firinneach (True Stories). Vols. I. and II. Translated into Gaelic by Henry Whyte ("Fionn"). 3s. 6d. per Vol., nett. _Mac-Choinnich._--Eachdraidh a' Phrionnsa; no, Bliadhna Thearlaich (The Jacobite Rising of 1745). Le Iain Mac-Choinnich. New Edition. 5s. nett. _Williamson._--Cartsburn and Cartsdyke. By G. Williamson. 25s. and 42s. ----Old Greenock. Second Series. Uniform with above. _Wright._--Laird Nicoll's Kitchen, and other Sketches of Scottish Life and Manners. By Joseph Wright 2s. 6d. nett. _Young._--Scotch Cameos. By John Young. New Edition, 1s. and 1s. 6d. MANUALS FOR THE HOUSEHOLD. Cookery for Working Men's Wives. By Martha H. Gordon. 1d.; post free, 2d. Large Type Edition, 3d.; post free, 4d. Indigestion. By Florence Stacpoole. 2d.; post free, 2-1/2d. Our Babies, and How to Take Care of Them. By Florence Stacpoole. 3d.; post free, 4d. The Home Doctor. By Florence Stacpoole. 3d.; post free, 4-1/2d. THE "JENNY WREN" SERIES. 6d. each. Post free, 8d. A Treatise on the Cooking of Big Joints. Dainty Dishes for Dinners, Luncheons, and Suppers. Dishes of Fishes: How to Prepare Them. Sauces, Seasonings, and Salads. The Art of Preparing Puddings, Tarts, Jellies, etc. The Art of Preparing Soups, Stews, Hashes, and Ragouts. The Complete Art of Dinner-Giving. [Illustration] End of the Project Gutenberg EBook of The Green Hand, by George Cupples ***
{ "redpajama_set_name": "RedPajamaBook" }
5,816
Funded by the Office of Low Emission Vehicles, Hammersmith Grove was a ground breaking project that acted as a response to the single minded goal of making the surrounding area the greenest borough in the country. The scheme explored the possibility of 'light touch' streetscapes being introduced to transform the character and use of the town centre's urban space. To this end, parklets were introduced at frequent intervals to a relatively small area, which maximized the sense of an overnight transformation in such a substantial central location. In addition, the project also included new EV charging points and kerb alignment changes which help endorse a sustainable and safe environment. We provided a wide range of services including but not limited to: project management, public realm design, transport design and highways engineering. These were crucial for the successful delivery of this complex and aspirational scheme. • Limit access to the section of Hammersmith Grove to zero emission capable vehicles only. • Provide suitable infrastructure that supports a range of electric vehicles including private, car share, taxis and buses. • Address the serious use of air quality and pollutant levels by creating a more sustainable and cleaner Hammersmith. • Set the president for enforcing access based on emissions, improving localized emissions and designing a street that can act as a template UK wide. • Create a new public space by extending Lyric Square northwards. The concluding idea, to successfully achieve all these aspects, was the instillation you see today. Inspired by the concept of origami, we proposed an area complete with planting areas, spaces to relax and aesthetically pleasing designs. As such, it provides better facilities for cyclists, and makes it more pleasant to be out on foot in the town centers. Through this the parklets are helping to improve air quality. It also supports part of a borough-wide plan to support and encourage biodiversity as increased flora can help with air quality. It was interesting to consider all the moving parts of this project. It was essential that we build a comprehensive understanding of Hammersmith and its grove area so that this ambitious project was well informed and placed with care. As such, we honed our critical thinking skills to astutely comprehend all facets of the project and deliver it to our best ability. Since it's completion, beyond the positive feedback from Hammersmith residents, we have observed a marked increase in utilization of the area by pedestrians and cyclists alike. It is now a vibrant area that is consistently filled with citizens enjoying themselves, alone or with company, in this wonderful addition to the soon to be greenest borough.
{ "redpajama_set_name": "RedPajamaC4" }
50
(4076) Dörffel es un asteroide perteneciente al cinturón de asteroides, descubierto el 19 de octubre de 1982 por Freimut Börngen desde el Observatorio Karl Schwarzschild, en Tautenburg, Alemania. Designación y nombre Designado provisionalmente como 1982 UF4. Fue nombrado Dörffel en honor al astrónomo alemán Georg Samuel Dörffel. Véase también Lista de asteroides del (4001) al (4100) Cuerpo menor del sistema solar Referencias Asteroides del cinturón principal Objetos astronómicos descubiertos por Freimut Börngen Objetos astronómicos descubiertos desde el Observatorio Karl Schwarzschild Objetos astronómicos descubiertos en 1982 Wikiproyecto:Asteroides/Artículos de asteroides
{ "redpajama_set_name": "RedPajamaWikipedia" }
5,884
The insurance company: Insurance companies must follow state laws but may also set standards of their own. State laws: A car must have a specific percentage of damage before it is considered a total loss. The car's condition: If a car cannot be repaired safely, adjustors may also consider it a total loss. If your car is considered a total loss, your car insurance company will ask for the car's title, license plate, keys and lienholder's contact information, if there is one. Once the car is collected, the insurance company will work on determining the actual cash value of the car. The actual cash value of a vehicle is the current value after depreciation. Policyholders may receive a full settlement or a partial payment. In a full settlement, the owner hands over the car to the insurance company. In a partial settlement, owners have the option to salvage the car, sell the totaled car, donate the car to a charity or use it as a tax write-off. If an owner chooses to salvage the car, they must obtain a salvage title to register and operate the car. Not all insurance companies will provide insurance coverage for salvaged cars. Do you need more information on total losses? Our agents and customer service representatives are here to help. Call us today at 1-888-949-6289 or visit your nearest Insurance Navy location. For your convenience, Insurance Navy is open from 8 a.m. to 9 p.m. CST, 7 days a week. *Please review your own policy carefully for details on total losses. Total losses vary by insurance company.
{ "redpajama_set_name": "RedPajamaC4" }
8,596
# Moving Hadoop to the Cloud Harnessing Cloud Features and Flexibility for Hadoop Clusters Bill Havanki # Moving Hadoop to the Cloud by Bill Havanki Copyright © 2017 Bill Havanki Jr. All rights reserved. Printed in the United States of America. Published by O'Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O'Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (<http://oreilly.com/safari>). For more information, contact our corporate/institutional sales department: 800-998-9938 or _corporate@oreilly.com_. Editor: Marie Beaugureau | Production Editor: Colleen Cole ---|--- Copyeditor: Kim Cofer | Proofreader: Christina Edwards Indexer: WordCo Indexing Services, Inc. | Interior Designer: David Futato Cover Designer: Karen Montgomery | Illustrator: Rebecca Demarest * July 2017: First Edition # Revision History for the First Edition * 2017-07-05: First Release See <http://oreilly.com/catalog/errata.csp?isbn=9781491959633> for release details. The O'Reilly logo is a registered trademark of O'Reilly Media, Inc. _Moving Hadoop to the Cloud_ , the cover image, and related trade dress are trademarks of O'Reilly Media, Inc. While the publisher and the author have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the author disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk. If any code samples or other technology this work contains or describes is subject to open source licenses or the intellectual property rights of others, it is your responsibility to ensure that your use thereof complies with such licenses and/or rights. 978-1-491-95963-3 [LSI] # Foreword Apache Hadoop as software is a simple framework that allows for distributed processing of data across many machines. As a technology, Hadoop and the surrounding ecosystem have changed the way we think about data processing at scale. No longer does our data need to fit in the memory of a single machine, nor are we limited by the I/O of a single machine's disks. These are powerful tenets. So too has cloud computing changed our way of thinking. While the notion of colocating machines in a faraway data center isn't new, allowing users to provision machines on-demand is, and it's changed everything. No longer are developers or architects limited by the processing power installed in on-premise data centers, nor do we need to host small web farms under our desks or in that old storage closet. The pay-as-you-go model has been a boon for ad hoc testing and proof-of-concept efforts, eliminating time spent in purchasing, installation, and setup. Both Hadoop and cloud computing represent major paradigm shifts, not just in enterprise computing, but affecting many other industries. Much has been written about how these technologies have been used to make advances in retail, public sector, manufacturing, energy, and healthcare, just to name a few. Entire businesses have sprung up as a result, dedicated to the care, feeding, integration, and optimization of these new systems. It was inevitable that Hadoop workloads would be run on cloud computing providers' infrastructure. The cloud offers incredible flexibility to users, often complementing on-premise solutions, enabling them to use Hadoop in ways simply not possible previously. Ever the conscientious software engineer, author Bill Havanki has a strong penchant for documenting. He's able to break down complex concepts and explain them in simple terms, without making you feel foolish. Bill writes the kind of documentation that you actually enjoy, the kind you find yourself reading long after you've discovered the solution to your original problem. Hadoop and cloud computing are powerful and valuable tools, but aren't simple technologies by any means. This stuff is hard. Both have a multitude of configuration options and it's very easy to become overwhelmed. All major cloud providers offer similar services like virtual machines, network attached storage, relational databases, and object storage—all of which can be utilized by Hadoop—but each provider uses different naming conventions and has different capabilities and limitations. For example, some providers require that resource provisioning occurs in a specific order. Some providers create isolated virtual networks for your machines automatically while others require manual creation and assignment. It can be confusing. Whether you're working with Hadoop for the first time or a veteran installing on a cloud provider you've never used before, knowing about the specifics of each environment will save you a lot of time and pain. Cloud computing appeals to a dizzying array of users running a wide variety of workloads. Most cloud providers' official documentation isn't specific to any particular application (such as Hadoop). Using Hadoop on cloud infrastructure introduces additional architectural issues that need to be considered and addressed. It helps to have a guide to demystify the options specific to Hadoop deployments and to ease you through the setup process on a variety of cloud providers, step by step, providing tips and best practices along the way. This book does precisely that, in a way that I wish had been available when I started working in the cloud computing world. Whether code or expository prose, Bill's creations are approachable, sensible, and easy to consume. With this book and its author, you're in capable hands for your first foray into moving Hadoop to the Cloud. Alex Moundalexis, May 2017 # Preface It's late 2015, and I'm staring at a page of mine on my employer's wiki, trying to think of an OKR. An OKR is something like a performance objective, a goal to accomplish paired with a way to measure if it's been accomplished. While my management chain defines OKRs for the company as a whole and major organizations in it, individuals define their own. We grade ourselves on them, but they do not determine how well we performed because they are meant to be aspirational, not necessary. If you meet all your OKRs, they weren't ambitious enough. My coworkers had already been impressed with writing that I'd done as part of my job, both in product documentation and in internal presentations, so focusing on a writing task made sense. How aspirational could I get? So I set this down. "Begin writing a technical book! On something! That is, begin working on one myself, or assist someone else in writing one." Outright ridiculous, I thought, but why not? How's _that_ for aspirational. Well, I have an excellent manager who is willing to entertain the ridiculous, and so she encouraged me to float the idea to someone else in our company who dealt with things like employees writing books, and he responded. "Here's an idea: there is no book out there about Running Hadoop in the Cloud. Would you have enough material at this point?" I work on a product that aims to make the use of Hadoop clusters in the cloud easier, so it was admittedly an extremely good fit. It didn't take long at all for this ember of an idea to catch, and the end result is the book you are reading right now. # Who This Book Is For Between the twin subjects of Hadoop and the cloud, there is more than enough to write about. Since there are already plenty of good Hadoop books out there, this book doesn't try to duplicate them, and so you should already be familiar with running Hadoop. The details of configuring Hadoop clusters are only covered as needed to get clusters up and running. You can apply your prior Hadoop knowledge with great effectiveness to clusters in the cloud, and much of what other Hadoop books cover still applies. It is not assumed, however, that you are familiar with the cloud. Perhaps you've dabbled in it, spun up an instance or two, read some documentation from a provider. Perhaps you haven't even tried it at all, or don't know where to begin. Readers with next to no knowledge of the cloud will find what they need to get rolling with their Hadoop clusters. Often, someone is tasked by their organization with "moving stuff to the cloud," and neither the tasker nor the tasked truly understands what that means. If this describes you, this book is for you. DevOps engineers, system administrators, and system architects will get the most out of this book, since it focuses on constructing clusters in a cloud provider and interfacing with the provider's services. Software developers should also benefit from it; even if they do not build clusters themselves, they should understand how clusters work in the cloud so they know what to ask for and how to design their jobs. # What You Should Already Know Besides having a good grasp of Hadoop concepts, you should have a working knowledge of the Java programming language and the Bash shell, or similar languages. At least being able to read them should suffice, although the Bash scripts do not shy away from advanced shell features. Code examples are constrained to only those languages. Before working on your clusters, you will need credentials for a cloud provider. The first two parts of the book do not require a cloud account to follow along, but the later hands-on parts do. Your organization may already have an account with a provider, and if so, you can seek your own account within that to work with. If you are on your own, you can sign up for a free trial with any of the cloud providers this book covers in detail. # What This Book Leaves Out As stated previously, this book does not delve into Hadoop details more than necessary. A seasoned Hadoop administrator may notice that configurations are not necessarily optimal, and that clusters are not tuned for maximum efficiency. This information is left out for brevity, so as not to duplicate content in books that focus only on Hadoop. Many of the principles for Hadoop maintenance apply to cloud clusters just as well as ordinary ones. The core Hadoop components of HDFS and YARN are covered here, along with other important components such as ZooKeeper, Hive, and Spark. This doesn't imply at all that other components won't work in the cloud; there are simply so many components that, due to space considerations, not all could be included. A limited set of popular cloud providers is covered in this book: Amazon Web Services, Google Cloud Platform, and Microsoft Azure. There are other cloud providers, both publicly available and deployed privately, but they are not included. The ones that were chosen are the most popular, and you should find that their concepts transfer over rather directly to those in other providers. Even so, each provider does things a little, or a lot, differently from its peers. When getting you up and running, all of them are covered equally, but beyond that, only Amazon Web Services is fully considered, since it is the dominant choice at this time. Brief summaries of equivalent procedures in the other providers are given to get you started with them. Overall, between Hadoop and the cloud, there is just so much to write about. What's more, cloud providers introduce new services and revamp older services all the time, and it can be challenging to keep up even when you work in the cloud every day. This book attempts to stick with the most vital, core Hadoop components and cloud services to be as relevant as possible in this fast-changing world. Understanding them will serve you well when integrating new features into your clusters in the future. # How This Book Works Part I starts off this book by asking why you would host Hadoop clusters in a cloud provider, and briefly introduces the providers this book looks at. Part II describes the common concepts of cloud providers, like instances and virtual networks. If you are already familiar with a cloud provider or two, you might skim or skip these parts. Part III begins the hands-on portion of this book, where you build out a Hadoop cluster in one of the cloud providers. There is a chapter for the unique steps needed by each provider, and a common chapter for bringing up a cluster and seeing it in action. Later parts of the book use this first cluster as a launching point for more. If you are interested in making an even more capable cluster, Part IV can help you. It covers adding high availability and installing Hive and Spark. You can try any combination of the enhancements, and learn even more about the ramifications of running in a cloud provider. Finally, Part V looks at patterns and practices for running cloud clusters well, from designing for price and security to dealing with maintenance. Those first starting out in the cloud may not need the guidance in this part, but as usage ramps up, it becomes much more important. # Which Software Versions This Book Uses Here are the versions of Hadoop components used in this book. All are distributed through Apache: * Apache Hadoop 2.7.2 * Apache ZooKeeper 3.4.8 * Apache Hive 2.1.0 * Apache Spark 1.6.3 and 2.0.2 Code examples require: * Java 8 * Bash 4 Cloud providers update their services continually, and so determining the exact "versions" used for them is not possible. Most of the work in the book was performed during 2016 with the services as they existed at that time. Since then, service web interfaces may have changed and workflows may have been altered. # Conventions Used in This Book The following typographical conventions are used in this book: _Italic_ Indicates new terms, URLs, email addresses, filenames, and file extensions. `Constant width` Used for program listings, as well as within paragraphs to refer to program elements such as variable or function names, databases, data types, environment variables, statements, and keywords. **`Constant width bold`** Shows commands or other text that should be typed literally by the user. _`Constant width italic`_ Shows text that should be replaced with user-supplied values or by values determined by context. ###### Tip This element signifies a tip or suggestion. ###### Note This element signifies a general note. ###### Warning This element indicates a warning or caution. ## IP Addresses Many of the examples throughout this book include IP addresses, usually for cluster nodes. The example IP addresses are drawn from reserved address ranges as specified in RFC 5737. They should never resolve to an actual IP address anywhere on the internet or within private networks. Change them as needed when using the examples in your work. # Using Code Examples Supplemental material (code examples, exercises, etc.) is available for download at _https://github.com/bhavanki/moving-hadoop-to-the-cloud_. This book is here to help you get your job done. In general, if example code is offered with this book, you may use it in your programs and documentation. You do not need to contact us for permission unless you're reproducing a significant portion of the code. For example, writing a program that uses several chunks of code from this book does not require permission. Selling or distributing a CD-ROM of examples from O'Reilly books does require permission. Answering a question by citing this book and quoting example code does not require permission. Incorporating a significant amount of example code from this book into your product's documentation does require permission. We appreciate, but do not require, attribution. An attribution usually includes the title, author, publisher, and ISBN. For example: " _Moving Hadoop to the Cloud_ by Bill Havanki (O'Reilly). Copyright 2017 Bill Havanki Jr., 978-1-491-95963-3." If you feel your use of code examples falls outside fair use or the permission given above, feel free to contact us at _permissions@oreilly.com_. # O'Reilly Safari ###### Note _Safari_ (formerly Safari Books Online) is a membership-based training and reference platform for enterprise, government, educators, and individuals. Members have access to thousands of books, training videos, Learning Paths, interactive tutorials, and curated playlists from over 250 publishers, including O'Reilly Media, Harvard Business Review, Prentice Hall Professional, Addison-Wesley Professional, Microsoft Press, Sams, Que, Peachpit Press, Adobe, Focal Press, Cisco Press, John Wiley & Sons, Syngress, Morgan Kaufmann, IBM Redbooks, Packt, Adobe Press, FT Press, Apress, Manning, New Riders, McGraw-Hill, Jones & Bartlett, and Course Technology, among others. For more information, please visit _http://oreilly.com/safari_. # How to Contact Us Please address comments and questions concerning this book to the publisher: * O'Reilly Media, Inc. * 1005 Gravenstein Highway North * Sebastopol, CA 95472 * 800-998-9938 (in the United States or Canada) * 707-829-0515 (international or local) * 707-829-0104 (fax) We have a web page for this book, where we list errata, examples, and any additional information. You can access this page at _http://www.oreilly.com/catalog/0636920051459_. To comment or ask technical questions about this book, send email to _bookquestions@oreilly.com_. For more information about our books, courses, conferences, and news, see our website at _http://www.oreilly.com_. Find us on Facebook: _http://facebook.com/oreilly_ Follow us on Twitter: _http://twitter.com/oreillymedia_ Watch us on YouTube: _http://www.youtube.com/oreillymedia_ # Acknowledgments I'm well aware that barely anyone reads the acknowledgments in a book, especially a technical one like this. So, for those few of you who are reading this right now, well, first, I'd like to thank you for your diligence, not to mention your attention and support in the first place. Truly, thanks for spending time and/or money on what I've written here, and I hope it helps you. Thank you to everyone who's helped to build up the amazing Apache Hadoop ecosystem, from its founders to its committers to its contributors to its users, for showing us a new way of computing. Thank you also to everyone who's built and maintained the amazing cloud provider services, for showing us another new way of computing and empowering the rest of us to use it. This book would be worse off without its reviewers: Jesse Anderson, Jenny Kim, Don Miner, Alex Moundalexis, and those who went unnamed or whom I've forgotten. They each applied their expertise, experience, and attention to detail to their feedback, filling in where I left important information out and correcting what I got wrong. I also owe thanks to Misha Brukman and the Google Cloud Platform team for looking over Chapter 7. My editors, Marie Beaugureau and Colleen Toporek, did a wonderful job of shepherding the writing process and giving feedback on organization, formatting, writing flow, and lots of other details. Finally, extra thanks is due to Alex Moundalexis for writing the foreword. One of my favorite aphorisms is by Laozi: "A good traveler has no fixed plans and is not intent on arriving." I've arrived at the destination of authoring a book, but no one observing my travel, including me, could have guessed that I'd have gotten here. The road has wound through a career with a few different employers and with a few more projects, and I was privileged to walk alongside a truly wonderful collection of coworkers and friends along the way. I owe them all my gratitude for their company, and their roles in my journey. I owe special thanks, of course, to my current employer, Cloudera, for the opportunity to create this book and the endorsement of the effort. I specifically want to thank Vinithra Varadharajan, my manager for the past few years, for her unwavering faith in and promotion of my writing effort; and also Justin Kestelyn, who got the ball rolling between me, my employer, and O'Reilly. My teammates past and present on my current project have all played a part in helping me learn about the cloud and have contributed their thoughts and opinions, for which I'm grateful: John Adair, Asif Arman, Cagdas Bayram, Jayita Bhojwani, Michael Cudahy, Xiaohua Guo, David Han, Joe Heyming, Ying Li, Andrei Savu, Fahd Siddiqui, and Michael Wilson. Finally, I must thank my family, including my parents and in-laws for their encouragement, my daughters Samantha and Lydia, and especially my wife Kathy. They have been constantly supportive of me during the long effort it's taken to write this book, and excited for it to be one of my accomplishments. I love them all very much. _Te amo et semper amabo._ # Part I. Introduction to the Cloud The purpose of the first part of this book is to orient you. First, the exact meaning of "the cloud" when it comes to working with Hadoop clusters is explored, so that it is clear what the benefits and drawbacks are. Then, overviews of three major public cloud providers are provided, including a little of their history as well as their approaches to doing business. # Chapter 1. Why Hadoop in the Cloud? Before embarking on a new technical effort, it's important to understand what problems you're trying to solve with it. Hot new technologies come and go in the span of a few years, and it should take more than popularity to make one worth trying. The short span of computing history is littered with ideas and technologies that were once considered the future of their domains, but just didn't work out. Apache Hadoop is a technology that has survived its initial rush of popularity by proving itself as an effective and powerful framework for tackling big data applications. It broke from many of its predecessors in the "computing at scale" space by being designed to run in a distributed fashion across large amounts of commodity hardware instead of a few, expensive computers. Many organizations have come to rely on Hadoop for dealing with the ever-increasing quantities of data that they gather. Today, it is clear what problems Hadoop can solve. Cloud computing, on the other hand, is still a newcomer as of this writing. The term itself, "cloud," currently has a somewhat mystical connotation, often meaning different things to different people. What is the cloud made of? Where is it? What does it do? Most importantly, why would you use it? # What Is the Cloud? A definition for what "the cloud" means for this book can be built up from a few underlying concepts and ideas. First, a cloud is made up of computing resources, which encompasses everything from computers themselves (or _instances_ in cloud terminology) to networks to storage and everything in between and around them. All that you would normally need to put together the equivalent of a server room, or even a full-blown data center, is in place and ready to be claimed, configured, and run. The entity providing these computing resources is called a _cloud provider_. The most famous ones are companies like Amazon, Microsoft, and Google, and this book focuses on the clouds offered by these three. Their clouds can be called _public clouds_ because they are available to the general public; you use computing resources that are shared, in secure ways, with many other people. In contrast, _private clouds_ are run internally by (usually large) organizations. ###### Note While private clouds can work much like public ones, they are not explicitly covered in this book. You will find, though, that the basic concepts are mostly the same across cloud providers, whether public or private. The resources that are available to you in the cloud are not just for you to use, but also to control. This means that you can start and stop instances when you want, and connect the instances together and to the outside world how you want. You can use just a small amount of resources or a huge amount, or anywhere in between. Advanced features from the provider are at your command for managing storage, performance, availability, and more. The cloud provider gives you the building blocks, but it is up to you to know how to arrange them for your needs. Finally, you are free to use cloud provider resources for whatever you wish, within some limitations. There are quotas applied to cloud provider accounts, although these can be negotiated over time. There are also large, hard limits based on the capacity of the provider itself that you can run into. Beyond these somewhat "physical" limitations, there are legal and data security requirements, which can come from your own organization as well as the cloud provider. In general, as long as you are not abusing the cloud provider's offerings, you can do what you want. In this book, that means installing and running Hadoop clusters. Having covered some underlying concepts, here is a definition for "the cloud" that this book builds from: _"The cloud" is a large set of computing resources made available by a cloud provider for customers to use and control for general purposes._ # What Does Hadoop in the Cloud Mean? Now that the term "cloud" has been defined, it's easy to understand what the jargony phrase "Hadoop in the cloud" means: it is running Hadoop clusters on resources offered by a cloud provider. This practice is normally compared with running Hadoop clusters on your own hardware, called _on-premises_ clusters or "on-prem." If you are already familiar with running Hadoop clusters on-prem, you will find that a lot of your knowledge and practices carry over to the cloud. After all, a cloud instance is supposed to act almost exactly like an ordinary server you connect to remotely, with root access, and some number of CPU cores, and some amount of disk space, and so on. Once instances are networked together properly and made accessible, you can imagine that they are running in a regular data center, as opposed to a cloud provider's own data center. This illusion is intentional, so that working in a cloud provider feels familiar, and your skills still apply. That doesn't mean there's nothing new to learn, or that the abstraction is complete. A cloud provider does not do everything for you; there are many choices and a variety of provider features to understand and consider, so that you can build not only a functioning system, but a functioning system of Hadoop clusters. Cloud providers also include features that go beyond what you can do on-prem, and Hadoop clusters can benefit from those as well. Mature Hadoop clusters rarely run in isolation. Supporting resources around them manage data flow in and out and host specialized tools, applications backed by the clusters, and non-Hadoop servers, among other things. The supporting cast can also run in the cloud, or else dedicated networking features can help to bring them close. # Reasons to Run Hadoop in the Cloud Many concepts have been defined so far, but the core question has not yet been answered: Why run Hadoop clusters in the cloud at all? Here are just a few reasons: Lack of space Your organization may need Hadoop clusters, but you don't have anywhere to keep racks of physical servers, along with the necessary power and cooling. Flexibility Without physical servers to rack up or cables to run, it is much easier to reorganize instances, or expand or contract your footprint, for changing business needs. Everything is controlled through cloud provider APIs and web consoles. Changes can be scripted and put into effect manually or even automatically and dynamically based on current conditions. New usage patterns The flexibility of making changes in the cloud leads to new usage patterns that are otherwise impractical. For example, individuals can have their own instances, clusters, and even networks, without much managerial overhead. The overall budget for CPU cores in your cloud provider account can be concentrated in a set of large instances, a larger set of smaller instances, or some mixture, and can even change over time. Speed of change It is much faster to launch new cloud instances or allocate new database servers than to purchase, unpack, rack, and configure physical computers. Similarly, unused resources in the cloud can be torn down swiftly, whereas unused hardware tends to linger wastefully. Lower risk How much on-prem hardware should you buy? If you don't have enough, the entire business slows down. If you buy too much, you've wasted money and have idle hardware that continues to waste money. In the cloud, you can quickly and easily change how many resources you use, so there is little risk of undercommitment or overcommitment. What's more, if some resource malfunctions, you don't need to fix it; you can discard it and allocate a new one. Focus An organization using a cloud provider to rent resources, instead of spending time and effort on the logistics of purchasing and maintaining its own physical hardware and networks, is free to focus on its core competencies, like using Hadoop clusters to carry out its business. This is a compelling advantage for a tech startup, for example. Worldwide availability The largest cloud providers have data centers around the world, ready for you from the start. You can use resources close to where you work, or close to where your customers are, for the best performance. You can set up redundant clusters, or even entire computing environments, in multiple data centers, so that if local problems occur in one data center, you can shift to working elsewhere. Data storage requirements If you have data that is required by law to be stored within specific geographic areas, you can keep it in clusters that are hosted in data centers in those areas. Cloud provider features Each major cloud provider offers an ecosystem of features to support the core functions of computing, networking, and storage. To use those features most effectively, your clusters should run in the cloud provider as well. Capacity Few customers tax the infrastructure of a major cloud provider. You can establish large systems in the cloud that are not nearly as easy to put together, not to mention maintain, on-prem. # Reasons to Not Run Hadoop in the Cloud As long as you are considering why you would run Hadoop clusters in the cloud, you should also consider reasons not to. If you have any of the following reasons as goals, then running in the cloud may disappoint you: Simplicity Cloud providers start you off with reasonable defaults, but then it is up to you to figure out how all of their features work and when they are appropriate. It takes a lot of experience to become proficient at picking the right types of instances and arranging networks properly. High levels of control Beyond the general geographic locations of cloud provider data centers and the hardware specifications that providers reveal for their resources, it is not possible to have exacting, precise control over your cloud architecture. You cannot tell exactly where the physical devices sit, or what the devices near them are doing, or how data across them shares the same physical network. When the cloud provider has internal problems that extend beyond backup and replication strategies already in place, there's not much you can do but wait. Unique hardware needs You cannot have cloud providers attach specialized peripherals or dongles to their hardware for you. If your application requires resources that exceed what a cloud provider offers, you will need to host that part on-prem away from your Hadoop clusters. Saving money For one thing, you are still paying for the resources you use. The hope is that the economy of scale that a cloud provider can achieve makes it more economical for you to pay to "rent" their hardware than to run your own. You will also still need a staff that understands system administration and networking to take care of your cloud infrastructure. Inefficient architectures, especially those that leave resources running idly, can cost a lot of money in storage and data transfer costs. ## What About Security? The idea of sharing resources with many other, unknown parties is sure to raise questions about whether using a public cloud provider can possibly be secure. Could other tenants somehow gain access to your instances, or snoop on the shared network infrastructure? How safe is data stashed away in cloud services? Is security a reason to avoid using public cloud providers? There are valid arguments on both sides of this question, and the answer for you varies depending on your needs and tolerance for risk. Public cloud providers are certainly cognizant of security requirements, and as you'll see throughout this book, they use many different mechanisms to keep your resources private to you and give you control over who can see and do what. When you use a cloud provider, you gain their expertise in building and maintaining secure systems, including backup management, replication, availability, encryption support, and network management. So, it is reasonable to expect that clusters running in the cloud can be secure. Still, there may be overriding reasons why some data simply cannot be put up into the cloud, for any reason, or why it's too risky to move data to, from, and around the cloud. In these situations, limited use of the cloud may still be possible. # Hybrid Clouds Running Hadoop clusters in the cloud has compelling advantages, but the disadvantages may restrict you from completely abandoning an on-prem infrastructure. In a situation like that, a _hybrid cloud_ architecture may be helpful. Instead of running your clusters and associated applications completely in the cloud or completely on-prem, the overall system is split between the two. Data channels are established between the cloud and on-prem worlds to connect the components needed to perform work. "Cloud-Only or Hybrid?" explores the pattern of hybrid clouds, including some examples for when they are appropriate or even necessary. Creating a hybrid cloud architecture is more challenging than running only on-prem or only in the cloud, but you are still able to benefit from some advantages of the cloud that you otherwise couldn't. # Hadoop Solutions from Cloud Providers There are ways to take advantage of Hadoop technologies without doing the work of creating your own Hadoop clusters. Cloud providers offer prepackaged compute services that use Hadoop under the hood, but manage most of the cluster management work themselves. You simply point the services to your data and provide them with the jobs to run, and they handle the rest, delivering results back to you. You still pay for the resources used, as well as the use of the service, but save on all of the administrative work. So, why ever roll your own clusters when these services exist? There are some good reasons: * Prepackaged services aim to cover the most common uses of Hadoop, such as individual MapReduce or Spark jobs. Their features may not be sufficient for more complex requirements, and may not offer Hadoop components that you already rely on or wish to employ. * The services obviously only work on the cloud provider offering them. Some organizations are worried about being "locked in" to a single provider, unable to take advantage of competition between the providers. * Useful applications that run on top of Hadoop clusters may not be compatible with a prepackaged provider service. * It may not be possible to satisfy data security or tracking requirements with a prepackaged service, since you lack direct control over the resources. Despite the downsides, you should investigate Hadoop-based provider solutions before rushing into running your own clusters. They can be useful and powerful, save you a lot of work, and get you running in the cloud more quickly. You can use them for prototyping work, and you may decide to keep them around for support tasks even while using your own clusters for the rest. Here are some of the provider solutions that exist as of this writing. Keep an eye out for new ones as well. ## Elastic MapReduce Elastic MapReduce, or EMR, is Amazon Web Services' solution for managing prepackaged Hadoop clusters and running jobs on them. You can work with regular MapReduce jobs or Apache Spark jobs, and can use Apache Hive, Apache Pig, Apache HBase, and some third-party applications. Scripting hooks enable the installation of additional services. Data is typically stored in Amazon S3 or Amazon DynamoDB. The normal mode of operation for EMR is to define the parameters for a cluster, such as its size, location, Hadoop version, and variety of services, point to where data should be read from and written to, and define steps to execute such as MapReduce or Spark jobs. EMR launches a cluster, performs the steps to generate the output data, and then tears the cluster down. However, you can leave clusters running for further use, and even resize them for greater capacity or a smaller footprint. EMR provides an API so that you can automate the launching and management of Hadoop clusters. ## Google Cloud Dataproc Google Cloud Dataproc is similar to EMR, but runs within Google Cloud Platform. It offers Hadoop, Spark, Hive, and Pig, working on data that is usually stored in Google Cloud Storage. Like EMR, it supports both transient and long-running clusters, cluster resizing, and scripts for installing additional services. It can also be controlled through an API. ## HDInsight Microsoft Azure's prepackaged solution, called HDInsight, is built on top of the Hortonworks Data Platform (HDP). The service defines cluster types for Hadoop, Spark, Apache Storm, and HBase; other components like Hive and Pig are included as well. Clusters can be integrated with other tools like Microsoft R Server and Apache Solr through scripted installation and configuration. HDInsight clusters work with Azure Blob Storage and Azure Data Lake Store for reading and writing data used in jobs. You control whether clusters are torn down after their work is done or left running, and clusters can be resized. Apache Ambari is included in clusters for management through its API. ## Hadoop-Like Services The solutions just listed are explicitly based on Hadoop. Cloud providers also offer other services, based on different technologies, for managing and analyzing large amounts of data. Some offer SQL-like query capabilities similar to Hive or Apache Impala, and others offer processing pipelines like Apache Oozie. It may be possible to use those services to augment Hadoop clusters, managed either directly or through the cloud provider's own prepackaged solution, depending on where and how data is stored. Of course, these tools share the same disadvantages as the Hadoop-based solutions in terms of moving further away from the open source world and its interoperability benefits. Since they are not based on Hadoop, there is a separate learning curve for them, and the effort could be wasted if they are ever discarded in favor of something that works on Hadoop, or on a different cloud provider, or even on-prem. Their ready availability and ease of use, however, can be attractive. ## A Spectrum of Choices It's perhaps ironic that much of this chapter describes how you can avoid running Hadoop clusters in the cloud, either by sticking with on-prem clusters (either partially or completely), by using cloud provider services that take away the management work, or by using tools that do away with Hadoop completely. There is a spectrum of choices, where at one end you work with your data at a conceptual level using high-level tools, and at the other end you build workflows, analyses, and query systems from the ground up. The breadth of this spectrum may be daunting. However, one fact remains true: _Hadoop works everywhere_. When you focus on the core components in the Hadoop ecosystem, you have the freedom and power to work however you like, wherever you like. When you stick to the common components of Hadoop, you can carry your expertise with them to wherever your code runs and your data lives. Cloud providers are eager for you to use their resources. They offer services to take over Hadoop cluster administration for you, but they are just as happy to let you run things yourself. Running your own clusters does not require you to forgo all of the benefits of a cloud provider, and Hadoop components that you deploy and run can still make effective use of cloud services. This book, in fact, explores how. # Getting Started Have you figured out why you want to run Hadoop in the cloud? Ready to get started? If you already know which cloud provider you'll use, skip ahead to Part II for a primer on the major concepts of cloud instances, networking, and storage. Otherwise, continue to the next chapter for an overview of the major cloud providers so that you can understand the landscape. An exception: some cloud providers have infrastructure dedicated to US government use where stricter controls are in place. If there weren't, this book would not be very useful! # Chapter 2. Overview and Comparison of Cloud Providers This short chapter provides a brief background and history of the three major public cloud providers that are covered in this book. If you aren't sure which one to use, this information may help you decide. # Amazon Web Services _Amazon Web Services_ (AWS) is, at the time of this writing, perhaps the dominant public cloud provider. It may be surprising to learn that its earliest services were launched in 2006, well before cloud computing grew popular: * Elastic Compute Cloud (EC2), a service for provisioning computing resources on demand * Simple Storage Service (S3), online storage for opaque data The original primary intent of AWS was to resolve scalability issues within Amazon itself, but even in its initial proposal in 2003 it was recognized that the new infrastructure could also be offered to customers. The next prominent services to be added to the AWS suite included: * Elastic Block Store (EBS), persistent disk-like storage for EC2 instances, in 2008 * Elastic MapReduce (EMR), a service providing Hadoop-like clusters for running MapReduce (and later Apache Hive and Apache Pig) jobs, in 2009 * Relational Database Service (RDS), a service for managing relational database server instances running in AWS, also in 2009 In 2012, new AWS services focused on data storage; in that year alone the Redshift massive-scale data warehouse, the DynamoDB NoSQL database, and the Glacier data archival service were introduced. More recent key developments include the Aurora cloud-optimized relational database and the Lambda function-as-a-service component, both in 2014. Major companies rely heavily on AWS for their computing and storage needs, not least of which is Amazon itself, which migrated its shopping services to it back in 2010. The US federal government has access to its own computing region, called GovCloud, for highly secured government applications. By being a first mover in cloud providers, AWS was able to define the terminology and practices that many other cloud providers use, with their own variations. It continues to be highly active, experiencing more demand than even its originators had anticipated. While all of the major cloud providers do a good job of evolving their systems according to customer demand, Amazon usually makes the biggest impact when it unveils its latest offerings, and it remains the provider against which all others are compared. ## References * Timeline of Amazon Web Services * The myth about how Amazon's web service started just won't die # Google Cloud Platform As the originator and popularizer of early Hadoop technologies like MapReduce, it is natural to consider _Google Cloud Platform_ as a home for your own Hadoop clusters. Services such as BigQuery and BigTable provide direct access to big data systems based on those original technologies, but you can also host your own Hadoop clusters using other services. Google Cloud Platform started out in 2008 as the Google App Engine service, a development environment backed by Google's infrastructure for needs such as persistent storage, CPU cycles, and user authentication. It was, and still is, focused on general web application development, although today it also focuses on hosting backends for mobile services. The next separate service, Google Storage for Developers, was introduced in 2010; it is now called Google Cloud Storage, and works in a manner similar to AWS S3. The BigQuery service for performing SQL-like queries on massive amounts of data followed in 2012. Perhaps surprisingly, it was not until late 2013 that Google Compute Engine, Google Cloud Platform's answer to AWS EC2, was made available for general use. Google Cloud SQL followed quickly in early 2014, supporting cloud deployments of MySQL. Google Dataproc, unveiled in 2016, is a versatile service supporting Hadoop and Spark workloads. The infrastructure supporting Google Cloud Platform is the same that powers Google's own services, most notably its internet search capability. Many major companies use Google Cloud Platform to run their own architectures. There is a smaller variety of services under the Google Cloud Platform umbrella than under AWS, although they do cover the requirements for fielding Hadoop clusters. You may find that you must assemble some pieces of your system "by hand" at times, whereas in AWS there is a service or service feature that fills the gap. Despite that, Google Cloud Platform is under active development just as the other cloud provider systems are, and the generally cleaner design of Google Cloud Platform compared to AWS may be attractive to some. Fundamentally, though, the concepts used in AWS and Google Cloud Platform are quite compatible, and being familiar with one makes it easier to get going with the other. ## References * Google Cloud Platform blog * Google Developers blog # Microsoft Azure Microsoft's cloud provider offering, today called _Microsoft Azure_ , started its life in 2008 as Windows Azure, a service for running .NET and other services on Windows inside Microsoft's infrastructure. Storage services for tables and general "blobs" were included, along with a service bus for queuing data between applications. Windows Azure became generally available in 2010. Also made available in 2010, although announced a year earlier, was Azure SQL Database, a distributed database service based on Microsoft SQL Server. The services in Azure continued to grow and advance, and finally in 2012 the ability to run images of Windows and Linux on persistent virtual machines was delivered. By 2014, given Azure's continuing expansion and shifting focus from being a platform-as-a-service to infrastructure-as-a-service, the provider was renamed to Microsoft Azure. The mode of working with Azure has changed over time, and today one of its distinguishing features is its portal, a highly customizable and dynamic web interface to the large variety of Azure services. The current portal was made available in 2015. Like AWS and Google Cloud Platform, Azure hosts its company's own large internet services, such as Microsoft Office 365, Bing, and OneDrive. Microsoft's long history of supporting large enterprises has led to many of them using Azure as their cloud provider. Azure also has excellent security accreditations and meets requirements for EU data protections, HIPAA, and US government FedRAMP. Among the major cloud providers, Azure has the widest geographic footprint. Azure has similar services to both AWS and Google Cloud Platform when considering them at a high level, but its conceptual framework varies significantly, such that it is more difficult to translate ideas and designs from Azure to the other providers, or back again. Organizations that have innate familiarity with the Microsoft ecosystem may be drawn naturally to Azure. While it originally leaned heavily on Microsoft technologies such as Windows, SQL Server, and .NET, today it works just as well as a cloud provider for Linux-based architectures, which are paramount for Hadoop cluster support. ## References * Microsoft launches Windows Azure * A Brief History of Azure * Windows Azure's spring fling: Linux comes to Microsoft's cloud * Upcoming Name Change for Windows Azure * Announcing Azure Portal General Availability # Which One Should You Use? This chapter is indeed only a short overview of these three cloud providers, and you should take the time to learn about them through their own marketing and technical materials as well as trade articles and blog posts. War stories abound about how using cloud provider capabilities saved the day, and large and successful customers openly share how they are able to run their businesses in the cloud. All of the providers offer free trials or credits in some form, so another important task in evaluating them is to try them out. While you will be limited in the scope of what you can field, hands-on experience tells you about how the providers work in ways that no web page can. Tasks you should try out to get a feel for a provider include: * Allocating a new computing resource, or _instance_ (see Chapter 3), and logging in to it * Moving data from your local system to a cloud instance and back * Downloading software to an instance and running it * Navigating the provider's web console * Saving data to and retrieving data from the provider's object storage service (see Chapter 5) Pricing plays a huge role in selecting a cloud provider. Your organization may already have a business relationship with a cloud provider (Microsoft is most common here) that can be parlayed into discounts. The providers themselves are in robust competition with each other as well, so since Hadoop clusters can be deployed on any of them quite effectively, you can easily pit them against each other. Since the cloud providers evolve and change so quickly, and to be fair to all of them, it is not possible to come up with a simple recipe for finding one that is best for you. Still, since your goal is to spin up Hadoop clusters, a suggestion that can be given here is to use this book as your guide, and take them each for a test drive. Here are some of the questions you'll want to find answers for: * How easy is it to understand what the services do? * Are the web interfaces easy to use? * Is essential information easy to find? * Does the provider make it simple to do tasks that are important to the organization? * When there are problems, are they easy to fix? How capable is the provider support? * Are the prices fair? * Does the provider infrastructure meet security requirements? If you are just starting out and need to get a basic understanding of cloud provider concepts in order to answer these questions and more, then continue on to Chapter 3, which starts you off with what an instance is. Otherwise, if you are ready to jump in and build a cluster, head to Part III, where you can get rolling on the cloud provider of your choice. # Part II. Cloud Primer This part provides an introduction to cloud provider concepts, including compute capabilities, networking, and storage. If you are already familiar with using a cloud provider, you may wish to skim the chapters in this part. Cloud providers can use different terminology to refer to the same concept, or even offer different features that support the same concept. In these cases, the descriptions here begin by using the terminology for Amazon Web Services (AWS). Differences in other cloud providers are called out after the basic concept is described. # Chapter 3. Instances The core of a cloud provider's offerings is the ability to provision instances. An _instance_ is similar in concept to a virtual machine, which is an emulation of a particular computer system. While historically virtual machines were thought of as running on a specific piece of hardware—perhaps a server in a company's machine room—a cloud instance is thought of as running somewhere unspecified within the cloud provider's vast infrastructure. Precisely where and how an instance is provisioned is often not revealed to you as a customer, although you do have some coarse-grained control (see "Regions and Availability Zones" for one example). All that matters to you is that you ask for an instance, and the cloud provider brings it to life. ###### Note Instances running in Azure are called "virtual machines." The features of an instance, beyond its precise physical location, are up to you. You can choose from a variety of combinations of CPU power and memory, any of several operating systems, and different storage options, just to start with. Once the instance has been provisioned, you can access it over SSH through the networking capabilities of the cloud provider. From that point on, it acts and feels just like a real, physical machine. You have root access, so you can install applications, perform additional upgrades, start web servers or Hadoop daemons, and so on. Your cloud provider account has limits that affect the number and size of instances you can provision. Those limits, along with the cost of running instances, influence how you design your cloud architecture. Given those limits, often the first step in the design process is determining which instance types to use. # Instance Types Cloud providers offer instances in a multitude of combinations of features. These combinations usually differentiate themselves in terms of compute power, memory, storage capacity, and performance. To make selecting a combination easier, and also to enable the cloud provider to fit all its customers' instances together efficiently on its infrastructure, a cloud provider offers a set of fixed feature combinations, like a menu. Each of these _instance types_ is defined for a purpose: heavy compute capability, vast storage, economy, or simply general-purpose use. ###### Note Azure refers to instance types as "instance sizes." While you are free to always select a top-of-the-line instance type with lots of everything, it will be among the most expensive of your options, and most of the time you will not need all of that power all the time. It is much more efficient, and cheaper, to pick instance types that focus on what you need the instances for. Since a cloud provider makes it easy to provision new instances, you have the option of allocating more, cheaper instances, instead of staying with a smaller number of ultrapowerful ones. Cluster technologies like Hadoop can flourish in this sort of environment. As your needs change over time, you can scale up or scale down the number of daemons you run for different components without worrying about the physical hardware. Moreover, Hadoop components do not require top-of-the-line instance specifications to work; they can perform well on mid-range instance types. Still, you should pick instance types that focus on the features that the components need. Advice for selecting instance types for Hadoop clusters is provided in "Picking Instance Types". In short, roles are defined for instances in a cluster, and then the needs for each role are discussed. Cloud providers offer many different instance types, so it can be tricky to decide on which ones to use. It is somewhat easier, though, to choose where the instances will run. # Regions and Availability Zones An advantage of using a cloud provider is geographic distribution. A major cloud provider's infrastructure spans time zones and continents, running 24 hours a day. A data center can be constructed anywhere that has space, electricity, network connectivity, and people to maintain it. This enables you to set up your own systems in a distributed fashion, reaping all of the associated availability and performance benefits. A cloud provider infrastructure is exposed as a set of divided, geographic areas called _regions_. For example, a cloud provider could define three regions in the continental United States (say, west, central, and east) along with two more in Europe and two in Southeast Asia. The number and coverage areas of cloud provider regions changes over time. A busy geographic area may be covered by multiple regions. When you provision new instances, you select the region where they live. You may decide to pick the region you work in, so that network performance between you and the instance is quickest. Or, you may be setting up a failover system and decide to choose a region farther away. If you know that most of the traffic to your instance will be from customers, you may choose a region close to them. You may pick a region to satisfy legal requirements that apply to where your data may be stored. Regions are one of the key factors in designing a large Hadoop cluster. While spreading a cluster far and wide across the world sounds attractive for availability, it takes much longer, and will cost more, for instances in different regions to communicate with each other. So, it's important to plan carefully to minimize cross-region communication while still getting the availability you need. To help provide both availability and performance, a cloud provider defines one or more _availability zones_ within a region. Availability zones are themselves independent within a region, but they have faster interconnections. This lets you set up a distributed architecture that sits within a single region and has good performance, yet has some measure of availability. While it is rare for an entire availability zone to fail, it is far rarer for an entire region to fail. ###### Note Azure does not support the concept of availability zones, but instead lets you define _availability sets_. An availability set contains instances that are spread out among multiple _fault domains_ , each of which has separate power and network connections and therefore are housed in different hosts and racks. So, rather than managing availability zones yourself for each individual instance in your architecture, you can group them into availability sets based on their roles. Communication between instances in different availability zones generally costs more than between instances in the same availability zone, and this is one factor that will influence your cluster architecture. In general, you would not spread a Hadoop cluster across availability zones except to achieve high availability. Chapter 10 is dedicated to exploring high availability, and discusses the pros and cons of availability zones as a factor. As you've seen, you have control over the specifications of an instance through selecting an instance type and some amount of control over where an instance runs. It's time to discuss how you can control an instance's existence once it has been started. # Instance Control Just like a real machine, even when no one is connected to it, an instance still "exists" and keeps running. This makes instances perfectly suited for hosting daemons like those across the Hadoop ecosystem. The cloud provider monitors your instances, and you can set up alerts to be notified if any of your instances become unreachable or, in rare cases, die out. If you know that you will not be using an instance for a while, you can _stop_ it. Stopping an instance works like shutting off a physical machine; processes running on it are terminated normally and the operating system halts. A stopped instance is unreachable until it is started again, which works like turning a physical machine back on. Why stop an instance instead of just leaving it running? One important reason is that your cloud provider charges your account much less, or not at all, for an instance while it is stopped, so it is economical to stop instances you aren't using. In addition, some operations on an instance, like changing its attached storage, can only be performed when the instance is stopped. ###### Note Azure continues to charge for instances that are stopped. You must also "deallocate" instances to suspend charging for instances. This is because Azure retains the compute and memory resources for your instances even when they are stopped. Once an instance has served its purpose, it can be _terminated_ or deleted. A terminated instance cannot be started up again; you need to provision a new instance to replace it. Once an instance is terminated, everything that was on its disks is lost, unless you have backed it up, either on your own or by using other cloud provider capabilities (see Chapter 5). Cloud providers stop charging for instances when they are terminated. ###### Warning Terminating an instance causes a cloud provider to reclaim most or all of the resources associated with that instance, but stopping may also cause the provider to reclaim some resources, such as ephemeral storage (see "Block Storage") or public IP addresses (see "Virtual Networks"). Check your provider's documentation for complete information. It may be the case that even stopping an instance participating in a Hadoop cluster will render it unusable when it is started again. # Temporary Instances By default, once you allocate an instance, it is yours to control until you terminate it yourself; it will not be taken away from you unless some rare problem occurs at the cloud provider, and even then you usually receive a warning and some lead time to react. Under some circumstances, however, you may decide to use a _temporary instance_ , which can disappear after some time. While this seems like a bad idea in the general case, temporary instances can be useful for surging your capacity for a few hours, or for running some process that won't take long. Still, though, why not just use ordinary instances all the time? The main reason is that cloud providers charge significantly less for temporary instances than for ordinary ones. Cloud providers almost always have excess capacity going unused, so temporary instances are a way to earn revenue on it, even at a discount, until the capacity can be allocated to ordinary provisioned instances. In order to use temporary instances effectively, you must have automated means of bootstrapping them and pressing them into service. If you spend too much time getting them set up, they may disappear before you get a chance to do anything with them. Nevertheless, if that does happen, it's straightforward to rerun automation and try again with another temporary instance. This mode of retrying on temporary instances is not suitable for critical pieces of your system, but can save money elsewhere. While it makes good sense to not under-utilize temporary instances, it makes good sense as well not to over-utilize them, especially for the sake of saving money. Temporary instances _will_ disappear on you, sometimes when you least expect or want them to, and a quiet spell of weeks where temporary instances have been reliable and lingered for plenty of time can end surprisingly suddenly. So, use them, but use them wisely. ###### Note Azure does not offer temporary instances at this time. ## Spot Instances AWS calls its temporary instances _spot instances_. There is a market for spot instances within AWS, driven by the price that customers are willing to pay for them. When demand for spot instances is low, the price is low; when demand goes up, so does the price. When you request spot instances, you select a price that you are willing to pay, anywhere from the current market price up to the fixed rate for ordinary instances. The spot market determines not only the price for spot instances, but also how long they last. Once the spot price rises above your chosen price, your spot instances are reclaimed so that their resources can be used by those who bid higher (or for ordinary instances). So, you can choose a higher initial price for a higher probability of keeping your spot instances longer, but you may end up paying "too much" if the market price remains low. Spot instances are particularly prone to overuse, since there is no predetermined time after which they will disappear. They can persist for days or weeks, and lull users into a false sense of stability. Don't be fooled; always treat them as if they could disappear at any moment. ## Preemptible Instances Google Cloud Platform calls its temporary instances _preemptible instances_. Unlike AWS, there is no market determining the price for a preemptible instance; there is a single offered price, which is lower than the price of a standard instance. While market conditions in AWS determine when your spot instances are reclaimed, preemptible instances are _guaranteed_ to be reclaimed within a day (24 hours), if not sooner. This does much to reduce the temptation to over-rely on them and promotes the practices of automating their configuration and keeping your cluster resilient to loss of instances. # Images Besides its instance type, location, and lifecycle, another key feature of an instance is what it's actually running: its operating system type and version, the software packages that are available, and applications that are installed. These considerations are all bundled up into _images_. An image can be thought of as the plan for a virtual drive that your instance runs from. Conceptually it is just like a virtual machine image file: an encapsulated filesystem with a specific operating system and other software installed and ready to go. When you provision an instance, you select the image that it should start from. Larger cloud providers can support hundreds or thousands of different images, some that they fashion themselves, but many more that are created by operating system vendors, vendors of other software, and in some cases even individuals. Cloud providers will propose a small set of stock images to help you get started, but you have the freedom to use any image you like. Most images are free to use, especially those that bundle free operating systems. However, there are some that cost money to use, either as a fixed additional cost or a continual surcharge to running them. In addition, some images may host unlicensed, freshly installed (at the time the image was created) software that will prompt you for license details before your instances will start to fully function. Hadoop can be used on images that include free operating systems like Ubuntu and CentOS, or on those that require licenses, such as Red Hat Enterprise Linux. One of the most important things you can do to make using Hadoop on a cloud provider easier is to create your own images. Instead of using a basic image for every instance and installing Hadoop components on them every time, even in an automated fashion, you can instead create a custom image with the components installed where you need them. Chapter 16 goes into detail about this process. # No Instance Is an Island Instances provisioned by a cloud provider aren't of much use if no one can reach them. The next chapter discusses how instances are connected into a network so that you can reach them and they can reach other and other systems outside the cloud provider. During the free trial period for cloud providers, you are usually restricted to only basic instance types with relatively meager specifications. Once you upgrade to a regular account, or after some amount of time, your options open up. Fault domains may still reside in the same data center. AWS documentation capitalizes the word "Spot." This book does not, reflecting how the term is commonly used to describe temporary instances from any cloud provider. # Chapter 4. Networking and Security An essential aspect of working with instances is configuring their network connectivity. While cloud providers start customers off with a basic, working network configuration, it's important to understand the ways to construct different network topologies, so that your clusters can communicate effectively internally, and back and forth with your own systems and with the outside world. Network topology is of primary importance when setting up Hadoop clusters. Worker daemons like datanodes and node managers must be able to work with namenodes and resource managers, and clients must understand where to send jobs to run and where cluster data resides. You will likely spend more time designing and maintaining the network architecture of your clusters than the instances and images that serve as their building blocks. Security considerations are intertwined with network design. Once network connections are made, you need to determine the rules by which they are used. Which parts of the network can talk to which other parts of the network? What can reach out to the internet? What can reach _in_ from the internet? What ports should be exposed, and to whom? This chapter covers a wide range of topics, and is more of an introduction to cloud networks and security than an application of them to Hadoop, although there are some pointers. Chapter 14 goes into much more detail about designing a network and security rules for a Hadoop cluster. # A Drink of CIDR Before diving into the details of cloud provider network services, it's helpful to be familiar with _CIDR_ ( _Classless Inter-Domain Routing_ ) _notation_ , a way of denoting a continuous range of IP addresses. The scopes of network partitions and the rules that apply to activity in them are defined using CIDR notation. In this book, the term "CIDR" or "CIDR block" is used to refer to an IP address range specified in CIDR notation. An IP address range expressed in CIDR notation has two parts: a starting IP address and a decimal number counting the number of leading bits of value 1 in the _network mask_ , which is as long as the IP address itself. An IP address lies within the range if it matches the starting IP address when logically ANDed with the network mask. Here are some examples that illustrate how to interpret CIDRs: * The range 192.168.0.0/24 represents the IP addresses from 192.168.0.0 to 192.168.0.255, for a total of 256 addresses. * The range 172.16.0.0/20 represents the IP addresses from 172.16.0.0 to 172.16.15.255, for a total of 4,096 addresses. Note that the number of 1 bits in the network mask does not need to be a multiple of 4, although it commonly is. * The range 192.168.100.123/32 represents only the single IP address 192.168.100.123. It is common practice to target a single IP address, in a security rule for example, using a /32 block. For more about the role of CIDR in IP routing and allocation, see the Wikipedia article on Classless Inter-Domain Routing. Their usefulness in allocating IP addresses is why CIDR blocks are used to delimit virtual networks in the cloud. # Virtual Networks Cloud providers establish _virtual networks_ as the top-level containers where instances live. Each virtual network is separate from other virtual networks, and instances within a virtual network always communicate with each other more directly than with instances in other virtual networks or outside of the cloud provider. A virtual network is just a basic, coarse-grained concept. To enable finer control of network topology, each virtual network is divided up into subnetworks or _subnets_. A subnet is not just a lower-level instance container; it also covers a range of _private_ IP addresses. There are normally several subnets within a virtual network, each with a distinct range of private IP addresses. ###### Tip RFC 1918 establishes three ranges of private IP addresses. Cloud providers use these ranges to define subnets. Any of these blocks, including just portions of them, can be used for a subnet: * 10.0.0.0–10.255.255.255 (CIDR 10.0.0.0/8) * 172.16.0.0–172.31.255.255 (CIDR 172.16.0.0/12) * 192.168.0.0–192.168.255.255 (CIDR 192.168.0.0/16) ###### Note Amazon Web Services calls its virtual networks Virtual Private Clouds or VPCs. Each VPC has a private IP address range, and the address range for each subnet within a VPC must be a subset of the VPC's range. The subnet ranges do not have to completely cover the VPC range. For example, a single virtual network could be designed to cover the entire 16-bit private IP address block of 192.168.0.0/16. One way to divide the network, as shown in Figure 4-1, is into four subnets, each covering a distinct quarter of the block: 192.168.0.0/18, 192.168.64.0/18, 192.168.128.0/18, and 192.168.192.0/18. ###### Figure 4-1. A virtual network with four subnets After a virtual network is established, subnets must be created within it as homes for instances that will reside in the virtual network. Sometimes the cloud provider establishes one or more default subnets, and sometimes it is up to you to define them. The size of the private IP range of a subnet dictates its capacity for instances: for example, a range like 192.168.123.0/28 only supports 16 instances, while a range like 172.16.0.0/16 supports thousands. Instances that reside in the same subnet can communicate more quickly and easily than those in separate subnets, so sizing subnets appropriately is important for designing efficient clusters. When you provision an instance on a cloud provider, you choose its subnet. The cloud provider assigns the instance an IP address from the remaining unused addresses in the subnet's range, and that IP address sticks with the instance until it is terminated. ###### Note The private IP address for an Azure virtual machine can either be static or dynamic. A dynamic private IP address, which is the default, is dissociated from the virtual machine even when it is stopped, while a static private IP remains across stops until termination. In order to avoid needing to reconfigure your Hadoop cluster after virtual machines are stopped and started, you will want to use static addresses. Most of the time, a Hadoop cluster should reside within a single subnet, itself within one virtual network. Not only is this arrangement simplest, it is the least expensive and has the best performance. Chapter 10 explores other arrangements in terms of establishing high availability. ## Private DNS When an instance is provisioned inside a subnet, it is assigned not only a private IP address, but also a _private_ DNS hostname. The hostname is automatically generated for you and registered with the cloud provider's internal DNS infrastructure. It may simply be a form of the public IP address or some random string, and thus have no meaning. The cloud provider also automatically configures each instance's network settings so that processes running on it can resolve private DNS hostnames successfully, both its own and those of others in the virtual network. A private DNS hostname can be resolved to a private IP address _only_ by instances within the virtual network of the instance it is assigned to. Other instances, including those in other virtual networks of the same cloud provider, must use a public DNS hostname or public IP address, if those are assigned at all. ###### Note In Azure, two virtual networks can be _peered_ , so that instances in them can communicate using private IP addresses. The two networks must have private IP address ranges that do not overlap. In practice, private DNS hostnames have limited usefulness in working with a Hadoop cluster; the private IP addresses work just as well, and are often shorter and therefore easier to work with. Given all the other things to think about when managing virtual networks and how instances are deployed within them, you may find that private DNS can essentially be ignored. ## Public IP Addresses and DNS While an instance is always assigned a private IP address, it may also be assigned a public IP address. The public IP address is not part of the instance's subnet's IP range, but is instead assigned from the block of IP addresses administered by the cloud provider. An instance with a public IP address is therefore addressable from outside the virtual network and, in particular, from the internet. While having a public IP address is a prerequisite for an instance to have connectivity outside the virtual network, it does not mean that the instance _can_ be reached, or itself reach out from the virtual network. That depends on the security rules that govern the instance and routing rules that apply to the subnet. A cloud provider may also assign a public DNS hostname to an instance with a public IP address. The typical public DNS hostname is under the domain of the cloud provider and, like a private DNS hostname, often has no real meaning. Still, the cloud provider does establish resolution of the public DNS hostname to the public IP address for external clients, so it is usable. If you have a DNS domain that you want to use for assigning public DNS hostnames to your instances, you can use the cloud provider's public DNS component to manage assignments (AWS Route 53, Google Cloud DNS, and Azure DNS). In the context of configuring and using Hadoop clusters, however, it's almost always sufficient to work with private DNS hostnames for instances. Save public DNS hostnames for those few gateway instances that host public-facing interfaces to your system. ###### Tip Without a public IP address or public DNS hostname, an instance is not reachable from the internet. It is therefore much more difficult to accidentally expose such an instance through, for example, overly permissive security settings. The private and public addresses for instances in a virtual network provide a logical means for finding where instances are. It is not as obvious how to understand where a virtual network and subnets within it are located. # Virtual Networks and Regions The location of a subnet in a virtual network, or of an entire virtual network, is determined in different ways, depending on the cloud provider. A subnet in AWS and Google Cloud Platform, besides determining the private IP address for an instance, also determines the region where the instance resides. In AWS, each subnet that you define is assigned to an availability zone, so instances in the subnet run in that availability zone, in the zone's region. In Google Cloud, the arrangement is slightly different: each subnet is associated with an entire region, but when you provision a new instance, you can select an availability zone in the subnet's region. The association of regions with subnets in these providers make subnets the means by which you take geography into account when architecting the network topology for your clusters. There is a need to strike a balance between the fast, open communication possible between instances in a single subnet with the availability and reliability benefits of distributing instances across regions and therefore across subnets. Figure 4-2 shows an example virtual network demonstrating subnets in different locations. ###### Figure 4-2. A virtual network spanning two regions and multiple availability zones Region determination works differently in Azure. With this provider, each subnet and, in turn, each virtual network is associated with a resource group, and a resource group specifies the region for all its resources. So, setting up a cluster that spans regions is somewhat more challenging in Azure, since you will need multiple resource groups, which spreads out management. Chapter 10 goes into detail about spanning clusters across availability zones and regions. The general advice is to never span regions, and rarely even span availability zones, due to the impact to performance and the high cost of data transfer, given the large amount of intracluster traffic that Hadoop generates. An architecture that keeps clusters confined to single regions, and even single availability zones, is much more cost effective. # Routing Cloud networking is about much more than placing instances in the right IP address ranges in the right geographic regions. Instances need paths to follow for communication with other instances and with the world outside the cloud provider. These paths are called _routes_. From the point of view of an instance, there are several possibilities for where a route leads. The shortest and simplest path is back to the instance's own subnet. There are also usually routes that lead to other subnets in the instance's virtual network. Some other routes lead outside the network, either to other virtual networks, or completely outside the cloud provider. A route is comprised of an IP address range and a destination. The route declares that a resource whose IP address falls within its range can be reached by communicating with the route's destination. Sometimes the destination is the desired resource itself, a direct route; but sometimes it is a device, specialized instance, or cloud provider feature that handles establishing communication. In general, that sort of intermediary destination is called a _gateway_. Here are some examples of routes, which are also illustrated in Figure 4-3: * For IP addresses in the CIDR range 192.168.128.0/18, the destination is subnet C. * For IP addresses in the CIDR range 10.0.0.0/8, the destination is the corporate VPN gateway. * For any IP address (CIDR 0.0.0.0/0), the destination is the internet gateway. ###### Figure 4-3. Routes leading from a subnet to various destinations A cloud instance has a set of routes to look through, which are arranged into a _route table_ or _routing table_. Given an IP address to communicate with, the route table is consulted, and the best match for the destination IP address is used. Sometimes there is only one route that satisfies the need, but sometimes there are multiple. In that case, generally, the route that most specifically matches the IP address is chosen. Suppose that an instance has an associated route table listing the three example routes as shown in Figure 4-3. When a process on the instance attempts to initiate communication with 10.0.0.126, the instance's networking system consults the route table and looks for the best match. The IP address does not fall within the range for subnet C, so that route is discarded. The VPN route and the internet route both match; however, the VPN route is a better match, so that route is chosen. If there is no match at all, then network communication will fail. That is why it is typical for there to be a catch-all (or default) route for CIDR 0.0.0.0/0 that leads to the internet, the idea being that any IP address not accounted for must be outside the cloud provider. ###### Tip Designing a cloud network architecture can appear daunting. A cloud provider gives you a lot of power and flexibility, but that carries complexity as well. Fortunately, when you create your first virtual network, the cloud provider sets up a reasonable default configuration for networking so you can get started quickly. For exploratory use the configuration is often acceptable, but before long you will want to look at routing and security rules to ensure they are set up for what you need, such as your first Hadoop cluster. Routing is an important factor in building out a functioning Hadoop cluster. The daemons that comprise each service, like HDFS and YARN, need to be able to connect to each other, and the HDFS datanodes in particular need to be available for calls from pieces of other services. If all of a cluster's daemons are confined to a single subnet, then the cloud provider's default routing is enough; some providers can even handle routing across subnets automatically or with their defaults. For reaching out farther, such as across VPNs or to the internet, it usually becomes necessary to define some routes, as the defaults start out restrictive for the sake of security. Each cloud provider provides routing services in a different way. ## Routing in AWS In AWS, a route table is an independent object that is associated with VPCs and subnets. Each VPC has a route table that is used as the default for subnets that do not have their own route tables. The destination for each route is termed a _target_. There are a variety of targets available, some of which are described here: * A "local" target points to the virtual network of the communicating instance. This covers not only that instance's own subnet, but other subnets in the same VPC. * An internet gateway target provides access to the internet, outside the cloud provider. When a subnet has a route to the internet, it is called a _public subnet_ ; without one, it is called a _private subnet_. See "Public and Private Subnets" for more detailed descriptions. * A virtual private gateway links to your corporate network's VPN device, allowing access to resources within that network. To establish this connection, you must define a _customer gateway_ in AWS representing the VPN device, create a virtual private gateway that links to it, and then define the IP address ranges covered by the gateway. * A VPC peering connection allows for communication between VPCs using just private IP addresses. * A network address translation (NAT) gateway provides access to the internet for private subnets. The gateway itself resides in a public subnet. ## Routing in Google Cloud Platform In Google Cloud Platform, each route is associated with a network, so all instances in the network may have use of it. Routes and instances are associated by tags: if a route has a tag, then it is associated with any instance with a matching tag; if a route has no tag, it applies to all instances in the network. All of the routes defined for a network form the network's _route collection_ , while all of the routes that are associated with an instance form that instance's routing table. The destination for each route is termed its _next hop_. There are a variety of destinations available, some of which are described here: * A subnet, or portion of a subnet, can be designated as the next hop by providing a CIDR block for its private IP addresses. * An internet gateway URL for the next hop provides direct access to the internet, as long as the source instance has an external (public) IP address. * The URL or IP address of a single instance can be the next hop. The instance needs to be configured with software that can provide connectivity to the ultimate desired destination. For example, the instance could use Squid as a proxy or perform NAT using iptables to provide internet access. Google Cloud Platform provides a service called Cloud VPN to help manage connectivity between your corporate VPN device and your instances in virtual networks, as well as between virtual networks in Google Cloud Platform itself. A VPN gateway leading to a VPN tunnel is another possible next hop for a route. ## Routing in Azure In Azure, a route table is an independent object that is associated with subnets. A route table may be associated with multiple subnets, but a subnet can have only one route table. Azure provides _system routes_ for common needs, which are usually comprehensive enough that you do not need to define a route table at all. For example, system routes direct network traffic automatically within a subnet, between subnets in a virtual network, and to the internet and VPN gateways. If you define a route table for a subnet, its routes take precedence over system routes. The destination for each route is termed its _next hop_. There are a variety of destinations available, some of which are described here: * The local virtual network can be specified as the next hop for traffic between subnets. * A virtual network gateway or VPN gateway for the next hop allows traffic to flow to other virtual networks or to a VPN. * Naming the internet as the next hop provides direct access to the internet. * A null route or black hole route can be used as the next hop to drop outgoing traffic completely. # Network Security Rules If routing builds the roads for traffic between your instances, then security rules define the laws the traffic must obey. Cloud providers separate the definitions of the connections between instances from the definitions of how data may flow along those connections. In a way, routing is a coarse-grained security measure: if there is no route defined between an instance and some destination, then absolutely no traffic can pass between them. When a route is established, however, then security rules provide a way to allow some kinds of traffic and disallow others. As with routing, each cloud provider provides network security in different ways, but they share common concepts. ## Inbound Versus Outbound _Inbound_ rules control traffic coming to an instance, while _outbound_ rules control traffic leaving an instance. Most of the time, you will find yourself focusing on inbound rules, and allowing unrestricted traffic outbound. The implication is that you trust the activity of the instances that you yourself control, but need to protect them from traffic coming in from outside, particularly the internet. ## Allow Versus Deny An _allow_ rule explicitly permits some form of network traffic, while a _deny_ rule explicitly blocks it. If an allow rule and a deny rule conflict with each other, then usually the deny rule wins out. A common pattern is to establish an allow rule with a broad scope, and then use deny rules to pick out exceptions; for example, you could allow HTTP access from everywhere with one rule, and add deny rules that block IP ranges that are known to exhibit bad behaviors. Some security rule structures do not use deny rules at all. Instead, they start from an initial implicit state of denying all traffic, and you add allow rules for only what you want to permit. ## Network Security Rules in AWS AWS provides two main mechanisms for securing your VPC. ### Security groups The most common mechanism used is _security groups_. A security group provides a set of rules that govern traffic to and from an instance. Each instance can belong to one or several security groups; a VPC also has a default security group that applies to instances that aren't associated with any groups themselves. Each rule in a security group only allows traffic. If none of the security groups for an instance allows a particular kind of traffic, then that traffic is denied by default. A rule in a security group can apply to either inbound traffic or outbound traffic. An inbound rule allows traffic into an instance over a protocol (like TCP or UDP) and port or port range from either another security group or a range of IP addresses. Similarly, an outbound rule allows traffic out from an instance to either another security group or to a range of IP addresses. Here are some examples of typical inbound and outbound security group rules: * If you are running a web server on an instance, an inbound rule for TCP port 80 can allow access from your IP address, or the IP range for your corporate network, or the entire internet (0.0.0.0/0). * To allow SSH access to an instance, an inbound rule should permit access for TCP port 22. It's best to restrict this rule to your own IP address, or those in your network. * If a process running on an instance will need to access a MySQL server elsewhere, an outbound rule over TCP port 3306 will allow it. The destination could be the IP address of the MySQL server or, if the server is running in EC2, the server's security group. Figure 4-4 shows how these rules appear in the AWS console. The image is a composite view of both the Inbound and Outbound tabs for a single security group. ###### Figure 4-4. A security group with some example rules Each VPC comes with a simple, default security group that allows outbound access to anywhere, but inbound access only from other instances in the same security group. This means that you need to set up SSH access from your local network before you can access instances provisioned there. One convenient feature of security groups is that you only need to allow one side of a two-way connection. For example, it is enough to allow TCP port 80 inbound for a web server; since requests are allowed to flow in, AWS automatically permits responses to flow back outbound from the web server. This feature is not true of the other main mechanism for securing VPCs, network ACLs. ### Network ACLs _Network ACLs_ are a secondary means of securing a VPC. Like security groups, they are comprised of a set of rules that govern network traffic. Unlike security groups, a network ACL is associated with a subnet, not individual instances. A subnet may only have one network ACL, or else it falls back to its VPC's default network ACL. A network ACL rule can either allow or deny traffic. While all of the rules in a security group apply to every network access decision, the rules in a network ACL are evaluated in a numbered order, top to bottom, and the first matching rule is enforced. If none of the rules match, then the fixed, final default rule in every network ACL denies the traffic. Each network ACL rule is an inbound rule or outbound rule, as with security group rules. A rule applies to a protocol and port range, but sources and destinations are only specified as IP address ranges, not as security groups. Figure 4-5 lays out a simple network ACL that allows limited inbound SSH access and HTTP access, but no other network traffic. The image is a composite view of both the Inbound Rules and Outbound Rules tabs for the ACL. ###### Figure 4-5. An ACL with some example rules The inbound rules allow only SSH access from one IP address range and HTTP port 80 access from two IP address ranges. Any other inbound network access is blocked by the default final deny rule. The outbound rules allow any traffic over nonprivileged TCP ports. This is necessary to permit outbound traffic for SSH and HTTP connections. Unlike security groups, network ACLs require you to allow both sides of two-way connections. Since it can be unpredictable what port a requesting process may use to connect out from its host, the network ACL rule here permits a wide range of ports. To illustrate, here is an example of an HTTP client outside the virtual network performing an HTTP request to a server running inside the network. The simple ACL defined previously gates both the incoming request and outgoing response. _Inbound request from 10.1.2.3:12345 to port 80_ * rule 100: does not apply (port range) * rule 200: does not apply (source CIDR) * rule 220: applies, so access is allowed _Outbound response from port 80 to 10.1.2.3:12345_ * rule 100: applies, so access is allowed Each VPC comes with a default network ACL that allows all traffic inbound and outbound. So, by default, your VPC does not make use of a network ACL for security, but it is still available for a second line of defense. ## Network Security Rules in Google Cloud Platform Google Cloud Platform supports _firewall rules_ for governing traffic to instances in a network. Firewall rules are associated with the network itself, but they can apply to some or all of the instances in that network. Each firewall rule only allows traffic. If none of the firewall rules for a network allow a particular kind of traffic, then that traffic is denied by default. A firewall rule controls inbound traffic only. You can control outbound traffic from an instance using network utilities installed on the instance itself. You can specify the source a firewall rule applies to as either a range of IP addresses, a subnet in the network, or an instance tag. When a subnet is specified, then the rule applies to all of the instances in that subnet as sources. An instance tag limits the applicability of a firewall rule to just instances with that tag. Each firewall rule names a protocol (like TCP or UDP) and port or port range on the destination instances that it governs. Those instances can be either all of the instances in the network, or just instances with another instance tag, called a target tag. Here are some examples of typical firewall rules. They are shown with some others in Figure 4-6: * If you are running a web server on an instance, a rule for TCP port 80 can allow access from your IP address, or the IP range for your corporate network, or the entire internet (0.0.0.0/0). To narrow down where the firewall rule applies, you can tag the web server instance as, say, "webserver", and provide that tag as the target tag for the rule. * To allow SSH access to an instance, a rule should permit access for TCP port 22. It's best to restrict this rule to your own IP address, or those in your network. ###### Figure 4-6. Some firewall rules (some source IP ranges are obscured) The default network that Google Cloud Platform supplies for you comes with a small set of firewall rules that allow all traffic within the network as well as SSH (TCP port 22), RDP (port 3389), and ICMP from anywhere. This is a reasonable default behavior, although it makes sense to adjust the rules to limit sources to just your own IP address or your own network. Any new networks you create, however, do not start out with any firewall rules, and so absolutely no inbound access is permitted. It is up to you to build out the necessary firewall rules to gain access. One convenient feature of firewall rules is that you only need to allow one side of a two-way connection. For example, it is enough to allow TCP port 80 inbound for a web server; since requests are allowed to flow in, Google Cloud Platform automatically permits responses to flow back outbound from the web server. There are a few automatic firewall rules that are enforced on all networks. Here are some of them: * TCP port 25 (SMTP) is always blocked outbound from your network. * TCP ports 465 and 587 (SMTP over SSL) are also always blocked outbound, except to SMTP relay services hosted on Google Apps. * Network traffic using a protocol besides TCP, UDP, or ICMP is blocked unless the Protocol Forwarding feature of Google Cloud Platform is used to allow it. ###### Tip Check the latest Google Cloud Platform documentation for ways to send email from its instances, such as SMTP relays, that involve third-party email providers. One final security rule deserves mention here. If an instance does not have a external IP address assigned to it, then it is not granted access to the internet. This rule is enforced even if a network route provides a path to an internet gateway URL. To reach the internet from such an instance, it's necessary to go through a gateway, using either NAT or a VPN. ## Network Security Rules in Azure Azure provides _network security groups_ for controlling traffic into and out of either subnets or individual virtual machines through their network interfaces. A virtual machine can be subject to its subnet's network security group as well as its own. A network security group holds a set of rules, each of which controls either inbound traffic or outbound traffic. An inbound rule allows or denies traffic into an instance over a protocol (like TCP or UDP) and port or port range from either a range of IP addresses, a default tag (defined next), or all sources. Similarly, an outbound rule allows or denies traffic out from an instance to either a range of IP addresses, a default tag, or all destinations. A _default tag_ is a symbolic representation for a set of IP addresses. For example, the virtual network tag stands in for the local virtual network and those connected to it. The internet tag represents the internet, outside of Azure's infrastructure and connected VPNs. Here are some examples of typical inbound and outbound security group rules: * If you are running a web server on an instance, an inbound rule for TCP port 80 can allow access from your IP address, or the IP range for your corporate network, or the entire internet using the internet default tag. * To allow SSH access to an instance, an inbound rule should permit access for TCP port 22. It's best to restrict this rule to your own IP address, or those in your network. * If a process running on an instance will need to access a MySQL server elsewhere, an outbound rule over TCP port 3306 will allow it. The destination could be the IP address of the MySQL server. Figure 4-7 shows how these rules appear in the Azure portal. ###### Figure 4-7. A network security group with some example rules Rules are evaluated in priority order to determine which one holds sway. A lower number priority on a rule indicates a higher priority. Every network security group has a default set of rules, which have lower priorities than any user-defined rules. They allow, among other things, all traffic from the same virtual network and all outbound traffic to the internet, but deny inbound traffic from anywhere but the virtual network. The rules can be overridden with user-defined rules. # Putting Networking and Security Together As you have seen, there is a lot to think about when it comes to networking and security in a cloud provider. Getting started with them can feel like jumping into the deep end of a pool, or being dropped into a foreign land without a map. Here are some pointers to getting rolling. Cloud providers do try to start you out with a sensible initial arrangement: a single virtual network with one or a few subnets, and default routing and security rules applied. Of all the concerns, routing tends to require the least amount of attention, as defaults and fallbacks define almost all of the necessary connections. For small-to-medium Hadoop deployments, a single virtual network usually suffices. As described in the beginning of this chapter, it is useful to think of each virtual network as a container for your clusters. With subnets to provide any necessary divisions or regional variations, and ample IP addresses available, you may find you can go a long time before needing to define an entirely new network. Routing and security rules become more important once traffic needs to be sent to or received from outside a virtual network. Keeping Hadoop clusters confined to single subnets or, at worst, single virtual networks eliminates most of the need to define routes and security rules. One important exception is allowing SSH access to some number of instances, which is described in the following chapters about getting started with each cloud provider. Another is opening up ports for applications running alongside clusters, or for web interfaces of Hadoop components. For these exceptions, the process is typically only defining a route if necessary and declaring a security rule that allows access. # What About the Data? The purpose here of creating cloud instances, networking them together, and establishing routes and security rules is to stand up Hadoop clusters, and the purpose of these clusters is to work on data. The data moves through the network between instances, but where is it stored? As you would expect, cloud providers offer ranges of storage options that include disks, databases, general object storage, and other services. Understanding how these storage options can be used is just as important for creating effective clusters as understanding networking and security. See "Cluster Topologies" for a description of gateway instances. # Chapter 5. Storage Hadoop clusters are about working with data, usually lots and lots of data, often orders of magnitude larger than ever before. Cloud providers supply different ways to store that data on their vast infrastructure, to complement the compute capabilities that operate on the data and the networking facilities that move the data around. Each form of storage serves a different purpose in Hadoop architectures. # Block Storage The most common type of storage offered by a cloud provider is the disk-like storage that comes along with each instance that you provision. This storage is usually called _block storage_ , but they are almost always accessed as filesystem mounts. Each unit of block storage is called a _volume_ or simply a _disk_. A unit of storage may not necessarily map to a single physical device, or even to hardware directly connected to an instance's actual host hardware. _Persistent_ volumes survive beyond the lifetime of the initial instances that spawned them. A persistent volume can be detached from an instance and attached to another instance, in a way similar to moving physical hard drives from computer to computer. While you wouldn't usually do that with physical drives, it is much easier to do so in a cloud provider, and it opens up new usage patterns. For example, you could maintain a volume loaded with important data or applications over a long period of time, but only attach it to an instance once in a while to do work on it. Volumes that are limited to the lives of the instances to which they are attached are called _ephemeral_ volumes. Ephemeral storage is often very fast and can be large, but it is guaranteed to be eliminated when an instance is stopped or terminated, at which time its data is permanently lost. In the context of Hadoop clusters, critical cluster-wide information like HDFS namenode data should reside on persistent storage, but information that is normally replicated across the cluster, like HDFS data copied in as the source for a job, _can_ reside on ephemeral storage. A volume is backed up by taking a _snapshot_ , which preserves its exact state at an instant in time. It is common to take snapshots of a volume repeatedly over time, and cloud providers store snapshots in an incremental fashion so that they don't take up unnecessary space. If something goes wrong with a volume, perhaps due to data corruption or a rare hardware failure, then a new volume can be created from a snapshot and attached to an instance to recover. A snapshot can also be used as the basis for a new instance image, in order to generate many new identical volumes over time. For security, the major cloud providers all support encryption at rest for data on persistent volumes. They all also automatically replicate persistent volumes, often across data centers, to avoid data loss from hardware failures. ## Block Storage in AWS The AWS component offering block storage is called Elastic Block Storage (EBS). When you provision an instance in EC2, you select an image for its root device volume, and the image determines whether that volume is a persistent volume in EBS or an ephemeral volume in the EC2 instance store. The root device volume houses the operating system and other files from the image. The physical hardware can use either magnetic or SSD storage. After provisioning an instance, you can attach multiple additional EBS volumes, or you can swap out the EBS root device volume of an instance with another existing one. EBS volumes are resizable, although for older instance types one must be detached before it can be resized. Some EC2 instance types support both EBS and ephemeral volumes, while others only support EBS. Those that support ephemeral volumes do so through drives that are attached to the physical hosts for the instances. Data on those ephemeral drives survive reboots of their associated instances, but not stoppages or termination. Each instance type specifies the maximum number and size of supported ephemeral volumes. ## Block Storage in Google Cloud Platform Persistent block storage for Google Compute Engine (GCE) instances are called persistent disks. When you provision an instance in GCE, a root persistent disk is automatically allocated to house the operating system and other files from the image selected for the instance. After provisioning an instance, you can attach multiple additional persistent disks. Each persistent disk, including the root disk, can use either magnetic or SSD storage. Persistent disks can be resized at any time. Any instance provisioned in GCE can be augmented with local SSDs, which are drives attached to the physical hosts for the instance. These drives are ephemeral storage; while data on them survives reboots of their associated instances, it is discarded when the associated instance stops or terminates. They come in a fixed size and only a limited number may be attached to an instance. Like persistent disks, local SSDs support at-rest encryption. RAM disks are another block storage option for GCE instances. A RAM disk is a virtual drive that occupies instance memory. These are even more ephemeral than local SSDs, as their data does not even survive instance restarts; however, they can be very fast. ## Block Storage in Azure Every Azure virtual machine is automatically granted two _virtual hard disks_ or VHDs: one based on an image hosting the operating system, and a second temporary disk for storing data that can be lost at any time, like swap files. Both of these disks are persistent, but the content of the temporary disk is not preserved if the virtual machine is migrated to different hardware. Additional persistent VHDs can serve as data disks to store data that needs to last; they are either created by mandate from the virtual machine image or can be attached later. The operating system disk and data disks are resizable, but the associated virtual machine must be stopped first. All VHDs are actually stored as _page blobs_ within the storage account associated with your Azure account, and the replication strategy for the storage account determines how widely disk contents are backed up across data centers. See "Object Storage in Azure" for further discussion about storage accounts. Azure File Storage is another block storage service, dedicated to serving file shares over the Server Message Block protocol. A file share works like a mounted disk, but it can be mounted across multiple virtual machines simultaneously. Finally, while not necessarily qualifying as a block storage service, Azure Data Lake Store (ADLS) stores files of arbitrary size in a folder hierarchy. The service is designed to satisfy the requirements of a Hadoop-compatible file system, so cluster services such as Hive and YARN can work with it directly. # Object Storage Disk-like block storage is clearly essential for supporting instances, but there is still the problem of where to keep large amounts of data that should survive beyond the lifetime of instances. You may have a compressed archive of some massive data set that will be referenced across multiple instances, or even from outside the cloud provider. You may have a backup of some important analytic results or critical logs that must be preserved. Sometimes it is possible to dedicate a block storage volume to store these big chunks of data, but there still must be at least one instance running to access it, and often it can be tricky to share that volume across multiple instances. As an alternative, cloud providers offer _object storage_. In object storage, each chunk of data is treated as its own entity, independent of any instance. The contents of each object are opaque to the provider. Instead of accessing a data object through a filesystem mounted on a running instance, you access it through either API operations or through URLs. Cloud providers each offer their own object storage solution, yet they all share many common features. ## Buckets Data objects reside inside containers called _buckets_. A bucket has a name and is associated with one or more regions. ###### Note Azure calls its buckets _containers_. There are restrictions on bucket names, because a bucket's name is used as part of the URLs for accessing objects in the bucket. In general, you should avoid special characters, spaces, and other characters that can be problematic in URLs. A bucket name must be unique to your cloud provider account; the solutions for AWS and Google Cloud Platform also require them to be globally unique. The region or regions associated with a bucket determine where in the world the objects in the bucket are stored. Hadoop clusters benefit in performance and cost by working with buckets that are in the same region as their instances. A bucket can be configured with replication to other regions, through provider-specific mechanisms, to geographically disperse data. This can be a valuable tool for expanding Hadoop architectures across regions; instead of clusters around the world all needing to reach back to a single region to access bucket contents, the bucket can be replicated to the clusters' regions for faster, cheaper local access. A bucket does not have an internal hierarchy for object storage, but object naming can be used to create the appearance of one. ## Data Objects A data object in object storage is a single opaque unit from the cloud provider's point of view. Metadata in the form of key-value pairs can be associated with each object, to use as tags or as guides for searching for, identification of, and tracking of the data within. The name of an object is used to locate it. As with buckets, there are restrictions on object names since they are also used in URLs. Although buckets are flat storage, objects can include forward slashes in their names to create the appearance of a directory-style hierarchy. The APIs, tools, and conventions for object storage interpret object names in a way that supports hierarchical access, often by treating common slash-delimited prefixes of object names as pseudodirectories. An object has a _storage class_ , which determines how quickly it can be accessed and, in part, its storage cost. The standard or default storage classes for cloud providers favor quick access over cost, and these classes tend to be the ones most useful for storing data Hadoop clusters will use. Other storage classes cost less but aim at access frequencies on the order of a few times each month or each year. While Hadoop clusters cannot effectively use objects in those storage classes directly due to their intentionally lower performance, they can be employed in associated archival strategies. Most of the time, a data object is immutable. When an object needs to be updated, it is overwritten with a completely new version of it. Cloud providers are capable of storing past, versioned copies of objects so that they can be restored as necessary in the future. ###### Note AWS and Google Cloud Platform object storage services automatically version each data object as it is updated. Azure's object storage service does not, but permits taking snapshots of data objects. Each data object can have permissions associated with it, in order to restrict who may access it. The permissions scheme folds in with each cloud provider's own authorization systems. ## Object Access There are two main methods for accessing objects in object storage. The most flexible method is through the cloud provider's own API, which provides all of the access and management operations available. An API client can create new objects, update them, and delete them. It can manage access permissions and versioning as well. Jobs running in Hadoop clusters can use APIs to work with objects, either directly or through common libraries. Some libraries provide a filesystem-like view of buckets, enough to allow access in many of the same ways that jobs would work with HDFS. This is a powerful capability, because it lets new clusters start their work right away by reading from durable, reliable object storage, instead of waiting to be primed by getting data copied up to their local HDFS storage. By the same token, clusters can save their final results back to object storage for safekeeping or access by other tools; once that happens, the clusters could be destroyed. So, object storage access enables the use of _transient_ clusters, a pattern that is covered in more detail in Chapter 15. The other main method for object access is through URLs. Each provider's object storage service offers a REST API for working with buckets and objects; perhaps the most salient capability is simply the ability to download an object with an HTTP GET request. Because of URL access, each bucket and object must be named to be compatible with URL syntax. For example, an object named "my-dir/my-object" in a bucket named "my-bucket" could be accessed by the following URLs, depending on the cloud provider. Each provider supports a handful of different URL formats: * AWS: _https://s3.amazonaws.com/my-bucket/my-dir/my-object_ * Google Cloud Platform: _https://storage.cloud.google.com/my-bucket/my-dir/my-object_ * Azure: _https://my-account.blob.core.windows.net/my-bucket/my-dir/my-object_ The following sections get into more detail about the differences in the object storage services offered by major cloud providers. ## Object Storage in AWS The AWS component offering object storage is called Simple Storage Service, or S3. It stores objects in buckets that are each associated with a single region that determines where objects are stored. A bucket can be configured to replicate data to a bucket in a different region for redundancy. S3 offers four storage classes, and a bucket may hold objects in any mix of classes: * The _standard_ storage class is aimed at fast, frequent data access. * The _standard-ia_ or _standard-infrequent access_ storage class carries the same durability guarantees as the standard class. It costs less to store data in this class, but each retrieval has an associated fee. * The _reduced redundancy storage_ or _RRS_ storage class is just as fast as the standard class but has lower durability guarantees. It costs less, and should be used for data that can be regenerated if necessary. * The _Glacier_ storage class is for nonrealtime, long-term, cheap data storage. Data must be "restored" from Glacier before it can be accessed. The storage class for each object is selected when it is first created. Lifecycle configuration rules can be attached to buckets to automatically migrate data from more accessible to less accessible storage classes over time, so that less frequently accessed data can be stored more cheaply. ## Object Storage in Google Cloud Platform Google Cloud Storage is the service offering object storage for Google Cloud Platform. It stores objects in buckets, which are each associated with a location and a default storage class. Google Cloud Storage offers four storage classes, and a bucket may hold objects in several classes: * The _regional_ storage class is aimed at fast, frequent data access, with storage confined to a single region determined by the bucket location. * The _multi-regional_ storage class is similar to ordinary regional storage, but data is replicated across multiple regions, determined by the bucket location. It costs somewhat more than regional storage. * The _nearline_ storage class carries the same durability guarantees as the regional and multi-regional classes. It costs less to store data in this class, but each retrieval has an associated fee. * The _coldline_ storage class is for long-term, cheap data storage. Retrieval for objects in coldline storage costs much more than for nearline storage. The storage class for each object is selected when it is first created, or defaults to that of the bucket. Lifecycle policies can be attached to buckets to automatically migrate data from more accessible to less accessible storage classes over time, so that less frequently accessed data can be stored more inexpensively. ## Object Storage in Azure Azure has a few different forms of data storage. The service that is most pertinent to Hadoop clusters is Azure Blob Storage. Azure Blob Storage stores objects, which are called _blobs_. There are a few types of blobs: * A _block blob_ is an immutable, opaque data object. * An _append blob_ can have additional data appended to it, and can be used to receive a stream of data such as continuously generated logs. * A _page blob_ is used by Azure as the backing storage for disks. Of the three types of blobs, the block blob is the type most useful for Hadoop clusters. Page blobs are used to store virtual machine disks, but it's not necessary to work with them directly. Each blob is stored in a container. Each container, in turn, is associated with a _storage account_ that is part of your Azure account. You can have multiple storage accounts, and each serves as a home for object storage containers and other forms of cloud storage offered by Azure. It is notable that the name for a storage account must be globally unique, but this means that container names only need to be unique within a storage account. There are two kinds of storage accounts: general-purpose and blob. A blob storage account allows for specifying one of two access tiers for the objects stored within it: * The _hot_ access tier is aimed at fast, frequent data access. It has higher storage cost, but lower access and transaction costs. * The _cold_ access tier carries the same durability guarantees as the hot access tier. It costs less to store data in this tier, but it has higher access and transaction costs. The storage account also determines the primary region where objects are stored, as part of the account's replication strategy. There are four replication strategies available: * _Locally redundant storage_ , or LRS, has the highest performance, but the lowest durability and is bound to a single data center in a single region. * _Zone redundant storage_ , or ZRS, goes further than LRS and spreads data out to multiple data centers, either in a single region or a pair of regions. However, it has limitations in when it can be used; in particular, a blob storage account cannot use ZRS. * _Geo-redundant storage_ , or GRS, is similar to ZRS in that it replicates data out to a secondary region. * _Read-access geo-redundant storage_ , or RA-GRS, works like GRS but also allows replicated data to be read from the secondary region. The access tier and replication strategy for each object is determined by the storage account governing the container where the object is created. With some limitations and some costs, the access tier and replication strategy for a storage account can be changed over time. # Cloud Relational Databases Although Hadoop breaks away from the traditional model of storing data in relational databases, some components still need their own databases to work their best. For example, the Apache Hive metastore database is crucial for mapping non-relational data stored in HDFS into a relational model that allows for SQL queries. The Apache Oozie workflow scheduling system also requires a backing database. While these components and others often can work using embedded databases, supported by software like Apache Derby, they are only production-ready when their databases are stored on full-fledged servers. By doing so, those database servers can themselves be maintained, backed up, and even shared across components, as part of an overarching enterprise architecture. It is also helpful in some situations to simply have relational databases store some data that Hadoop clusters use or refer to. Using Hadoop does not require completely abandoning other useful technologies. Analysis jobs can refer to tables in outside databases to find metadata about the information being analyzed, or as lookup or translation mechanisms, or for numerous other helpful purposes. Finally, applications that work with Hadoop clusters may require their own relational databases. Perhaps authentication and authorization information resides in one, or the definitions of data views reside in another. It is perfectly reasonable to use an ordinary cloud instance as the host for a database server. It is a familiar and comfortable arrangement for database administrators, and lets you carry over existing maintenance processes into the cloud. You have direct control over upgrades, downtime, backups, and so on, and additional applications can be installed alongside the server as necessary. There are images available for popular databases to make standing up a database server instance even easier. However, cloud providers also offer native, abstracted services for supporting database servers. With these services, instead of requesting a compute instance, you request a database server instance, specifying the type, version, size, capacity, administrative user credentials, and many other parameters. The cloud provider handles setting up the server and ensuring it is accessible to your virtual networks as you request. You do not have login access to the instance, but can access the database server process using all the usual client tools and libraries in order to define schemas and load and query data. The provider handles backups and ensures availability. Hadoop components can easily use cloud relational databases. The servers have hostnames and ports, and you can define the users, accesses, and schemas each component requires. From the components' points of view, the servers host remote databases like any other. ## Cloud Relational Databases in AWS The AWS component offering cloud relational databases is called Relational Database Service, or RDS. Each _database instance_ hosts a single database server, and is similar in concept to an EC2 instance, having an _instance class_ that determines its compute power and memory capacity. Storage capacity is managed separately, ranging from gigabytes to terabytes. Like ordinary instances, database instances run inside an availability zone associated with a subnet inside a VPC network, and security groups govern access. Moreover, a multi-AZ database instance can continuously replicate its data to another in a separate availability zone. RDS also automatically takes care of performing periodic database backups and minor server software upgrades. It also handles automatically failing over a multi-AZ database instance in case of the loss of the primary database instance, due to an availability zone outage or a hardware failure. RDS supports many popular database types, including MySQL, MariaDB, PostgreSQL, Oracle, and Microsoft SQL Server. It also offers Aurora, a MySQL-compatible database type that has some additional benefits, including the ability to establish a database cluster. For database types that require licenses, such as Oracle and Microsoft SQL Server, you have the option of bringing your own license (BYOL) or establishing instances that AWS has already licensed. ## Cloud Relational Databases in Google Cloud Platform Google Cloud SQL is the primary service offering cloud relational databases for Google Cloud Platform. A Cloud SQL instance hosts a database server in a specific region and availability zone, and like an ordinary instance has a _machine type_ determining the number of virtual CPUs and the size of its memory. Storage capacity is specified separately and can be set to grow automatically as needed. Network access to Cloud SQL instances can be granted by whitelisting the IP addresses of GCE instances, but an easier method is to use a Cloud SQL proxy, which provides an encrypted tunnel to a Cloud SQL instance. Client use of a proxy works just like ordinary database access, and the proxy can be configured with a list of Cloud SQL instances to support or perform automatic discovery. A Cloud SQL instance can be set up for high availability, which causes the creation of a second instance serving as a failover replica. If the primary instance becomes unavailable, Google Cloud SQL automatically switches to the replica, redirecting the hostname and IP address accordingly. Google Cloud SQL also handles periodic database backups. Only MySQL is supported by Google Cloud SQL. ##### Google Cloud Spanner In beta at the time of writing, Google Cloud Spanner is another, new cloud relational database service that takes advantage of Google's robust global network to natively provide high availability while enforcing strong consistency. Cloud Spanner automatically maintains replicas across availability zones in the chosen region where an instance resides. What's more, it provides ways to control where related data is located through features like parent-child table relationships and interleaved tables. ## Cloud Relational Databases in Azure The Azure SQL Database service focuses primarily on the creation and maintenance of relational databases, as opposed to the servers that host them. A database belongs to a _service tier_ , which defines the guaranteed amount of compute, memory, storage, and I/O resources available for database access. Each database runs on a server; multiple databases can reside on a single server. A database server belongs to an Azure resource group, which determines the region where the server resides. Firewall rules associated with a database server control which ranges of IP addresses are permissible for client access. The service tier of a database can be updated over time in response to changing needs, but a more powerful approach is to use _elastic pools_. Resource usage is spread across all of the databases belonging to the pool, and administrative tasks can be conveniently performed _en masse_. Azure SQL Database handles performing automatic backups, storing data both local to each database and in a separate data center. Long-term backups can be sent to a vault. You can also set up replication to several additional databases in other regions, any of which can be promoted to serve as a new primary database. Azure SQL Database fully supports Microsoft SQL Server. However, newer services such as Azure Database for MySQL and Azure Database for PostgreSQL, support those open source databases in a similar fashion, including tiered guarantees on size and performance and automatic replication. ##### Azure Cosmos DB Newly introduced at the time of writing, Azure Cosmos DB is a service for managing globally distributed databases that are either relational or nonrelational, using a common data storage model beneath. The service gives you some control over how data is partitioned and automatically scales storage to achieve the desired throughput. You can also choose from one of several consistency models to guide the timeliness of data availability. Behind the scenes, Cosmos DB spreads data globally to fit your desired associations, and you can control whether to focus service interactions on specific regions or across the world. # Cloud NoSQL Databases It is in the same spirit of offering relational database services that cloud providers also offer services that provide nonrelational or "NoSQL" databases. These services are usually pushed to the margins when working with Hadoop clusters, since Hadoop's own data storage technologies take center stage. However, as with relational databases, NoSQL databases can be useful for ancillary applications associated with the cluster. In general, the databases hosted by NoSQL database services are highly scalable both in size and geolocation, and offer high performance. The cloud provider handles administration and availability concerns, much like they do for relational databases. Access control is managed by the cloud provider's own identity and access management systems. The primary drawback of NoSQL database services is that they are much more specific to each cloud provider. While any well-supported relational database supports SQL, each cloud provider's NoSQL database service has a way, or set of ways, of working with data that differs from other services, sometimes even those from the same provider. This can contribute to becoming tied to a single cloud provider, which may be undesirable from a competitive point of view. Also, Hadoop components rarely have use for a NoSQL database beyond whatever storage is set up within their clusters. Still, NoSQL database services are a part of the storage services available from cloud providers, and they can find their place in some architectures. Here is a quick rundown of what is available at the time of writing: * AWS offers the DynamoDB database service. Tables can be accessed through the AWS console or through a variety of client-side libraries. * Google Cloud Platform offers two NoSQL database services. Cloud Datastore works well for frequent transactions and queries and has higher durability, while Bigtable emphasizes speed and supports access through the API for Apache HBase. * Azure's DocumentDB service, now part of Azure Cosmos DB, stores databases containing collections of documents, and can be accessed through a RESTful protocol as well as the MongoDB API. Azure Table Storage, which is associated with storage accounts, works with entity-based data. # Where to Start? This chapter has covered four distinct forms of storage supported by cloud providers: block, object, relational, and NoSQL. Each of these is provided by one or more cloud provider services, and those are just a part of those providers' suites of services. It can be a lot to take in, especially when figuring out how Hadoop clusters fit. The two more important services to think about are block storage and object storage. Block storage is the most crucial, since it provides the disk volumes that instances need to run. Every cluster needs block storage as an underpinning, and fortunately it is reasonably straightforward to work with. Object storage is a powerful addition to your clusters, giving you a place to keep data that survives cluster lifetimes and even supporting direct use by some Hadoop components. Relational database services are handy for supporting the Hadoop components and secondary applications that work with clusters, but are not as important as block and object storage, especially since you can host your own database servers on ordinary instances. NoSQL database services are the least important, being unnecessary for most cluster architectures, but potentially useful in some cases. Understanding the three core concepts of instances, networking, and storage, you are ready to jump in and create clusters in the cloud. The next part of this book begins with individual chapters for three major cloud providers, in which you will prepare instances and virtual networks necessary for a simple cluster. You should focus on your cloud provider of choice, although it is informative to see how similar tasks work in other providers, so you may want to skim the chapters for the other providers: * If you are using AWS, continue with Chapter 6. * If you are using Google Cloud Platform, continue with Chapter 7. * If you are using Azure, continue with Chapter 8. Once you have worked through your cloud provider's chapter, Chapter 9 pushes forward with Hadoop installation, configuration, and testing, which works much the same no matter what provider you use. The choice of region also influences how data may be accessed. See "Configuring the S3 Endpoint" for more information. The term "blob," which simply refers to a large chunk of data, has an interesting etymology. Chapter 11 covers setting up Hive in the cloud. Azure resource groups are described in detail in "Creating a Resource Group". # Part III. A Simple Cluster in the Cloud In this part, you will stand up a simple Hadoop cluster running on the infrastructure of a cloud provider. The first three chapters in this part each focus on a separate cloud provider, so start with the one that you use. The chapters for the other providers can give you a sense of what it's like to use a different one, so they may also be of interest. The cluster that you create will have the same structure, regardless of the provider you choose. The simple cluster built here is used as the basis for further exploration later on in the book. # Chapter 6. Setting Up in AWS In this chapter you'll create a simple Hadoop cluster running in Elastic Compute Cloud (EC2), the service in Amazon Web Services (AWS) that enables you to provision instances. The cluster will consist of basic installations of HDFS and YARN, which form the foundation for running MapReduce and other analytic workloads. This chapter assumes you are using a Unix-like operating system on your local computer, such as Linux or macOS. If you are using Windows, some of the steps will vary, particularly those for working with SSH. # Prerequisites Before you start, you will need to have an account already established with AWS. You can register for one for free. Once you are registered, you will be able to log in to the _AWS console_ , a web interface for using all of the different services under the AWS umbrella. When you log in, you are presented with a dashboard for all of those services. It can be overwhelming, but fortunately, for this chapter you only need to use one service: EC2. Find it on the home page in the console, as shown in Figure 6-1. ###### Caution Over time, Amazon will update the arrangement of the console, and so the exact instructions here may become inaccurate. ###### Figure 6-1. EC2 on the AWS console home page Notice at the top of the page a drop-down menu, as shown in Figure 6-2, with a geographic area selected, such as N. Virginia, N. California, or Ireland. This indicates the AWS region where you are currently working. If the selected region is not the one you prefer, go ahead and select a different one using the drop-down. It is generally a good idea to use a region that is close to your location. ###### Figure 6-2. A drop-down menu for the AWS regions # Allocating Instances In this section, you will launch the instances that will comprise a Hadoop cluster. You will also ensure that they have the right networking connections, and that you can connect to them over SSH. ## Generating a Key Pair Before provisioning instances in EC2, you must create a _key pair_. A key pair consists of a public key and a private key, to be used for SSH communication with your instances. If you are already familiar with asymmetric encryption technologies such as SSL/TLS, you will be comfortable with EC2 key pairs. You can have AWS generate the key pair for you and download the private key. As an alternative, you can use a client-side tool like OpenSSL to create the key pair yourself, and then upload the public key to AWS. For now, you'll let AWS do the work. To have AWS generate a key pair, log in to the AWS console and select EC2. A menu will appear on the left side of the page with options for working in EC2. Select Key Pairs in the menu. The main area of the page will show that you have no key pairs for the region yet. Click the Create Key Pair button to start the process of creating a new key pair, and follow the instructions. When you are done, you will receive a PEM file that contains a private key. The phrase "BEGIN RSA PRIVATE KEY" starts the contents of the file. This is the key file you will use to SSH to your provisioned instances. Save the file in a safe place, using file permissions on your local computer to protect it (e.g., make it readable only by your account). A great place to store it is in the hidden _.ssh_ directory in your home directory, which is normally used by OpenSSH for key storage and other sensitive files: $ mv keyfile.pem ~/.ssh $ chmod 600 ~/.ssh/keyfile.pem ## Launching Instances You're now ready to launch instances. For this simple cluster, you'll launch four instances: one "manager" and three "workers." The manager instance will host the HDFS namenode and the YARN resource manager, while the workers will host the HDFS datanodes and YARN node managers. A minimum of three workers is recommended, since the default HDFS replication factor is three. ### The manager instance Let's start by launching the manager instance. Select Instances from the EC2 menu. (Pick EC2 from the set of AWS services if you need to.) You'll see that you don't have any running instances yet; you'll change that. Click the Launch Instance button to start the process. In the first step, you need to choose an image to base your instance on, as shown in Figure 6-3. In AWS, an image is called an _Amazon Machine Image_ (AMI). A "Quick Start" set of AMIs is presented to you. The AMIs cover popular operating systems and architectures; they are updated periodically as new recommended images are made available. Find an AMI for Ubuntu Linux that uses virtualization type HVM and select it. ###### Figure 6-3. Some AMI choices ##### Free Tier For the first year that you have an AWS account, you are eligible for the free tier, which lets you provision small instances on free operating systems without any cost. The free tier is great for exploring how to use AWS, but the instance types that fall within it are, sadly, too underpowered to host a Hadoop cluster that can do more than trivial work. ###### Note You do not need to use Ubuntu to deploy Hadoop in the cloud. It was chosen for the instructions here because it is popular and widely supported across all cloud providers. The steps for using a different Linux distribution can differ, especially in the system tools available and in package management. Next, select an instance type for the manager. A subset of the available choices is shown in Figure 6-4. A manager instance often needs more powerful specifications than a worker. For this cluster, select an instance type in the General purpose family with at least four vCPUs and at least 8 GB of memory. Over time, EC2 introduces new instance types with faster processing, better or more memory, or better storage capabilities, and these new types are preferred over older ones. Unless you have particular requirements that only an older instance type satisfies, you should favor new instances types. ###### Figure 6-4. Selecting an EC2 instance type Instead of clicking the tempting Review and Launch button, you need to work through the full set of steps for launching an instance to fully configure it. Click the Next: Configure Instance Details button to review networking choices and other information. The form for doing so is shown in Figure 6-5. ###### Figure 6-5. EC2 instance details There is a lot to digest here, but here are some highlights: * The number of instances to launch defaults to one. That is fine for now, because only one manager is necessary for a simple cluster. * A VPC has already been selected. Your AWS account is automatically set up with a VPC upon creation; if you are using a long-standing, shared account, there may be a few VPCs to choose from. * The shutdown behavior defines what happens if you issue a system shutdown within your instance (e.g., **`/sbin/shutdown`** ). The default of Stop leaves the instance available in your account to be started again, but selecting Terminate causes the instance to instead be destroyed. You should leave Stop selected. * You can enable termination protection on instances so that they cannot be terminated without explicitly disabling the protection via the console as an extra step. Since the cluster will have multiple instances talking to one another, configuration will be easier and performance will be much better if they are all close to each other in the network. So, select a specific subnet from the list of available subnets. A _subnet_ is a segment of the overall address space in a VPC that resides within a single availability zone. Remember the subnet you choose now, so that the worker instances can be provisioned there as well. Click Next: Add Storage to see options, as shown in Figure 6-6, for adding storage to the new instance. ###### Figure 6-6. EC2 instance storage configuration By default, an EC2 instance comes with a modest amount of dedicated storage mounted as its root volume. Increase the amount, if necessary, to at least 30 GB, so that there is ample room for installing what you need for your cluster. Resist the temptation to add more storage than you need: you will be charged per GB provisioned, not per GB utilized. Then click Next: Tag Instance to see the tag entry form as in Figure 6-7. ###### Figure 6-7. Setting EC2 instance tags Tags are simple name-value pairs that are attached to instances. They are useful for organizing instances and noting their name, purpose, owner, or any other basic information. For this instance, enter a tag with key "Name" and value "manager". Click Next: Configure Security Group to set up security for the new instance using the form shown in Figure 6-8. ###### Figure 6-8. The default security group selection for EC2 instances Here, you will define the permissions for network communications to and from the cluster through a security group. Start by selecting the "Create a new security group" radio button, and then entering "basic-security" for the group name. Supply any description you like. The renamed security group is shown in Figure 6-9. The new security group defaults to having one incoming rule, allowing SSH access from any IP address, and is represented by the CIDR 0.0.0.0/0. While this can be acceptable for a case such as this where you are only trying things out, you should instead restrict access to only an appropriate range of IP addresses. To restrict SSH access to your IP address alone, either replace the default CIDR address by selecting Custom IP and enter your IP address, or just select My IP to have your address autodetected. To instead restrict access to a range of IP addresses (e.g., your address may change over time, or you may switch local computers), select Custom IP and enter the appropriate CIDR address. ###### Note If you are on a local network that accesses the internet through a router performing network address translation (NAT), then be sure to use the IP address assigned to the router. The My IP autodetection should select the correct IP address. ###### Figure 6-9. Updated security group configuration for EC2 instances Click the Review and Launch button to see an overview of the instance you are about to launch. The chosen AMI, instance type, security group, and other details are available to look over. When you are satisfied, click the Launch button to complete the last step. Before EC2 proceeds to launch your instance, you will be asked for a key pair to use for SSH access. Since you already created a key pair, select its name and click Launch Instances. Your new instance will start to launch. You can monitor its progress by returning to the AWS console and selecting Instances from the EC2 menu. Once the instance state is shown as "running," you can attempt to connect to it over SSH, using the private key from your chosen key pair to authenticate. The username to use depends on the AMI you have chosen; sometimes "root" will work, but often it will be a different username; for Ubuntu, you can try "ubuntu" as the username. You can use either the public DNS name or public IP address to reach the instance; these can be found in the instance details when you select the manager instance from the list of running instances. ###### Tip The AWS console can help you with your SSH command line for connecting to an instance. Select Instances from the EC2 menu, select the row for the instance you want to connect to, and click the Connect button. A dialog box will suggest an SSH command line, including a username that may work. ### The worker instances Once you can connect to the manager instance, you've completed the first step toward standing up a cluster. Now, repeat the preceding steps to launch the three worker instances. The procedure is almost the same, but there are important changes: * You can choose a less powerful instance type for workers: for example, an instance type with only two vCPUs. * When configuring instance details, change the Number of Instances to 3. * Be sure to select the same subnet as the one hosting the manager instance. As mentioned earlier, this will make configuration of the cluster much easier. * Use the value "worker" for the Name tag. * Instead of creating a new security group, select the same security group that you created for the manager instance. After the worker instances are launched, make sure you can SSH to each of them as well. At this point you have a set of instances that is able to run a Hadoop cluster. # Securing the Instances Some of the work to secure the new instances was done when the security group for them was defined, but there is a little more to do. If you took the recommended step of locking down SSH access in the "basic-security" security group created while allocating instances, then SSH between instances will not work. This is because the security group only allows SSH from your IP address (or IP address range), and nowhere else. So, the security group must be updated to allow wider SSH access. In fact, there will be more than just SSH traffic between instances once the cluster is running, so the best way to allow it all is to open up inbound traffic from anywhere in the security group itself. Start by selecting Security Groups from the EC2 menu. Select the row for the "basic-security" group, and then select the Inbound tab for the group. Click the Edit button, and then Add Rule in the dialog box that appears. For the Type of the new rule, select "All traffic," and enter the security group ID or name in the Source field. Click Save, and the security group will be updated. At this point, it should be possible to SSH between any two instances in the security group. # Next Steps At this point, there are instances destined to host a cluster running in EC2. To pause here, you can stop the new instances by selecting them in the list of running instances and then using the Actions button to select Instance State, and then Stop. You can start them later by using Start in the same menu. Otherwise, proceed to Chapter 9 to install Hadoop and configure it, and then try it out with some basic MapReduce jobs. If you just created your AWS account, you may discover that you are not permitted to use such a powerful instance type right away. If so, go ahead and use a free tier instance type that at least has the minimum memory needed. The cluster will still work for experimentation. # Chapter 7. Setting Up in Google Cloud Platform In this chapter you'll create a simple Hadoop cluster running in Google Compute Engine (GCE), the service in Google Cloud Platform that enables you to provision instances. The cluster will consist of basic installations of HDFS and YARN, which form the foundation for running MapReduce and other analytic workloads. This chapter assumes you are using a Unix-like operating system on your local computer, such as Linux or macOS. If you are using Windows, some of the steps will vary, particularly those for working with SSH. ###### Tip If you just worked through the previous chapter on AWS, you'll find that this chapter covers the same procedures, just under Google Cloud Platform. If you're more interested in using your AWS cluster, skip ahead to Chapter 9. # Prerequisites Before you start, you will need to have an account already established with Google Cloud Platform. You can use your current Google account, or register for a separate account for free. Once you are registered, you will be able to log in to the _Google Cloud Platform console_ , a web interface for using all of the different services under the Google Cloud Platform umbrella. When you log in, you are presented with a dashboard providing a curated view of some of those services; a complete list is available from the "hamburger" menu accessible from the top-left corner. For this chapter, you will be focusing on GCE, whose dashboard tile is shown in Figure 7-1. ###### Figure 7-1. GCE on the Google Cloud Platform dashboard ###### Caution Over time, Google will update the arrangement of the console, and so the exact instructions here may become inaccurate. # Creating a Project Work that you perform in Google Cloud Platform is always done within the context of a _project_. You can define projects yourself and switch between them. Each project defines a scope for instances, billing, security, default metadata, and so on. Perhaps most importantly, a project has a default region and availability zone for instances that are created within it. Google Cloud Platform will select a region that is near your location, but you can choose a different one yourself if you want. To create a new project, use the project drop-down menu next to the search bar across the top of the dashboard to select "Create a project." The menu is shown in Figure 7-2. ###### Figure 7-2. Creating a new project A cluster creation form, as shown in Figure 7-3, appears. This project can be called "My First Cluster". By selecting "Show advanced options," you can select a specific default region for the project. Click the Create button to create the new project. Once the project has been created, the dashboard switches to working within it. Now you have a space for allocating instances. Open the hamburger menu and select Compute Engine. ###### Figure 7-3. The "My First Cluster" project # Allocating Instances In this section, you will launch the instances that will comprise a Hadoop cluster. You will also ensure that they have the right networking connections, and that you can connect to them over SSH. ## SSH Keys Before provisioning instances in Google Cloud Platform, you must provide it an _SSH key_. An SSH key is just the public key that forms half of a public/private key pair used for SSH communication with your instances. If you are already familiar with asymmetric encryption technologies such as SSL/TLS, you will be comfortable with SSH keys. If you already have a key pair that you like to use, you can reuse it for Google Cloud Platform. If not, you can create a new one yourself using a client-side tool like OpenSSL. In either case, you will upload the public key to Google Cloud Platform. Then, the public key can be chosen to be recognized by the default login account on newly provisioned instances, enabling SSH access. To create a new key pair, try using the _ssh-keygen_ utility. You can run it with no arguments to work completely interactively, or use command-line options to supply most of what the utility needs. The following example generates a 2048-bit RSA key, saving the private key to a file named "gcp" and the public key to a file automatically named "gcp.pub" in the hidden _.ssh_ directory, which is normally used by OpenSSH for key storage and other sensitive files: $ ssh-keygen -b 2048 -t rsa -f ~/.ssh/gcp ###### Note When ssh-keygen asks for a passphrase for the new private key, you can enter an empty string (press Enter or Return) to leave the key unprotected. This is a common practice done for convenience, so that the key can be used to connect via SSH without entering a passphrase every time. If you do this, though, be sure to protect the private key file by using file permissions (e.g., make it readable only by your account), so that it is less likely to be compromised. With the key pair generated, you can upload the _public_ key data to Google Cloud Platform. Select Metadata from the Google Cloud Platform menu, and then the SSH Keys tab in the main part of the page. The empty form for adding new keys is shown in Figure 7-4. Click the "Add SSH keys" button to reveal a simple form for adding the data. Copy the contents of your public key file to your clipboard, as demonstrated in Figure 7-5, and paste them into the text area. Then click Save. ###### Warning Use the contents of the _public_ key, not the _private_ key. Google Cloud Platform never needs to know your private key to provide SSH access. If you accidentally paste your private key data into the form, assume that the key has been compromised and generate a new one. ###### Figure 7-4. The SSH Keys tab ###### Figure 7-5. An SSH key ## Creating Instances You're now ready to create instances. For this simple cluster, you'll create four instances: one "manager" and three "workers." The manager instance will host the HDFS namenode and the YARN resource manager, while the workers will host the HDFS datanodes and YARN node managers. A minimum of three workers is recommended, since the default HDFS replication factor is three. ### The manager instance Let's start by creating the manager instance. Select VM instances from the Google Cloud Platform menu. You'll see, like in Figure 7-6, that you don't have any running instances yet; you'll change that. Click the "Create instance" button to start the process. ###### Figure 7-6. The first "Create instance" button ##### Free Trial After signing up for Google Cloud Platform, you are eligible for a limited-time free trial, during which you are granted a fixed amount of credit that can be used to provision instances. The free trial is great for exploring how to use Google Cloud Platform, but during the free trial you are limited in how many cores you can have active at once. This prevents you from getting in over your head, but also disallows creating Hadoop clusters that can do more than trivial work. After the free trial ends, there is a permanent _free tier_ , although resources that run under it are too underpowered for Hadoop. A form appears, covering the basic information needed to create a new instance: * Use the name "manager". * Select an availability zone near your location. It does not need to be within the default region of your project. * A manager instance often needs more powerful specifications than a worker. For this cluster, select an instance type in the standard family with at least four vCPUs and at least 8 GB of memory. * The boot disk hosts the operating system and file storage for the instance. Click the Change button to bring up a secondary form, as shown in Figure 7-7, where you can pick a different image and resize the disk. Select an Ubuntu image from the "Preconfigured image" tab, then increase the size, if necessary, to at least 30 GB, so that there is ample room for installing what you need for your cluster. ###### Figure 7-7. Boot disk options ###### Note You do not need to use Ubuntu to deploy Hadoop in the cloud. It was chosen for the instructions here because it is popular and widely supported across all cloud providers. The steps for using a different Linux distribution can differ, especially in the system tools available and in package management. The instance is ready to be created. While here, though, you can take a look through additional hidden options by selecting "Management, disk, network, SSH keys" near the bottom of the form. All of the defaults in these additional tabs are acceptable for this instance. * You can see that Google Cloud Platform automatically selects a subnet for the instance. When you create a new project, Google Cloud Platform establishes a network for it automatically with a few subnets, one per region. The subnetwork selected here resides in the same region as the availability zone for the instance. If you update the network definition with additional subnets for the region, this form lets you select from those subnets. * You could use the SSH Keys tab here to supply a public key, but since the project already has a default, it isn't necessary here. With the manager instance fully specified as shown in Figure 7-8, click the Create button to start the instance creation process. ###### Figure 7-8. The manager instance Your new instance will start to launch. You can monitor its progress on the Google Cloud Platform console by selecting "VM instances" from the Google Cloud Platform menu. Once the instance state is shown as running via a checkmark, you can attempt to connect to it over SSH, using the private key from your chosen key pair to authenticate. The username matches the username for your Google account. You can use the external IP address to reach the instance, which can be found in the list of instances in the console. ###### Tip The Google Cloud Platform console lets you connect to instances via SSH directly from the browser. Do this by selecting SSH from the Connect column in the list of instances. Google Cloud Platform generates a short-lived SSH key pair and configures a login account on the instance to recognize it, then connects you in a popup terminal window. The account created in this process does have sudo capability, so you can use it to fully explore the instance, including checking on what the standard account for the instance is. ### The worker instances Once you can connect to the manager instance, you've completed the first step toward standing up a cluster. On the VM instances dashboard page, you will see options across the top for creating an instance and an instance group. For efficiency, select Create Instance Group to begin the process of launching three worker instances at once. The procedure here is similar to setting up the single manager instance, but there are important changes. Start off by using the name "worker-group-1" and selecting the same availability zone you selected for the manager. Under "Creation method," leave "Use instance template" selected and select "Create an instance template" from the Instance Template drop-down. An _instance template_ defines the parameters needed to automatically generate several instances at once, and the form that appears for defining a template, shown in Figure 7-9, works just like the similar part of the form for creating a single instance: * Enter a template name "worker-template-1". * If you wish, choose a less powerful instance type for workers: for example, an instance type with only 2 vCPUs. * Select the same OS and root disk size. ###### Figure 7-9. The worker instance template Back on the main form, as shown in Figure 7-10, change the "Number of instances" to 3. Then click Create. ###### Figure 7-10. The worker instances The VM instances dashboard page will show three new instances being provisioned. Figure 7-11 shows a set of provisioned workers along with a manager. The name for each of the workers is automatically determined by Google Cloud Platform, but they are all prefixed with the instance group name. After the instances are running, make sure you can SSH to each of them as well. At this point you have a set of instances that is able to run a Hadoop cluster. ###### Figure 7-11. Instances running in GCE # Securing the Instances You may have noticed that, besides selecting availability zones, no network choices needed to be made for provisioning instances. That is because GCE automatically placed the instances into the default network, which was already populated with subnets and firewall rules. Those firewall rules can be updated to improve the security posture of the cluster. From the VM instances dashboard page, follow the link for the "default" network listed for any of the instances. (Alternatively, select Networking from the hamburger menu, then Networks, and follow the link for the "default" network.) The page for the default network, as shown in Figure 7-12, lists the subnets and firewall rules that are already in place. The firewall rules defined for the default network do limit access from outside the network to only a few ports, but for those ports they allow access from anywhere, as can be seen from the IP range of 0.0.0.0/0 for the relevant rules. Make the following changes to the firewall rules to make the network more secure: * Remove the RDP / port 3389 rule. * Edit the ICMP and SSH / port 22 rules to restrict them to your IP address or organization's IP address range. To edit a rule, follow the link for its name and select Edit from the menu at the top of the page to bring up the rule editing form. ###### Tip The IP range for a single IP address is expressed in CIDR notation by appending "/32" after the IP address, e.g., "203.0.113.123/32". ###### Figure 7-12. Default firewall rules Note the firewall rule that allows traffic on any port from IP addresses in the subnet. This enables unfettered network connectivity between instances in the subnet including SSH and all the other ports used by Hadoop components. That is why an additional allow rule for that traffic isn't required; that helpful, permissive firewall rule takes care of it. After updating the firewall rules, check to make sure that you can still connect to your instances via SSH as before. If you cannot, make sure that you used the correct IP address range in the edited rules. # Next Steps At this point, there are instances destined to host a cluster running in GCE. To pause here, you can stop the new instances by selecting them in the list of instances and then clicking the Stop button in the options across the top of the list. You can start them later by using the Start button. Otherwise, proceed to Chapter 9 to install Hadoop and configure it, and then try it out with some basic MapReduce jobs. At the time of writing, the limit is eight, which is enough for a cluster of four instances with two cores each. Such a powerful instance type may run up against your free trial core limit. Go ahead and use fewer vCPUs if you wish; the cluster will still work for experimentation. # Chapter 8. Setting Up in Azure In this chapter you'll create a simple Hadoop cluster running in Azure. The cluster will consist of basic installations of HDFS and YARN, which form the foundation for running MapReduce and other analytic workloads. This chapter assumes you are using a Unix-like operating system on your local computer, such as Linux or macOS. If you are using Windows, some of the steps will vary, particularly those for working with SSH. ###### Tip If you just worked through a previous chapter on AWS or Google Cloud Platform, you'll find that this chapter covers the same procedures, just under Azure. If you're more interested in using your AWS or Google Cloud Platform cluster, skip ahead to Chapter 9. # Prerequisites Before you start, you will need to have an account already established with Azure. You can use your current Microsoft account, or register for a separate account for free. ##### Free Trial After signing up for Azure, you are eligible for a limited-time free trial, during which you are granted a fixed amount of credit that can be used to provision resources. The free trial allows you to explore Azure, but the limited number of permitted cores per region may be so low that you are unable to field a Hadoop cluster. If so, contact Azure Support to request a limit increase. Once you are registered, you will be able to log in to the _Azure portal_ , a web interface for using all of the different services under the Azure umbrella. A view of the portal is shown in Figure 8-1. When you log in, you are presented with a default portal arrangement with a starter set of tiles; a complete list of services is available from the menu on the left side of the portal. You are free to rearrange the tiles to your liking. ###### Figure 8-1. The default arrangement of the Azure portal ###### Caution Over time, Microsoft will update the default arrangement of the portal, and so the exact instructions here may become inaccurate. Also, as you work in Azure, the contents will change. # Creating a Resource Group Working in Azure is about managing _resources_ , which are things like virtual machines and virtual networks. Resources are grouped into _resource groups_ so that they can share the same lifecycle and be tagged and controlled together. Each resource group is associated with a region, so all of the resources in the group are tied to that region. As a start to building a cluster in Azure, create a resource group for all of the cluster's resources. To begin creating a resource group, select "Resource groups" from the portal menu. This opens a window within the portal, called a _blade_ , which lists the resource groups. As shown in Figure 8-2, there are none at the moment, so click the "+ Add" button in the toolbar to create one. ###### Figure 8-2. A closeup of the Resource groups blade A new blade appears, with a small form, as shown in Figure 8-3, to fill in about the resource group. Give it a name such as "my_first_cluster" and select a region for the "Resource group location." If you have just signed up for Azure, "Free Trial" is the only choice for the subscription; otherwise, pick the correct one. If desired, check the "Pin to dashboard" checkbox so that the resource group appears in the portal as a tile. Finally, click Create to complete the workflow. ###### Figure 8-3. The my_first_cluster resource group Once Azure creates the resource group, a new blade will appear for it, with an empty list of resources. If you close this using the "X" at the upper right, you will see a new tile like the one shown in Figure 8-4 for the resource group in the dashboard, as long as you checked the "Pin to dashboard" checkbox. ###### Figure 8-4. The my_first_cluster resource group in the portal # Creating Resources Now it's time to fill up the resource group with the resources needed for a Hadoop cluster. The resources are: * A virtual network, to house the cluster instances * A storage account, as a home for the disk storage used by the cluster * A network security group, to control network traffic to and from the cluster ###### Note In this chapter, the terms _virtual machine_ and _instance_ are used interchangeably. There is a somewhat standard process for creating any resource: select the resource type from the portal menu to bring up a blade with a list of the resources, click the "+ Add" button to begin the process of creating the resource, and follow the steps provided, ending up back at the resource list. Because Azure creates resources asynchronously, the resource list might not show a new resource immediately, but it can be refreshed. Notifications keep you informed of progress. The portal menu shows "favorite" resource types and other services, but all of them are available by following the "More services" option at the bottom of the menu. The menu contents can be customized by selecting and deselecting favorites, and the menu order can be rearranged by dragging items around. Do feel free to customize the menu for easier use. ###### Note Creating these resources before any virtual machines that will comprise your cluster is one possible workflow. You can instead go ahead and create the first virtual machine, and Azure will generate a virtual network, storage account, and network security group for you. The instructions here show the supporting resources first to highlight how they are configured. Start with creating a virtual network by selecting "Virtual networks" from the portal menu. Following the usual workflow, click the "+ Add" button above the empty list of virtual networks to reveal a form, as shown in Figure 8-5, for beginning the creation process: * Give the virtual network a name such as "cluster_net". * The default IP address space for the network is 10.0.0.0/16, which is more than enough. * Likewise, the first subnet in the network, named "default" with IP address space 10.0.0.0/24, will work fine for a cluster. * Select the same subscription that you used for the resource group. You'll do this for each new resource, so it is not called out again here. * Select the resource group that you just created. This will also populate the location with the resource group's location. Again, this is a common step across resources and won't be repeated in these steps. ###### Figure 8-5. The virtual network End by clicking the Create button. As with the resource group, and with other resources that you will make, you should see notifications that the resource is being created and then is ready. You can refresh the list of virtual networks to see it listed. Next, create a storage account so that you can access Azure Storage services. This provides a home for the disks that will be attached to cluster instances. Start from the "Storage accounts" portal menu item and follow the usual workflow, using the form shown in Figure 8-6: * Give the account a name. This must be globally unique across all Azure storage accounts, so short or obvious names might not be available. * Select "Resource manager" for the deployment model. * The correct account type is "General purpose," since this will be for virtual machine disks, as opposed to only blobs. * Select Premium for performance. This directs the storage account to use SSDs for disks, instead of slower magnetic storage. Some virtual machine images require premium storage. * For replication, select LRS (locally redundant storage) as the cheapest option. It may be the only option available. There are several options for data redundancy, which are discussed in "Object Storage in Azure". * Storage service encryption may be disabled. ###### Figure 8-6. The storage account Now for the network security group, starting from "Network security groups" in the portal menu and using the form shown in Figure 8-7, the only unique piece of information needed is a name, such as "cluster_nsg". ###### Figure 8-7. The network security group With a network security group defined, add an inbound rule that permits SSH access from your local computer, so that you can connect directly to any of the cluster instances. Select the group from the list of network security groups, if necessary, to see a blade like the one shown in Figure 8-8, providing an overview of the group with its empty lists of inbound and outbound rules. ###### Figure 8-8. An overview of the new network security group Select "Inbound security rules" from the blade menu to reveal a list of empty rules. Click the "+ Add" button above the list to create a new rule. Populate the new rule as shown in Figure 8-9: * Give the rule a name such as "cluster_ssh". * Pick a priority. The default of 100 represents the highest possible priority and is fine as a default. * For a source, select "CIDR block," and provide an IP address range that includes your local computer. * Select SSH for the service, and the protocol and port range are filled in automatically. * Pick Allow for the action. ###### Figure 8-9. An inbound rule permitting SSH access # SSH Keys Before provisioning instances in Azure, you need to generate an _SSH key_. An SSH key is just the public key that forms half of a public/private key pair used for SSH communication with your instances. If you are already familiar with asymmetric encryption technologies such as SSL/TLS, you will be comfortable with SSH keys. If you already have a key pair that you like to use, you can reuse it for Azure. If not, you can create a new one yourself using a client-side tool like OpenSSL. In either case, the public key can be provided for the login account on newly provisioned instances, enabling SSH access. To create a new key pair, try using the _ssh-keygen_ utility. You can run it with no arguments to work completely interactively, or use command-line options to supply most of what the utility needs. The following example generates a 2048-bit RSA key, saving the private key to a file named "azure" and the public key to a file automatically named "azure.pub" in the hidden _.ssh_ directory, which is normally used by OpenSSH for key storage and other sensitive files: $ ssh-keygen -b 2048 -t rsa -f ~/.ssh/azure ###### Note When ssh-keygen asks for a passphrase for the new private key, you can enter an empty string (press Enter or Return) to leave the key unprotected. This is a common practice done for convenience, so that the key can be used to connect via SSH without entering a passphrase every time. If you do this, though, be sure to protect the private key file by using file permissions (e.g., make it readable only by your account), so that it is less likely to be compromised. # Creating Virtual Machines With the preliminary work of establishing necessary support resources out of the way, you're now ready to create virtual machines. For this simple cluster, you'll create four instances: one "manager" and three "workers." The manager instance will host the HDFS namenode and the YARN resource manager, while the workers will host the HDFS datanodes and YARN node managers. A minimum of three workers is recommended, since the default HDFS replication factor is three. ## The Manager Instance Let's start by creating the manager instance, following the usual procedure: Select the Virtual machines item in the portal menu and click the "+ Add" button in the currently empty list of virtual machines, as shown in Figure 8-10. ###### Figure 8-10. The initially empty list of virtual machines A blade for the Azure Marketplace appears so you can select an image to base your instance on. Enter "ubuntu" in the search field to look for available Ubuntu images, and select a recent Ubuntu Server image. Remember which one you select, so you can re-use it for other cluster instances. Figure 8-11 shows a couple of options for Ubuntu versions. ###### Figure 8-11. Search results for Ubuntu in the marketplace ###### Note You do not need to use Ubuntu to deploy Hadoop in the cloud. It was chosen for the instructions here because it is popular and widely supported across all cloud providers. The steps for using a different Linux distribution can differ, especially in the system tools available and in package management. The next blade asks for your deployment model, either Resource Manager or Classic. As shown in Figure 8-12, select the newer Resource Manager model, which lets you work with your cluster resource group, and click the Create button. ###### Figure 8-12. Selecting the Resource Manager deployment model Next, a pair of blades appear to work through a wizard-like workflow for creating a new instance. The first step is a form, shown in Figure 8-13, for basic settings: * Use the name "manager". * Provider a username for the default account. These instructions assume the username is "ubuntu". * Select "SSH public key" for the authentication type, and for the next field copy in the _public_ key from your SSH key pair. ###### Warning Use the contents of the _public_ key, not the _private_ key. Azure never needs to know your private key to provide SSH access. If you accidentally paste your private key data into the form, assume that the key has been compromised and generate a new one. * Select the "Use existing" radio button for the resource group and enter the name for your resource group. Click OK to move to the next step. ###### Figure 8-13. The basic settings for the manager instance Now select a size for the manager instance. A manager instance often needs more powerful specifications than a worker. For this cluster, select an instance size with at least four vCPUs and at least 8 GB of memory. Figure 8-14 shows some available instance sizes, along with their monthly costs, at the time of writing. ###### Figure 8-14. Some available instance sizes for a virtual machine The next form, shown in Figure 8-15, is for "optional" settings, but for setting up a Hadoop cluster they are quite important: * Select the storage account, virtual network, default subnet, and network security group that you created earlier. They may be automatically selected in the form. * A new public IP address is suggested. Highlight the automatic selection and a pair of new blades appear, one for choosing a public IP address with the "Create new" option selected, and a second with a small form for defining the public IP address. A public IP address in Azure is a resource like any other, so you can establish one for the manager now. In the public IP address form, enter a name for the public IP address resource and select Static assignment. * Monitoring diagnostics may be disabled. ###### Figure 8-15. Optional settings for the manager instance The last part of the workflow is just a summary, so you can verify your choices before Azure begins to create the virtual machine. An example summary is shown in Figure 8-16. Click OK one last time to start the creation process. ###### Figure 8-16. A summary of the manager instance settings Azure automatically places a tile on the portal for the new virtual machine, which animates as the instance is created. You can select the tile to bring up a blade about the virtual machine and monitor its progress. You may notice that Azure automatically creates yet another resource, a _network interface_. This is analogous to a network adapter card in a physical machine, and links the virtual machine to its public IP address and virtual network. When the virtual machine is created and running, the overview of the virtual machine describes its "Essentials," including the public IP address reserved for it. An example overview is shown in Figure 8-17. You can now attempt to connect to it over SSH, using the username and SSH key provided during the creation process. ###### Figure 8-17. Essential information about the new manager instance ## The Worker Instances Once you can connect to the manager instance, you've completed the first major step toward standing up a cluster. Now, repeat the preceding steps to launch the three worker instances. The procedure is almost the same, but there are a couple of important changes: * Use unique names for the instances, such as "worker1", "worker2", and "worker3". * You can choose a less powerful instance size for workers: e.g., an instance size with only two vCPUs. After the worker instances are launched, make sure you can SSH to each of them as well. At this point you have a set of instances that is able to run a Hadoop cluster. # Next Steps The default rules of the network security group automatically permit connectivity between all of the instances, since they all belong to the same virtual network, and the explicit inbound rule in the group restricts SSH access appropriately, so there are no further steps needed to secure the instances. To pause here, you can stop each new virtual machine; go to the list of virtual machines and select Stop in each one's action menu, which is denoted by an ellipsis (three periods). You can start them later by selecting Start in the same menu. Otherwise, proceed to Chapter 9 to install Hadoop and configure it, and then try it out with some basic MapReduce jobs. A /16 CIDR block such as this covers 65,536 addresses. For more about interpreting CIDR notation, see "A Drink of CIDR". Such a powerful instance size may not be available under a free trial subscription. Go ahead and select an instance size that at least has the minimum memory needed. The cluster will still work for experimentation. # Chapter 9. Standing Up a Cluster Now that you have instances up and running in the cloud provider of your choice, they can be set up to run a Hadoop cluster. If you don't have instances at the ready and want to follow along, then go back to Chapter 6 for AWS, Chapter 7 for Google Cloud Platform, or Chapter 8 for Azure first, and then return here. # The JDK Hadoop requires a Java runtime to work, and so Java must be installed on each of your new instances. A good strategy is to use the operating system package management capability already on the instances, e.g., `yum` on Red Hat Linux, `apt` on Ubuntu. Cloud providers ensure that these capabilities work within their infrastructures, sometimes even providing local mirrors or gateways to help. Table 9-1 suggests packages to install for some operating systems. As new versions of Java are released, the package names will change. Table 9-1. Suggested Java packages OS | Package names ---|--- Debian or Ubuntu | openjdk-8-jdk or openjdk-7-jdk Red Hat or CentOS | java-1.8.0-openjdk or java-1.7.0-openjdk Instead of using a package available natively for your operating system, you can install an Oracle JDK by downloading an installation package directly from Oracle. Since you have root access to your instances, you are free to use whatever means you prefer to install Java. After you have installed Java, make note of where the Java home directory is (i.e., what the `JAVA_HOME` environment variable should be set to). You will need to know this location later. # Hadoop Accounts While Hadoop can run under the root account, it is better security practice to use nonprivileged accounts. For this simple cluster, create two ordinary user accounts on each instance for running HDFS and YARN. These instructions will assume that the usernames for the account are "hdfs" and "yarn". They will both belong to a new "hadoop" group. For even better security, instead of creating passwords for the new accounts, use an SSH key pair. One option is to copy in the _authorized_keys_ file from the standard login account for the instance; that way, you can use the same private key to connect via SSH from your local computer to any of the accounts on the instances: $ sudo groupadd hadoop $ for u in hdfs yarn; do > sudo useradd -G hadoop -m -s /bin/bash ${u} > sudo mkdir /home/${u}/.ssh > sudo cp ~/.ssh/authorized_keys /home/${u}/.ssh > sudo chmod 700 /home/${u}/.ssh > sudo chown -R ${u} /home/${u}/.ssh > done # Passwordless SSH The Hadoop distribution includes some helpful utility scripts that can connect to each instance in your cluster to start and stop everything for a service at once. To use these scripts, passwordless SSH must be established from the "hdfs" and "yarn" accounts on the manager instance to the same accounts on each of the worker instances, as well as for hopping from the manager instance back to itself. While your cloud provider key pair can be used for passwordless SSH, it's better to keep its private key from being copied too widely. So, instead, generate new default SSH keys on the manager instance under each account, and then transfer the public keys to the corresponding accounts on the worker instances: # on manager: $ ssh-keygen -t rsa -b 2048 -f ~/.ssh/id_rsa -N '' $ cat ~/.ssh/id_rsa.pub >> ~/.ssh/authorized_keys # on each worker: $ cat >> ~/.ssh/authorized_keys # copy and paste public key contents ^D The preceding commands accomplish transferring the public keys by just copying and pasting their contents through your SSH sessions. Another option, which is automatable, is to copy the public keys using SCP back to your local computer, and then copy them again from there to each worker instance. On a larger system, management tools like Chef or Puppet could be used to automatically distribute keys. Now that the public keys have been distributed, connect via SSH from the "hdfs" and "yarn" accounts on the manager to the same accounts on each instance, including the manager itself, using each instance's private IP address. This is not only a useful check, but also gives you the chance to accept the key fingerprint for each instance and have it recorded in the SSH known hosts files of the manager accounts. Without doing so, automated scripts that use SSH might get stuck waiting for interactive confirmation of a fingerprint. If the connections fail, verify the security rules governing the instances, and make sure to use the private keys generated for each Hadoop account, not the private key set up with the cloud provider. # Hadoop Installation For now, the Hadoop cluster will only contain the basic Hadoop services HDFS and YARN. These instructions are based on the standard cluster setup instructions and use the standard binary distribution from Apache. If you already have a tried-and-true set of steps for Hadoop installation, or if you prefer to use a customized or bundled distribution from a Hadoop vendor, you may be able to adapt these instructions. To start, download a binary Hadoop distribution from _hadoop.apache.org_ to each of your instances, under the standard login account. You can download to your local computer and then use SCP to transfer the distribution to each of your instances, or instead use `curl` or `wget` on each instance to download the distribution directly. Apache uses a mirror system to offer distributions, so the simplest way to find a download URL is to visit the Hadoop download page to have it select a mirror, and then use the chosen mirror URL for your download command line. Since multiple user accounts will be running Hadoop components, install it in a commonly accessible location. For this cluster you'll use _/opt/hadoop_ as that common location: $ curl -O http://mirrorhost/path/to/hadoop-x.y.z.tar.gz $ sudo tar xzfC hadoop-x.y.z.tar.gz /opt $ sudo ln -s /opt/hadoop-x.y.z /opt/hadoop ###### Tip Example commands in this chapter will use the version number `x.y.z` to stand in for the real Hadoop version number. Unless you have a specific need otherwise, you should simply use the latest release. ###### Note About now you may notice how often you need to repeat steps for every instance in your cluster. Once you are creating lots of clusters in the cloud, it's a good idea to use a tool that issues commands over SSH to multiple instances at a time. Chapter 17 discusses some options. Now that Hadoop is installed, its _bin_ directory can be added to the `PATH` environment variable for each of the Hadoop accounts: # as hdfs and as yarn $ echo "export PATH=\"/opt/hadoop/bin:\$PATH\"" >> ~/.profile # HDFS and YARN Configuration Once Hadoop is installed across your cluster, it's time to configure it. The procedure here is much like configuring a Hadoop cluster on "real" hardware. Refer to the Hadoop documentation for all of the details, or consult texts like _Hadoop: The Definitive Guide_ by Tom White (O'Reilly). The instructions here are simple ones, just to get the cluster going. Again, if you are used to configuring Hadoop clusters, go ahead and adapt what you normally do. Many of these configuration steps require you to use `sudo`. The standard login account for your instances should be able to execute commands using `sudo`. ###### Tip To avoid needing to type `sudo` before every command, use **`sudo su -`** in the standard instance login account to open a shell as root. Be careful, though, since you will have unrestricted access to the machine. Unless otherwise stated, the configuration steps should be performed on every cluster node. Some that are only required on the manager node are called out. ## The Environment Create a script _/etc/profile.d/hadoop.sh_ that sets the `HADOOP_PREFIX` environment variable to point to the Hadoop installation. To have the script take effect, either log out and back in again, or source it in your current shell: # as root % echo "export HADOOP_PREFIX=/opt/hadoop" > /etc/profile.d/hadoop.sh ###### Tip Redirection of a command run under `sudo` happens under the initial account, and not as root. That is why the preceding command requires you to be logged in as root. An alternative is to use the `tee` utility to write the file, but then discard standard output: $ echo "export HADOOP_PREFIX=/opt/hadoop" | \ > sudo tee /etc/profile.d/hadoop.sh > /dev/null Create a symlink at _/etc/hadoop_ that points to _/opt/hadoop/etc/hadoop_ , since you will be using that directory for the cluster's configuration: $ sudo ln -s /opt/hadoop/etc/hadoop /etc/hadoop Create the directories _/var/log/hadoop_ and _/var/run/hadoop_ for Hadoop logs and process ID files, and make them writable only by the Hadoop accounts: $ for d in /var/log/hadoop /var/run/hadoop; do > sudo mkdir $d > sudo chgrp hadoop $d > sudo chmod g+w $d > done On many Linux distributions, the contents of _/var/run_ are stored on a temporary filesystem and destroyed on reboot, causing the new _/var/run/hadoop_ directory to vanish. There are two options to cope with this. First, you can simply use a different directory for process ID files, such as _/opt/hadoop/pids_ , which resides on a non-temporary filesystem; however, this is a nonstandard approach. The other option is to employ a system initialization script, in accordance with the Linux distribution you are using, that creates _/var/run/hadoop_ on each boot. These instructions assume the latter approach. Here is an example initialization script for Ubuntu and similar distributions, which can be saved as _/etc/init.d/hadoop_ : #!/bin/sh ### BEGIN INIT INFO # Provides: # Required-Start: $remote_fs $syslog # Required-Stop: $remote_fs $syslog # Default-Start: 2 3 4 5 # Default-Stop: 0 1 6 # Short-Description: Create Hadoop directories at boot ### END INIT INFO case "$1" in start) mkdir -p /var/run/hadoop chown root:hadoop /var/run/hadoop chmod 0775 /var/run/hadoop ;; esac The script can be activated through either of the following commands: # activate with fixed start priority of 98 $ update-rc.d hadoop defaults 98 # activate using dependencies in INIT INFO comments $ /usr/lib/lsb/install_initd hadoop Next, edit _/etc/hadoop/hadoop-env.sh_ and make the following changes: * Set the path for `JAVA_HOME`. Where this is depends on how you chose to install Java. If you used your platform's package manager, try seeing where _/usr/bin/java_ or _/etc/alternatives/java_ links to. * Set `HADOOP_LOG_DIR` and `HADOOP_PID_DIR` to point to _/var/log/hadoop_ and _/var/run/hadoop_ , respectively: export JAVA_HOME=/path/to/jdk export HADOOP_LOG_DIR=/var/log/hadoop export HADOOP_PID_DIR=/var/run/hadoop Edit _/etc/hadoop/yarn-env.sh_ and set the paths for `YARN_CONF_DIR` and `YARN_LOG_DIR` to point to _/etc/hadoop_ and `$HADOOP_LOG_DIR`, respectively. Also append a Java option to the `YARN_OPTS` variable so that YARN daemons prefer to listen over IPv4: export YARN_CONF_DIR=/etc/hadoop export YARN_LOG_DIR="$HADOOP_LOG_DIR" YARN_OPTS="$YARN_OPTS -Djava.net.preferIPv4Stack=true" ## XML Configuration Files Edit _/etc/hadoop/core-site.xml_ and configure the `fs.defaultFS` property with the address of your manager instance. Use the private IP address of the manager instance in the URL. You can find the private IP address for an instance by locating it in your cloud provider's console. You can also configure the `hadoop.tmp.dir` property with a different location for Hadoop's temporary file storage. HDFS, for one, uses this location as the basis for where namenode and datanode data is kept. The default value for the directory resides under _/tmp_ , which is cleared out when instances are restarted. If you want to be able to stop and start your cluster, you should change this location. The value `/home/${user.name}/tmp` directs Hadoop to use a temporary directory under each Hadoop account's home directory. You could select other persistent locations as well, perhaps those that map to large persistent disks. "Stopping and Starting Entire Clusters" discusses the practice of stopping and starting Hadoop clusters in more detail. <property> <name>fs.defaultFS</name> <value>hdfs://203.0.113.101:8020</value> </property> <property> <name>hadoop.tmp.dir</name> <value>/home/${user.name}/tmp</value> </property> _For Azure only_ , edit _/etc/hadoop/hdfs-site.xml_ and disable the requirement that datanodes have a resolvable IP address. Azure does not establish reverse DNS lookup for private IP addresses by default: <property> <name>dfs.namenode.datanode.registration.ip-hostname-check</name> <value>false</value> </property> Edit _/etc/hadoop/yarn-site.xml_ and make the following changes: * Configure the `yarn.resourcemanager.hostname` property for your manager instance. Use its private IP address here as well. * Configure the `yarn.nodemanager.aux-services` property with the value "mapreduce_shuffle". This enables YARN node managers to perform the shuffle stage of MapReduce jobs: <property> <description>The hostname of the RM.</description> <name>yarn.resourcemanager.hostname</name> <value>203.0.113.101</value> </property> <property> <name>yarn.nodemanager.aux-services</name> <value>mapreduce_shuffle</value> </property> Create the file _/etc/hadoop/mapred-site.xml_ ; the easiest way is to copy the empty template file for it: $ sudo cp /etc/hadoop/mapred-site.xml.template /etc/hadoop/mapred-site.xml Then, add the `mapreduce.framework.name` property with the value "yarn" so that the cluster will use YARN for executing MapReduce jobs. Also set the `yarn.app.mapreduce.am.staging-dir` property to the _/user_ directory in HDFS; this will allow users running MapReduce jobs to write staging data into their home directories in HDFS, which will have the necessary permissions: <property> <name>mapreduce.framework.name</name> <value>yarn</value> </property> <property> <name>yarn.app.mapreduce.am.staging-dir</name> <value>/user</value> </property> ## Finishing Up Configuration Edit _/etc/hadoop/slaves_ and replace its contents with a list of the private IP addresses for the worker instances. This only needs to be done on the manager instance. This file is used by Hadoop's helper scripts to find each worker. # Startup The cluster is ready to start. Begin by formatting HDFS as usual. Log in to the manager instance as the "hdfs" user for the step: # as hdfs $ hdfs namenode -format mycluster Now start up HDFS and YARN using the helper scripts, also on the manager instance. This uses the passwordless SSH set up earlier to connect to the manager itself and each worker to start the daemons. If you did not try out the connections manually and accept the key fingerprints for each instance, then you will see the interactive prompts emitted by these scripts; just type "yes" for each one you see and they should continue executing: # as hdfs $ $HADOOP_PREFIX/sbin/start-dfs.sh # as yarn $ $HADOOP_PREFIX/sbin/start-yarn.sh ###### Note For brevity, configuration and startup of the MapReduce Job History Server is omitted; the cluster will function without it. To set it up, establish a "mapred" user in the "hadoop" group, just like the "hdfs" and "yarn" users, and follow the standard instructions to configure and start the server. # SSH Tunneling Now that all of the daemons are started, you can check their statuses through their web interfaces. However, connecting directly will not work, because the security rules governing the instances block access from outside to the necessary ports. You can open up access to those ports from your IP address by adding new rules, but a better option is to use _SSH tunneling_ , which maps a local port on your computer to a remote port on another computer through SSH. Using SSH tunnels lets you leave only the SSH port open to anything outside the security group, and encrypts the traffic as a bonus. You can create SSH tunnels using the standard SSH client. Run commands like these to establish tunnels from the local ports 50070 (for the namenode web interface) and 8088 (for the resource manager web interface) to the same ports on your manager instance. Use the public IP address or, if it is available, the public DNS name for your manager instance to establish the connection from your local computer. For the remote end of the tunnel, "localhost" works for the namenode, but you must use the same IP address for the resource manager as configured for the `yarn.resourcemanager.hostname` configuration property in _yarn-site.xml_. $ ssh -i /path/to/cloud_provider_key.pem -n -N \ > -L 50070:localhost:50070 userid@manager.cloud-provider.example & $ ssh -i /path/to/cloud_provider_key.pem -n -N \ > -L 8088:203.0.113.101:8088 userid@manager.cloud-provider.example & Consult the man page for `ssh` for more information about setting up SSH tunnels. Tunneling is also covered in more detail in Chapter 14. Now, in your browser, navigate to _http://localhost:50070_ and _http://localhost:8088_ to see your namenode and resource manager ready for work. The web interfaces are being served from the manager instance, but tunneled through SSH to your browser. # Running a Test Job After all of that work, it should be gratifying to see your cluster in action. The Hadoop distribution comes with many example programs bundled in an examples JAR. You can use any of those on your new cluster. One easy one to try is the "pi" example, which calculates the value of pi using a MapReduce algorithm. MapReduce jobs in the cluster will write their history information to _/user/history_ in HDFS, so that directory needs to be established before any jobs are run. Using the "hdfs" user, create it with wide-open permissions but owned by the "mapred" user and the "hadoop" group: # as hdfs $ hdfs dfs -mkdir -p /user/history $ hdfs dfs -chmod -R 1777 /user/history $ hdfs dfs -chown mapred:hadoop /user/history Now, you can run the example under any account on an instance. For the account you choose, create a home directory in HDFS, using the hdfs account. Then go ahead and run the example: # as hdfs $ hdfs dfs -mkdir -p /user/userid $ hdfs dfs -chown userid /user/userid # as the user account $ export PATH=/opt/hadoop/bin:$PATH $ export HADOOP_CONF_DIR=/etc/hadoop $ hadoop jar \ > /opt/hadoop/share/hadoop/mapreduce/hadoop-mapreduce-examples-x.y.z.jar \ > pi 10 100 You should see the MapReduce job submitted to YARN and visible in the resource manager web interface. If not, then it is possible that you are not configured to use YARN for MapReduce, and the job is being run locally; check over the configuration, especially _yarn-site.xml_ and _mapred-site.xml_. After a short runtime and some output describing the progress of the job, you should see an answer like this. Yours may vary: Estimated value of Pi is 3.14800000000000000000 Congratulations, you have created a functional Hadoop cluster in the cloud! You should feel free to try running more example programs or other analyses through it. Even though it is running in the cloud, using it is much like using an on-premises cluster. ## What If the Job Hangs? If the example job never gets started, but gets stuck waiting for an application master (AM) to be allocated, it's usually a sign that there may not be enough memory on the node managers for allocating the container needed for the application master process. The default configurations for YARN are higher than what you often have to work with in smaller cloud deployments. Try setting these configuration properties: * In _/etc/hadoop/yarn-site.xml_ , set `yarn.nodemanager.resource.memory-mb` to something low; for example, 1,024 for a worker instance with 8 GB of memory. The default value of 8,192 is too high for such an instance. * In _/etc/hadoop/mapred-site.xml_ , set `yarn.app.mapreduce.am.resource.mb` to the same value. If this does not work, consult the documentation about tuning YARN configurations for MapReduce. They provide advice, and even worksheets, for coming up with appropriate configuration property settings for your cluster. # Running Basic Data Loading and Analysis The example job does exercise your new cluster, but might not be representative of the type of work a cloud-based cluster will perform. The next test of the cluster will get a little closer to real life by running a couple of simple MapReduce jobs that read in text data from Wikipedia and then, following the tradition of new Hadoop clusters everywhere, count words in it. ## Wikipedia Exports Wikipedia offers on-demand and pregenerated exports of all of its data in XML format. You can export the complete information for a single article, or for a category of articles, on demand. Wikipedia also periodically posts large, complete dumps of many wikis in the Wikimedia family. These exports are well suited for analysis in a Hadoop cluster. Visit _https://dumps.wikimedia.org/_ to see the available pregenerated dumps. ## Analyzing a Small Export While it is tempting to grab a complete Wikipedia dump, it is better to start with a smaller one, and then scale up. Since the XML format is the same for any dump, the same jobs will work on any of them. ### Generating the export Visit _https://en.wikipedia.org/wiki/Special:Export_, which lets you export one or more articles from the English Wikipedia site. Collect a set of page titles that you want to export and enter them manually, or select a category. In Figure 9-1, the category is "Member states of the United Nations," which returns around 200 articles. Remove any subcategory entries, and be sure to check the boxes to include only the current revision of each article and to save as a file. Then click the Export button to receive the exported data as XML. ###### Figure 9-1. Wikipedia export page The export will serve as the source data for analysis, so it needs to be copied into HDFS in the cluster. Copy the file up to the manager instance using `scp`; be sure to use the same private key that works for SSH access. Then, on the manager instance, use the `hdfs` utility to copy the XML into the home directory for the same user account used earlier to run the pi example: # on the computer where the export was downloaded $ scp -i /path/to/cloud_provider_key.pem Wikipedia-20160701000000.xml \ > userid@manager.cloud-provider.example:. # on the manager instance $ hdfs dfs -copyFromLocal Wikipedia-20160701000000.xml /user/userid ### The MapReduce jobs For this analysis, two MapReduce jobs will be used. The first one will scan the XML and extract each article's title and page contents, saving them into HDFS; this can be seen as a very basic _extract-transform-load_ or _ETL_ process, although real-life ETL is often much more involved. The second one will evaluate each article's text to count words in it, much like the standard Hadoop word-count example. Examples 9-1 and 9-2 show the important parts of the Java source for the loader job, which consists of a driver class and a mapper class. This is a map-only job with no reducers required. The driver sets up the job to stream the XML data from the file provided as the first argument, runs it through a mapper, and sends the output data to sequence files in an HDFS directory specified by the second argument. ##### Example 9-1. Wikipedia loader job driver code JobConf conf = new JobConf(getClass()); conf.setJobName("WP dump loader"); // Set the mapper class, but skip the reduce phase conf.setMapperClass(WikipediaDumpLoaderMapper.class); conf.setNumReduceTasks(0); // The object key/value pairs are text conf.setOutputKeyClass(Text.class); conf.setOutputValueClass(Text.class); // Stream XML into the job conf.setInputFormat(StreamInputFormat.class); StreamInputFormat.addInputPath(conf, new Path(args[0])); // Use the XML record reader, with each page as one record conf.set("stream.recordreader.class", "org.apache.hadoop.streaming.StreamXmlRecordReader"); conf.set("stream.recordreader.begin", "<page>"); conf.set("stream.recordreader.end", "</page>"); // Emit sequence files conf.setOutputFormat(SequenceFileOutputFormat.class); SequenceFileOutputFormat.setOutputPath(conf, new Path(args[1])); JobClient.runJob(conf); return 0; ##### Example 9-2. Wikipedia loader job mapper code private enum Counter { ARTICLES } private DocumentBuilder db; @Override public void configure(JobConf conf) { try { db = DocumentBuilderFactory.newInstance().newDocumentBuilder(); } catch (ParserConfigurationException e) { throw new IllegalStateException("XML parser configuration is bad", e); } } @Override public void map(Text key, Text value, OutputCollector<Text, Text> output, Reporter reporter) throws IOException { try { // Parse the page of XML into a document Document doc = db.parse(new InputSource(new StringReader(key.toString()))); // Extract the title and text (article content) from the page content String title = doc.getElementsByTagName("title").item(0).getTextContent(); String text = doc.getElementsByTagName("text").item(0).getTextContent(); // Emit the title and text pair output.collect(new Text(title), new Text(text)); reporter.getCounter(Counter.ARTICLES).increment(1L); } catch (SAXException e) { throw new IOException(e); } } MapReduce veterans may notice that this job uses the old Java MapReduce API. This is because `StreamInputFormat` is currently only available under that API. An alternative design would use Hadoop Streaming to load the XML data. The `StreamInputFormat` is configured to simply send each article's content to the mapper as the key; the value sent to the mapper is always an empty string. Other than those details, the job is straightforward. Once these classes are packaged into a JAR, the job is ready to run. Using `scp`, copy the JAR to the manager instance under your user account, and run it using the `yarn` command-line utility: $ yarn jar basic-loader-1.0.0.jar com.mh2c.WikipediaDumpLoaderDriver \ > Wikipedia-20160701000000.xml wikitext As before, you will see signs of progress as the job is run on the cluster. When the job completes, there will be one or more sequence files in a directory in HDFS (the preceding example uses the _wikitext_ directory in the user's HDFS home directory). You should also see the custom "ARTICLES" counter reporting the total number of articles parsed. If you like, you can peek at a sequence file to check that article text is present; while a sequence file is binary, it will have large areas of plain text that are easy to discriminate: $ hdfs dfs -ls wikitext $ hdfs dfs -cat wikitext/part-00000 It's time for the second job, also written in Java, which performs the word count. This job works like any other word-count job, except that it reads from sequence files instead of ordinary text files. Examples 9-3, 9-4, and 9-5 show the key portions of the code for the job. ##### Example 9-3. Wikipedia word-count job driver code JobConf conf = new JobConf(getClass()); conf.setJobName("WP word count"); // Set the mapper and reducer classes, and use the reducer as a combiner conf.setMapperClass(WikipediaWordCountMapper.class); conf.setReducerClass(WikipediaWordCountReducer.class); conf.setCombinerClass(WikipediaWordCountReducer.class); // The object key/value pairs are text words and integer counts conf.setOutputKeyClass(Text.class); conf.setOutputValueClass(IntWritable.class); // Read in sequence files conf.setInputFormat(SequenceFileInputFormat.class); SequenceFileInputFormat.addInputPath(conf, new Path(args[0])); // Emit ordinary text files conf.setOutputFormat(TextOutputFormat.class); TextOutputFormat.setOutputPath(conf, new Path(args[1])); JobClient.runJob(conf); return 0; ##### Example 9-4. Wikipedia word-count job mapper code private static final IntWritable ONE = new IntWritable(1); private Text wordText = new Text(); @Override public void map(Text key, Text value, OutputCollector<Text, IntWritable> output, Reporter reporter) throws IOException { // Split the text content of the article on whitespace String[] words = value.toString().split("\\s+"); // Count each word occurrence for (String word : words) { wordText.set(word); output.collect(wordText, ONE); } } ##### Example 9-5. Wikipedia word-count job reducer code private IntWritable sumIntWritable = new IntWritable(); /** * key = word * values = counts */ @Override public void reduce(Text key, Iterator<IntWritable> values, OutputCollector<Text, IntWritable> output, Reporter reporter) throws IOException { // Total up the incoming counts for the word int sum = 0; while (values.hasNext()) { sum += values.next().get(); } // Emit the word count sumIntWritable.set(sum); output.collect(key, sumIntWritable); } The old Java MapReduce API is used here, for consistency with the loader job, but this code could easily be rewritten to use the new API instead. Run the job to perform the word count: $ yarn jar basic-loader-1.0.0.jar com.mh2c.WikipediaWordCountDriver \ > wikitext wikiwordcount The results are in one or more files in HDFS under the _wikiwordcount_ directory. The mapper code used here is intentionally simple; differing letter case and punctuation are not accounted for, so the results could be cleaned up with some improvements: $ hdfs dfs -ls wikiwordcount $ hdfs dfs -cat wikiwordcount/part-00000 Both of these MapReduce jobs are quite simple, and could have been combined into a single job, but they make clearer examples when separated. Also, the results of the first job could be saved off and used as the starting point for other analyses later, saving the work of parsing XML in each run. In a cloud architecture, you have the choice of saving valuable intermediate data long term in object storage services (see "Object Storage"), which lets you trade off the cost of repeated computation for the cost of increased data storage. As computation time increases, the option of reducing it by cheaply storing useful data products becomes more attractive. # Go Bigger With the Wikipedia export jobs available and working in your cluster, you have a starting point for further exploration. The "Member states of the United Nations" example used an export of around 200 articles, which at the time of writing weighed in at 26 MB, but larger exports should work just as well. The only limitation is the amount of room available in HDFS, since the XML data needs to be loaded there first for the loader job to work on it. If you are low on room in HDFS, or find that your workers run out of disk space when spilling data, either add worker instances or increase the available block storage for the existing workers. The trickiest part of working with a large export is getting it from Wikipedia into HDFS. In this chapter, the file was downloaded to the local computer, copied to the manager instance, and then copied into HDFS. This approach may not work well for, say, the complete export of English language Wikipedia, which exceeds 20 GB, compressed, as of this writing. It is feasible to download a large file directly to an instance, and then copy the file from there into HDFS. The disk where the large file resides can be kept as the "golden copy" of the data, and attached to instances when the file stored on it is needed. A more advanced approach involves uploading a large file to the cloud provider's object storage service, and then configuring Hadoop to access the file from there. The exact mechanics of this approach vary with the cloud provider, and there can be multiple ways to pull it off. Some possibilities: * Under AWS, download the file to an EC2 instance, and use the S3 command-line client to upload the file into S3. Then, use Hadoop's s3a protocol to access the file directly as an HDFS volume, or use the `distcp` tool to copy the file from S3 into local HDFS. * Under Google Cloud Platform, use the Google Cloud Storage Transfer Service to load the file directly from Wikipedia into a bucket in Cloud Storage. Then, install the Google Cloud Storage Connector into your cluster and access the file directly as an HDFS volume. * Under Azure, download the file to a virtual machine, and use the Azure CLI to upload it to either Azure Blob Storage or Azure Data Lake Store (ADLS). Then, install the Azure Blob Storage module or the Azure Data Lake Store module into your cluster and access the file directly as an HDFS volume. Chapter 11, which covers adding Apache Hive to your cluster, describes how to use the s3a filesystem connector to directly access data residing in S3 for use in Hive queries. Depending on the capabilities of the job, you may not need to decompress a large file before storing it in HDFS or cloud provider object storage services. Avoiding decompression saves not only on HDFS capacity, but also storage costs and potential data transfer costs. However, as usual, compressed files can hamper the performance of MapReduce or other analytic jobs performed on them, and you may find you need to change over a file from, say, gzip compression to a splittable compression algorithm such as LZO. This affects the time it takes for data to be ready for work and modestly increases storage costs. Consider these trade-offs in your data flow. Check your cloud provider's documentation and examples to see what options you have for working with files and the provider's storage features. As new features are introduced, you may discover better patterns to move your large files around. The _/tmp_ directory may map to persistent storage, but can still be cleared out by the operating system on reboot. Find the complete source at: _https://github.com/bhavanki/moving-hadoop-to-the-cloud_. Or Spark (see Chapter 12). Increasing volume storage can be easy or difficult, depending on the cloud provider. With the correct content type set for the file, Cloud Storage should decompress it when it is accessed. # Part IV. Enhancing Your Cluster After working through Part III, you should have a simple, functional Hadoop cluster running on a cloud provider. While this can be satisfying, you may want to push it further, and that's what this part of the book is all about. Each chapter starts from the simple cluster and adds more capabilities to it, so that it works more like a real-world cluster. You can pick and choose which chapters to dive into based on your interests. # Chapter 10. High Availability A Hadoop cluster running in the cloud has some intrinsic reliability built in, due to the robustness of the cloud provider. Their data centers are built with reliable power sources and network connections. They also accommodate the constant parade of failing motherboards, memory chips, and hard drives that come with running huge numbers of servers. Often, when these "normal" hardware failures occur, your instances and infrastructure components are automatically migrated over to alternative resources. Sometimes, you won't even notice that anything went wrong. Still, there are some failures a cloud provider can't hide from its customers. Disks can become corrupted due to either software or hardware failures. Although rare, network hiccups or power outages at a cloud provider data center can cause instances, or even whole availability zones, to disappear for some amount of time. Even some of those "normal" hardware failures can't be automatically handled every time. Given that the risk of cluster failures is not completely eliminated by running on a cloud provider, it is reasonable to have a strategy in place to reduce their impact. Running in the cloud, if a cluster fails, it's completely feasible to simply spin up a new one to take its place. As long as the data the cluster was operating on is preserved, for example, in cloud provider storage services, a new cluster can be created in the same or a different availability zone, or even a different region in extreme cases, to pick up where the failed cluster left off. This is one of the strategies that makes little sense when working with physical hardware, but that can be advantageous when working with a flexible and resilient cloud provider infrastructure. If you prefer keeping clusters around for a while, perhaps because other systems depend on them being available constantly, then another strategy is to set up _high availability_ (HA). An HA cluster involves running redundant copies of some Hadoop components in order to eliminate single points of failure. By keeping cloud provider infrastructure and features in mind, you can set up HA clusters that are even more robust than those in an ordinary, single data center. This chapter does not completely describe Hadoop HA. Please consult Hadoop documentation for more information. # Planning HA in the Cloud The most important Hadoop components in a cluster to set up for HA are HDFS and YARN, so those will be focused on here. ## HDFS HA There are two options for configuring HA for HDFS: using conventional shared storage (NFS) or using the Quorum Journal Manager. This chapter explores using the Quorum Journal Manager, which involves running several journalnode daemons as well as a second namenode. Automatic failover, using ZooKeeper, is also covered. When a non-HA cluster is configured, it only has a single namenode, which of course runs in some availability zone in some region. When converting a cloud cluster to HA, a second namenode is added, as well as a set of at least three journalnodes. An important decision to make is whether to place the second namenode, and some of the journalnodes, in other availability zones or other regions. While it is possible to run the new daemons in a different region, there are practical reasons why this should be avoided. First, network connectivity between regions is much slower than between availability zones within a region. Second, cloud providers often charge for data transfer between regions, increasing the cost for HA clusters. Finally, management of all of HDFS within a cluster is much easier when all of its instances run within one region. There is a performance cost to spreading clusters across availability zones. Because clusters grow to hold more data and jobs running on them become more complex, the cost increases, and it can get to the point where jobs will tend to time out. In "Benchmarking HA", some techniques for testing cluster performance are discussed; they can help guide your decision on using multiple availability zones for HA. Figure 10-1 shows an HA deployment that is confined to a single availability zone. Figure 10-2 shows an HA deployment that spans two availability zones, with one namenode and several journalnodes in each zone. ###### Figure 10-1. An HA deployment of HDFS within a single availability zone ###### Figure 10-2. An HA deployment of HDFS in two availability zones. Many journalnodes are required so that there are at least three in each zone. ### What about the datanodes? HA configuration for HDFS does not require doing anything special for datanodes; it focuses on the critical data used by the namenode and on having a second namenode running. However, the loss of an availability zone causes a loss of datanodes within it as well, which can lead to data being lost or being unreachable for a time. When configuring a cluster for HA, then, consider spreading datanodes across availability zones too, keeping in mind potential performance problems. New datanodes added to new availability zones will, as usual, gradually receive replicated copies of HDFS data, until they are fully participating in the cluster. ## YARN HA Just as HDFS HA is enabled by running two namenodes, one active and one standby, YARN HA is enabled by running two resource managers, one active and one standby. As with the namenodes, it is possible to install the second resource manager in a different availability zone than the original (first) one. # Installing and Configuring ZooKeeper In order for an HA cluster to automatically switch from a formerly active namenode or resource manager to a standby, ZooKeeper must be running on the cluster. ZooKeeper is a distributed, highly reliable coordination system. It is used to enable many different capabilities in a Hadoop cluster, and automatic failover for HDFS and YARN HA is one of them. A distributed ZooKeeper deployment requires at least three daemons, and as with journalnodes and the second namenode and resource manager, it may be spread across availability zones. ZooKeeper itself is "smart" enough to detect when its own daemons disappear, and it can continue functioning when that happens, so no special steps are required after installing and configuring it for it to participate in an HA cluster. These instructions are based on the standard setup instructions and use the standard binary distribution from Apache. If you already have a tried-and-true set of steps for ZooKeeper installation, or if you prefer to use a customized or bundled distribution from a Hadoop vendor, you may be able to adapt these instructions. Prepare for installing ZooKeeper by creating a dedicated account for it on each host that will be running ZooKeeper, just like those for HDFS and YARN (see Chapter 9). These instructions will assume that the username for the account is "zk" and that the account belongs to the "hadoop" group. SSH key pairs are used for logging in. $ sudo useradd -G hadoop -m -s /bin/bash zk $ sudo mkdir /home/zk/.ssh $ sudo cp ~/.ssh/authorized_keys /home/zk/.ssh $ sudo chmod 700 /home/zk/.ssh $ sudo chown -R zk /home/zk/.ssh If you have a cluster with three workers like the one set up in Chapter 9, then those can be the targets for ZooKeeper installation as well. You may want to create an account on the manager instance as well for hosting a control script, described later on in this section. Download a binary ZooKeeper distribution from _zookeeper.apache.org_ to each of your instances, under the standard login account. In keeping with the use of _/opt/hadoop_ as the installation location for Hadoop, install ZooKeeper to _/opt/zookeeper_ : $ curl -O http://mirrorhost/path/to/zookeeper-x.y.z.tar.gz $ sudo tar xzfC zookeeper-x.y.z.tar.gz /opt $ sudo ln -s /opt/zookeeper-x.y.z /opt/zookeeper ###### Tip Example commands in this chapter will use the version number `x.y.z` to stand in for the real ZooKeeper version number. Unless you have a specific need otherwise, you should simply use the latest stable release. This ZooKeeper system will be running "replicated" with a quorum of servers. Each of them receives the same configuration file, so it's enough to create the file on one worker instance and copy it to the others. (The file should be named _/opt/zookeeper/conf/zoo.cfg_.) tickTime=2000 dataDir=/var/lib/zookeeper clientPort=2181 initLimit=5 syncLimit=2 server.1=203.0.113.102:2888:3888 server.2=203.0.113.103:2888:3888 server.3=203.0.113.104:2888:3888 In the preceding example, the private IP addresses of the worker instances are used in the file. It also names _/var/lib/zookeeper_ as its data directory, so create that on each worker as well: $ sudo mkdir /var/lib/zookeeper $ sudo chgrp hadoop /var/lib/zookeeper $ sudo chmod g+w /var/lib/zookeeper Each server requires a file named _/var/lib/zookeeper/myid_ containing its numeric ID from the configuration file (e.g., 1, 2, or 3 for the preceding file). This file, therefore, must be created uniquely on each worker. The last part of configuring ZooKeeper is setting its log directory. If it is not set, it defaults to the current directory, which in this configuration is the home directory of the "zk" account. You may want it to instead log to _/var/log/zookeeper_ , again to be similar to Hadoop. If so, create that directory on each worker, and set the `ZOO_LOG_DIR` environment variable in _/opt/zookeeper/bin/zkEnv.sh_ (before the script evaluates it): # commands to make the log directory $ sudo mkdir /var/log/zookeeper $ sudo chgrp hadoop /var/log/zookeeper $ sudo chmod g+w /var/log/zookeeper # then, editing zkEnv.sh export ZOO_LOG_DIR=/var/log/zookeeper ZooKeeper is ready to start. This can be done by running _/opt/zookeeper/bin/zkServer.sh_ on each worker instance; unfortunately, ZooKeeper does not ship with a distributed start script like the Hadoop distribution does. But it doesn't take anything complicated. See Example A-1 for a script that covers the basics. In order to use the example script, the account running it must have passwordless SSH access to each worker. One option is to create a "zk" account on the cluster manager instance and establish access from there, just like for the "hdfs" and "yarn" accounts. Once all the ZooKeeper servers are running, you can check the status of each one by running _zkServer.sh_ , or the example script in Example A-1, with the `status` subcommand. One server should report it is the leader, and the others should report they are the followers: # Using the example script "zk" $ ./zk status Checking ZooKeeper status ZooKeeper JMX enabled by default Using config: /opt/zookeeper/bin/../conf/zoo.cfg Mode: follower ZooKeeper JMX enabled by default Using config: /opt/zookeeper/bin/../conf/zoo.cfg Mode: leader ZooKeeper JMX enabled by default Using config: /opt/zookeeper/bin/../conf/zoo.cfg Mode: follower ZooKeeper is now running alongside your Hadoop cluster and ready to play its part in enabling HA. # Adding New HDFS and YARN Daemons With ZooKeeper in place and ready to perform automatic failover, the additional HDFS and YARN daemons can be installed on the cluster, and the entire cluster configured for HA. Start by noting the availability zone(s) where the current namenode and resource manager are running, and identify which other zone or zones will host the second instances of those daemons. ## The Second Manager For a cluster set up with a single manager instance that hosts both the namenode and resource manager, as was done in Part III, the most straightforward path is to create a second manager instance. Follow the procedure you used to prepare the first manager instance, depending on which cloud provider you use, to prepare a second one. Give it a unique name, say, "manager2". If desired, select a different availability zone for the new manager instance. ###### Tip In AWS, subnets do not span availability zones, and so the second manager instance in a separate availability zone must reside in a different subnet from the first one, which complicates cluster architectures. In Google Cloud Platform, this is not the case; a subnet may span availability zones. In Azure, instead of using a different availability zone, add the new manager instance to an availability set also containing the first one. ###### Tip There are more efficient ways of essentially cloning or copying existing instances, which will be covered in Chapter 16. Install Hadoop on the second manager instance and start to configure it like the first one, as covered in Chapter 9: * Install a JDK and Hadoop as before. * Set up the "hdfs" and "yarn" accounts, as well as "zk" if you are using a control script for ZooKeeper as described earlier. * Set up passwordless SSH access from the Hadoop accounts on the new manager instance to all of the workers, as well as to itself. In the event that the first manager is unavailable, say, because its instance fails, then control of the cluster will pass to this new instance, and so it should be capable of starting and stopping daemons. The second manager instance does not need to use the same SSH key pair as the first one, but it can. * Make the same directories and changes to the Hadoop environment scripts (like _hadoop-env.sh_ ) as before. You can copy the scripts from the first manager to the second, since the needed changes are identical. This does not include the XML configuration files, however, which need changes to set up HA. ## HDFS HA Configuration Now for the main part of this effort: configuring HDFS HA. Stop your existing cluster before proceeding, so that the Hadoop daemons aren't running while changes are being made to their configuration. Edit _/etc/hadoop/hdfs-site.xml_ on the _first_ , original master instance and make the following changes: * Configure the `dfs.nameservices` property with your cluster's name. These instructions assume a cluster name of "myfirstcluster"; replace this name with your own in other configuration properties. * Configure the `dfs.ha.namenodes.myfirstcluster` property with a list of namenode IDs. There should be two since there are two manager instances in your cluster. These instructions use "nn1" and "nn2". * Configure the `dfs.namenode.rpc-address.myfirstcluster` and `dfs.namenode​.http-address.myfirstcluster` sets of properties with the private IP addresses of the manager instances. * Configure the `dfs.namenode.shared.edits.dir` property with a `qjournal://` URI pointing to each of the worker instances in your cluster. Each worker will host a single journalnode. * Specify the standard `ConfiguredFailoverProxyProvider` class with the `dfs.​client.failover.proxy.provider.myfirstcluster` property. * Configure the `dfs.journalnode.edits.dir` property with the path that journalnodes should use for storing their data. In these instructions, _/var/data/jn_ will be used. * Configure the `dfs.ha.fencing.methods` property with at least the do-nothing value "shell(/bin/true)". Even though fencing isn't strictly required under the Quorum Journal Manager, automatic failover will not work without something set for it. * Configure the `dfs.ha.automatic-failover.enabled` property with the value "true". As one might expect, this enables automatic HDFS failover: <property> <name>dfs.nameservices</name> <value>myfirstcluster</value> </property> <property> <name>dfs.ha.namenodes.myfirstcluster</name> <value>nn1,nn2</value> </property> <property> <name>dfs.namenode.rpc-address.myfirstcluster.nn1</name> <value>203.0.113.101:8020</value> </property> <property> <name>dfs.namenode.rpc-address.myfirstcluster.nn2</name> <value>203.0.113.105:8020</value> </property> <property> <name>dfs.namenode.http-address.myfirstcluster.nn1</name> <value>203.0.113.101:50070</value> </property> <property> <name>dfs.namenode.http-address.myfirstcluster.nn2</name> <value>203.0.113.105:50070</value> </property> <property> <name>dfs.namenode.shared.edits.dir</name> <value>qjournal://203.0.113.102:8485;203.0.113.103:8485; 203.0.113.104:8485/myfirstcluster</value> </property> <property> <name>dfs.client.failover.proxy.provider.myfirstcluster</name> <value>org.apache.hadoop.hdfs.server.namenode.ha. ConfiguredFailoverProxyProvider</value> </property> <property> <name>dfs.journalnode.edits.dir</name> <value>/var/data/jn</value> </property> <property> <name>dfs.ha.fencing.methods</name> <value>shell(/bin/true)</value> </property> <property> <name>dfs.ha.automatic-failover.enabled</name> <value>true</value> </property> Copy _/etc/hadoop/hdfs-site.xml_ over to the new manager instance, so that both of them have the same HA settings. Also copy it to the worker instances, so that they are aware of HA being in place. Don't forget to create the journalnode data directory that was configured in _hdfs-site.xml_. It should be writable by the "hdfs" account, since that account will run the journalnodes. The directory only needs to be created where the journalnodes are running: $ sudo mkdir -p /var/data/jn $ sudo chgrp hadoop /var/data/jn $ sudo chmod g+w /var/data/jn Next, edit _/etc/hadoop/core-site.xml_ on all of the instances, and any other instances that serve as clients for Hadoop, and make the following changes: * Change the `fs.defaultFS` configuration property from the URI for the single namenode to the HA URI. * Configure the `ha.zookeeper.quorum` property with a list of the private IP addresses and ports for the ZooKeeper instances. Since ZooKeeper will arbitrate automatic failover, the system needs to be pointed to where its servers are running: <property> <name>fs.defaultFS</name> <value>hdfs://myfirstcluster</value> </property> <property> <name>ha.zookeeper.quorum</name> <value>203.0.113.102:2181,203.0.113.103:2181,203.0.113.104:2181</value> </property> Start the ZooKeeper servers if they are not running, and initialize their HA state: # as zk, if needed $ ./zk start # as hdfs $ hdfs zkfc -formatZK It is time to transition the cluster to HA, now that configuration is complete. Start by manually starting the journalnodes on each of the worker instances: # as hdfs on worker instances $ $HADOOP_PREFIX/sbin/hadoop-daemon.sh start journalnode After the journalnodes are running, the namenodes can be started. First, on the original, first manager instance, initialize the namenode's shared edits directory and start the namenode. Then go to the new, second manager instance and initialize and start it as well: # as hdfs on the original manager instance $ hdfs namenode -initializeSharedEdits $ $HADOOP_PREFIX/sbin/hadoop-daemon.sh start namenode # as hdfs on the new manager instance $ hdfs namenode -bootstrapStandby $ $HADOOP_PREFIX/sbin/hadoop-daemon.sh start namenode At this point, HDFS is not fully running: the namenodes and journalnodes are up, but nothing else. The easiest way to get everything running again is to start HDFS as usual, with the helper script. You may notice that this not only starts datanodes, but also the ZooKeeper failover controller (zkfc), which is required for automatic failover to work: # as hdfs on a manager instance $ $HADOOP_PREFIX/sbin/start-dfs.sh Moving forward, the _start-dfs.sh_ script is all you need to start and stop all of the HDFS daemons; once HA is configured, it handles starting journalnodes and zkfc processes. HDFS is now running in an HA configuration. You can verify this by looking at the web interface for each of the two namenodes. If you are using SSH tunnels to reach the namenodes, note that since HA configuration required specifying private IP addresses for their HTTP addresses, the remote host specified for the tunnels must match those private IP addresses, instead of just "localhost". One of the namenodes should be listed as active, the other as standby. If this is not the case, check to make sure that ZooKeeper is running correctly and that the ZooKeeper failure controller processes are working properly. Another way to find out which namenode is active is to use the `hdfs haadmin` command. In the following example output, as expected, one of the namenodes is listed as active, the other as standby: $ hdfs haadmin -getServiceState nn1 active $ hdfs haadmin -getServiceState nn2 standby ## YARN HA Configuration Configuring HA for YARN takes less work than for HDFS. As with configuring HDFS, stop the YARN daemons before configuring for HA. Edit _/etc/hadoop/yarn-site.xml_ on the _first_ , original master instance and make the following changes: * Configure the `yarn.resourcemanager.ha.enabled` property with the value "true". * Configure the `yarn.resourcemanager.cluster-id` property with your cluster's name. These instructions assume a cluster name of "myfirstcluster"; replace this name with your own in other configuration properties. * Configure the `yarn.resourcemanager.ha.rm-ids` property with a list of resource manager IDs. There should be two since there are two manager instances in your cluster. These instructions use "rm1" and "rm2". * Configure the `yarn.resourcemanager.ha.id` property with the ID of the resource manager on the instance; for the first manager instance, use "rm1". * Configure the set of `yarn.resourcemanager.hostname` properties with the private IP addresses of the manager instances. Eliminate or comment out the single, non-HA `yarn.resourcemanager.hostname` property. * Configure the `yarn.resourcemanager.zk-address` property with a list of the private IP addresses and ports for the ZooKeeper instances. * Configure the `yarn.resourcemanager.ha.automatic-failover.enabled` and `yarn.resourcemanager.ha.automatic-failover.embedded` properties each with the value "true". As one might expect, this enables automatic resource manager failover using the embedded elector: <property> <name>yarn.resourcemanager.ha.enabled</name> <value>true</value> </property> <property> <name>yarn.resourcemanager.cluster-id</name> <value>myfirstcluster</value> </property> <property> <name>yarn.resourcemanager.ha.rm-ids</name> <value>rm1,rm2</value> </property> <property> <name>yarn.resourcemanager.ha.id</name> <value>rm1</value> </property> <property> <name>yarn.resourcemanager.hostname.rm1</name> <value>203.0.113.101</value> </property> <property> <name>yarn.resourcemanager.hostname.rm2</name> <value>203.0.113.105</value> </property> <property> <name>yarn.resourcemanager.zk-address</name> <value>203.0.113.102:2181,203.0.113.103:2181,203.0.113.104:2181</value> </property> <property> <name>yarn.resourcemanager.ha.automatic-failover.enabled</name> <value>true</value> </property> <property> <name>yarn.resourcemanager.ha.automatic-failover.embedded</name> <value>true</value> </property> Copy _/etc/hadoop/yarn-site.xml_ over to the new manager instance and update the `yarn.resourcemanager.ha.id` property with the value "rm2" in that copy. Also copy the file to the worker instances, so that they are aware of HA being in place, but remove the `yarn.resourcemanager.ha.id` property. YARN is ready to be restarted. Unfortunately, its helper script does not have the ability to start both resource managers, so it's necessary to start one of them directly: # as yarn on one manager $ $HADOOP_PREFIX/sbin/start-yarn.sh # as yarn on the other manager $ $HADOOP_PREFIX/sbin/yarn-daemon.sh start resourcemanager YARN is now running in an HA configuration. You can verify this by looking at the web interface for the active resource manager. The same caveat applies here as with HDFS: SSH tunnels must point their remote ends to the private IP addresses of the resource managers, and not "localhost". It is possible that only the active resource manager is reachable over a tunnel. The standby resource manager returns to the browser an HTTP redirect to the active resource manager, and if the redirect uses a DNS name that is not resolvable on your local computer, the request will fail. This doesn't indicate a problem with YARN HA. To find out which resource manager is active, use the `yarn rmadmin` command. In the following example output, as expected, one of the resource managers is listed as active, the other as standby. If this is not the case, check to make sure that ZooKeeper is running correctly: $ yarn rmadmin -getServiceState rm1 active $ yarn rmadmin -getServiceState rm2 standby # Testing HA Perhaps the best part of running an HA cluster is testing it out. If everything has been configured correctly, then it should be possible to stop a namenode or resource manager and still have a functional cluster. The first step is to ensure that the reconfigured cluster is still working. Running the pi example from "Running a Test Job" again should succeed as it did before: $ hadoop jar \ > /opt/hadoop/share/hadoop/mapreduce/hadoop-mapreduce-examples-x.y.z.jar \ > pi 10 100 If it doesn't work, any of a wide variety of problems could be at the root of the failure. Start by making sure that all of the daemons for HDFS and YARN are running, as well as the ZooKeeper servers. Check their logs in _/var/log/hadoop_ for signs of any errors. See if HDFS on its own is working correctly before looking at YARN, which builds on top of it. As you have seen, configuring HA is involved, and it is very easy to make a typographical error or forget a critical configuration property. Check over the configuration files, especially _core-site.xml_ and _hdfs-site.xml_ , on all of the instances to make sure they are correct. Once you are able to run a job through the HA cluster, it's time to put it through its paces. Here are some things to try: * Stop the active resource manager. The standby resource manager should automatically take over, and the pi example should run without any trouble: # as yarn on the manager instance with the active resource manager $ yarn rmadmin -getServiceState rm1 active $ yarn rmadmin -getServiceState rm2 standby $ $HADOOP_PREFIX/sbin/yarn-daemon.sh stop resourcemanager stopping resourcemanager $ yarn rmadmin -getServiceState rm2 active * Stop the active namenode. The standby namenode should automatically take over: # as hdfs on the manager instance with the active namenode $ hdfs haadmin -getServiceState nn1 active $ hdfs haadmin -getServiceState nn2 standby $ $HADOOP_PREFIX/sbin/hadoop-daemon.sh stop namenode stopping namenode $ hdfs haadmin -getServiceState nn2 active * Using the console for your cloud provider, stop the manager instance hosting the active namenode and active resource manager. This emulates, to a degree, the unanticipated termination of a manager instance in your cluster, and is much more severe than merely stopping a daemon. Be sure to only _stop_ the instance, not terminate it, or else the work you put into its configuration will be lost. # Improving the HA Configuration The HA cluster set up in this chapter works well enough, but there are additional changes that could be made to it to make it even more robust. Here are some suggestions for further exploration of HA clusters in the cloud. ## A Bigger Cluster It's recommended that the HDFS journalnodes be running on more robust instances than the worker instances; manager instances are a great choice. Allocate a third manager instance with Hadoop installed, and reconfigure the cluster to host journalnodes on the three manager instances. Even though the second manager instance may be in a separate availability zone from the first manager instance, all of the datanodes are still in that original availability zone. Try allocating additional worker instances in the second availability zone and add them to the cluster, so that it could potentially survive the loss of an entire zone. The cluster built up in this chapter is only running three ZooKeeper servers. Since ZooKeeper is vital for automatic failover, it is a good idea to run more servers. New servers could be run on the manager instances, or on additional worker instances that also host more datanodes and node managers. It's vital, though, to only run an odd number of ZooKeeper servers, so that a majority can be reached when the quorum makes decisions. ## Complete HA The instructions in this chapter did not cover all HA configurations, including namenode fencing and work-preserving recovery for resource managers. Those additional measures can be added to an HA cluster in the cloud just as they normally would be. Namenode fencing using SSH implies that passwordless SSH to the "misbehaving" manager instance is possible from the other manager instance, so be sure to configure the fencing method with a private key that is already authorized for that SSH connection. Since either manager instance could be the one being fenced, keys need to be set up for either direction. ## A Third Availability Zone? If two availability zones can be good, wouldn't three be even better? Unfortunately, that is not the case. Both HDFS HA and YARN HA currently only support two namenodes and resource managers, respectively, so it is not possible today to field a third instance of those. You can add more datanodes, node managers, ZooKeeper servers, and more to a third availability zone, and the cluster should still hang together. Expanding too far, however, will not only increase the cost of the cluster but also further hurt performance as data moves across even more availability zones. # Benchmarking HA Depending on your choices, the HA cluster implemented in this chapter may span two availability zones. Network traffic between availability zones is not as fast as within an availability zone, and so a cluster spread across availability zones can have poorer performance. While it is certainly better to have an HA cluster that continues to function during an availability zone failure, the performance penalty paid during the times when nothing has gone wrong could more than offset the benefit. The best thing to do, then, is to run some benchmarks on the cluster. If its performance suffers, then either there are configuration tweaks to be made, or perhaps spanning availability zones is not worth it. The best benchmarks are those that resemble the "real" workloads that will be run on the cluster. Here, benchmarks that ship with the Hadoop distribution are used. While they are general, they are well understood and have been used for years to measure cluster performance. You can use the same methodology with your own benchmarks. The benchmarks described in this section were run using Hadoop 2.7.2 on an HA cluster just like the one developed in this chapter. The cluster ran on t2.large instances with 30 GB root volumes in AWS, in the us-east-1 region. ## MRBench The main concern about spreading cluster instances across availability zones is the increased time for them to communicate with each other. So, a good benchmark to try out first is MRBench, which focuses on MapReduce performance, and thereby communication between instances, instead of HDFS performance, which focuses on each instance's connection to its block storage. For the following test results, MRBench was run with these parameters: * 30 runs * 3 maps * 10 input lines MRBench is a small benchmark, but it can be run many times in succession to get an average runtime: $ hadoop jar \ > /opt/hadoop/share/hadoop/mapreduce/hadoop-mapreduce-client-jobclient-2.7.2.jar \ > mrbench -numRuns 30 -maps 3 -inputLines 10 ###### Tip A long-standing bug in MRBench kept it from correctly obeying its `-baseDir` option. If you add the option and find that the benchmark tries to write to the _/benchmarks/MRBench_ directory in HDFS anyway, then create the _/benchmarks_ directory in HDFS with global write permissions and try again. The benchmark was run under the following conditions: 1. The active namenode and resource manager are in the same availability zone (zone 1) as the datanodes, while the standby daemons are in a separate zone (zone 2); the job is run from zone 1. 2. The same as the first condition, except the active namenode is in zone 2. 3. The active namenode and resource manager are in zone 2; the job is run from zone 1. 4. The same as the first condition, except the job is run from zone 2. 5. The same as the first condition, except the standby namenode and resource manager are not running. This is similar to a non-HA cluster, although there are additional daemons running, such as the journalnodes and ZooKeeper servers. The average job times for the test runs are listed in Table 10-1. Table 10-1. Average job times for MRBench Condition | Average time (ms) ---|--- 1 | 20863 2 | 20860 3 | 20789 4 | 20858 5 | 20858 For this set of runs, you can see that the average job time does not vary significantly across the different test conditions. ## Terasort The Terasort benchmark tests both HDFS and MapReduce performance by sorting large amounts of data. It exercises HDFS as well as MapReduce, but it is much larger than MRBench, so it is useful to try it out. For these runs, `teragen` was first executed to generate 5 GB of test data. Jobs were run under the "ubuntu" user account: # run as the ubuntu user $ hadoop jar \ > /opt/hadoop/share/hadoop/mapreduce/hadoop-mapreduce-examples-2.7.2.jar \ > teragen 50000000 /user/ubuntu/terasort-input Then, `terasort` was run under the same conditions described for MRBench. In between each run, the previous run's output was deleted from HDFS and removed from the trash: # as ubuntu $ hdfs dfs -rm -r -skipTrash /user/ubuntu/terasort-output $ hadoop jar \ > /opt/hadoop/share/hadoop/mapreduce/hadoop-mapreduce-examples-2.7.2.jar \ > terasort /user/ubuntu/terasort-input /user/ubuntu/terasort-output ###### Note No tuning was performed on the cluster before running Terasort. Cluster tuning is a critical part of configuring real-world clusters, and the right settings can dramatically improve performance both on benchmarks like Terasort and on real workloads. So, interpret the results here as those of a cluster with an out-of-the-box configuration. The CPU times for each run are listed in Table 10-2. Table 10-2. Job times for Terasort Condition | CPU time spent (ms) ---|--- 1 | 416260 2 | 422250 3 | 416510 4 | 414970 5 | 415460 As was the case with MRBench, there were no significant differences in total CPU time across the test conditions. ## Grains of Salt What do the preceding results mean? Not too much, to be honest. There are a huge number of variables that can affect cluster performance, including: * The number and instance types of cluster instances * The version of Hadoop in use and the services running * Cloud provider configuration, especially networking * Current load and outages at the cloud provider * The choice of cloud provider * The nature of the workload One conclusion that can be drawn from them is that it is possible to have an HA cluster that performs consistently under different configurations of active, standby, or inactive namenodes and resource managers. Whether this is true for your own clusters can only truly be determined by running tests on them. One final, important principle to remember is that, while outages in cloud providers are rare, they can and will happen. Your clusters and applications should be structured in such a way that they can withstand those inevitable problems. By configuring high availability to automatically deal with outages, and running tests on your clusters' performance, you can implement a reliable and resilient cloud cluster architecture. The instructions in Chapter 9 did not include any modifications to _hdfs-site.xml_ , so your file probably has no configuration properties to start with. # Chapter 11. Relational Data with Apache Hive So far, the clusters established in the cloud using the instructions in this book have only been capable of running classic MapReduce jobs. Of course, the Hadoop ecosystem offers many other ways to work with large amounts of data, and one of the most attractive is viewing it as relational data that can be queried using Structured Query Language (SQL). For decades before the advent of Hadoop and similar cluster architectures, data analysts worked with large data sets in relational databases, and for many use cases that is still appropriate today. Hadoop components such as Apache Hive allow those with experience in relational databases to transition their skills over to the big data world. As you might expect, a Hadoop cluster running on a cloud provider can support these components. What's more, the cloud providers have features that the components can take advantage of, and the components themselves have ways to explicitly use cloud provider features to enhance their capabilities. The content in this chapter starts off with installing Hive into a cloud cluster. The instructions assume that you have a cluster set up in the configuration developed in Chapter 9 but, as usual, you should be able to adapt the instructions to your specific situation. # Planning for Hive in the Cloud The most important pieces of Hive to consider are the Hive server (HiveServer2), a server process that accepts requests from other Hive clients, and the Hive metastore, which houses information about the objects and structures comprising Hive databases, tables, and partitions. A typical configuration has at least a single Hive server running on a manager node, alongside the HDFS namenode and YARN resource manager. The Hive metastore, which maps HDFS data into relational data models, can live either "locally" within Hive itself or "remotely" on a separate database server. The instructions here start with a local metastore, since that is a quick way to check that Hive is working, but then go on to set up a remote metastore fronted by a Hive metastore server. # Installing and Configuring Hive These instructions are based on the standard Hive installation instructions and use the standard binary distribution from Apache. If you already have a tried-and-true set of steps for Hive installation, or if you prefer to use a customized or bundled distribution from a Hadoop vendor, you may be able to adapt these instructions. Prepare for installing Hive by creating a dedicated account for it, just like those for HDFS and YARN (see Chapter 9). These instructions will assume that the username for the account is "hive" and that the account belongs to the "hadoop" group. SSH key pairs are used for logging in. Since Hive components only run on the manager node, it's not necessary to establish a "hive" account on workers or to have passwordless SSH established across the cluster for the account: $ sudo useradd -G hadoop -m -s /bin/bash hive $ sudo mkdir /home/hive/.ssh $ sudo cp ~/.ssh/authorized_keys /home/hive/.ssh $ sudo chmod 700 /home/hive/.ssh $ sudo chown -R hive /home/hive/.ssh Download a binary Hive distribution from _hive.apache.org_ to your manager instance, under the standard login account. In keeping with the use of _/opt/hadoop_ as the installation location for Hadoop, install Hive to _/opt/hive_ : $ curl -O http://mirrorhost/path/to/apache-hive-x.y.z-bin.tar.gz $ sudo tar xzfC apache-hive-x.y.z-bin.tar.gz /opt $ sudo ln -s /opt/apache-hive-x.y.z-bin /opt/hive ###### Tip Example commands in this chapter will use the version number `x.y.z` to stand in for the real Hive version numbers. Unless you have a specific need otherwise, you should simply use the latest stable releases. Now that Hive is installed, it can be configured. The instructions here are simple ones, just to get Hive going. Again, if you are used to configuring Hive clusters, go ahead and adapt what you normally do. Fortunately, Hive's default configuration is set up to use a local metastore. Take a look at _/opt/hive/conf/hive-default.xml.template_ to see what the default configuration entails: * The `hive.metastore.warehouse.dir` property points to where data that Hive operates on lives in HDFS. Its default value is _/usr/hive/warehouse_ , which works fine. These instructions will assume that default, but for something different, set this property in _hive-site.xml_. * The `javax.jdo.option.ConnectionURL` and `javax.jdo.option.Connection​DriverName` properties point to a local database running under Apache Derby, a lightweight embedded relational database engine, as the metastore. Initially Hive will use that metastore, but later in this chapter Hive will be reconfigured to use a remote metastore. * The `hive.metastore.uris` property is empty, which indicates to Hive that the metastore is local. * The `hive.exec.scratchdir` property points to _/tmp/hive_ , also in HDFS like the warehouse directory, as Hive's scratch directory. This default works as well, and these instructions use it. There are still some changes to make, however. Hive does not ship with a copy of _/opt/hive/conf/hive-site.xml_ , so create it: # as root % cat > /opt/hive/conf/hive-site.xml <?xml version="1.0" encoding="UTF-8" standalone="no"?> <?xml-stylesheet type="text/xsl" href="configuration.xsl"?> <configuration> </configuration> ^D These instructions require that impersonation be disabled in Hive, so that queries run as the user running the Hive server and not the querier. (A more secure installation would leave impersonation on and set permissions appropriately.) To do so, set the `hive.server2.enable.doAs` property in _hive-site.xml_ to "false". Hive's instructions also recommend disabling filesystem caches to avoid memory leaks when impersonation is disabled, so also set the `fs.hdfs.impl.disable.cache` and `fs.file.impl.disable.cache` properties to "true": <property> <name>hive.server2.enable.doAs</name> <value>false</value> </property> <property> <name>fs.hdfs.impl.disable.cache</name> <value>true</value> </property> <property> <name>fs.file.impl.disable.cache</name> <value>true</value> </property> As the "hdfs" user on the manager instance, create the required warehouse and scratch directories in HDFS, and set their permissions. Here, the _/tmp_ directory is opened up because the Hive server must write to it and will fail to start correctly if it cannot: # as hdfs $ hdfs dfs -mkdir /tmp $ hdfs dfs -mkdir -p /user/hive/warehouse $ hdfs dfs -chmod 777 /tmp $ hdfs dfs -chown -R hive:hadoop /user/hive Hive uses Apache Log4J 2 for its own logging. Since the rest of the Hadoop components in the cluster are logging to _/var/log_ , Hive should as well. Start by creating a _/var/log/hive_ directory that the "hive" user can write to: $ sudo mkdir /var/log/hive $ sudo chgrp hadoop /var/log/hive $ sudo chmod g+w /var/log/hive Then put the Log4J properties file in place for Hive and edit the value of `property​.hive.log.dir` to point to _/var/log/hive_ : $ sudo cp /opt/hive/conf/hive-log4j2.properties.template \ > /opt/hive/conf/hive-log4j2.properties $ sudo vi /opt/hive/conf/hive-log4j2.properties # and edit property.hive.log.dir # Startup Hive is ready to start. Set up the "hive" account to work with Hive by setting the `HIVE_HOME` and other environment variables, and by adding Hive's _bin_ directory to the `PATH`: # as hive $ export HADOOP_HOME=/opt/hadoop $ export HIVE_HOME=/opt/hive $ export PATH=${HIVE_HOME}/bin:${HADOOP_HOME}/bin:$PATH $ export HADOOP_CONF_DIR=/etc/hadoop Use _schematool_ to initialize the local metastore, and then start the Hive server: # as hive $ $HIVE_HOME/bin/schematool -dbType derby -initSchema $ $HIVE_HOME/bin/hiveserver2 & ###### Note If, while working with Hive, the server fails to start and logs errors saying that "direct SQL is disabled," it is because you did not start it from the same directory in which it was first started, and it cannot locate the local metastore. Find the _metastore_db_ directory and start the Hive server from there. As was the case with the HDFS namenode and YARN resource manager, you can check on the status of the Hive server through its web interface, but security rules governing the manager instance block access from the outside to the necessary port. Establish an SSH tunnel (see "SSH Tunneling" for a refresher) from the local port 10002 to the same port on your manager instance: $ ssh -i /path/to/cloud_provider_key.pem -n -N \ > -L 10002:localhost:10002 userid@manager.cloud-provider.example & Now, in your browser, navigate to __http://localhost:10002__ to see your Hive server ready for work. # Running Some Test Hive Queries To make sure Hive is working properly, you can run some basic queries using the Beeline CLI. For now, run it from the "hive" account on the manager instance, since its environment is already set up for Hive. You can also try these steps from a separate account. $ beeline -u jdbc:hive2://localhost:10000 Make a simple table and run some queries on it. This example creates a test table with a single column, inserts a row, and runs some SELECT queries. You should see evidence of Hive issuing MapReduce jobs, starting with the first SELECT query: CREATE TABLE test (value INT) ROW FORMAT DELIMITED FIELDS TERMINATED BY '\t' STORED AS TEXTFILE; SELECT COUNT(*) from test; INSERT INTO test VALUES (123); SELECT * FROM test; !quit For something a little more interesting, try working with the MovieLens database using the instructions in Apache Hive documentation. The datasets are distributed as ZIP files, so to extract them you will need the _unzip_ utility; use your operating system's package manager to install it. If the data load and count query work, you should see a correct result for the row count: SELECT COUNT(*) FROM u_data; ... OK +---------+--+ | c0 | +---------+--+ | 100000 | +---------+--+ At this point, Hive is working on your cluster and running MapReduce jobs in the cloud to satisfy queries. The next step, needed for a more robust Hive installation, is to switch to a remote metastore. Fortunately, your cloud provider can help you with setting up a database server where the metastore can live. # Switching to a Remote Metastore The result of the previous instructions is a Hive server using a local metastore. To switch to a remote metastore, begin by stopping the Hive server and cleaning out the warehouse in HDFS. This will get Hive back into an empty state: # as hive $ kill hive-server-pid # as hdfs $ hdfs dfs -rm -r /user/hive/warehouse $ hdfs dfs -mkdir -p /user/hive/warehouse $ hdfs dfs -chown -R hive:hadoop /user/hive A remote metastore requires a database server. The instance hosting the database should be separate from any of the cluster instances, so that it can be managed independently. While you can launch a new instance and manually install a database server, it's much easier to use your cloud provider's database hosting features. See "Cloud Relational Databases" for an overview; here is a quick rundown: * Under AWS, you can use RDS to stand up a database server, choosing from several supported engines. RDS handles backups, availability, and patching automatically. * Under Google Cloud Platform, you can use Google Cloud SQL to stand up a MySQL database server. The server can be configured with automatic backups, high availability, and automatic failover. * Under Azure, you can use Azure SQL database to stand up a Microsoft SQL Server database server, or Azure Database for MySQL or Azure Database for PostgreSQL to stand up one of those types of database server. The server is automatically backed up across data centers and can be explicitly replicated. These instructions cover setting up a MySQL database server to host the remote metastore, since MySQL is supported across all three cloud providers. There are no special requirements on the database server, so you can follow your provider's standard instructions. The steps here work with AWS RDS, but even if you use Google Cloud Platform or Azure, it is worth looking through them to guide you. ###### Tip It may be tempting to use an existing, on-prem database server for the remote metastore. While it is possible, it is a very bad idea. Not only will performance be much worse between the server and the rest of your cluster, but you will be charged for data moving into and out of the cloud provider infrastructure. See Chapter 13 and Chapter 14 for more about how the choices in where you position cluster components affects price and performance. In the AWS console dashboard, select the RDS service. Be sure to select the same region where your cluster resides as well. Just like when working with EC2, the RDS dashboard presents a menu on the lefthand side of the page, as shown in Figure 11-1. Select Instances in the menu. ###### Figure 11-1. RDS dashboard The main area of the page will show that you have no RDS instances. Click the Launch Instance button to start the process of creating a new RDS instance. Your first choice is which engine to use; pick the MySQL tab from the available options, as shown in Figure 11-2, and click Select for MySQL. You may be presented with a choice of using Amazon Aurora, an in-house, compatible variant of MySQL; these instructions stick with MySQL itself. ###### Figure 11-2. RDS engines Your next decision is whether to set up a production-ready database or one suited for development and testing. See Figure 11-3 for an example of this prompt. Since the cluster is being used for testing and exploration, select Dev/Test. ###### Figure 11-3. A choice of production or development database The next page, part of which is shown in Figure 11-4, presents options for the specifications of the new RDS instance: * Select the latest available version of MySQL for the Database Engine Version. * The DB instance class may be the smallest available, since this is an exploratory installation of the remote metastore. Feel free to pick a larger instance if you plan to do more work in Hive. Similarly, a multizone deployment isn't necessary. * The metastore does not require a lot of space, so the maximum permitted under the AWS Free Tier should be more than enough. ###### Figure 11-4. RDS instance specifications Below the instance specifications is a separate form, shown in Figure 11-5, for naming the instance and providing its root username and password. Be sure to record your choices here, so that you can connect to it to create the metastore database. ###### Figure 11-5. RDS instance settings Next, describe where the new instance will reside in your network. Use the same VPC, subnet, and availability zone as your manager instance for the best performance and lowest cost. Also select the same security group that your cluster belongs to, so that communications between the metastore and the cluster are unimpeded. The instance does not need to be publicly accessible, because Hive is running inside the cloud provider as well. Figure 11-6 shows the network and security form filled out with these settings. ###### Figure 11-6. RDS instance network and security settings The remaining items on the page can be left as they are. RDS can create an initial database, but to show more about how the remote metastore is created and managed, these instructions opt not to use that feature. Click the Launch DB Instance button to complete this last step. When RDS reports that the instance is being created, click View Your DB Instances to return to the list of instances. Once the database server is available, determine its hostname or IP address. The next step is to create the metastore database; Hive ships with a MySQL script for this purpose. ###### Note The Hive `schematool` can be used as an alternative way to establish the metastore database; consult the Hive documentation for details. To connect to the database server, install the MySQL client on the manager instance that hosts the Hive server, using the operating system's package manager. Then, run the SQL script included with the Hive distribution to create the metastore database: $ cd /opt/hive/scripts/metastore/upgrade/mysql # use chosen root username here $ mysql -h mysql-hostname.cloud-provider.example -u root -p Enter password: # enter chosen root password here mysql> create database metastore; mysql> use metastore; mysql> source /opt/hive/scripts/metastore/upgrade/mysql/hive-schema-x.y.z.mysql.sql; # many queries are run mysql> create user 'hive'@'%' identified by 'hive'; mysql> grant all privileges on metastore.* to 'hive'@'%'; mysql> \q The preceding MySQL commands create a "hive" user inside MySQL with access to the metastore database. Change the password in the `create user` command if desired. The new user can log in from any remote address, which is acceptable for testing and when security rules block access from most sources; in a production setting, you may wish to restrict access to a small range of remote addresses as an extra line of defense. ###### Note The `cd` command is necessary because the SQL script that is sourced itself sources another script in the current directory. This limitation was fixed in issue HIVE-6559 but appears to have regressed. As an extra check, you can reconnect to the database server as the "hive" user and see that the metastore tables have been created: $ mysql -h mysql-hostname.cloud-provider.example -u hive -p Enter password: mysql> use metastore; mysql> show tables; # list of tables appears mysql> \q Next, Hive must be reconfigured to use the new database server for the metastore. Edit _/opt/hive/conf/hive-site.xml_ and make the following additions: * Add the `javax.jdo.option.ConnectionURL` property, set to the JDBC URL of the metastore database. * Add the `javax.jdo.option.ConnectionDriverName` property, set to "com.mysql.jdbc.Driver". * Add the `javax.jdo.option.ConnectionUserName` and `javax.jdo.option`​`.ConnectionPassword` properties with the username and password for the database user added while creating the metastore database. * Add the `hive.metastore.uris` property with a Thrift URI for the manager instance that hosts the Hive server. This same instance will also host the metastore server: <property> <name>javax.jdo.option.ConnectionURL</name> <value>jdbc:mysql://mysql-hostname.cloud-provider.example/ metastore</value> </property> <property> <name>javax.jdo.option.ConnectionDriverName</name> <value>com.mysql.jdbc.Driver</value> </property> <property> <name>javax.jdo.option.ConnectionUserName</name> <value>hive</value> </property> <property> <name>javax.jdo.option.ConnectionPassword</name> <value>hive</value> </property> <property> <name>hive.metastore.uris</name> <value>thrift://203.0.113.101:9083</value> </property> Hive needs access to the MySQL JDBC driver in order to communicate with the remote metastore database server. Either install the driver JAR file, called Connector/J, using the manager instance's operating system package manager, or download a copy from the official download page. Copy the JAR file to _/opt/hive/lib/mysql-connector-java.jar_. Hive is now configured for a remote metastore. Start the Hive metastore server, and then the Hive server once more. Use the same port for the metastore server that is configured in _hive-site.xml_ , and direct its log to _/var/log/hive_ alongside the Hive server's log: # as hive $ $HIVE_HOME/bin/hive --service metastore -p 9083 > /var/log/hive/metastore.log & # wait for the metastore server to come up $ $HIVE_HOME/bin/hiveserver2 & Once the servers are up, you can try the same tests that were performed for the local metastore. This time, Hive is reaching out to the remote metastore on the database server maintained by the cloud provider, with all the benefits of performance and reliability that come along with it. ## The Remote Metastore and Stopped Clusters If you stop your cluster instances, you may also wish to turn off the database server hosting the remote metastore. Google Cloud SQL allows you to stop a database instance, but if you are using RDS or Azure SQL, then you do not have the option to just stop a database server; you can only terminate it. In that case, go ahead and terminate the instance, but take one last snapshot or backup of the server contents. When it comes time to start the cluster again, create a new database instance that restores from the final snapshot. You may need to reconfigure Hive if the new database server's hostname or IP address differs from the old one's. # Hive Control Scripts Hive does not ship with convenience scripts for starting and stopping its servers. See Example A-2 and Example A-3 for some simple ones that should work well, at least as starting points. # Hive on S3 So far, Hive has operated on data that was explicitly loaded into HDFS. The data is distributed across datanodes in the cluster, and metadata about how it can be interpreted as relational data tables is kept in a remote database server; all of the instances are running in the cloud. This is a common and reasonable way of working with Hive data. But you can go further, specifically in how the data is stored. Cloud providers have object storage solutions, as described in "Object Storage". Instead of pulling data into HDFS before analyzing it, you can keep the data in object storage and reference it there as Hive external tables. This section describes how to configure Hive to work with data on the AWS object storage service, S3. ## Configuring the S3 Filesystem The first step in working with S3 under Hadoop is to configure the cluster to use a Hadoop S3 filesystem. When such a filesystem is enabled, you can address objects and folders in S3 like files and directories in HDFS. S3 cannot act exactly like a filesystem, due to its weaker guarantees on consistency, but it can work as one in many situations, including as a source for file-like data. ##### Why Not Use S3 for Everything? If you can access data in S3 like a Hadoop filesystem, you may wonder why you shouldn't just use S3 for all file storage, forgoing HDFS completely. The primary reason is that S3 does not adhere to POSIX-like constraints on how a filesystem should behave. Newly created files may not be immediately visible after creation, and deleted files may still be available for some time after deletion. These behaviors and others are why S3, and other object stores like it, are called _eventually consistent_. Because of the delays in some changes made in S3, it is not suitable for storing transient or highly variable data, like that saved in the middle of a workflow. Its strengths include storage of read-only data and archival use. An attempt to compensate for S3's eventual consistency, called _S3Guard_ , is underway at the time of this writing. It pairs up an external, consistent database with S3 access to improve consistency overall. See the Hadoop issue tracking its development at "HADOOP-13345". Over time, Hadoop has supported three separate S3 filesystem implementations: the original S3 block filesystem or "s3", the S3 native filesystem or "s3n", and the latest "s3a" filesystem. The instructions here focus on s3a, since s3 has already been removed from Hadoop and s3n is deprecated. The s3a filesystem implementation ships with Hadoop but is not active by default. Activating it involves adding the library directory where the implementation and supporting JAR files reside to the Hadoop classpath. On each cluster instance, edit _/etc/hadoop/hadoop-env.sh_ and add the following line, which places the necessary directory into the Hadoop classpath: export HADOOP_CLASSPATH=$HADOOP_CLASSPATH:$HADOOP_HOME/share/hadoop/tools/lib/* Then, again on each cluster instance, edit _/etc/hadoop/mapred-site.xml_ and add the `mapreduce.application.classpath` property. This property controls the classpath available to MapReduce tasks, which is independent from the Hadoop classpath. The value shown in the following code includes the default classpath as well as the directory containing the s3a filesystem implementation. (The following XML is edited for fit.) <property> <name>mapreduce.application.classpath</name> <value>$HADOOP_MAPRED_HOME/share/hadoop/mapreduce/*, $HADOOP_MAPRED_HOME/share/hadoop/mapreduce/lib/*, $HADOOP_MAPRED_HOME/share/hadoop/tools/lib/*</value> </property> These new settings do not take effect until HDFS and YARN are restarted, but there are more settings to add. ## Adding Data to S3 One way to check that the s3a filesystem is working properly, once it is fully configured, is to place some data into S3 and then attempt to look at it using the HDFS client. Since you are already familiar with the MovieLens data, that data can work for this test. In the AWS console dashboard, select the S3 service. The welcome page for S3 appears, with a button for creating your first bucket. Click that button, and use the dialog box shown in Figure 11-7 to name your bucket. Remember that the bucket name is globally unique, so more obvious names are most likely already taken. Select the region where your cluster resides, and then click Create to create the bucket. ###### Figure 11-7. Creating an S3 bucket Remember the region that you chose for your bucket, as that may influence how you must configure Hadoop later on. Select the bucket from the S3 dashboard. The bucket is currently empty, so add a folder by clicking the Create Folder button. Enter the name "ml-100k" for the folder, and it will be created and displayed as shown in Figure 11-8. ###### Figure 11-8. A folder in an S3 bucket Now the file containing the MovieLens data can be uploaded. Download the ZIP file containing the data to your local computer and unzip it. The file "u.data" in the contents contains the data set, and it's that file that should be uploaded to S3. Back in the S3 console, select the folder you just created to navigate into it, and then click the Upload button. In the upload dialog, click the Add Files button, and navigate to the "u.data" file on your local computer and select it for addition. Then click the Upload button in the dialog to begin the file upload. It should complete in a few seconds, and the file should appear in the bucket as shown in Figure 11-9. ###### Figure 11-9. A file uploaded to an S3 bucket The data is now available in S3. However, attempts to look at it from Hadoop at this point will fail, because public access to the S3 bucket contents is not established. Additional configuration is necessary for Hadoop to be able to authenticate to AWS using an account with permissions to look into S3. ## Configuring S3 Authentication The s3a filesystem implementation can retrieve credentials for S3 from many different locations, including environment variables, properties in _core-site.xml_ , Hadoop's own credential providers, and the instance profile associated with the EC2 instances where Hadoop runs. Here, properties in _core-site.xml_ are used. The _core-site.xml_ properties themselves support a few different means of authentication, but the simplest is to use a typical AWS access key and secret key pair. The keys associate Hadoop with a user under your AWS account, and when that user has permissions to work with S3, Hadoop is able to work with S3. A user is needed for AWS keys, so make one using the Identity and Access Management (IAM) service, which is available from the AWS console. Select Users from the menu on the left side of the page, and click the Add User button above the empty user list. In the form that appears, shown in Figure 11-10, provide your choice of username and select the Programmatic access checkbox, which triggers the creation of keys. Click the Next: Permissions button to pick what the new user can do. ###### Figure 11-10. Creating a new user in IAM From the choices in the next form, as shown in Figure 11-11, select "Attach existing policies directly," since there are no groups or users existing yet. ###### Figure 11-11. Permission choices for a new IAM user Below these choices, a list of security policies appears. Each policy can grant a set of permissions to the new user. Look for the policy named "AmazonS3FullAccess," as shown in Figure 11-12, and check its checkbox. Click the Next: Review button to check over the settings for the new user, and then "Create user" to create it. ###### Figure 11-12. An S3 policy selected for a new IAM user The next page should display a success message along with a table containing the keys for the new user. Record both key values and then click the Close button. This is the only time that AWS will tell you the secret access key, so do not miss the opportunity to save it; if you do, then you must delete the user and start again. Keys in hand, edit _/etc/hadoop/core-site.xml_ on each cluster instance and add the `fs.s3a.access.key` and `fs.s3a.secret.key` properties. (Obviously, the keys in the following XML have been masked out.) <property> <name>fs.s3a.access.key</name> <value>AKIAXXXXXXXXXXXXXXXX</value> </property> <property> <name>fs.s3a.secret.key</name> <value>XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX</value> </property> ## Configuring the S3 Endpoint If your S3 bucket resides in a region that was added to AWS after January 30, 2014, then calls accessing the bucket must be authenticated with the AWS Signature Version 4 (V4) algorithm, and not with the older Signature Version 2 (V2) algorithm. Usually this detail can be ignored, since the AWS SDK handles the details for you, but it matters for S3 access. The default endpoint for S3 is _s3.amazonaws.com_ ; this endpoint works for any region under V2, but under V4 it only works for the default us-east-1 region. So, if your bucket is in a V4-only region, edit _/etc/hadoop/core-site.xml_ on each cluster instance and add the `fs.s3a.endpoint` property with the unique S3 endpoint for the region. For example, if you are using the Frankfurt region eu-central-1, add the following: <property> <name>fs.s3a.endpoint</name> <value>s3.eu-central-1.amazonaws.com</value> </property> Now that S3 authentication and the correct S3 endpoint are in place, go ahead and restart HDFS and YARN. This will activate the s3a filesystem implementation with authentication in place using the new user account. Once HDFS is ready, you can try to look into S3 using the HDFS client. Pass a URL that follows the s3a scheme, starting with the bucket and proceeding down through the folders: $ hdfs dfs -ls s3a://myhivebucket/ml-100k Found 1 items -rw-rw-rw- 1 1979173 2017-01-01 12:34 s3a://myhivebucket/ml-100k/u.data $ hdfs dfs -tail s3a://myhivebucket/ml-100k/u.data # last 1K of file If s3a listings do not work, make sure that the AWS keys were entered correctly, that the updated classpaths are correct, and that you have set the S3 endpoint if required for your region. ## External Table in S3 All of the prerequisites are in place for Hive to work with data in S3. Return to the Beeline client and create a new table for the MovieLens data loaded into the new bucket. This table is an external table, indicating that the data should be left in its original location and not copied into HDFS: CREATE EXTERNAL TABLE u_data_s3 ( userid INT, movieid INT, rating INT, unixtime STRING) ROW FORMAT DELIMITED FIELDS TERMINATED BY '\t' LOCATION 's3a://myhivebucket/ml-100k/'; Notice that the s3a URL for the folder containing the data is provided as the location for the table. You should now be able to work with the data just as when it was available in HDFS: SELECT COUNT(*) FROM u_data; ... OK +---------+--+ | c0 | +---------+--+ | 100000 | +---------+--+ # What About Google Cloud Platform and Azure? If you are using Google Cloud Platform, you can use the Google Cloud Storage Connector to link up Hadoop and Google Cloud Storage. Like the s3a filesystem implementation, the connector establishes a filesystem, usually named "gs", that is backed by Google Cloud Storage. It is implemented by a JAR that must be placed into the necessary classpaths, and it authenticates via the service account associated with the cluster's GCE instances. Consult Google Cloud Platform documentation for details on installation and configuration. Hadoop ships with an implementation for a "wasb" filesystem backed by Azure Blob Storage. It is activated in a similar fashion to the s3a filesystem, by including it in the necessary classpaths and configuring authentication using an access key. The implementation supports both block blobs and page blobs. Consult the Hadoop documentation for the hadoop-azure module for more information. An even better option for Azure is to use the "adl" Azure Data Lake Store (ADLS) Hadoop filesystem implementation. ADLS has stronger consistency guarantees than Azure Blob Storage or even S3, so it should better support scenarios where updates occur. Once any of these provider-specific filesystems are in place and working, external Hive tables should work from locations containing their URLs. # A Step Toward Transient Clusters It is certainly convenient to be able to work with relational data directly from cloud provider object storage services, but there is another, greater motivation for doing so. With data given a safe home on a storage service, you do not need to worry about the Hadoop cluster that works with it; it no longer needs to store the data for the long term. If the cluster should be lost, due to problems in the cloud provider or even a mistake made by administrators, the data remains. In this chapter, you've worked with reading data stored in S3, but of course data can be written to S3 too. When you begin to think of cloud storage as the durable, available home for important cluster data, then you can understand how the clusters themselves do not need to live for a long time. To work with the data, you can spin up a cluster, query the data from S3, write final results back to S3, and then destroy the cluster. This has the potential to save money and make more efficient use of cloud provider resources. With the right automation, you can thereby support working with _transient_ clusters. "Long-Running or Transient?" goes into greater detail about using transient clusters, but this chapter has given you initial exposure to the idea. # A Different Means of Computation While working with Hive, you may have noticed some warnings like this: WARNING: Hive-on-MR is deprecated in Hive 2 and may not be available in the future versions. Consider using a different execution engine (i.e. tez, spark) or using Hive 1.X releases. So far, the steps in this book for setting up a Hadoop cluster have only covered setting up YARN, so that is all that is available for conducting MapReduce jobs to satisfy Hive queries. As the warnings suggest, different providers for Hive computation are supported. The next chapter covers adding one of those providers, Spark, to your cloud cluster. Not only will Spark be configured as another execution engine for Hive, but it will also be used for processing streaming data, which is one of its more powerful capabilities. In this book, Hive will run using the newer HiveServer2 server process and the Beeline client, as opposed to the older Hive CLI. You can instead copy _hive-default.xml.template_ to _hive-site.xml_. The MovieLens database contains ratings of movies entered by users of the MovieLens website. For full details, visit the MovieLens database. RDS does not divulge IP addresses for database servers, so use the assigned hostname. As of Hadoop 2.7. An instance profile for an EC2 instance links to a role in AWS. Processes running on the instance automatically gain the permissions associated with the role. For even more security, choose "AmazonS3ReadOnlyAccess." However, this will prohibit Hadoop writing to S3 in the future. # Chapter 12. Streaming in the Cloud with Apache Spark The venerable MapReduce computation framework, part of Apache Hadoop from the beginning, is falling out of favor now that newer and more flexible solutions are available. The original MapReduce implementation of job trackers and task trackers is obsoleted by YARN, which scales better and can support distributed work beyond MapReduce jobs. One of the most popular alternatives to MapReduce is Apache Spark, which supports a wide variety of algorithms including mapping and reducing, and also manages the chaining of the distributed computations together. Much like Hive caters to users who are familiar with relational data, Spark caters to developers who can focus more on the algorithmic features of the jobs they write, so they need not try to hammer them into the MapReduce mold. The content in this chapter starts off with installing Spark in a cloud cluster. The instructions assume that you have a cluster set up in the configuration developed in Chapter 9 but, as usual, you should be able to adapt the instructions to your specific situation. Later on, the instructions cover running Hive on Spark, and it's expected that your cluster is set up for Hive as described in Chapter 11. # Planning for Spark in the Cloud Spark running in a cluster can use any of several execution engines, including its own "standalone" manager and worker processes that can run in an integrated fashion with a Hadoop cluster. However, Spark can use YARN for running jobs, which is already available in your cluster. By configuring _Spark on YARN_ , you can get running more quickly and take advantage of the resiliency already present in the YARN framework. # Installing and Configuring Spark These instructions are based on the standard Spark download and configuration instructions and use the standard binary distribution from Apache. If you already have a tried-and-true set of steps for Spark installation, or if you prefer to use a customized or bundled distribution from a Hadoop vendor, you may be able to adapt these instructions. Prepare for installing Spark by creating a dedicated account for it, just like those for HDFS and YARN (see Chapter 9). These instructions will assume that the username for the account is "spark" and that the account belongs to the "hadoop" group. SSH key pairs are used for logging in. Since Spark will run jobs on YARN, which is already installed in the cluster, it's not necessary to establish a "spark" account on workers or to have passwordless SSH established across the cluster for the account: $ sudo useradd -G hadoop -m -s /bin/bash spark $ sudo mkdir /home/spark/.ssh $ sudo cp ~/.ssh/authorized_keys /home/spark/.ssh $ sudo chmod 700 /home/spark/.ssh $ sudo chown -R spark /home/spark/.ssh Download a binary Spark distribution from _spark.apache.org_ to your manager instance, under the standard login account. You can choose a prebuilt package that matches your specific Hadoop version, or a package that needs to be configured for a "user-provided" Hadoop; these instructions use the latter to be more widely applicable. In keeping with the use of _/opt/hadoop_ as the installation location for Hadoop, install Spark to _/opt/spark_ : $ curl -O http://mirrorhost/path/to/spark-x.y.z-bin-without-hadoop.tar.gz $ sudo tar xzfC spark-x.y.z-bin-without-hadoop.tar.gz /opt $ sudo ln -s /opt/spark-x.y.z-bin-without-hadoop /opt/spark ###### Warning If you plan to run Hive on Spark and are using a version of Hive before 2.2.0, then you will need to install a 1.x version of Spark. You may also install a 2.x version of Spark in a separate directory to benefit from its improvements elsewhere, but it is not compatible with Hive before version 2.2.0. ###### Tip Example commands in this chapter will use the version number `x.y.z` to stand in for the real Spark version numbers. Unless you have a specific need otherwise, you should simply use the latest stable releases. Now that Spark is installed, it can be configured. The instructions here are simple ones, just to get Spark going. Again, if you are used to configuring Spark clusters, go ahead and adapt what you normally do. Create the file _/opt/spark/conf/spark-env.sh_ ; the easiest way is to copy the empty template file for it: $ sudo cp /opt/spark/conf/spark-env.sh.template /opt/spark/conf/spark-env.sh Then, define the `HADOOP_CONF_DIR` environment variable, pointing to _/etc/hadoop_ , so that Spark can find the cluster's configuration files. If you installed the Spark package for user-provided Hadoop, then also define the `SPARK_DIST_CLASSPATH` environment variable so that Spark can locate Hadoop binaries: export HADOOP_CONF_DIR=/etc/hadoop export SPARK_DIST_CLASSPATH=$(/opt/hadoop/bin/hadoop classpath) This is a good checkpoint to make sure that Spark is configured correctly, before continuing to connect it to YARN. Try running the "SparkPi" example job locally: # as spark $ cd /opt/spark $ ./bin/run-example SparkPi 10 In the midst of a lot of informative logging, you should see a result like this: Pi is roughly 3.1421711421711422 It is not much more work to get Spark jobs running on YARN; Spark is already configured with Hadoop's configuration directory. To make it easier to find the output from Spark jobs, enable log aggregation in YARN; this causes logs from each node manager involved in a job to be gathered and stored in HDFS for later retrieval. To enable log aggregation, edit _/etc/hadoop/yarn-site.xml_ on each cluster instance and add the `yarn.log-aggregation-enable` configuration property, set to true: <property> <name>yarn.log-aggregation-enable</name> <value>true</value> </property> # Startup Since Spark is set up to run on YARN, there are no Spark components to start. Do ensure that HDFS and YARN are running, though. If YARN had been running before enabling log aggregation, restart it. # Running Some Test Jobs You can run Spark jobs under any account, and so for the account you choose, create a home directory in HDFS, using the hdfs account. These instructions assume that the new "spark" user account is used for running Spark jobs: # as hdfs $ hdfs dfs -mkdir -p /user/spark $ hdfs dfs -chown spark /user/spark The example job can now be run again, this time using YARN instead of local execution. The command for running the example differs based on the Spark version: # as spark $ cd /opt/spark # for Spark 2.x $ ./bin/spark-submit --class org.apache.spark.examples.SparkPi --master yarn \ > --deploy-mode cluster examples/jars/spark-examples_2.11-x.y.z.jar 10 # for Spark 1.x $ ./bin/spark-submit --class org.apache.spark.examples.SparkPi --master yarn \ > --deploy-mode cluster lib/spark-examples-x.y.z-hadoop2.2.0.jar 10 You should see the Spark job submitted to YARN and visible in the resource manager web interface. After a short runtime and a good amount of local output describing the progress of the job, you should see a report that the job was successful. The application master IP address and hostname in the tracking URL will use the private IP address of the YARN resource manager, and the timestamps and application IDs will reflect the time that the job was executed: 16/12/27 13:59:13 INFO yarn.Client: Application report for application_ 1482846864508_0002 (state: FINISHED) 16/12/27 13:59:13 INFO yarn.Client: client token: N/A diagnostics: N/A ApplicationMaster host: 203.0.113.101 ApplicationMaster RPC port: 0 queue: default start time: 1482847140363 final status: SUCCEEDED tracking URL : http://ip-203-0-113-101.ec2.internal:8088/proxy/application_ 1482846864508_0002/ user: spark There is no indication of the job output, because that is echoed to standard output by one of the Spark containers that executed the job. The result can be found in the aggregated log results for the job, which can be viewed using the `yarn logs` command. Find the application ID for the Spark job in the output from running it, or consult the resource manager web UI: # as spark $ $HADOOP_PREFIX/bin/yarn logs -applicationId application_1482846864508_0002 | \ > less The standard error and standard output logs for each container are listed, and one of those standard output logs should contain the result: Pi is roughly 3.1417631417631418 Congratulations, your Hadoop cluster running in the cloud now supports Spark jobs! You should feel free to try running more example Spark jobs or other analyses through it. # Configuring Hive on Spark Hive queries are converted under the hood into jobs to be run on the underlying cluster, and by default those are ordinary MapReduce jobs. You can configure a different "execution engine" if one is available, and now that Spark is installed in your cluster, you can use it instead of MapReduce jobs on YARN for satisfying Hive queries. There is documentation on this subject, but as usual, the steps here attempt to represent the minimum needed to get to a working state. ## Add Spark Libraries to Hive Hive ships with the ability to run a Spark driver, but it does not ship with the necessary Spark code. That must be installed by you. For Spark versions before 2.0, a single "assembly" JAR is all that is required: $ sudo cp /opt/spark/lib/spark-assembly-*.jar /opt/hive/lib/ Starting with Spark version 2.0, there is no longer an assembly JAR, but several smaller JARs take its place: $ sudo cp /opt/spark/jars/scala-library-*.jar /opt/hive/lib/ $ sudo cp /opt/spark/jars/spark-core_*.jar /opt/hive/lib/ $ sudo cp /opt/spark/jars/spark-network-common_*.jar /opt/hive/lib/ Be sure to use a version of Spark that is compatible with the version of Hive. ## Configure Hive for Spark Edit _/opt/hive/conf/hive-site.xml_ and make the following changes: * Configure the `spark.master` property with the value "yarn". This indicates that Spark should itself rely on YARN for compute capability, as opposed to its own standalone implementation, for example. * Configure the `spark.home` property to point to the Spark installation that is compatible with Hive; for example, _/opt/spark_. * Optionally, configure the `hive.spark.job.monitor.timeout` property with a custom timeout, in seconds, larger than the default of 60. When using a small, untuned test cluster, it may take longer than 60 seconds for some Hive queries to be serviced by Spark, in particular, the first query in each session. You may leave this property out and add it later if you find that jobs submitted by Hive are timing out after just over a minute: <property> <name>spark.master</name> <value>yarn</value> </property> <property> <name>spark.home</name> <value>/opt/spark</value> </property> <property> <name>hive.spark.job.monitor.timeout</name> <value>120</value> </property> ## Switch YARN to the Fair Scheduler To configure YARN to use the fair scheduler, as recommended by Hive documentation, edit _/etc/hadoop/yarn-site.xml_ and configure the `yarn.resourcemanager`​`.scheduler.class` property with the class name for the fair scheduler. (The following XML is edited for fit.) <property> <name>yarn.resourcemanager.scheduler.class</name> <value>org.apache.hadoop.yarn.server.resourcemanager.scheduler.fair. FairScheduler</value> </property> ## Try Out Hive on Spark on YARN Restart the Hive metastore server and the Hive server to pick up the new Hive configuration. If you have multiple Spark installations, specify the `SPARK_HOME` environment variable with the same value as the `spark.home` configuration property in _hive-site.xml_. Without the environment variable, the startup scripts for Hive may guess incorrectly as to the location of the Spark installation: # as hive # export usual environment variables, but then add: $ export SPARK_HOME=/opt/spark $ $HIVE_HOME/bin/hive --service metastore -p 9083 > /var/log/hive/metastore.log & # wait for the metastore server to come up $ $HIVE_HOME/bin/hiveserver2 & Also restart YARN to switch it to use the fair scheduler. Finally, run the Beeline client as usual, but before running your first query, tell it to use Spark for query executions: set hive.execution.engine=spark; Now when you run a query, instead of seeing information about MapReduce being used, you will see details about how Hive submitted work to Spark, and how Spark is itself running on YARN. (The following output is edited for fit.) 0: jdbc:hive2://localhost:10000> SELECT COUNT(*) FROM u_data; Query ID = hive_20161228174515_9bfd160e-6c6b-413f-9f7e-5eff85d04124 Total jobs = 1 Launching Job 1 out of 1 In order to change the average load for a reducer (in bytes): set hive.exec.reducers.bytes.per.reducer=<number> In order to limit the maximum number of reducers: set hive.exec.reducers.max=<number> In order to set a constant number of reducers: set mapreduce.job.reduces=<number> Starting Spark Job = 72d7b61d-9f19-4a31-ae87-385ac80676c7 Running with YARN Application = application_1482938585635_0013 Kill Command = /opt/hadoop/bin/yarn application -kill application_1482938585635_0013 Query Hive on Spark job[1] stages: 2 3 Status: Running (Hive on Spark job[1]) Job Progress Format CurrentTime StageId_StageAttemptId: SucceededTasksCount(+RunningTasksCount-FailedTasksCount)/TotalTasksCount [StageCost] 2016-12-28 17:45:16,760 Stage-2_0: 0(+1)/1 Stage-3_0: 0/1 2016-12-28 17:45:19,775 Stage-2_0: 1/1 Finished Stage-3_0: 1/1 Finished Status: Finished successfully in 4.02 seconds OK +---------+--+ | c0 | +---------+--+ | 100000 | +---------+--+ 1 row selected (4.285 seconds) # Spark Streaming from AWS Kinesis Besides being able to perform complex analytics on data stored at rest, whether in HDFS or elsewhere, Spark can also work on data that is streamed into it. Spark Streaming lets you process large amounts of incoming live data in much the same way as typical _resilient distributed datasets_ (RDDs). Batches of data generated through _discretized streams_ or "DStreams" can be operated upon similarly to RDDs, and the results can be saved to persistent storage for further analytics. Spark supports several sources for DStreams, including Apache Flume and Apache Kafka. It also ships with support for streaming data from Amazon Kinesis, a component of AWS that supports the establishment and management of data streams within AWS. This section describes how to set up a Spark Streaming job that reads from a Kinesis stream, performs some simple processing on it, and saves the results to HDFS. The streaming pipeline developed in this section operates on Apache access logs. In a real-life scenario, Apache web servers would be configured to forward their access logs to the Kinesis stream, but to make the work here simpler, access log data is faked using a basic generator. The basic architecture of the streaming pipeline is shown in Figure 12-1. ###### Figure 12-1. Data flow for a Spark Streaming job through AWS Kinesis ## Creating a Kinesis Stream To create a Kinesis stream, use the AWS console to select the Kinesis service. Be sure to select the region where you want the stream to be created. On the Kinesis home page, click Go to Streams. Click the "Create stream" button on the next page to reveal the form—shown in Figure 12-2—for creating a new stream. Provide a name for the stream, such as "apache-access-logs". For the simple stream used in this section, use just one shard. The form automatically calculates the read and write throughput for the stream, which is more than enough for exploration purposes. Click the "Create stream" button to begin the process of stream creation. ###### Figure 12-2. Creating a Kinesis stream The stream eventually appears in the list of streams. Soon, the stream should be reported as ACTIVE, as shown in Figure 12-3, meaning it is ready to accept and provide data. ###### Figure 12-3. An active Kinesis stream Once the generator begins to send data into the stream and the stream job reads data from the stream, the Monitoring tab for the stream will provide graphs summarizing the data flow. ## Populating the Stream with Data The simplest way to populate the new Kinesis stream is to use a simple standalone generator program. The Kinesis client available in the AWS SDK can be used to send one generated log line at a time, as bytes, to the stream. The main body of a generator program is listed in Example 12-1. ###### Note As in the rest of this book, code in this chapter is written in Java. ##### Example 12-1. Loop for sending log lines to a Kinesis stream AmazonKinesisClient client = new AmazonKinesisClient(); int numPasses = (numRecords + recsPerSecond - 1) / recsPerSecond; int recordsLeft = numRecords; for (int i = 0; i < numPasses; i++) { int numToGenerate = Math.min(recordsLeft, recsPerSecond); for (int j = 0; j < numToGenerate; j++) { String logLine = generateLogLine(); PutRecordRequest request = new PutRecordRequest() .withStreamName(streamName) .withPartitionKey(PARTITION_KEY) .withData(ByteBuffer.wrap(logLine.getBytes(StandardCharsets.UTF_8))); PutRecordResult result = client.putRecord(request); System.out.println(String.format("Wrote to shard %s as %s", result.getShardId(), result.getSequenceNumber())); } recordsLeft -= numToGenerate; if (recordsLeft > 0) { Thread.sleep(1000L); } } The loop in Example 12-1 sends a batch of records each second (roughly) to the Kinesis stream and reports the sequence number assigned by Kinesis to each record as a sign that the transfer was successful. The work of creating a fake Apache access log line is done by the `generateLogLine()` method. There are many ways to implement the method; the code in Example 12-2 uses a combination of `java.util.Random`, weighted distributions supported by Apache Commons Math 3, and the Java Faker library to create realistic-looking log lines. (The example here is edited down for clarity.) ##### Example 12-2. Generation of a random Apache access log line private static final String FORMAT = "%s - - [%s] \"%s %s HTTP/1.0\" %s %d \"%s\" \"%s\""; private Random random = new Random(); private Faker faker = new Faker(); private static final DateTimeFormatter TIMESTAMP_FORMATTER = DateTimeFormatter.ofPattern("dd/MMM/yyyy:HH:mm:ss Z"); private static final EnumeratedDistribution<String> METHODS = makeDistribution( Pair.create("GET", 6.0), Pair.create("POST", 2.0) ); private static final EnumeratedDistribution<String> RESOURCES = makeDistribution( Pair.create("/page1", 10.0), Pair.create("/page2", 9.0) ); private static final EnumeratedDistribution<String> RESPONSES = makeDistribution( Pair.create("200", 8.0), Pair.create("404", 2.0) ); private static final EnumeratedDistribution<String> USER_AGENTS = makeDistribution( Pair.create("user agent string 1", 4.7), Pair.create("user agent string 2", 3.8) ); @SafeVarargs private static EnumeratedDistribution<String> makeDistribution(Pair<String, Double>... items) { return new EnumeratedDistribution<String>(Arrays.asList(items)); } private String generateLogLine() { String ipAddress = faker.internet().privateIpV4Address(); String dateTime = TIMESTAMP_FORMATTER.format(ZonedDateTime.now()); String method = METHODS.sample(); String resource = RESOURCES.sample(); String status = RESPONSES.sample(); int bytes = random.nextInt(10000); String referer = faker.internet().url(); String userAgent = USER_AGENTS.sample(); return String.format(FORMAT, ipAddress, dateTime, method, resource, status, bytes, referer, userAgent); } A Kinesis stream can hang on to data for a while, but the processing job will read from the leading edge of the stream. So, in order to see the job in action, the generator must run simultaneously. The generator program can run anywhere that has access to the Kinesis stream. AWS credentials are necessary for putting records in the stream, and one way that they can be supplied to the program is through an AWS access key ID and secret access key assigned to an IAM user with the necessary permissions. See "Configuring S3 Authentication" for instructions on how to add a new IAM user with the permissions you choose. The policies required are: * "AmazonKinesisFullAccess" for reading from and writing to Kinesis streams * "AmazonDynamoDBFullAccess" for checkpointing progress in reading Kinesis streams * "CloudWatchFullAccess" for reporting stream metrics to AWS CloudWatch The keys may be passed to the program in a few different ways. The most straightforward is to set the `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY` environment variables before running. ## Streaming Kinesis Data into Spark A streaming job that processes records from a Kinesis stream starts by creating a DStream from it. All the usual stream manipulation capabilities of Spark are available to perform processing on the data, and the end result may be saved to any of several locations. The job in Example 12-3 alters each log record to have an anonymized IP address and a generic user agent, and then maps each line to a pair with a unique identifier so that it can be saved to Hadoop. ##### Example 12-3. Processing of Apache log lines in Spark Streaming public void process(String streamName, String region, int batchInterval, String hadoopDir) throws InterruptedException { String kinesisEndpoint = String.format("https://kinesis.%s.amazonaws.com/", region); AmazonKinesisClient client = new AmazonKinesisClient(); client.setEndpoint(kinesisEndpoint); int numShards = client.describeStream(streamName).getStreamDescription().getShards().size(); SparkConf conf = new SparkConf().setAppName(APP_NAME); JavaStreamingContext ctx = new JavaStreamingContext(conf, new Duration(batchInterval)); JavaDStream<byte[]> kinesisStream = KinesisUtils.createStream(ctx, APP_NAME, streamName, kinesisEndpoint, region, InitialPositionInStream.LATEST, new Duration(batchInterval), StorageLevel.MEMORY_AND_DISK_2()); // Make more DStreams JavaDStream<ApacheLogRecord> processedRecords = kinesisStream .map(line -> new ApacheLogRecord(new String(line, StandardCharsets.UTF_8))) .map(record -> record.withIpAddress(anonymizeIpAddress(record.getIpAddress()))) .map(record -> record.withUserAgent(categorizeUserAgent(record.getUserAgent()))) ; // Only pair streams can be written as Hadoop files JavaPairDStream<String, ApacheLogRecord> markedRecords = processedRecords .transformToPair(recordRdd -> recordRdd.mapToPair( record -> new Tuple2<>(UUID.randomUUID().toString(), record) )); // Write out to Hadoop markedRecords.print(); markedRecords.saveAsHadoopFiles(hadoopDir, "txt", Text.class, Text.class, TextOutputFormat.class); ctx.start(); try { ctx.awaitTermination(); } catch (InterruptedException e) { System.out.println("Streaming stopped"); return; } } ###### Note The processing code in Example 12-3 uses lambdas, introduced in Java 8, to be more readable. This requires that the Hadoop cluster, or at least YARN, run under Java 8 as well. The `ApacheLogRecord` class referenced in Example 12-3 is a basic implementation of an object that can manage the fields in a log record. When the streaming job is run, each batch delimited by the batch interval is processed, and its results are saved into a separate directory in Hadoop. To avoid an explosion of directories, make the batch interval somewhat large, on the order of at least a minute. ### Packaging the streaming job As with any Spark job, the streaming job should be packaged into an all-in-one JAR that can be uploaded to the cluster for execution. The Spark Streaming library does not need to be included, since the job runs within Spark. This will dramatically reduce the size of the JAR. With complex systems like Spark, the AWS SDK, and Hadoop all being used at once, it is likely that dependency conflicts will arise when running the streaming job. Here are some conflicts to watch out for, and how to resolve them: * The Amazon Kinesis Client Library (KCL) available through Spark uses a specific version of the AWS Java SDK. If you use a different version for your job, classes in the SDK may be reported missing or incompatible. Try using the same version of the AWS SDK for your job that the KCL packaged with Spark uses. * Spark and the AWS SDK may rely on different versions of the Jackson JSON library, leading to class-loading problems. Override the versions of Jackson so that the latest ones are bundled. * The Amazon KCL also uses a specific version of Apache Commons HTTPClient, which may be newer than the version embedded in the Hadoop cluster. Use Apache Maven's package relocation capability to move the HTTPClient code used by the job to a different "shaded" package to avoid the conflict altogether. Example 12-4 illustrates how to use Apache Maven to implement the workarounds that resolve dependency conflicts among Spark, the AWS SDK, and Hadoop. ##### Example 12-4. Maven settings resolving dependency conflicts among Spark, AWS SDK, and Hadoop <dependencyManagement> <dependencies> <dependency> <groupId>com.amazonaws</groupId> <artifactId>aws-java-sdk-bom</artifactId> <version>1.10.20</version><!-- KCL in Spark 2.1.0 uses 1.10.20 --> <type>pom</type> <scope>import</scope> </dependency> <!-- Jackson libs in AWS 1.10 are too old for Spark 2 --> <dependency> <groupId>com.fasterxml.jackson.core</groupId> <artifactId>jackson-databind</artifactId> <version>2.6.5</version> </dependency> <dependency> <groupId>com.fasterxml.jackson.dataformat</groupId> <artifactId>jackson-dataformat-cbor</artifactId> <version>2.6.5</version> </dependency> </dependencies> </dependencyManagement> <build> <plugins> <plugin> <groupId>org.apache.maven.plugins</groupId> <artifactId>maven-shade-plugin</artifactId> <version>2.4.3</version> <executions> <execution> <phase>package</phase> <goals> <goal>shade</goal> </goals> <configuration> <relocations> <!-- Apache Commons HTTPClient in Hadoop may conflict --> <relocation> <pattern>org.apache.http</pattern> <shadedPattern>com.mh2c.shaded.org.apache.http</shadedPattern> </relocation> </relocations> </configuration> </execution> </executions> </plugin> </plugins> </build> ### Running the streaming job To run the streaming job, upload its JAR to the Hadoop cluster and run it in a Hadoop user account like "spark". Use the `spark-submit` utility to start the job driver in YARN and to pass essential Spark configuration properties and command-line arguments: # as spark $ ./bin/spark-submit --class com.mh2c.LogProcessor --master yarn \ > --deploy-mode cluster \ > --conf spark.yarn.appMasterEnv.AWS_ACCESS_KEY_ID=AKIAXXXXXXXXXXXXXXXX \ > --conf spark.yarn.appMasterEnv.AWS_SECRET_ACCESS_KEY=XXXX....XXXX \ > --conf spark.executorEnv.AWS_ACCESS_KEY_ID=AKIAXXXXXXXXXXXXXXXX \ > --conf spark.executorEnv.AWS_SECRET_ACCESS_KEY=XXXX....XXXX \ > /home/spark/apache-access-log-processing-1.0.0.jar \ > apache-access-logs us-east-1 60000 > hdfs://203.0.113.101:8020/user/spark/access-logs/stream Notice that the AWS keys are passed to both the application master and the Spark executors. Failing to do both leads to authentication failures working with Kinesis or DynamoDB. The arguments in this command line, which correspond to the arguments of the `process` method in Example 12-3, are: * The name of the Kinesis stream * The region of the Kinesis stream, which is used to determine the Kinesis endpoint URL * The batch interval for Spark Streaming, in milliseconds * The "prefix" for Hadoop files written by the job The Hadoop file prefix is the start of the URL for where files should be written. An `hdfs://` URL directs Spark to write the files into HDFS. If the s3a filesystem implementation is installed and available in the Hadoop cluster, then the job can write files directly to S3, provided that the IAM user associated with the AWS keys also has write access to S3. That is how you can create a Spark Streaming job that not only reads from a cloud service, but also writes to one as well, leaving no critical data resident in the cluster itself. See "Configuring the S3 Filesystem" for instructions on setting up the s3a filesystem. ### Stopping the streaming job The `spark-submit` command is merely reporting on the status of the YARN application hosting the Spark Streaming job, so it can be stopped at any time using Control-C. This leaves the YARN application itself running, and it continues to run until you kill it through YARN. Find the application ID for the job, as reported by `spark-submit`, and then kill the application. (The following output has been edited for fit.) # as spark $ /opt/hadoop/bin/yarn application -kill application_1484496337475_0014 17/01/15 20:58:47 INFO client.RMProxy: Connecting to ResourceManager at /203.0.113.101:8032 Killing application application_1484496337475_0014 17/01/15 20:58:47 INFO impl.YarnClientImpl: Killed application application_1484496337475_0014 With YARN log aggregation enabled, you can find the output from the job as usual, using `yarn logs`. The logs contain output from Spark itself, including the output from `print()` calls on DStreams: # as spark $ $HADOOP_PREFIX/bin/yarn logs -applicationId application_1484496337475_0014 | \ > less The actual output files can be found in Hadoop at the location specified to the job as the "prefix." For example, a prefix of "hdfs://203.0.113.101:8020/user/spark/access-logs/stream" leads to a set of directories in HDFS starting with "stream" and timestamped at each batch. Each directory houses "part" files with the text records from the processor. (The following output is edited for fit.) # as spark $ hdfs dfs -ls /user/spark/access-logs/ Found 5 items drwxr-xr-x /user/spark/access-logs/stream-1484513640000.txt drwxr-xr-x /user/spark/access-logs/stream-1484513700000.txt drwxr-xr-x /user/spark/access-logs/stream-1484513760000.txt drwxr-xr-x /user/spark/access-logs/stream-1484513820000.txt drwxr-xr-x /user/spark/access-logs/stream-1484513880000.txt With the streaming results in place, other analysis jobs using Spark, MapReduce, or other frameworks that can read the files can be run later to drill further into the data. # What About Google Cloud Platform and Azure? If you are using Google Cloud Platform, Google Cloud Pub/Sub is the analogous service for AWS Kinesis. There is a Java library for the service, although it is still very new. Spark does not ship with built-in support for working with Cloud Pub/Sub, but connecting should be possible with the Pub/Sub Java library or the grpc library. Another tack is to use Apache Kafka as the source for the streaming job, and use the CloudPubSubConnector to move data from Cloud Pub/Sub through Kafka to the job. If you are using Azure, Azure Event Hubs is the analogous service for AWS Kinesis. Microsoft's HDInsight team maintains a Spark connector for Azure Event Hubs that can take the place of the AWS KCL in Spark Streaming jobs. Apache Kafka alone is a viable alternative for any of the stream services offered by the cloud providers. Choosing Kafka gives you more control over how your streams are managed, at the cost of having to maintain Kafka itself and the instances Kafka runs on. # Building Clusters Versus Building Clusters Well Configuring Spark, including Hive on Spark and Spark Streaming, on a cluster is a complex affair. If you also installed Hive as described in Chapter 11 and enabled high availability as described in Chapter 10, you did a lot of work and ended up with a powerful, capable cluster in the cloud. It is time now to take a step back and think about other issues with deploying cloud clusters beyond the mechanics of installation and configuration, which has been the focus of this book up until now. Part V begins by exploring the pricing decisions to be made when designating resources for clusters, weighing them against performance requirements. After all, while a cloud cluster is powerful and useful, it is even better if it is also cost-effective and fast. A dedicated account is not truly needed for Spark on YARN, but it provides better separation of Spark jobs from other cluster work. Find the complete source at: _https://github.com/bhavanki/moving-hadoop-to-the-cloud_. This exposes the key values in the command line reported by utilities like `ps`. Other ways of passing the keys are described in the AWS SDK documentation for managing credentials. # Part V. Care and Feeding of Hadoop in the Cloud By now you have created a simple Hadoop cluster running on a cloud provider, run some jobs on it, and possibly enhanced it to be highly available or tried out some other Hadoop components on it. The goals so far have been centered on getting things working and exploring, but now that you have some experience with clusters running in the cloud, it's time to focus on getting things to work well. That entails understanding how the features offered by cloud providers, as well as their trade-offs and limitations, can influence the choices you make in architecting clusters. # Chapter 13. Pricing and Performance As the saying goes, you get what you pay for. When it comes to cloud providers, in general, the more you are willing to pay, the more resources you can have at your command. For a small price, you can provision some modest instances with a small amount of storage and use them for proof-of-concept work, small websites, or simple server hosting. On the other hand, if you have money to spend, you can employ the full range of compute and storage offerings from your cloud provider, which enable you to field entire enterprise-scale infrastructures—for a corresponding enterprise-scale price. Fortunately, Hadoop was designed from the start not to require enterprise hardware, and it can run on a small handful of instances, at least to start with. Even in cloud deployments, it is not necessary to deploy the most powerful resources in order to architect a powerful cluster. You can build a decent cluster at a decent price. Regardless of the scale of your clusters, there's no need to waste money. By taking a careful look at the menu of selections for instances and storage, and building your network out well, you can be sure that you are getting the most bang for your buck. # Picking Instance Types One of the first decisions to confront when designing a cluster running in the cloud is which instance type or types to use. Some instance types are too underpowered for most cluster roles, while some are overpowered except for very large-scale deployments. Even though there is a lengthy list of instance types to choose from, it's enough to focus on a few characteristics common to all of them to find a good fit. ## The Criteria The primary criteria to consider when choosing instance types for a cluster are: * Number of vCPUs or cores * Memory * Associated block storage or disk space In general, and as you probably expect, an instance type is priced higher when it has more vCPUs, more memory, or more block storage. However, the ratios between these criteria do not stay constant across the set of available instance types. Some instance types go heavy on memory, while others have a tremendous amount of block storage. Instance types can usually be categorized by what their expected role is, and the role for a type derives from what criteria are emphasized in its makeup. Role classifications can apply to Hadoop cluster architectures as well as other uses. Here are some common roles for instance types: * _General-purpose_ instance types provide a balanced amount of vCPUs, memory, and block storage. These are analogous to general-purpose physical computers, which are configured to perform most tasks well, but without any specializations. * _Compute_ instance types provide more vCPUs and a lot more memory, while reducing available block storage. These instance types excel at number-crunching and analysis tasks that can eat up a lot of memory, but which don't require large amounts of block storage. * _Storage_ instance types are light on vCPUs and memory but deliver large amounts of block storage. While these instance types can still perform nontrivial compute tasks, they serve best as data repositories. Cloud providers do offer other instance types aimed at different roles, such as very high memory or GPU availability. If you are just getting started with Hadoop in the cloud, those more specialized instance types are not usually necessary, but as your expertise grows and the needs of your clusters become apparent, they can become useful. ## General Cluster Instance Roles As a Hadoop cluster architect, you have complete freedom to choose the instance types you want to use for your cluster (provided you have the budget). A common-sense starting point is to define some basic cluster instance roles, where each role maps to some set of Hadoop daemons. The needs of those daemons then influence the proper instance type for the role. Here is a good starter set of instance roles: _manager_ An instance that hosts the "master" or "manager" daemons for each cluster service, such as the HDFS namenode and the YARN resource manager _worker_ An instance that hosts the more numerous daemons for each cluster service, such as an HDFS datanode or a YARN node manager _gateway_ An instance that hosts daemons that interface with the world outside the cluster, like Flume agents, and/or host clients for cluster services If you built out a cluster in Part II, you will recognize the manager and worker roles. In a cluster that follows these roles, there are usually only one or two manager instances, a large number of workers, and a handful of gateways. More sophisticated architectures would evolve to include different worker roles optimized for specific cluster services, or even different manager instances. Given these roles, it's straightforward to map them to appropriate instance types: Table 13-1. Some cluster roles and their matching instance types Role | Instance type ---|--- manager | more powerful general purpose worker | compute and/or storage gateway | less powerful general purpose Because manager instances host the most crucial daemons in the cluster, they need to have the best and broadest resources available. They themselves do not store much data or execute cluster jobs, so general purpose-hardware is suitable. For larger clusters, an instance type with somewhat more memory can help keep things running smoothly. Since cluster work is spread out across workers, they can be less powerful compared to a manager instance, but they make up for it in numbers. Workers that run jobs can take advantage of the extra vCPUs and memory of a compute instance, while HDFS datanodes can take up the additional storage associated with storage instances. In larger clusters, you may choose to run storage daemons and compute daemons on separate instances with optimized instance types, but on smaller clusters all of the worker daemons will host both kinds of daemons, in which case compute instances tend to be the better choice. If you need additional storage on a compute instance, you can always attach more volumes, but you can't as easily add vCPUs or memory to a storage instance, if it's possible at all. Gateway instances are used lightly and mostly serve to feed the cluster or to host interactive applications for people to use, so they typically do not require a lot of horsepower. As always, there are exceptions, depending on what the cluster needs, but these are good guidelines to start with. # Persistent Versus Ephemeral Block Storage Each instance you launch comes with at least one persistent root volume for data storage. Some instance types provide additional ephemeral volumes, where data survives as long as the instance is not stopped or terminated. After an instance is launched, you can attach new persistent volumes and may be able to add more ephemeral volumes, at least up to a limit. So, with all these block storage options, what should you use for a Hadoop cluster? One option is to use persistent volumes for all block storage. Cloud providers take measures to ensure that they are available and can survive outages. However, persistent storage has two primary drawbacks over ephemeral storage: * _They are slower._ Persistent volumes are not necessarily attached to the same hardware, or even nearby in the same network, as an instance. In contrast, ephemeral storage is either directly connected to the same physical hardware or extremely close to it, so data access is fast. * _They cost more._ While the cost of persistent volumes is not generally considered _expensive_ , it is more than that of ephemeral storage. Once your clusters scale up to storing huge amounts of data, the cost of maintaining that data, triple-replicated in the case of HDFS, may start to add up. While ephemeral storage is relatively fast and cheap, its primary drawback is that it's ephemeral. Whenever a cluster instance stops, its ephemeral storage is wiped out. Therefore, it's likely unsafe to use it for data that needs to be stored long-term only within the Hadoop cluster. The primary issue is using ephemeral storage as the backing disks for HDFS. Because HDFS replicates data across datanodes, a cluster can automatically recover from the loss of a single datanode and the corresponding loss of its share of data. As usual, a cluster can safely lose as many datanodes as the value of its replication factor, less one. Losing more than that risks data loss, unless the data is saved off elsewhere. In some cases, you may not be able to use ephemeral storage for HDFS at all. Perhaps information-handling policies require that cluster data be stored on more robust forms of storage, or perhaps there is concern that the cluster will lose too many datanodes while jobs are running. If so, persistent storage is the better option. The dichotomy between persistent and ephemeral storage is not as simple to discern as perhaps one would like. Other factors blur the lines. As one example, some cloud providers offer different types of persistent block storage with faster or slower access times and throughput, with corresponding differences in cost. You could choose faster, more expensive types of persistent storage for commonly used clusters or instances, and choose slower ones for less busy corners of your architecture. With different options for persistent storage, you may not need to consider ephemeral storage at all. If you architect data flows such that data you cannot afford to lose is kept safely outside of Hadoop clusters, perhaps in object storage, then in-flight data is no longer as critical to preserve, and it becomes more feasible to use ephemeral storage for cluster data. The trade-off is that it can take time to retrieve data from storage and send final results back to it; is that extra time and data transfer cost offset by increased cluster performance? Finally, it is important not to forget that you can, and should, back up your cluster data periodically (see Chapter 18). With reliable backups in places, the risk of using ephemeral storage is reduced, but now there is a need to restore data once in a while, which can slow things down and incur data transfer costs. In summary, then, here are two overarching strategies for block storage use in a Hadoop cluster: * Use persistent storage for all data. Optionally, go with slower and cheaper storage types where performance is not an issue. * Use ephemeral storage for HDFS, and persistent storage for the rest. Save critical data to object storage, and restart processing from there if too many datanodes are lost. Current trends are to go with the first strategy and use persistent storage for everything. The cost savings and performance boost of ephemeral storage are often not enough to make up for the increased criticality of data backups and the lack of intrinsic reliability compared to persistent storage. It is also more akin to running on-prem, which organizations are today still more comfortable with. Exclusive use of persistent storage also makes it easier to start and stop clusters. # Stopping and Starting Entire Clusters Running clusters on a cloud provider opens up new usage patterns and operations practices. There is added flexibility, due to the fact that instances are not actual physical pieces of hardware, but abstract collections of resources. One practice that becomes viable in a cloud provider is shutting down clusters when they are not needed. In a typical on-premises architecture, it does not usually make sense to shut down entire machines when they are not needed, except to save on power and cooling costs; instead, you might try to have those machines serve multiple purposes, so that they are in use as much as possible. Of course, this makes administration of those instances more complex and can lead to conflicts among the software packages installed. This pursuit of machine-level efficiency isn't as necessary in the cloud, because it is easy to stop and start instances as often as you wish. There is no need for a human to physically visit hardware and push buttons and rewire network connections; everything is controlled through the cloud provider's consoles and APIs. This practice can save money. However, it's also a way to effectively field a larger set of clusters than with a more static operational stance. For example, instead of running ten general-purpose clusters all the time, you could run six general-purpose clusters, but then use the remaining capacity for a shifting set of eight other clusters for specialized needs. At any moment, only some of those specialized clusters would be running, but they can be swapped in and out in response to business needs. There is still the cost of maintaining the block storage associated with all of the instances, but this costs less than it would with all of the instances running with their storage attached. This scheme is shown graphically in Figure 13-1. On the left, all of the resources are constantly used by ten running clusters. On the right, six clusters always run, but other clusters are defined that can be started and stopped to use the rest of the resources. There are important caveats with this practice. Perhaps the most important is that all data residing on ephemeral block storage is destroyed when instances are stopped. The process of stopping specialized clusters must involve backing up any important data that ends up on ephemeral storage, and likewise the process for starting them must involve putting it back. For this reason, it's usually recommended to use persistent storage exclusively for clusters that are stopped and started. ###### Figure 13-1. Ways to manage clusters with limited resources Another important caveat is that providers may grant a restarted instance a different IP address from when it was last running. Cluster configurations that rely on those IP addresses must be updated in order to bring the cluster back up to fully operational status. For example, a GCE instance that is stopped and restarted will receive a new ephemeral public IP address by default, unless a static IP address has already been established for it. Generally, private IP addresses do remain assigned to instances as they are stopped and started, which is a good reason to configure clusters using them. Finally, not all cloud providers meter instance usage at a fine level, but instead at larger time units, such as whole hours for EC2. As a result, it is not always economical to bring up clusters frequently but for short periods of time; the provider will round up charges to the next time unit anyway. For example, if a cluster is brought up and shut down three times in a single hour, and billing is done in units of hours, then the cloud provider will charge for three hours of usage for each instance. So, bring up clusters at times when there is a batch of jobs to be run; this will maximize their time used within the billing unit. In general, trying to game cloud provider billing practices to save a few dollars is tricky and prone to creating higher charges. Automation is extremely helpful for managing the starting and stopping of clusters, which is covered in Chapter 17. # Using Temporary Instances Another attractive way to save money on clusters besides stopping them when not in use is to use temporary instances. As explained in "Temporary Instances", a temporary instance works just as well as a standard instance and costs much less, but can or will be terminated without warning after some time. Some roles in a cluster are naturally suited for temporary instances. In the set of basic instance roles defined previously, the worker role is the most appropriate to host on temporary instances, because a cluster has so many of them. As temporary instances are reclaimed, new ones can be provisioned to take their place. Hadoop automatically copes with the disappearance and appearance of worker daemons like datanodes and node managers, so operating in this fashion is practical. It's important to maintain a minimum number of nontemporary instances for some cluster roles. The HDFS datanode role is a prime example. If all of the datanodes are running on temporary instances and are reclaimed by the host provider, then all of your HDFS data is lost. Even if only some datanodes disappear, if those hosted all of the replicas of some HDFS data and they disappeared too quickly for the replicas to be copied to remaining datanodes, then that data is lost. Automation of the maintenance of temporary cluster instances is required to work with them for a significant period of time. It's wasteful and slow to have someone manually allocating new temporary instances as older ones are reclaimed. Scripts, tools, or cloud provider features should be employed to notice when the pool of temporary instances in your clusters falls below a certain level, provision new temporary instances to take their place, and configure them into your clusters. Chapter 17 covers ways that you can get started with monitoring your clusters. One common tactic is to use temporary instances for YARN node managers, expanding a cluster's compute capacity. If there is, say, a surge of end-of-month jobs to run, or a busy shopping day coming up, and the additional load on the cluster is certain to abate after some time, then expanding a cluster with temporary compute instances is a cost-effective and easy way to cope. Even as some node managers drop away when the cloud provider pulls back its instances, YARN can automatically push the work to the remaining node managers without intervention. It isn't too difficult to "manually" expand a cluster, but with the right combination of monitoring and automation, you can arrange for clusters to grow in response to increased demand as it is sensed. See "Elastic Compute Using a Custom Metric" for pointers on how to implement _autoscaling_ of compute capacity, which works with both temporary and ordinary instances. Always keep in mind that you cannot rely on temporary instances to last for any amount of time. Even if historically you find that they survive for a long time, there are no guarantees that history will continue to repeat itself. AWS spot instances, for example, can theoretically last for weeks if the initial bid is high enough and the market price stays low, and this can lull you into a false sense of security. In contrast, Google Cloud Platform preemptible instances are guaranteed to be terminated within 24 hours, specifically to avoid that, but that makes them less reliable for some cluster operations. # Geographic Considerations The cost of running clusters in a cloud doesn't depend just on _what_ you run with, but _where_ it runs. ## Regions The price for an instance type, or gateway, or other element of cloud infrastructure can vary from region to region. The hardware and connectivity in each of a cloud provider's regions is roughly the same, so you can realize significant cost savings by running in a region that has lower rates. There are reasons to run in a more expensive region. The most important one is network performance between instances running in the region and their users; this is even more important when the users are customers outside of your organization. You may find that your clusters need to run closer to their users to meet your needs. For example, clusters running in Asian regions will tend to exhibit higher latencies for users in Europe than users also in Asia. If the performance is bad enough, you may consider replicating your clusters in a European region. You should never construct a cluster that spans regions. Not only are network speeds much slower than even between availability zones in the same region, but there is additional cost associated with data flowing into or out of regions, which are significant given the amount of network traffic within Hadoop clusters. ## Availability Zones Resources are not priced differently depending on the availability zone within which they run, so that need not influence your cluster design. However, some cloud providers do charge for network traffic between availability zones. A cluster that spans availability zones will cost more, although not nearly as much as one spanning regions. Network speeds between availability zones are slower than within availability zones, although again not as slow as between regions. Still, larger clusters and more extensive workloads benefit from being contained within a single zone, since they will run faster. You may wish to build clusters that span availability zones as part of a high-availability strategy (see Chapter 10), but heavier workloads may have trouble running and costs may shoot up, and you may be driven to stay within a single zone. Keeping cluster data backed up or safe in a cloud provider storage service (see Chapter 5) can enable moving work from a cluster lost in one availability zone to another running in a separate zone, as an alternative to a single HA cluster. # Performance and Networking The performance of Hadoop clusters in the cloud is determined by more than the sort of instances they run on and the kinds of storage they use; how the instances are networked also has a major effect. The geographic considerations of regions and availability zones covered here only touch on the topic of networking Hadoop clusters. Chapter 14 goes further, developing and comparing network topologies while keeping in mind performance as well as security. Well, not always. Cloud providers like AWS allow you to start an instance with an ephemeral root volume, but for most uses, including Hadoop clusters, this is not recommended. # Chapter 14. Network Topologies Cloud providers let you design almost any network architecture you could imagine to support your instances. You have options for where in the world the instances are running, their IP addresses and DNS names, and all of the rules for how they can talk to each other and the outside world. All of that freedom can be overwhelming. Cloud providers start you off with a default network that gets you up and running quickly. However, even establishing a single Hadoop cluster leads you to outgrow that initial state, and compels you to confront many questions about how your instances should be arranged, and the rules that they should play by. Your organization may also have its own requirements for where data can live and the protections for it both at rest and in transit, including access rules and redundancy requirements. The collective layout for a network of computing resources can be called its _topology_. This chapter defines some common concepts behind cloud network topologies and shows how Hadoop clusters can work within them. # Public and Private Subnets When it comes to networking and security, perhaps the most fundamental question to ask about a single instance, or an entire cluster's worth of them for that matter, is: Who can see it? It's essential that all of the instances within a single Hadoop cluster be able to see each other. In the typical, basic case, all of the instances run in the same subnet in the same availability zone, so that they have the fastest network connectivity to each other. Security rules also allow for unrestricted communication between them, so there is no internal obstacle to the cluster's functionality. ###### Tip It is possible to set up security rules so that only the ports relevant to Hadoop clusters are reachable, even from instances in the same cluster. In practice, this is very difficult, as there are so many of them to cover. The better model is to assume that cluster instances can completely trust each other with no obstacles blocking their way. If instances within a single cluster cannot trust each other, there are deeper architectural problems! If the cluster instances in a subnet are also reachable, in some way, from the internet, then the subnet is called a _public subnet_. If there is no network routing between the instances and the internet, or security rules completely prevent communications, then the subnet is called a _private subnet_. A cloud provider generally starts you off with public subnets, by automatically allowing at least SSH access from either the internet or from your apparent IP address to instances residing in it. After all, without any other way to reach your instances, they are not of much use. You can manipulate the security rules to allow wider access, or eliminate all outside access and turn the subnet private. A good rule of thumb for securing any system is to minimize the attack surface. So, in general, using private subnets for your clusters is more secure than using public subnets. The trade-off is in convenience, as it takes extra steps to reach a private subnet. The rest of this chapter explores the trade-offs. If you use a public subnet to host clusters, then access from the internet should be tightly restricted: * Prefer allowing only SSH access, using tunneling or proxies (see "SOCKS Proxy") for any other form of communication. * Prefer key-based authentication over password-based authentication. For SSH access in particular, there is no reason to use passwords. * Prefer secure, encrypted communication protocols or layers, such as HTTPS instead of HTTP. * Use security rules that restrict outside access to known IP address ranges instead of allowing in the entire internet (CIDR 0.0.0.0/0). Imagine an HDFS namenode running in a public subnet, and suppose cluster users want to check on it through its web interface. The worst configuration for it would be to allow access from anywhere on the internet to its unencrypted HTTP port. While this is undoubtedly _convenient_ , it is completely exposed to attack from anywhere. Moreover, anyone who stumbles upon it can learn about your internal cluster architecture, including IP addresses of your instances. Just enabling HTTPS for the namenode's web interface is not enough; authentication is also required, which involves setting up Kerberos and configuring the namenode appropriately. Fortunately, in the cloud, there are alternatives to doing all of that work for securing the namenode. ## SSH Tunneling One alternative is to prohibit direct access to the namenode's HTTP port from outside the subnet. As described in "SSH Tunneling", you can establish an SSH tunnel from outside the subnet to the HTTP port of the namenode. This is less convenient than direct access, but it carries the benefits of key-based authentication and encryption, and reduces the exposure of the subnet's instances; it's one less port that's exposed. To create a tunnel, make an SSH connection to an instance inside the public subnet, and request that it establish a tunnel to the desired instance and port within the subnet. Here is an example of creating a tunnel for reaching a namenode: $ ssh -i /path/to/cloud_provider_key.pem -n -N \ > -L 50070:localhost:50070 userid@bastion.cloud-provider.example & In this example, the SSH command is purely for creating a tunnel, and so it runs in the background with the `-n` option. A different pattern is to create the tunnel along with a normal, active SSH connection to the instance where you will be issuing commands. The `-N` option instructs the SSH client not to run a command on the instance hosting the tunnel, since it is running only to maintain a tunnel. An important concept to understand for tunneling is that the instance on the other end of the tunnel does not need to be the same as the desired destination. In the preceding example, the SSH connection is made to an instance "bastion.cloud-provider.example", and then the tunnel's remote end is directed to port 50070 on "localhost". The tunnel is illustrated in Figure 14-1. ###### Figure 14-1. An SSH tunnel to a bastion host that forwards to a port on the bastion host ###### Note The network diagrams in this chapter were generated using Cloudcraft. The address for the remote end of the tunnel is specified _relative to the serving instance_. So, "localhost" here means _bastion.cloud-provider.example_ , because the namenode is running on that same instance. If the namenode were running elsewhere, and the routes and security rules allowed connecting from the instance, the tunnel could direct requests there. This arrangement is shown in Figure 14-2, created by a command like the following: $ ssh -i /path/to/cloud_provider_key.pem -n -N \ > -L 50070:nn1.cloud-provider.internal:50070 \ > userid@bastion.cloud-provider.example & ###### Figure 14-2. An SSH tunnel to a bastion host that forwards to a port on another host The single instance _bastion.cloud-provider.example_ can be used for SSH tunneling to lots of other instances, and serves as a kind of communications center on behalf of all the instances in the public subnet. Such an instance is called a _bastion_ , because it is like a fortified part of the subnet that is exposed to the internet, protecting the rest of the instances. You should not run cluster components on a bastion, but use it as a dedicated communications hub. ##### Caring for Your Bastion A bastion is a potentially vulnerable part of your cloud architecture, so it must be hardened. Some prudent practices: * Keep its operating system up-to-date with the latest patches, especially security-related ones. * Disable root access except through local logins. * Disable password-based SSH authentication. * Monitor network connections made to it, and watch for attacks. * Lock it down to access from a limited IP address range and from as few ports as possible, preferably only SSH (port 22). * Stop it when it is not in use. Since the desired destination is resolved on the bastion, you are free to use the private IP address or private hostname of the destination when describing the tunnel. They do not mean anything to your local computer hosting the local end of the tunnel, but the bastion runs in the cloud provider and can interpret them. So, with the right network and security configuration, this allows a bastion to reach private subnets as well. Once an SSH tunnel is established, you use it by pointing your browser to the local port on your own computer, e.g., _http://localhost:50070/_. The SSH client is listening on that port locally, and forwards the request through the tunnel to the bastion, which sends it to the remote destination and port. Response data flows back through the same path. So, communication is enabled by only having the SSH port of the bastion exposed. ## SOCKS Proxy Another method for reaching into a public subnet in a more secure way is to establish a SOCKS proxy server, again on a bastion host. A SOCKS proxy listens on a single port and forwards requests to it on to the desired destination. There are many SOCKS proxy server implementations available. As it turns out, the OpenSSH client process can act as a SOCKS proxy: $ ssh -i /path/to/cloud_provider_key.pem -n -N \ > -D 8157 userid@bastion.cloud-provider.example & This command connects to the bastion host, as when performing SSH tunneling, but it also starts a SOCKS proxy server listening locally on port 8157. Any TCP requests that are sent to that local port are forwarded through the encrypted SSH connection and then issued from the bastion host to the desired destination. This method adds an additional layer on top of the basic SSH tunnel. To use a SOCKS proxy, a client program like your web browser needs to be configured to send requests through it instead of directly to the destination. Using an SSH tunnel requires you to explicitly send requests to the local end of the tunnel, but using a SOCKS proxy does not, as the client program automatically knows that it needs to communicate via the proxy. So, a SOCKS proxy is less intrusive once configured, but requires support from the client. A SOCKS proxy connecting through an SSH tunnel is illustrated in Figure 14-3. The client application is configured to work with the SOCKS proxy, which forwards requests through SSH to a bastion host, and onward from there to the desired destination. ###### Figure 14-3. A SOCKS proxy with an SSH connection To connect to the example namenode, you would point your configured browser to port 50070 of its instance's _private_ IP address or _private_ DNS hostname. The browser will send the request to the SOCKS proxy running on your local computer, which forwards it through the SSH tunnel to the bastion, and the SSH daemon on the bastion will be able to resolve either private identifier and send the request to the namenode instance. It is possible, depending on your network configuration, that you can use the _public_ IP address or hostname, which is more natural when you are operating outside the cloud provider. However, if the cloud provider routes requests to those public identifiers outside the subnet, as it would for any other external address, then the connection can fail. The route for the request will exit the subnet and attempt to re-enter, but the subnet may be locked down. This situation is illustrated in Figure 14-4. ###### Figure 14-4. A SOCKS proxy with an SSH connection with a bad destination address: because the bastion host resolves the public IP address to a route that leaves the secure network, the connection fails An advantage of using a SOCKS proxy is that once one is established, you are free to send requests to any reachable host and port within the subnet. With SSH tunneling, you must establish one tunnel per host and port. A disadvantage is that you must configure applications on the client side to use the proxy; SSH tunneling does not require that, although you must then target the tunnels explicitly. Instead of relying on SSH, you can set up a standalone SOCKS proxy server on the bastion host. The server would listen on its own port, which is available outside its subnet, and client programs would be configured to use it as their proxy. When using such a server, it's important to establish strong authentication and not run it as an "open proxy" that the whole world can use. Restricting access to only IP addresses in the range used by you or your organization is also prudent, whether for a SOCKS server or SSH in general. ## VPN Access An organization that uses a cloud provider heavily may establish access directly from the organization's VPN. Conceptually, this is like extending private access to virtual networks to clients that are connected to the VPN; at a minimum, clients are able to reach instances using their private IP addresses. It may also be possible for clients to resolve the cloud provider's internal hostnames, which are normally only resolvable inside the cloud provider, if DNS is included in the arrangement. Sometimes, cloud instances can even connect out of their subnets and into clients running on the VPN, making the connection truly two-way. In practice this is uncommon, since it complicates the security posture of the organization's own network. With VPN access, it is as if your local computer connected to the VPN is also present in the subnet; in a way, your computer is itself a bastion. SSH tunnels or SOCKS proxies are not necessary to gain access to instances because of the hard work that your network administrators have done for you. VPNs do have outages, though, so your only access to critical clusters should not be through a VPN. Having security rules defined, but inactive, that allow access when the VPN link is down will let you keep working with your clusters. It's just another part of keeping clusters available. ## Access from Other Subnets In a large enough cluster architecture, multiple subnets will be in use. Cloud providers allow you to establish routes between subnets and to set security rules for how instances in different subnets can connect to each other. Each subnet may be either private or public. Most importantly, instances in a public subnet can connect to instances in a private subnet. This opens up different possibilities for where clusters live and how they are accessed and used. # Cluster Topologies A cluster topology describes what runs on instances in a cluster as well as how they are connected to each other and to cluster users. Now that concepts for public and private access have been laid out, some cluster topologies can be built with them. ## The Public Cluster This topology is the least secure and arguably the worst choice of them all, but serves well as a basis for comparison with better topologies. In a public cluster, all of the instances run in a public subnet, and all of the ports involved in cluster operations are open to the internet. In the least secure case, all ports on all instances are reachable from any IP address, either inside or outside the cloud provider. A public cluster is illustrated in Figure 14-5. ###### Figure 14-5. A public cluster, in which access is completely open to the internet Considering a basic cluster that is running HDFS and YARN services, this means that all of the ports for the namenode, datanodes, resource manager, and node managers are accessible from outside the subnet. This includes the standard ports used by the daemons to communicate with each other (e.g., port 8020 for the namenode, port 50010 for a datanode) and those used by users and other clients (e.g., HTTP port 50070 for the namenode). This topology puts up no roadblocks to accessing it, which is convenient. Anyone can use the cluster from any location. However, it is terrible for security. Anyone can configure a Hadoop client to connect to the cluster and peruse data stored in it, and use it to run jobs. Even if steps are taken to secure the Hadoop services, such as enabling Kerberos and requiring TLS, the cluster components are still exposed to the public and vulnerable to attacks. The convenience is not worth the risk. ## The Secured Public Cluster An important step in securing a public cluster is to restrict the ports that are accessible outside the subnet. A cluster with many services running can make use of a large number of standard ports, but most of them are not pertinent to people or processes outside the cluster. For example, port 50010 is the standard port that a datanode listens on for cluster operations, but cluster clients do not need to reach that port to do their work. So, that port does not need to be exposed outside the subnet hosting the cluster. Port for daemons like the HDFS journalnodes and the ZooKeeper servers, which are purely for internal cluster functioning, need not have any ports exposed at all. So which ports are necessary? It depends on what clients need to do with the cluster. For people checking on cluster health, it's enough to expose the HTTP ports—or better yet, HTTPS ports—for the namenode, resource manager, and other key daemons. Client processes that run jobs on the cluster or look through its stored data need access to the primary ports of daemons like the namenode (8020), resource manager (8032), and the Hive server (10000). ###### Tip You could configure nonstandard ports as a means of obscuring the fact that Hadoop daemons are running on your instances. A naïve port scan might assume that a process listening on port 8020 is an HDFS namenode, but might not assume that for the same process listening on, say, port 23456. However, port scanners can perform fingerprinting on responses that they receive, which give away the nature of listening processes. Also, the use of non-standard ports makes cluster and client configuration much more difficult. So, the practice is pointless. Source address restrictions are also important to secure a public cluster. Just because the cluster is reachable from the internet does not mean it has to be reachable from the entire internet. Security rules placed on the subnet can easily limit access to IP ranges that are known to be safe. A secured public cluster is illustrated in Figure 14-6. ###### Figure 14-6. A secured public cluster; security rules control what outside sources can access the cluster and which ports are available ##### Your Drifting IP Address If your local computer has a fixed IP address assigned to it, from your ISP or your work organization, then maintaining security rules that are pinned to your local computer is easy. Often this is not the case, and over time your IP address will change. It's up to you to watch for that to happen and update your security rules. If SSH access spontaneously stops working, check if you have a new IP address. The cluster can be configured with authentication and authorization, using Kerberos for example, as an additional layer of protection. This is not a topological choice, but is very effective in further locking down a cluster. _Hadoop Security_ by Ben Spivey and Joey Echeverria (O'Reilly) covers "Kerberizing" clusters and many other security topics in great detail. ## Gateway Instances To make a secured public cluster even more secure, you can limit its availability to clients. For example, the HTTP port for the namenode does not need to be directly accessible from outside the cluster; you can use SSH tunneling or a SOCKS proxy to reach it indirectly. It is harder to reach it, but the attack surface of the cluster is reduced, since communications are now encrypted and authenticated with SSH. It's one thing to want to reach an HTTP port on a cluster with a browser, but another to run a MapReduce job. Client applications do need direct access to work effectively. The strategy here is to only allow client applications to run on designated resources that are specifically configured to have direct access to the cluster. The resources might not even run any cluster daemons, but are there purely for using the cluster. Such a resource running in the cloud provider is called a _gateway instance_ , because it provides a gateway for accessing the cluster. Figure 14-7 shows the addition of a gateway instance to a secured public cluster. Access from the internet to the cluster is normally only through the gateway instance, although it still may be possible to reach the cluster directly. ###### Figure 14-7. A secured public cluster with a gateway instance Use of gateway instances is less convenient. No longer do users simply run jobs from their local computer or their favorite nearby server; they must connect to a gateway instance, potentially copying their application over, and work from there. Server applications that use a backing Hadoop cluster must be installed out in the cloud provider on gateway instances, instead of on on-premises hardware. They, in turn, must enforce their own security using TLS, passwords, and/or other measures. ## The Private Cluster A gateway instance can be viewed as a kind of bastion, a fortified and controlled entry point for working with a cluster. With gateway instances in place, cluster instances running Hadoop daemons no longer need to be accessible at all from the internet. A private cluster topology places all of the instances that constitute the cluster in one private subnet. The only way to access the instances is through other subnets. Some of those may in turn be private, but at least one of them, somewhere down the line, is public and hosts gateway instances. Cluster users only ever directly connect to the gateway instances which, ensconced in the cloud provider and locked down, safely access the cluster. A private cluster is illustrated in Figure 14-8. Access to the cluster is only possible through the gateway instance, and access from the internet is routed only to the gateway instance. ###### Figure 14-8. A private cluster A private cluster does not strictly require additional security measures to be implemented, such as TLS or Kerberos, because all communications are either contained within its subnet or on controlled paths to client applications. The cloud provider shields the "soft underbelly" of the cluster from the outside. You may still need to, or want to, implement those measures, depending on the nature of the data that the cluster manages and the number and skill of the users of the cluster. Administrators can still access cluster instances by tunneling or proxying through gateway instances to the relevant ports. ## Cluster Access to the Internet and Cloud Provider Services The preceding topologies assume that the cluster doesn't initiate interactions with the outside world, but this assumption does not hold true in many real-world deployments. For example, a job executing on a cluster may reach out to a website or to a database running outside the cloud provider to pull down data for analysis. A different job could rely on another cloud provider service, such as object storage, and calls to those service endpoints might be routed outside of the private subnet. Fortunately, it isn't necessary to open the cluster all the way back up to the internet to satisfy these situations. If a cluster is running in a public subnet, the security rules for outbound traffic can be fashioned to allow exactly the connections that jobs in the cluster need. If there's confidence that the cluster will not be used maliciously, all outbound traffic can be permitted. A fully locked down private subnet permits no outbound traffic, though, except to gateway instances in order to deliver results. Those gateway instances run in a public subnet, with access to the outside world, so they can be used in routes the cluster uses to reach out. Sometimes, client applications that make use of the cluster can arbitrate that access themselves, so there is no additional work to be done; otherwise, a gateway instance needs to be set up, this time to serve the cluster's needs, and not just users' needs. One general solution to this problem is to set up a gateway instance as a network address translation (NAT) instance. Like a home router, a NAT instance provides controlled access outside of an isolated network. It must run in a public subnet in order to do its job, but cluster instances only need to talk to the NAT instance, and are not themselves directly exposed. For example, if a job running on the cluster needs to save a data blob to the cloud provider's object storage service, then the request sent to the storage service is routed to the NAT instance, which then handles sending it on to the service. A proxy instance is a similar solution. Instead of performing NAT, a proxy instance runs a proxy server, such as a SOCKS server, which forwards any requests from the cluster out and returns the results. This could be considered more heavyweight than a NAT instance. Cloud providers support NAT and proxying in different ways: * EC2 provides both _NAT instances_ and newer _NAT gateways_. A NAT instance is an EC2 instance that launches from a special AMI containing network configuration scripts that, on launch, set up the instance to perform NAT. A NAT gateway is a more abstract element that EC2 automatically manages; it is the newer and usually the better choice. * GCE does not have first-class support for NAT instances, but supports creating either a NAT instance that uses iptables or a proxy instance that uses Squid to enable access from a private subnet to the internet. * Azure automatically uses Source Network Address Translation (SNAT) to support outbound connections. If the virtual machine is under a load balancer with a public IP address, the connection is made through the load balancer's IP address; otherwise, a temporary, unconfigurable public IP address is associated with the connection. Sometimes a NAT or proxy instance is not necessary, because it is possible to run part of a cluster service on a gateway instance directly. A good example of this is Flume, which uses agent processes to accept incoming data and save it to HDFS. Flume agents can run on gateway instances in a public subnet, thereby allowing external sources to deliver data to them directly, but also having a controlled outbound path into the cluster on the private subnet to save that data (or to other agents, depending on the flow architecture). # Geographic Considerations The topologies developed in this chapter are all logically defined, without concern for where the availability zones in a cluster's subnet exist in the real world. It is not possible to completely ignore this aspect of cluster topology, but fortunately it does not have a large impact on it. ## Regions The guidance for cluster topologies across regions is simple: each cluster should reside in just one region. As described in "Regions", network speeds are too slow and data transfer costs are too high to make cross-region topologies practical. Moreover, it is essentially impossible to construct a single working cluster in separate regions where the instances all reside in private subnets, as heavy amounts of NAT or proxying would be necessary for the large volume of traffic between cluster daemons. ## Availability Zones Most clusters will exist in a single availability zone. A cluster that spans multiple availability zones should be set up for high availability (see Chapter 9) in order to cope with the loss of a zone hosting the namenode or resource manager. Under high availability, it is possible to have the two namenodes and two resource managers in separate availability zones. ###### Warning See "Planning HA in the Cloud" and "Availability Zones" for discussions on the price and performance trade-offs of running a cluster that spans availability zones. The higher costs and lower performance that come with such a cluster may drive you to avoid it altogether, making network topology choices moot. In any of these cases, clusters can reside in private subnets and rely on gateway instances for working with them. The important question becomes: where should gateway instances reside? A rule of thumb to follow is: _For the highest availability for use of the cluster, gateway instances should run in the same availability zones as the namenodes and resource managers._ Consider the case of a non-HA cluster running in a single availability zone. Its gateway instances could run in the same zone or in a separate zone. When they run in the same zone, and that zone drops out, then the gateway instances are unavailable, but so is the cluster, so the client applications would not work anyway. When they run in a separate zone, there are two ways to lose functionality: 1. The cluster's availability zone drops out but the gateway instances remain available. The client applications are only usable for the few features, if any, that do not require the cluster. 2. The gateway instances' availability zone drops out but the cluster remains available. However, without any gateway instances, the cluster is effectively unavailable, if it is running in a private subnet. There is limited advantage to running gateway instances separately from the cluster, so it is generally better to host them in the same availability zone for speed and ease of administration. However, if the client applications are still useful without the cluster, or if some basic "emergency use" gateway instances are running in the same zone as the cluster, then running the client applications separately could still be a good option. The possibilities for an HA cluster are a little more complex. Here, usually there are one or two key availability zones hosting namenodes and resource managers. If the namenodes and resource managers are all running in a single availability zone, then the calculus does not change compared to the non-HA case. If they are split across two availability zones, things become more interesting, because even if one zone drops out, the daemons in the other zone take over and the cluster remains available. One option for gateway instances for an HA cluster is to host them in a third availability zone. This way, no matter which of the two cluster's zones drops out, the cluster and its client applications remain available. There is only one set of client applications in existence, so managing them is straightforward. One downside, as in the non-HA case, is that if the third zone drops out, the cluster is still available yet unusable without gateway instances. Also, network speeds between the gateway instances and the cluster are worse, no matter the state of the availability zones. Another option is to include gateway instances in both of the key availability zones for the cluster. If one of the zones drops out, the client applications are still available and the cluster, configured for HA, still works, so there is no loss of functionality. Including instances in just one zone creates a new single point of failure for using the cluster, so it is better to use both. However, this complicates management of the gateway instances and client applications since there are two copies of them. Load balancing, application data replication, and other measures are necessary to create a seamless user experience. Still, this option ensures that the cluster is usable whenever it is available. # Starting Topologies For your first few clusters, it's reasonable to use a secured public cluster topology where only SSH access is required to a small number of bastion hosts. This topology is nearly as secure as a private cluster topology and takes less work to establish and maintain. Gateway instances can be deployed for hosting server applications, and those instances can be protected just like bastions. As you gain more experience deploying clusters in the cloud, you should think about moving to the private cluster topology for critical clusters. They are more difficult to administer, but experience gained along the way in configuring virtual networks and subnets and defining security rules will lessen the burden. Structurally, they are similar to public secured clusters, except that the gateway instances reside in a separate subnet from the cluster. You may come up with your own topologies. After all, the practice of deploying Hadoop in the cloud is still evolving, so there is yet room for new ideas. Good topologies will always follow the guiding principles that have been covered in this chapter: minimize outside access, use controlled access points, prefer stronger modes of authentication, and ensure adequate performance. # Higher-Level Planning The chapters so far in Part V of this book have focused on understanding low-level concepts for designing clusters and making the right choices for cost, performance, and security on a cluster-by-cluster basis. There are concepts at a higher level to consider as well, which come to the forefront once you have become somewhat adept at creating clusters and have resolved many of those low-level questions. Chapter 15 takes a wider view and considers options for how all of your cloud clusters can be managed. Topologies for clusters running in multiple subnets are not considered here, since they have cost and performance problems. Establishing VPN access to the cluster is an alternative that preserves convenience. It is theoretically possible to spread out the active and standby daemons across up to four availability zones, but those scenarios are exceedingly rare and not explored here. # Chapter 15. Patterns for Cluster Usage Eventually you, or your organization, will be at the point where the use of clusters running in your cloud provider is no longer just for research or proof-of-concept work. The important questions now change from whether it is a good idea at all to how best to take advantage of the clusters: * When should clusters be created and how long should they last? * Who should be able to use them? * How should they be created? * How much work should be sent to the cloud? Every organization has different answers to these questions, but knowing that there are choices to be made helps you formulate the plan to get from experimentation to regular use of cloud clusters. # Long-Running or Transient? Of all the questions, the one that tends to come up the earliest and has the most effect on the answers for others is the question of when. When do you create clusters running in your cloud provider, and relatedly, how long should those clusters be available? There are two dominant answers to the question. The first, which is most like the way that on-prem clusters are used, is that clusters should be set up in advance and tended so that they are always available for anyone to use. Administrators monitor them and resolve problems as they arise, perhaps even increasing or decreasing their sizes or adjusting the mix of service components in response to demand. Meanwhile, users coordinate to work on them, each sharing the storage and computation facilities with everyone else. This arrangement can be called _long-running clusters_. The second, opposing answer is that clusters should be set up when they are needed and destroyed when they are done with their work or there is no longer demand for them. Each cluster encompasses the storage, compute power, and Hadoop components necessary for the jobs at hand, as laid out by the (usually automated) systems that built it. If the cluster experiences problems, it is destroyed and replaced by a working one. If it is not powerful enough, a new and larger one replaces it. Users can share clusters or have their own, but overall cloud resource usage is managed across all users. This arrangement can be called _transient clusters_. Most organizations start out in the cloud thinking mostly about long-running clusters, because they are most like on-prem clusters in how they are managed. An existing Hadoop administration team can apply most of their expertise right away; it's as if the instances are simply in a server room they cannot physically access, but otherwise much like any other resources to manage. Users who are already familiar with the standard practices for on-prem clusters can easily transition to cloud clusters that run in the same way. It's not long before it becomes obvious that long-running clusters can be a waste of money. For example, why run a 20-node cluster all day, every day, when it's only used for 8 hours each work day? Instead, the cluster should be shut down somehow, so that charges aren't incurred every night while the cluster is idle. So, the next stage in the evolution of cloud cluster usage is to have clusters reserved for long spans of time, but running only during certain time periods when demand is anticipated. "Stopping and Starting Entire Clusters" explains more about this mode of operation, including some caveats that come along with it such as the disappearance of ephemeral storage and shifting IP addresses. Beyond those issues lies another problem: What do users do when they want to use a cluster that is stopped? Perhaps they are working outside the normal work day, to finish work during some crunch time. The problem is exacerbated for teams spread across time zones, in which case there may not be a lot of common downtime. How can these users get working, or do they have to wait until the morning in your time zone? There's also the issue of dealing with workloads that are still in progress on a cluster when it's time to stop it. Even if it is somehow feasible to "freeze" these workloads, the users waiting for the results are out of luck and have to wait even longer for the cluster to restart. A less severe tactic, similar to wholesale stopping and starting, is to reduce the size of clusters during off-peak hours. A Hadoop cluster can cope with the loss of YARN node managers and, to a certain extent based on replication, HDFS datanodes, while continuing to function. Clusters can therefore be shrunk and grown at certain times of the day or in response to demand, which naturally reduces at off-peak times. _Elastic_ clusters like these do a good job of balancing efficiency with availability, but require the help of automation to trigger size adjustments, to reduce or eliminate the burden of performing the work, and to ensure data is managed safely. After all, there is more to adding and removing cluster instances than just allocating or terminating them in the cloud provider. Instead of focusing on the clusters, and trying to figure out how to run them so that users can get their work done, it can be a good idea to focus on the users, and figure out how to run clusters that cater to them. This change in perspective seeds the idea of creating entire clusters on demand. Why stop and start the same old clusters over and over, when fresh ones can be created and terminated whenever you like? Why struggle to get just the right sizes and components in place, when each cluster can be tailor-made from the start with exactly what users want? Why try to guess when clusters are needed, when they can be made at will? The idea of transient clusters isn't necessarily obvious at first, because it is not practical with expensive, slow-changing on-prem hardware. It also requires even more automation than elastic clusters, since it involves creating and destroying entire clusters, each with potentially different characteristics; this is much more drastic than just adding or removing instances. Finally, it creates a new requirement to store critical data somewhere outside the clusters. Fortunately, as described in Chapter 5, there are plenty of options for cloud data storage, and ways to connect to it, like the AWS s3a connector used in "Hive on S3", that merge well with workloads. Users do have to adjust their workloads, and their thinking, to have data flow from storage to transient clusters and back again. However, transient clusters solve many of the problems with long-running clusters. They help to minimize expenses, virtually eliminate ongoing maintenance with the help of robust automation, and avoid struggling with unpredictable times of peak demand. Both long-running clusters and transient clusters can work well in the cloud, and each mode of operation has its benefits and costs. However, of the two, the benefits to using transient clusters can move you and your organization to a higher level of efficiency and performance. # Single-User or Multitenant? A cluster for each user? That concept doesn't seem like it could be efficient at all, at first. Yet, once an organization becomes proficient at using transient clusters, it's a possibility worth considering. Imagine a system where every data scientist and every analyst can have their own bespoke cluster, or even clusters. Since each cluster is made according to the user's specifications, it's much more likely that workloads will succeed for everyone. Since they do not have to share local storage, there is no danger of data being mixed inappropriately or accidentally overwritten. If a cluster starts failing, due to hardware problems or data corruption, it can be torn down and recreated, because it's transient anyway, and only the cluster's single user is affected. Single-user clusters shift the problem of resource sharing out of each cluster and into the system that allots clusters to users. Because users are no longer sharing cluster instances and disk storage, overall resource requirements can slightly increase. However, because each user doesn't need clusters at all most of the time, resource requirements can decrease, if the clusters are managed effectively (see "Self-Service or Managed?"). Confining users to their own clusters leads to effective isolation of their workloads, taking advantage of the strong network and security capabilities of the cloud provider. The problem of preventing users on a shared cluster from accidentally accessing each other's data goes away. This can help to satisfy security requirements for that data. If single-user clusters are too extreme of an idea, then you could consider per-team clusters, where only a few users have access to a cluster, instead of just one user. It is easier for a small team of users to coordinate among themselves to share cluster resources than for an entire organization. If they all have the necessary authorizations to access cluster data, security requirements within the cluster are relaxed. The fewer users that have access to a cluster, the more desirable it is for the cluster to be transient. A cluster for a single user should be limited to his or her immediate needs, so that its resources can be returned in good time to the pool for others to use. On the other hand, a multitenant cluster should be long-running, since more people rely on it, and collectively use it more often. # Self-Service or Managed? Suppose that you are thinking about taking advantage of the flexibility of your cloud provider to create many clusters, some of which are transient, and some of which are for only one or a few users. Whose job is it, exactly, to create and destroy all of these clusters, and how do they know what to do? In keeping with the questions considered so far, here are two possible answers. The more traditional one is that cluster management is performed by a single controlling entity, perhaps a cloud team, on behalf of the entire organization. A user requests a cluster, describing exactly how big it should be, what Hadoop components must be installed, and who needs access. The cloud team weighs the request against others based on its priority, the clusters that have already been allocated, and other factors. Finally, it creates the cluster and provides its addresses and credentials back to the requester. The cluster is assigned a lifetime and is destroyed when it elapses or when the user indicates that the cluster can be terminated. The function of managing cluster allocations is certainly one that can be automated, even beyond the core process of creating and destroying clusters. Monitoring systems can track how many instances of what types are being used, and other factors, in order to keep the overall cloud usage within budget. Watchdog processes can clean up clusters automatically after their lifetimes or once they are idle for a while. After automating business processes like these, there might not be much left for a human to do. If that's so, then why not take humans out of the loop completely, and make the entire process user-driven? A self-service system parallels the consoles and APIs of the cloud providers, working on the level of entire clusters instead of instances and networks and Hadoop components. As is the case with transient clusters, there is a cost to create such a system, but it can lead to increased user satisfaction and greater efficiency in cloud resource usage. Even with maximized automation around cluster creation, careful monitoring is still vital. It's a boon to users to be granted the power to create their own clusters, but users can forget about them and leave them idle and costing money, reserve too many resources, or misuse what they've been given. At least a light touch of oversight is still necessary to ensure the health of all clusters and to ward off unexpectedly high cloud provider bills. No matter which choice you pick, it's a reasonable idea to offer only predefined cluster types for users to select. The assumption is that the grand majority of users can make do with a typical, say, "Hive cluster" or "Spark cluster." They needn't be concerned with the details of which network the cluster resides in, or what the security rules are, or even which instance types to use; those can be determined at an organizational level, taking into account the cloud budget, the infrastructure that's already been established, and technical recommendations. Users should be free instead to devote their attention to their workloads and the jobs that they want to get done. # Cloud-Only or Hybrid? Despite all of the benefits cluster users can reap from using cloud clusters, some may be stuck on-prem. A common reason is data security: it may be necessary by law, regulation, or contract to keep data within local data centers with the approved geographic location, physical security, and network defenses. Another reason is that your organization may not have enough money to afford sending everyone to the cloud. Another is that licenses for essential software used in clusters may require it to be installed only within your own facilities. The question that is relevant here is: How much of your Hadoop work should be shipped off to cloud clusters? Two simple answers, of course, are "all of it" and "none of it." A third is "some of it," but this answer goes beyond just running some clusters in the cloud provider and others on-prem. Data analysts prefer to think in terms of their workloads, and not in terms of the clusters they run on. It's why single-user, on-demand clusters are so appealing to them, and it is also key to seeing that a single workload could be arranged to be performed partially on-prem and partially in the cloud. An architecture that works in this way is called a _hybrid cloud_. A workload running in a hybrid cloud is not a single, enclosed entity. It would usually have a primary segment running on-prem, and secondary segments running in cloud clusters. The idea is to offload processing to the cloud where it makes sense to do so, so that the local demand for resources is lessened. At dividing points in the overall workload, data and logic are transferred up to the cloud, and then results are pulled back. A hybrid cloud certainly uses less cloud resources than running everything in the cloud, but it does incur data transfer costs, since providers charge for data being sent to and from instances and storage services. Rates are usually quite modest, but it is still wise to design hybrid workloads so that they minimize data transfer. Of course, excessive data transfer stages also extend processing time. Here are some examples of workloads that could benefit from a hybrid cloud architecture: * Regulators have determined that data being processed must remain on machines within a locked server room. Processing unrelated to the sensitive data has already been migrated elsewhere, but things are still running too slowly. Some of the work that is peripheral to the sensitive data and that doesn't use it directly is relocated to ancillary jobs in the cloud, which eases the load on the server room. To send even more work to the cloud, identifiers in the data are replaced with anonymizing tokens locally; the scrubbed data is deemed safe to process in the cloud, and other local processes de-anonymize the resulting data once it returns. While overall the amount of work has increased, large portions have been offloaded to the cloud, where it is easier and cheaper to expand. * There already exists a large on-prem data processing system, perhaps using Hadoop clusters, which works well. In order to expand its capacity for running new analyses, rather than adding more on-prem hardware, Hadoop clusters can be created in the cloud. Data needed for the analyses is copied up to the Hadoop clusters where it is analyzed, and the results are sent back on-prem. The cloud clusters can be brought up and torn down in response to demand, which helps to keep costs lower. * Vast amounts of data are streaming in, and it all needs to be centralized and processed. To avoid having one single choke point where all of the raw data is sent, a set of cloud clusters can share the load, perhaps each in a geographic location convenient to where the data is generated. These clusters can perform pre-processing of the data, such as cleaning and summarization, thereby spreading the work out. The preprocessed data is finally sent on the final centralized system to be merged. Notice that the last two examples are not situations where some portion of the workload _must_ remain on-prem. You could imagine alternative layouts where all of the processing occurs in the cloud, and only final results are returned, if ever. Just because you can move completely into the cloud does not mean you need to, and a hybrid cloud architecture is one way to take a measured approach that balances the benefits of the cloud with your budget and the time you have to invest. # Watching Cost A key factor for selecting a cluster usage pattern for your organization is cost. No pattern has a guaranteed cost advantage over another, because so much depends on when and how clusters are used. It takes research and experimentation to find the patterns that give you the most value for what you are paying your cloud provider. Table 15-1 compares the patterns explained in this chapter through highlighting how they can either save you money or cost you money. Table 15-1. Comparing cluster usage patterns by cost Pattern | Possible savings | Possible extra cost ---|---|--- Long-running clusters | Less time waiting for clusters to start and stop, lower resource demand | Wasted idle time, maintenance burden, growing size over time Transient clusters | Minimal maintenance, high efficiency | Spin-up time, higher resource demand, data transfer to permanent storage Single-user clusters | Simpler security, smaller size | Higher overall resource demand Multitenant clusters | Efficient use of resources per user | Complex management, security risks Self-service clusters | Efficiency of on-demand creation | Need to maintain tooling, waste through overuse Managed clusters | Easy alignment with budget constraints | Waiting time for usage, administrative effort Cloud-only clusters | Data transfers stay within the cloud, minimal on-prem costs, integration with provider | Security risks, higher cloud expenditure Hybrid clusters | Lower cloud expenditure, simpler security | Complex workflows, on-prem maintenance, data transfer costs While cost is indeed a critical factor for settling on the best way to use the cloud, it is not the only one; fundamentally clusters need to be up and ready when needed. Focusing only on spending on the cloud provider may lead to the implementation of inefficient patterns whose wastefulness outweigh the savings, either in time or money. # The Rising Need for Automation Running clusters on a cloud provider opens up new options for how to architect your clusters, while making it easier to exercise other options that are already available on-prem. The best choices for your organization can depend on outside factors and on your budget, but cloud providers can support you no matter which paths you choose. Some of the answers to the questions examined in this chapter drive the need for automation. Even if you have been performing some of the practices described here manually so far, having a cloud provider at your disposal tends to increase cluster usage, simply because of the lower barrier for setting up new clusters. It would quickly grow tiresome to manually create clusters in the face of increased user demand and adjudicate who gets which clusters when. Chapter 16 kicks off the discussion of ways to manage clusters using scripts, tools, services, and cloud provider features. The first technique, that of using images, is a straightforward and highly effective initial way to get more efficient at building more clusters. Sometimes these are instead called _ephemeral clusters_ , but to avoid confusion the term _ephemeral_ in this book is applied only to ephemeral storage (see "Block Storage"). For example, simply dropping HDFS datanodes out of a cluster can lead to data loss if blocks are under-replicated or if the dropped datanodes house all of a block's replicas. Shrinking must be done in a controlled fashion to preserve data. Some may use the term "hybrid" to refer to elastic clusters that have some instances that exist for the life of the cluster and others that come and go to adjust capacity. # Chapter 16. Using Images for Cluster Management It is worthwhile to go through the exercise of building out a Hadoop cluster "by hand," as laid out in Part III, in order to understand how instance allocation, networking, and security rules all play their parts. Once you are building clusters over and over again, though, you'll want to be much more efficient. You don't usually need to establish virtual networks, routing, and security rules for every new cluster. They can all happily coexist within one or a few networks and abide by the same rules. Each cluster needs its own instances, but starting those up is also straightforward, either by using a provider console or by a single API call. It's Hadoop installation and configuration that takes most of the time. One method to speed things up is to create images for cluster instances with most of the installation and configuration work baked in. Instances based on those images can already have Hadoop components almost ready to go, requiring only a minimum of additional configuration to become fully functional. Stamping out cluster instances like this is not only faster, but results in fewer mistakes or unintentional variations. It also lends itself to automation; you could imagine it as part of a complete automatic process for building Hadoop clusters. Images can be shared. That means that a valuable base image for creating Hadoop cluster instances can benefit not just who built it, but their friends, coworkers, and even their customers. This chapter starts out by describing the structure of an image, and then covers creating and maintaining them directly and through the use of Packer. At the end, tooling options for creating and managing clusters are described, along with their relationships to images. # The Structure of an Image The concept of images was introduced in "Images". What makes up an image varies from cloud provider to cloud provider. Fundamentally, though, an image is a set of one or more disk snapshots along with metadata that makes the snapshots available for launching new instances. The snapshot of the root disk, which houses the operating system, is the essential ingredient in an image. Images can include snapshots of additional data disks that are always to be associated with instances launched from the image. The metadata about an image holds its name, describes its features and limitations, links to the snapshots for the image's disks, and may include permissions or other guidance on using it. Each cloud provider offers a starter set of images for many different operating systems. The operating systems are preconfigured to work within the provider infrastructure, primarily so that they can be seamlessly integrated into virtual networks. Usually, the cloud provider's own client utilities are preinstalled as well, but for all practical purposes they are uncustomized, vanilla installations of the operating systems. Because base images are so minimal in content, they frequently serve as the basis for new, custom images. For example, a software vendor may start with an instance created from a standard Ubuntu image, install its own software on it and configure it properly, and then create a new image. You can imagine a custom image, then, that already has Hadoop components installed and mostly ready to run. ## EC2 Images An EC2 image, called an _Amazon Machine Image_ or _AMI_ , consists of the snapshot for a root volume, permissions for who can use the image, and a block device mapping laying out additional EBS or instance store volumes to attach, based on their own snapshots. The root volume for an image can be hosted on either EBS, making it persistent, or the instance store, making it ephemeral. You should always use EBS-backed instances for Hadoop clusters. They are created faster, have larger root volume capacity, can be stopped and started without losing data, and are stored more efficiently and thus more cheaply within AWS. Permissions are applied to each AMI to determine who can use them. By default, those you create yourself are private, but you can grant permission to specific users or to the public. You are not charged for others' use of your AMI, only for storing it. ## GCE Images A GCE image consists of a boot loader and templates for the operating system and root filesystem as a single persistent disk. Images can be grouped into _image families_ as a framework for versioning them; this way, it is easy to figure out, for example, the latest image available for a specific purpose. GCE images can be shared in one of two ways. The simpler way is to grant other Google Cloud Platform users the necessary permission to use images in the image's project. While this is straightforward, the permission allows access to all images in the project. The more complex but fine-grained way is to save images to Google Cloud Storage as compressed "raw disk" images. Access controls in Google Cloud Storage govern the saved image files and therefore dictate who may use them. ## Azure Images An Azure image is comprised of the snapshot for a root volume, optional snapshots for additional volumes, and a Resource Manager template defining metadata for the image. Each disk snapshot is formatted as a virtual hard disk (VHD) file, which means that it is possible to supply your own VHD files created outside Azure as the basis for new images. While images available in the Azure Marketplace are treated as single units, your own images are managed as the component VHD files and accompanying template. The VHD files underlying an Azure image are kept in Azure Storage, and so they may be shared by applying the appropriate permissions to those files, along with distributing the associated template. Users of the image may update the template, which is written in JSON, for their own needs before creating new virtual machines from it and the disk snapshots. # Image Preparation Suppose that you have an instance running that is just how you like it, and you want to be able to create new instances from the same pattern. If you worked your way through Part III, then you have a cluster's worth of these instances. It's a lot of work, and almost all of it would need to be done again for your next cluster. Even just building the first cluster, there were a lot of steps that had to be repeated on every instance. To save time and effort, then, you'll want to make an image of one of the cluster instances. For easy management later, it's good to work with a single image for any cluster instance. They all have the same software installed, and most Hadoop configuration files are identical, or nearly so, across all of the instances. A useful variation for complex clusters is to have one image per role, to cover any special infrastructure choices you make. For example, an image for a worker node may call for extra volumes to be attached to be used for HDFS storage, something manager or gateway nodes don't usually need. Images do not mandate the size of the instance types that may be used for them. The same image can be used for a small gateway node and a heavy manager node, since images focus on the disk storage used for an instance. There may be instance types that are incompatible with an image, but normally many of them apply. So, decide which cluster instance or instances you'd like to image. You'll want to make changes to it to make it generic, but there's plenty to leave just the way it is, including these items: * The JDK installation * The Hadoop user accounts, such as "hdfs" and "yarn" * The installed Hadoop software * The Hadoop configuration files and most of the properties in them (read on for exceptions) * Directories created for Hadoop There are some files and configurations you can keep, but you might wish to change for improved security: SSH keys for the Hadoop user accounts The keys are necessary to control Hadoop services from the manager instance or instances, but there is no reason that every future cluster has to use the same set of keys. Leaving the keys in place would let a manager instance in one cluster connect via SSH to instances in another cluster, which may be a security issue for you. The SSH key used to connect to the instances from your own local computer, however, needs to remain, or else you will be unable to reach your cluster. The file _$HOME/.ssh/authorized_keys_ in each Hadoop user account This keeps track of which SSH keys are trusted for logging in. If you dispose of the SSH keys for the user accounts, then this file should be cleaned out to no longer include them. It does need to retain the SSH key used for outside connections from your local computer. Finally, there are some things that should be changed, as they are specific to the cluster: IP addresses in the Hadoop configuration files A new cluster built from the image will have different IP addresses, so replace those in _core-site.xml_ , _yarn-site.xml_ , and the others with tokens indicating what they should be. If someone uses the image and forgets to fill in the token, it will be obvious in error messages. For example, you should change the "fs.defaultFS" property in _core-site.xml_ to something like "hdfs://${manager.ip}:8020/". ZooKeeper configuration files The file _zoo.cfg_ contains the IP addresses for each quorum server, so those should be replaced with tokens like other IP addresses. The content of _myid_ , which unfortunately must be unique per server, should be replaced as well, or else the file should just be removed. Local data and code If you uploaded files to the cluster for import into HDFS, uploaded job code to run, or extracted files from the cluster to look at or save, they should be wiped away so that new clusters do not waste space carrying them forward. In addition, any data still resident in cluster data stores such as HDFS should be deleted and/or purged. Each image should provide a clean starting state for new clusters. The file _$HOME/.ssh/known_hosts_ in each Hadoop user account Because IP addresses will be different in new clusters, the mapping between hosts and IP addresses in this file will be obsolete or, if some IP address does happen to get reused, incorrect, causing SSH connections to fail. The file should be deleted. It's easy to miss a change or two when preparing an instance. Fortunately, the process can be performed iteratively, where each image is better than its predecessor. As time goes on, the needs for the image will evolve anyway, perhaps to include more Hadoop components or third-party applications. ## Wait, I'm Using That! Obviously, preparing an instance to be imaged as just described will break it as a cluster instance. If you cannot spare the instance, there are other ways to proceed. The simplest alternative is to image the instance as it is, and then create a separate instance from the image to do the preparation work. You will need to stop the original instance in order to create the image, so that it is guaranteed that there are no ongoing writes to the disk that could cause a disk snapshot to be corrupted. So, this doesn't require breaking a cluster, but does require degrading it. A worker node is a good candidate here, since Hadoop can recover when one drops out. Another alternative is to create a new instance from the original image used for the cluster and work through the Hadoop installation and configuration steps from the beginning, modifying them here and there so that the end result is correct for imaging. This method is attractive since it eliminates the possibility that anything will be left over from the real cluster, but it takes more time, and it's easy to miss some steps. Eventually you will want to automate this manual, error-prone work. See "Automated Image Creation with Packer" for how to get started with using Packer for image creation; for now, imaging an existing instance yields quick results. # Image Creation Once the instance is prepared, it can be imaged. The procedure for doing so varies depending on your cloud provider. ## Image Creation in AWS Creating an AMI from an EBS-backed instance is straightforward. First, stop the instance to be sure that there is no changing disk state. Then, locate your instance in the list of EC2 instances and select it. Click the Actions button and select Image, then Create Image from the drop-down menu. In the Create Image dialog, as shown in Figure 16-1, give the new image a name and description. The table of instance volumes lists each attached volume that will be snapshotted as part of the image creation process. You can add more volumes, either as EBS snapshots or as ephemeral instance store volumes. Finally, click Create Image to create a new AMI. A snapshot is taken of the root volume and any other attached EBS volumes, and AMI metadata is generated and registered with AWS. The process can take some time, mostly due to the snapshot work. Eventually, the AMI will appear in the list of images shown when you select AMIs from the EC2 menu. ###### Figure 16-1. The form for creating a new AMI ## Image Creation in Google Cloud Platform An image can only be created from an unattached root disk. The first step in creating an image from an instance is to ensure that the root disk for the instance is not automatically deleted when the instance itself is terminated. In the Google Cloud Platform console, select VM instances from the Google Cloud Platform menu. Follow the hyperlink for the name of the instance to image, so that a page with its details is displayed. Look for the "Boot disk and local disks" table, as shown in Figure 16-2; below it is a checkbox labeled "Delete boot disk when instance is deleted." If the checkbox is checked, then select Edit from the menu at the top of the page, clear the checkbox, and click the Save button. ###### Figure 16-2. The disk attached to an image and the cleared deletion checkbox Now it is safe to delete the instance by using the Delete option in the top menu. If the confirmation dialog includes a checkbox for deleting the boot disk, be sure it is not checked. Select Disks from the Google Cloud Platform menu. The table of disks should include the former root disk for the instance. Eventually the "In use by" column for the disk will be empty, as shown in Figure 16-3, indicating that the disk is no longer attached to its former instance. Note the name of the disk. ###### Figure 16-3. The unattached disk ready for imaging Select Images from the Google Cloud Platform menu. The many public images available from Google are listed, but you will be making your own private image. Select the Create Image option from the menu at the top of the page. Fill in the form for the new image, as shown in Figure 16-4, including its name, family, and description. Select Disk for the source of the image, and pick the disk from the recently deleted instance as the "Source disk." Click Create to create the new image. ###### Figure 16-4. The form for creating a new image in GCE Return to the Images page. Eventually, the new image appears in the table of available images. At this point, if you wish, you can return to the list of disks and delete the snapshot used as the foundation for the image. ## Image Creation in Azure Creating an image in Azure is a largely manual process that does not involve the Azure portal. The first step, for a Linux virtual machine, is to "deprovision" the instance to be imaged by running a command on it. This eliminates data on disk that would be problematic for new instances created from the image: $ sudo waagent -deprovision+user -force The remaining steps require use of the Azure CLI, properly configured to work with your account. The three steps to execute, after ensuring that the CLI is in Resource Manager mode, are to deallocate (stop) the virtual machine, then "generalize" it, and finally capture it as VHD snapshots and a JSON template. The snapshots are saved in Azure Blob Storage and named with the prefix you provide: # switch to Resource Manager mode $ azure config mode arm # stop the virtual machine $ azure vm deallocate -g my_first_cluster -n manager # generalize the virtual machine $ azure vm generalize -g my_first_cluster -n manager # capture its disks and generate a template $ azure vm capture -g my_first_cluster -n manager -p snap -t manager.json # Image Use It's simple to use your new image in AWS and Google Cloud Platform. When launching an instance, instead of selecting a standard base image for your instances, select your own. Other than that, the procedure for launching instances does not change. In Azure, use the JSON template generated by the image creation process to launch a new virtual machine. This can be done from the Azure CLI. It is up to you to define additional resources needed for the virtual machine that otherwise can be automatically created by the Azure portal when creating virtual machines. You can target an existing virtual network and subnet for the new virtual machine, but you must allocate a NIC and, if you wish, a public IP address. These resources can be created in the Azure portal or through the Azure CLI. After creating the NIC, find its ID, a path-like string, which you then must supply to the interactive virtual instance creation process: # create a public IP address $ azure network public-ip create my_first_cluster manager3_ip -l "eastus" # create a NIC that uses the public IP address $ azure network nic create my_first_cluster manager3_nic \ > -m cluster_net -k default -p manager3_ip -l "eastus" # find the ID of the new NIC $ azure network nic show my_first_cluster manager3_nic # create the new virtual machine from the template $ azure group deployment create my_first_cluster my_image_deployment \ > -t manager.json info: Executing command group deployment create info: Supply values for the following parameters vmName: manager_3 adminUserName: root adminPassword: password networkInterfaceId: /subscriptions/.../networkInterfaces/myNic Once your instances are ready, connect to them via SSH using the same key used to access the original instance. Reconfiguring instances launched from a Hadoop image takes much less work than starting from scratch: * If necessary, generate new SSH keys for the Hadoop user accounts and add them to the necessary _authorized_keys_ files. Then, use them to connect from the manager instance to each worker instance in order to populate the _known_hosts_ files. * Edit the Hadoop configuration files with the private IP addresses for the new cluster instances, replacing the placeholder tokens. * Edit or recreate the _myid_ files for the ZooKeeper servers. * Edit the database server hostname for the remote Hive metastore. ## Scripting Hadoop Configuration The preceding steps should only take a few moments, but since they are well-defined and only depend on a few pieces of information, they are ripe for scripting. Appendix B provides example scripts for automating the work. # Image Maintenance A custom image remains available until you decide to deregister or delete it. Your cloud provider charges for the storage used by the snapshots backing the image, and some also charge a small amount for the image definition itself, but instances launched from an image are charged for separately. In fact, even after an image is no longer available, instances launched from it keep running. It's common to want to improve an image, to address problems with it, or to add new stock configurations or installed software. Because snapshots are immutable, you cannot update the image itself. Instead, launch an instance based on the image, make the desired changes to it, and then create a new image from the instance. ###### Tip Under GCE, successive images can be placed in the same image family. This mechanism gives you the option to launch the most recent (and likely "best") image in a family. It may not be long before you have made a lot of images, and you will want to consider ways to track them and to enable users to understand what they contain and which ones to use. Cloud providers do not provide services to help with these tasks, so here are some ideas to get you started: * Use image names and tags in well-defined ways to describe image contents and purposes. * Maintain an image registry, using a spreadsheet, wiki, or simple web page. * Wrap tools that automate image creation in calls to databases holding image information. # Image Deletion Over time, then, images tend to pile up. To save money and make tracking images easier, you'll want to get rid of older images that should no longer be in use. As with image creation, the image deletion process varies across cloud providers. ## Image Deletion in AWS Select Images from the EC2 menu, and highlight the image to delete in the list of images. Look at its details and note the IDs of the snapshots for the root EBS volume and any other attached EBS volumes listed as "Block Devices"; each ID begins with "snap-". Then, click the Actions button and select Deregister from the drop-down menu. A deregistered AMI is no longer available for use in launching new instances, but deregistration does not destroy the snapshots backing the former image. Select Snapshots from the EC2 menu to see the list of snapshots, select the snapshots used for the deregistered AMI, and select Delete from the Actions button drop-down menu. ## Image Deletion in Google Cloud Platform GCE lets you either _deprecate_ or _delete_ an image. A deprecated image can still be used, but does not appear by default in the list of available images. When an image is deprecated, an image must be named as its replacement. A deleted image, in contrast, is simply no longer available. To either deprecate or delete an image, select Images from the Google Cloud Platform menu. Select the image to work with, and select either Deprecate or Delete from the options in the menu at the top of the page. After confirming, the image will disappear from the list of images. To see a deprecated image once again, use the "Show deprecated images" link at the bottom of the list. ## Image Deletion in Azure To delete an image in Azure, simply discard the JSON template and delete the VHD files from storage. # Automated Image Creation with Packer Creating images manually is fine for small-scale or exploratory work, but a production environment requires speed, predictability, and robustness. Packer from HashiCorp is a leading tool for this purpose. It takes as input a JSON template describing how to build an image, runs through the steps as prescribed, and then creates a new image in the cloud provider. The template serves as one form of documentation for what the image contains, and it can be placed in version control for safekeeping and to track changes over time. Example 16-1 shows a simple Packer template that creates an AMI. ##### Example 16-1. Example Packer template { "variables": { "ami_name": null, "region": null, "source_ami": null, "ssh_username": null }, "builders": [{ "type": "amazon-ebs", "ami_name": "{{user `ami_name`}}", "instance_type": "m3.large", "region": "{{user `region`}}", "source_ami": "{{user `source_ami`}}", "ssh_pty": "true", "ssh_username": "{{user `ssh_username`}}" }], "provisioners": [{ "type": "shell", "inline": "sudo yum install --assumeyes wget" }] } A Packer template uses one or more _builders_ to build images for different platforms and tools that can use images. There are builders for creating images for EC2 and GCE and VHDs for Azure. Each builder requires information about the source image to work from. In the template in Example 16-1, the source AMI is specified as a variable passed to the template, along with other variables. _Provisioners_ in the template can run processes on the instances being used by the builders to perform installation and configuration tasks. Some provisioners use shell scripts, run either on the instances or locally, while others use common infrastructure automation tools like Ansible, Chef, and Puppet. The provisioner in Example 16-1 performs an installation of the `wget` utility on the build instance, so the final image will have it already installed. Packer can run on your local computer, remotely connecting to the cloud provider using credentials that you supply. Each builder accepts credentials differently; the EC2 builders look in a variety of typical locations for the access key ID and secret access key, including the environment: $ export AWS_ACCESS_KEY_ID=... $ export AWS_SECRET_ACCESS_KEY=... Assuming those keys have been set, the following command line works to build an image from the example template. It works in us-east-1 and selects a specific CentOS AMI as the source: $ packer build -var 'region=us-east-1' -var 'source_ami=ami-6d1c2007' \ > -var 'ami_name=PackerTest1' -var 'ssh_username=centos' packer.json Packer outputs progress as it builds and provisions, and then finally reports the ID of the new AMI. (Yours will be unique.) ==> Builds finished. The artifacts of successful builds are: --> amazon-ebs: AMIs were created: us-east-1: ami-5c29154b Packer has just done the work of creating an instance from a source image, installing software on it, and using it to create a new image. Along the way it handled deciding the choice of network and security rules for the temporary instance, generating an SSH key pair to use, and cleaning up after itself. Even for making simple images, automation has compelling advantages. The example template can be augmented to perform all of the work needed to create a base image for a Hadoop cluster; it's a matter of encoding the steps performed in Chapter 9 and elsewhere. Shell provisioners can perform software downloads and installations, file provisioners can copy up templates for configuration files, and other shell provisioners can use hands-off editing tools from `sed` up to Perl and Python to add and change configuration information. Unfortunately, Packer cannot do all of the work. Specifically, the information listed in "Image Use" still is not available until an actual cluster is being constructed. So, there is still room for automation outside of Packer to get to a complete, working Hadoop cluster in the cloud. # Automated Cloud Cluster Creation Cloud providers have their own services for automatically creating Hadoop clusters, some of which are described in "Hadoop Solutions from Cloud Providers". They present a more hands-off approach to cluster management, focusing instead on what you want to do with the clusters. If you are looking for a tool that builds cloud clusters that are more under your direct control, you have some choices. ## Cloudera Director Cloudera Director supports creating clusters in AWS, Google Cloud Platform, and Azure. It can be run as a server process or through a standalone client, both of which are installed and run directly. Director handles creating instances and then installing Cloudera Manager, Cloudera's own cluster management tool, and the company's CDH distribution of Hadoop components. Once a cluster is created, Director can manage adding and removing instances from it, and terminate it when you are done with it. Director can manage many clusters at once, and leaves it up to the user to select the components and define the topology for each cluster. The Director client works with configuration files defining all aspects of the Cloudera Manager and cluster installations and configurations. The server supports a RESTful API that enables scripting, and Cloudera distributes Java and Python client libraries. ## Hortonworks Data Cloud Hortonworks Data Cloud (HDCloud) is an AWS Marketplace application that runs inside EC2. Its web console lets you create clusters running the company's HDP distribution of Hadoop components, managed by Apache Ambari. Cluster templates can be defined and reused to create new similar clusters, and the application allows for resizing, cloning, and termination on demand. The user interface includes links to the web interfaces for Ambari and other Hadoop components. HDCloud offers a curated set of cluster types, some including Spark or Hive, and supports options that cover the instance types for master (manager) and worker instances, whether to use an existing or new VPC, and whether to use a shared remote Hive metastore database. Each cluster template can be represented in JSON, and a CLI tool downloadable from HDCloud can use such templates to perform cluster operations. ## Qubole Data Service The Qubole Data Service (QDS), available online, includes a cluster management solution for creating and configuring clusters in AWS, Google Cloud Platform, and Azure. The service starts you off with definitions for a few default clusters to get you started, but you can create your own definitions, selecting from a set of predefined types. The core Hadoop components, as well as others including Spark and HBase, are compatible with the Apache distributions. QDS monitors cluster usage and terminates them when they are idle in order to manage costs. QDS has topology options that include instance types for master (manager) and slave (worker) instances, parameters for AWS spot instance proportion and pricing limits, and virtual network and subnet placement. There is also access to Hadoop configuration property overrides, along with suggestions. ## General System Management Tools The tools just described are created and supported by third-party vendors, and some of them may cost money to use. For those reasons, or others, you may decide to create your own homegrown cluster creation tool. The cloud providers each have powerful APIs that can be used to perform the work otherwise done manually through their web consoles, and a general management tool like Ansible, Chef, or Puppet can be employed to direct any configuration tasks that need to be performed beyond what is already baked into images. If it is not obvious yet, however, then it is important to understand before setting out that such an effort, while feasible, can be time-consuming. Creating your own tool may appear easy at first. However, it requires deep understanding of your cloud provider's API, including any quirks and known issues, and staying up-to-date with it as it changes. The tool must be able to reach out to new instances to issue necessary, nontrivial commands, all while coping with network configurations and security rules imposed on the instances. A cluster creation tool may eventually be called upon not just to create clusters but to destroy them as well, or change their size, or reconfigure them, all of which makes development and maintenance more expensive. On the other hand, with your own tooling you have full control and can address any unique needs that vendor tools do not support. You are also free to use any Hadoop distribution you choose, including the "vanilla" versions offered directly by Apache. A custom tool may integrate more easily into your existing systems than an off-the-shelf, general-purpose product. # Images or Tools? When it comes to choosing between managing clusters using either images or tools, you are strongly encouraged to use a tool that you can adapt to your desired processes. Images are excellent for preserving the static needs of cluster instances, but they do not apply well to the inescapable dynamic tasks that must be performed to fully create clusters. Besides built-in automation for cluster creation, tools can modify and destroy clusters and perform monitoring. They also abstract away the complexity of working with a cloud provider. Some tools can themselves use images as a way to save work that they would otherwise need to do, like software installation or operating system updates. Clusters are then spun up more quickly, which saves money and reduces user-waiting times. Organizational requirements about the contents and configuration of all cloud instances are more easily enforced by creating and using "blessed" images for tools to consume. When your organization is ready to consider automated cluster creation, first try some of the existing tools to see if they can meet your needs. Here are some reasons why, after trying what's already out there, you might decide to roll your own tooling: * You have security requirements that cannot be satisfied by the tools already available. * Your organization already has strong expertise in automation tools and in working with a cloud provider API. * Lack of visibility into or precise control over existing tools' activity runs against organizational prerogatives. If none of the existing tools are satisfactory, then at least trying them out will give you ideas for how your own tooling should work. # More Tooling Image creation is just one area where scripting and tooling can make it easier to stand up Hadoop clusters in the cloud. Chapter 17 explores other areas, such as monitoring and automation, where tools and scripts shine. It is possible to create a new image "from scratch," but it is a much more complex effort. Consult your cloud provider's documentation for information. Because you should not use instance store-backed AMIs for Hadoop clusters, the differing procedure for creating those is not described here. This is one of the less secure methods. See the builder documentation for all of the options. Disclaimer: At the time of this writing, the author is an employee of Cloudera who works on Director. As such, the descriptions of Director and competing products in this section may be unavoidably uneven. Please interpret the descriptions as informative and avoiding advocacy. # Chapter 17. Monitoring and Automation As use of Hadoop clusters in the cloud grows in your organization, it becomes more important to be able to monitor them. Early on, monitoring focuses on ensuring that the clusters are fully up and not overloaded; this information can help guide your future choices for instance types, cluster size, storage size, and network configuration. As time goes on, monitoring data will become more important for keeping tabs on overall cloud expenditure. Of course, cloud clusters themselves will also become more crucial to the organization, so it becomes doubly important to be sure they are working properly. The need for monitoring is somewhat less when clusters are transient (see "Long-Running or Transient?"). A transient cluster does not survive for long, so if it does have problems, it can be torn down and replaced using systems already established. Long-running clusters, on the other hand, need more monitoring, as it's necessary that they remain in good shape for continuous or on-demand use. There are two facets to monitoring cloud clusters: monitoring the cloud provider resources themselves, and monitoring the Hadoop components running on them. As you may have noticed, the cloud provider's consoles already deliver health information, and so it's good to start by considering all the monitoring features they offer. # Monitoring Choices When you're ready to start monitoring Hadoop clusters, you'll find that you have choices for which monitoring system to use. The major cloud providers each support monitoring infrastructures that you can tap into to get information about your instances, storage, and many other resources. You also have the option of using a system you create and maintain yourself. ## Cloud Provider Monitoring Services The information available in cloud providers' compute consoles is just the basics, what's necessary to give a useful overview of resource health; you can get much more information through their monitoring services. Each provider's monitoring service has the advantage of being tightly integrated, delivering the most up-to-date metrics without extra effort on your part in terms of configuration. A downside for them is that they are generally agnostic of the software, like Hadoop, using the resources, so it is up to you to cover monitoring for them. They can accept custom metrics, but you must install and run the code to generate each metric and upload it. Besides watching numeric metrics, monitoring can entail saving and analyzing the contents of logs. Here again, cloud provider monitoring services can be configured to ingest logs, such as the HDFS namenode log and the YARN resource manager log, and perform basic analysis on them to look for signs of trouble. The logs are stored in the provider's own storage service, so you can look at them yourself as well. Finally, monitoring services can issue alerts when metrics cross defined thresholds, or when logs indicate a problem. Email is always an option for receiving alerts, but integrations can enable alerting via pager, text message, or instant message. In some cases, you can also configure automatic actions that the provider should take on your behalf, such as creating new instances or restarting daemons. Cloud provider monitoring is free for basic levels, but advanced features such as custom metrics can cost extra. Expense can be one reason why you might select your own monitoring solution instead of a cloud provider's, but the seamless integration and features that you get up front make them compelling and worth evaluating. If you are using AWS, CloudWatch is the monitoring service to investigate. It supports a wide range of metrics for assessing the health of EC2 instances, RDS database servers, EBS volumes, and more, and its API can accept custom metrics that you send. Basic CloudWatch monitoring is automatically enabled under EC2. The service directly supports the submission of logs to its own storage and can be configured to scan them for patterns indicating trouble. Alarms raised from problem conditions can result in alerts sent to personnel or automated actions to be taken by AWS itself. Google offers a monitoring service called Stackdriver, which can monitor both Google Cloud Platform resources as well as AWS resources. Besides a large number of metrics for Google Cloud Platform, Stackdriver supports many metrics for AWS services as well as third-party applications running on either provider, including HBase, Kafka, and ZooKeeper. Beyond metrics, Stackdriver has a log ingestion and analysis capability called Stackdriver Logging as well as built-in support for uptime checks. The monitoring capabilities in Azure are collected under the term Azure Monitor. By itself, Azure Monitor is a RESTful API for managing metrics and alerts, with SDKs available for several languages. However, it is possible to configure alerts for Azure's wide variety of metrics using the Azure portal, its CLI, or Powershell. The Log Analytics service, which is part of the Microsoft Operational Management Suite, is capable of receiving logs from applications running either on Azure or elsewhere and providing search and analysis on them. The Application Insights service, which runs within Azure, functions as a management portal for gathering application-specific metrics, gathered either through runtime or development-time integration. ## Rolling Your Own If you do not prefer using a cloud provider monitoring service, you can run a separate application that is capable of monitoring your clusters. Applications such as Apache Ambari and Cloudera Manager provide comprehensive monitoring capabilities for Hadoop clusters, and they can be pointed to clusters running on a cloud provider, provided that network connectivity is established. Perhaps you already have a system established in your organization; it could similarly be extended to the cloud. Such applications are generally agnostic of whether clusters they monitor are in the cloud or on-prem, but for many monitoring needs that doesn't matter. Appendix C contains tips for configuring Nagios, a popular open source monitoring system, to monitor a Hadoop cluster running on a cloud provider, beyond what normally would need to be done for an on-prem cluster. Before leaping into configuring it, or any other system, read on to learn about provider command-line interfaces, which are essential for building the foundational scripts to support your monitoring. # Cloud Provider Command-Line Interfaces Thus far in this book, you've been pointed almost exclusively to cloud provider consoles to perform operations such as allocating and terminating instances, configuring networks, setting security rules, and checking on resource health. Becoming comfortable with your cloud provider's CLI is an important step to setting up efficient, automated monitoring and control capabilities. ## AWS CLI The AWS CLI is a single Python-based application that can work with the gamut of services such as EC2, RDS, S3, and Kinesis. It can be installed using native operating system installers (like MSI for Microsoft Windows), or through `pip`, Python's package installation tool: $ sudo pip install awscli You must have an AWS access key and secret key to use the AWS CLI. The tool can locate the keys in any of several locations; a good option is to store them in the _.aws/credentials_ file. After installing the CLI, you can configure it to use your keys in its default profile using the `aws configure` command: $ aws configure AWS Access Key ID [None]: AKIAXXXXXXXXXXXXXXXX AWS Secret Access Key [None]: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX Default region name [None]: us-east-1 Default output format [None]: json The CLI can report results in JSON, as plain text, or in a tabular format. Interpretation of results by automated scripts is easiest with JSON, since it can be parsed in a straightforward fashion. The CLI itself can filter down its JSON results as well, using the JMESPath query language. To check if the CLI is working, try listing the available EC2 regions: $ aws ec2 describe-regions { "Regions": [ { "Endpoint": "ec2.ap-south-1.amazonaws.com", "RegionName": "ap-south-1" }, { "Endpoint": "ec2.eu-west-2.amazonaws.com", "RegionName": "eu-west-2" }, ... ## Google Cloud Platform CLI The Google Cloud SDK houses the CLI for Google Cloud Platform, and is comprised of the tools `gcloud`, `gsutil`, and `bq`. Most operations are provided through the `gcloud` tool, while `gsutil` is used for working with Google Cloud Storage and `bq` with BigQuery. You install the SDK using native operating system installers. After installation, the SDK must be configured using the `gcloud init` command. This establishes the default configuration for the CLI tools, including the account to authorize with and the default project. The authorization process includes the use of a browser window to confirm authorization of the local SDK installation for your account: $ gcloud init To check if the CLI is working, try listing your projects. The default output format is a general human-readable one, but many formats are available, including JSON, CSV, and YAML, through the `--format` option: $ gcloud projects list PROJECT_ID NAME PROJECT_NUMBER my-first-cluster-1311 My First Cluster 123456789012 temporal-parser-127719 My First Project 372793013720 $ gcloud projects list --format=json [ { "createTime": "2016-05-14T17:05:48.748Z", "lifecycleState": "ACTIVE", "name": "My First Cluster", "projectId": "my-first-cluster-1311", "projectNumber": "123456789012" }, { "createTime": "2016-04-10T19:52:51.350Z", "lifecycleState": "ACTIVE", "name": "My First Project", "projectId": "temporal-parser-127719", "projectNumber": "372793013720" } ] Format-specific attributes and projections can be used to filter down and modify the output results as desired. For example, JSON output can be culled down using simple projections to pick out fields: $ gcloud projects list '--format=json(name)' [ { "name": "My First Cluster" }, { "name": "My First Project" } ] ## Azure CLI The Azure CLI comes in two forms: a cross-platform CLI tool and a set of PowerShell cmdlets. This section covers only the cross-platform CLI. It can be installed using native installers for macOS or Windows, or through the `npm` package management tool: $ npm install -g azure-cli Docker images hosting the tool are also available. After installation, the CLI must be used to log in to Azure and become associated with your account. The authorization process includes the use of a browser window to confirm authorization of the local CLI for your account: $ azure login By default, the CLI operates in Azure Resource Manager mode, which is recommended for new Azure usage and is used throughout this book. To check if the CLI is working, try listing your resource groups. The default output format is a general human-readable one, but you can request JSON by passing the `--json` option. The tool itself does not offer ways to filter down JSON output, but an external tool such as jq or JMESPath can do that job for you. (The following command output is edited for fit.) $ azure group list info: Executing command group list + Listing resource groups data: Name Location Provisioning State Tags: data: ---------------- -------- ------------------ ----- data: my_first_cluster eastus Succeeded null info: group list command OK $ azure group list --json [ { "id": "/subscriptions/12345678-.../resourceGroups/my_first_cluster", "name": "my_first_cluster", "properties": { "provisioningState": "Succeeded" }, "location": "eastus" } ] $ azure group list --json | jq '.[] | { name }' { "name": "my_first_cluster" } ## Data Formatting for CLI Results Each cloud provider CLI is capable of generating output in human-readable formats, often with clarifying colors, indentation, and tabular markings. Each CLI also supports one or more machine-readable formats; notably, each CLI can produce JSON output. So, it's helpful to standardize on JSON as the output format of choice for scripting and automation, especially for systems that work across cloud provider boundaries. The rich ecosystem of applications that can consume and transform JSON also make it a great choice. # What to Monitor Now that you have your cloud provider CLI ready to use, you can think about the questions you want to answer through monitoring. This section starts you off with some basic ones, to get you familiar with using the CLI or other ways to script checks. ## Instance Existence The first question to consider, one which is silly for on-prem clusters, is whether the instances a Hadoop cluster runs on exist at all. While you can be confident that in almost all cases an instance will not vanish without you knowing about it, things can get confusing in those rare cases when you assume an instance is there, but it's gone. An instance existence check is not as useful for temporary instances (discussed in "Temporary Instances"), since those are expected to disappear after some amount of time. You will want to apply this check to ordinary, permanent instances, such as manager instances, nontemporary worker instances, or essential gateways. Given the IP address of an instance, how can you check that the instance exists in the cloud provider? The examples in Example 17-1 show how you can answer that question using the provider CLIs. ##### Example 17-1. Example existence checks using provider CLIs # AWS $ aws ec2 describe-instances --instance-id=i-12345678901234567 # Google Cloud Platform $ gcloud compute instances describe instance-name # Microsoft Azure $ azure vm show resource-group-name vm-name ## Instance Reachability It's not enough for an instance to exist to know that it is fundamentally functional; an instance also needs to be reachable, so that you can work with it as necessary. The definition of reachability can vary. Here, an instance is considered reachable if an SSH connection can be established to it. There are other ways to reach instances such as through web interfaces, and those are important as well, but SSH reachability is fundamental for maintaining control of your clusters. ### Reachability checks using a provider CLI The AWS CLI supports a `describe-instance-status` EC2 command, which returns basic status information for instances. Including the `--include-all-instances` option permits the command to return status information for instances that aren't running: $ aws ec2 describe-instance-status --instance-id=i-12345678901234567 \ > --include-all-instances The JSON result describes not only the "state" of the instance, which indicates if the instance is running, stopped, or other values, but also overall system and instance status information. Consult the EC2 documentation for full details on interpreting the command results. In general, if the instance status is "ok", AWS considers the instance reachable. The Google Cloud Platform CLI does not include reachability checks for SSH, although you can configure a _health check_ that monitors whether an instance is reachable over HTTP or HTTPS. For SSH, however, you have the option of using the CLI to connect, without needing to know what the IP address of the instance is. Combining that with a simple command to execute creates a good reachability check: $ gcloud compute ssh --ssh-key-file /path/to/google_key.pem instance-name \ > --command "echo OK" The Azure CLI does not include reachability checks over SSH. Here, your best course of action is to simply attempt an ordinary SSH connection. It is possible to retrieve the public IP address of a virtual machine through the CLI by using the name of its public IP address resource, and that can be embedded into a basic SSH command to form a basic reachability check: $ ssh -i /path/to/azure_key.pem \ > userid@$(azure network public-ip show \ > resource-group public-ip-address-resource --json | \ > jq -r .ipAddress) \ > "echo OK" If the name of the public IP address resource is not known ahead of time, it can be found dynamically by using the Azure CLI to first look up the virtual machine to locate its network interface, and then again to look up the network interface to find the public IP address. The private IP address is directly attached to the network interface: # Find the network interface for a manager instance in a cluster $ azure vm show my_first_cluster manager --json | \ > jq -r '.networkProfile.networkInterfaces[0].id' | sed 's/.*\///g' manager516 # Find the private IP address for the instance $ azure network nic show my_first_cluster manager516 --json | \ > jq -r '.ipConfigurations[0].privateIPAddress' 10.0.0.4 # Find the public IP address resource for the instance $ azure network nic show my_first_cluster manager516 --json | \ > jq -r '.ipConfigurations[0].publicIPAddress.id' | sed 's/.*\///g' manager-ip # Find the public IP address for the resource $ azure network public-ip show my_first_cluster manager-ip --json | \ > jq -r .ipAddress 203.0.113.101 ### Rolling your own reachability checks There are many ways to perform straightforward checks of SSH connectivity using common utilities, and these work for on-prem hardware as well as cloud instances. One basic technique is to use the netcat utility to check if a daemon is listening on the SSH port (usually 22) of the instance. This does not check that it is the SSH daemon, nor does it ensure that an SSH connection can be established using the proper keys, but the check is quick and simple. If the command's exit code is 0, the check passes: $ nc -w 10 -z 203.0.113.101 22 For a stronger check, just establish an SSH connection and issue a simple command. Include a connection timeout so that the command does not get stuck for long if the connection cannot be established. If the command's exit code is 0, or if the expected command output is emitted, then the check passes: $ ssh -i /path/to/cloud_provider_key.pem -o ConnectTimeout=10 \ > userid@203.0.113.101 "echo OK" OK There are many other choices for implementing reachability checks. Be wary of using more powerful security scanning and troubleshooting tools, such as `nmap`. While they are effective, they could unintentionally trip defense mechanisms that cloud providers put in place to prevent abuse. ## Hadoop Daemon Status Once it's established that your instances exist and are reachable, a next logical step is to see if the expected Hadoop daemons are running on them. ### Cloud provider custom metrics The cloud provider monitoring services described in "Monitoring Choices" support the definition of custom metrics, beyond the defaults pertaining to general system health that they automatically track. It is up to you to implement a script or application that determines the value of a desired custom metric and uploads it to the monitoring service. The core benefit of this approach is that you can rely on the provider monitoring service as a single location for tracking the health of your cloud resources and the Hadoop components running on them. See "Custom Metrics in CloudWatch" to learn how to establish a custom metric for AWS CloudWatch. ### Rolling your own Hadoop daemon status checks As is the case with reachability checks, status checks for Hadoop daemons that you create yourself work just as well for on-prem or hybrid clusters as for cloud clusters. If you already have monitoring systems in place for on-prem clusters, they can be easily extended to check cloud clusters. Status check implementations for Hadoop focus on directly contacting the daemons at their expected ports, or else using client applications that connect for you. An important question is whether you should use the private IP addresses or public IP addresses for the daemons. Using private IP addresses is a better choice, for three reasons. First, it is the more secure option, because communication to public IP addresses requires opening up security rules to permit traffic from outside the provider network or your organization's VPN. Second, it will have somewhat better performance, since network traffic remains within the cluster's virtual network or within VPNs that are reliably connected. Third, using private IP addresses allows you to use ephemeral public IP address assignments for cluster instances, which cost less, and are only necessary for gateway instances. If you opt for using private IP addresses, you end up running the checks, or the monitoring application that houses them, either within the cloud provider or on your own VPN. This makes monitoring subject to the cloud provider's infrastructure functioning well. For example, if you monitor from a cloud instance that is coresident with your cluster and the availability zone for all of them goes down, you lose your monitoring capability. Another drawback is that it can be more difficult to integrate separate monitoring systems for cloud clusters with existing, perhaps global, monitoring systems already in place at your organization. Weigh the pros and cons of each possible home for your monitoring with these implications in mind. The simple check for SSH reachability using netcat, suggested in "Instance Reachability", can be applied to the well-known ports for Hadoop daemons. Table 17-1 is a quick reference for ports to check. Table 17-1. Well-known TCP ports for Hadoop daemons Daemon | Port ---|--- HDFS Namenode | 8020 HDFS Datanode | 50010 YARN Resource Manager | 8032 YARN Node Manager | 8040 ZooKeeper Server | 2181 # check on the namenode $ nc -v -z 203.0.113.101 8020 # check on the resource manager $ nc -v -z 203.0.113.101 8032 For more detailed information, a scripted check can collect status information from the daemons by communicating with them. Consult the documentation for each Hadoop component to learn about what they offer. The core HDFS and YARN daemons automatically provide monitoring information over HTTP that is managed internally using JMX. Table 17-2 provides example URLs for retrieving the information. Table 17-2. Example URLs for retrieving JMX information from Hadoop Daemon | Example URL ---|--- HDFS Namenode | _http://203.0.113.101:50070/jmx_ HDFS Datanode | _http://203.0.113.101:50075/jmx_ YARN Resource Manager | _http://203.0.113.101:8088/jmx_ YARN Node Manager | _http://203.0.113.102:8042/jmx_ The data returned is formatted in JSON, with one object for each MBean. You can pass the `qry` query parameter to request only the information from a single MBean: $ curl http://203.1.113.101:50070/jmx?qry=beanName With the returned JSON in hand, you can use parsing utilities like `jq` to whittle them down to what you want to monitor. ZooKeeper servers do not use JMX, but you can retrieve textual status information from them by issuing the four-letter command `mntr` to them, and then use typical text processing utilities to narrow down what's returned: $ echo mntr | nc 203.0.113.102 2181 The suggestions here just scratch the surface of monitoring Hadoop daemons. You can enable JMX on daemons that support it and then connect full-featured JMX console applications. You can design checks that use the standard client utilities for the Hadoop components to retrieve exactly the information you are interested in. There are many possibilities, and since they aren't specific to cloud clusters, they are not covered in this book. Consult texts such as _Hadoop Operations_ by Eric Sammer (O'Reilly) to learn more. ## System Load Monitoring Hadoop daemons gives you a view into whether your cloud clusters are working _at all_ , and also into whether they are working _well_ , if you monitor metrics such as how full HDFS is or how long MapReduce jobs take to begin and then complete execution. Another view on whether clusters are working well is gained by monitoring the usual system-level metrics, like CPU load. Here again, as with general Hadoop monitoring, you can apply the same checks you normally would to on-prem hardware to cloud instances, and you have the option of using the cloud provider's own services. ### AWS system monitoring Once again, under AWS you can use CloudWatch to gather and report on metrics. CloudWatch automatically tracks some basic metrics for every EC2 instance, and you can opt to gather more by enabling detailed metrics, for additional cost. To find out what metrics are available for an instance, use the CLI: $ aws cloudwatch list-metrics --namespace AWS/EC2 \ > --dimensions Name=InstanceId,Value=i-12345678901234567 Fortunately, CPUUtilization is a basic metric, so it should be listed as available for any instance. Utilization can be retrieved by asking for metric statistics, specifying a start and end time for the metric and a period over which each reported value, such as an average or maximum, is to be calculated. This example reports on the maximum CPUUtilization over the course of a day, as seen on an hourly basis: $ aws cloudwatch get-metric-statistics --namespace AWS/EC2 \ > --metric-name CPUUtilization \ > --dimensions Name=InstanceId,Value=i-12345678901234567 \ > --start-time 2017-02-04T00:00:00 --end-time 2017-02-05T00:00:00 \ > --period 3600 --statistics Maximum ### Google Cloud Platform system monitoring To work with anything beyond basic metrics in Google Cloud Platform, you need a Stackdriver account. Select Monitoring from the Stackdriver section of the Google Cloud Platform console menu, and log in with the account that you use. Create a new account and associate it with one of your projects, such as My First Cluster, as shown in Figure 17-1. ###### Figure 17-1. Creating a Stackdriver account After associating your account with one project, add other projects as you like. It is not necessary to associate any AWS accounts during the account setup process, so that step may be skipped and performed later. Instructions are displayed for installing Stackdriver agents on your instances, as shown in Figure 17-2, so that you can gather more detailed monitoring data. ###### Figure 17-2. Instructions for installing Stackdriver agents After working the rest of the way through account setup, click the Launch Monitoring button to go to the Stackdriver dashboard. You can use this dashboard to monitor many facets of your instances. The `gcloud` CLI for Google Cloud Platform does not offer access to Stackdriver metrics. A good alternative for scripting is to use the Python API client library for Stackdriver. Consult its documentation to learn how to install the library and to use it with service accounts to query the Stackdriver metrics endpoints. ### Azure system monitoring Azure automatically tracks several metrics for virtual machines, including Percentage CPU. While the data is easy to access through the Azure portal, there is no easy way to get at the raw data using the Azure CLI. The Azure REST API provides an endpoint for retrieving metrics under the Microsoft Insights banner. Consult the endpoint's documentation to learn how to access it. Note that use of the API requires authentication using a JSON web token based on an approved principal in your account. ### Rolling your own system checks Use any system check that works for on-prem hardware for your cloud instances. For checks that require SSH connectivity, be sure to provide the necessary SSH key. It's good practice to establish a separate account with permissions for only what is required for the checks, so that the monitoring system cannot unintentionally perturb cluster operations. A simple way to check CPUUtilization on any instance is to parse the results of the `uptime` command. For more detail, try the `mpstat` command, which you may need to install beforehand, depending on how minimal the base image for your cluster instances is. (The following `mpstat` output is edited for fit.) # determine system load using uptime $ ssh -i /path/to/cloud_provider_key.pem userid@203.0.113.101 uptime 18:51:04 up 1:58, 0 users, load average: 0.00, 0.01, 0.05 # determine system load using mpstat $ ssh -i /path/to/cloud_provider_key.pem userid@203.0.113.101 mpstat -u Linux 3.13.0-74-generic (ip-203-0-113-101) 02/20/2017 _x86_64_ (4 CPU) 06:51:20 PM CPU %usr %nice %sys ... %idle 06:51:20 PM all 1.24 0.00 0.09 ... 98.56 ## Putting Scripting to Use It's useful to spend some time with the provider CLIs to become comfortable with how they work and to understand what you can glean from them. Check out the built-in help that ships with the CLI for your provider, along with the online documentation; not only will you get more ideas for what you can monitor, but you can discover some convenient ways to work, beyond the confines of the provider web console. The next section uses scripting to support defining a custom metric in AWS CloudWatch. A custom metric can be designed to map to a measurement pertinent to Hadoop, such as YARN job volume, or HDFS usage. This way, if you are using a cloud provider monitoring service, you can have your Hadoop monitoring in the same place as everything else. # Custom Metrics in CloudWatch AWS CloudWatch automatically establishes custom metrics as soon as they are passed to it. Starting out, there are no custom metrics, but there are many basic metrics already tracked for several services. A brief look at working with those helps to get oriented for using custom metrics. This section assumes that you have a cluster running in AWS like the one set up in Chapter 9. ## Basic Metrics Select the CloudWatch service from the service list in the AWS console to go to the CloudWatch console. Then, click the Browse Metrics button to begin looking at metrics. The graph on the main portion of the page is empty because no metrics are selected for it. To add a metric, select EC2 from the "All metrics" tab, shown in Figure 17-3, which lists a few of the AWS services with basic metrics available. Each service maps to a _namespace_ of metrics under CloudWatch. ###### Figure 17-3. Initial metrics namespaces in AWS CloudWatch Then, drill further by selecting Per-Instance Metrics. All of the available EC2 metrics are listed, and checking any of them will have them begin to be plotted on the graph. As an example, select the CPUUtilization metric for the "manager" instance, as shown in Figure 17-4. ###### Figure 17-4. The CPUUtilization metric for the manager instance Over time, the graph will fill up with the CPUUtilization metric for the manager instance, looking something like Figure 17-5. You can add the same metrics for the other cluster instances to make a single graph tracking CPUUtilization cluster-wide. ###### Figure 17-5. CPU utilization graphed in CloudWatch ## Defining a Custom Metric Working with a custom metric is similar to working with a basic metric, but first, the metric must be created. This section defines a new metric for how full HDFS is, expressed as a percentage (so, 0% is empty and 100% is full). Before defining the new custom metric in CloudWatch, a script or application must be available to determine it. Fortunately, it is easy to get the figure needed for the metric using the `hdfs dfsadmin -report` command. This example command retrieves the first `DFS Used%` line from the DFS report, which covers the entire cluster, and extracts the field containing the percentage: # as hdfs $ hdfs dfsadmin -report | grep -m 1 "DFS Used%" | cut -d ' ' -f 3 | sed 's/%//g' 0.00 This command can form the basis for a script that finds the percentage and then submits it to CloudWatch. The latter task requires the AWS CLI, so install it on the manager instance, under the "hdfs" account, as described in "AWS CLI". The CLI must be configured with credentials for an IAM user that can work with CloudWatch metrics. You can use your own, or you can create a new IAM user as described in "Configuring S3 Authentication". If you create a new IAM user, be sure to request programmatic access and save the access key pair to use for CLI configuration. Applying the policy "CloudWatchFullAccess" will grant enough permissions to the user to work with CloudWatch. With the CLI installed and ready to run, it's time to think about how to name the new custom metric. CloudWatch will establish everything automatically as soon as the metric is first submitted, so no additional work is required in CloudWatch to get it ready: * A custom metric in CloudWatch occupies a namespace, like any other metric, which groups similar metrics together. The namespace "HadoopClusters" works nicely for any metrics pertaining to Hadoop clusters. * A metric needs a name describing what it measures. "DFSUsed" is a succinct and accurate name. * A metric can have a unit associated with it, and for this custom metric "Percent" is perfect. * Since there may be multiple Hadoop clusters running, each with their own usage, a _dimension_ should be used to align the metric's datapoints. For example, the CPUUtilization metric has a dimension named "InstanceId"; this makes it possible to retrieve all of the datapoints for a single instance by its ID. The custom metric for DFS usage should be viewed per cluster, so a dimension named "Cluster" should be defined. ## Feeding Custom Metric Data to CloudWatch With the naming and dimensions worked out, a script for submitting usage information to CloudWatch can be written: #!/usr/bin/env bash dfs_used=$(/opt/hadoop/bin/hdfs dfsadmin -report | \ grep -m 1 "DFS Used%" | cut -d ' ' -f 3 | sed 's/%//g') /usr/local/bin/aws cloudwatch put-metric-data --metric-name DFSUsed \ --namespace HadoopClusters --unit Percent --value "$dfs_used" \ --dimensions Cluster=MyFirstCluster Notice that the script uses full paths for the `hdfs` and `aws` commands. This is because this script will be called by the `cron` daemon, which passes a minimized set of environment variables to scripts that it runs. Use the correct path for `aws` for your instance, based on where `pip` installed it. You can test the script by calling it directly. ###### Tip The script could easily be adapted to become a Nagios service check, by removing the submission of the metric to CloudWatch and adding code to return different exit codes depending on the percentage value. Add the script to the crontab for the hdfs user to have it run on a regular basis, sending the custom metric data to CloudWatch continually: # as hdfs $ crontab -e # add a line for the script, as in the listing below $ crontab -l * * * * * /home/hdfs/dfs_used.sh > /home/hdfs/dfs_used.log 2>&1 Wait a couple of minutes after the job is added to the crontab for it to start feeding data to CloudWatch. Soon, in the "All metrics" tab of the CloudWatch metrics page, the new "HadoopClusters" custom namespace should appear, as shown in Figure 17-6. ###### Figure 17-6. A custom namespace for Hadoop clusters in AWS CloudWatch Selecting the HadoopClusters namespace reveals the single "Cluster" dimension, and selecting that dimension reveals the single custom metric, DFSUsed, for the dimension value "MyFirstCluster". It can now be selected, as demonstrated in Figure 17-7, and graphed like any other metric. ###### Figure 17-7. A custom metric for DFS usage in CloudWatch Also like any other metric, statistics are available for DFS usage: $ aws cloudwatch get-metric-statistics --namespace HadoopClusters \ > --metric-name DFSUsage \ > --dimensions Name=Cluster,Value=MyFirstCluster \ > --start-time 2017-02-19T17:00:00 --end-time 2017-02-20T00:00:00 \ > --period 60 --statistics Average Maximum { "Datapoints": [ { "Timestamp": "2017-02-19T17:57:00Z", "Average": 0.0, "Maximum": 0.0, "Unit": "Percent" }, ... { "Timestamp": "2017-02-19T17:55:00Z", "Average": 0.0, "Maximum": 0.0, "Unit": "Percent" } ], "Label": "DFSUsed" } If there is nothing in HDFS, all of the metrics values come back as zero, which is hardly exciting. An easy way to fill up the space is to run the `teragen` utility. The utility is normally used for running the Terasort benchmark, described in "Benchmarking HA"; it generates test data in HDFS in the amount that you request. Run `teragen` under a user account that can run MapReduce jobs. See "Running a Test Job" for steps to take for the account you choose. For the first run, try generating a small amount of data that fits easily in the available space in your cluster: $ hadoop jar \ > /opt/hadoop/share/hadoop/mapreduce/hadoop-mapreduce-examples-x.y.z.jar \ > teragen 50000000 /user/userid/terasort-input You can rerun `teragen` to add more and more data to HDFS, and watch the graph of DFS usage grow. An example graph showing increased DFS usage is shown in Figure 17-8. For each run, use a different HDFS directory as an argument. ###### Figure 17-8. DFS usage graphed in CloudWatch ## Setting an Alarm on a Custom Metric CloudWatch is now tracking DFS usage for a cluster, but nothing is watching the metric to make sure usage doesn't go too high. Accordingly, you can set an alarm to trigger if usage exceeds a threshold. CloudWatch can take actions on your behalf if an alarm is triggered; a simple action would be to send an email, but a highly advanced action could add a datanode to the cluster to expand the available space. For now, only the basic alarm without actions is established. An alarm needs a descriptive name, such as "DFS_Usage_Alarm" for alarming on excessive DFS usage. Various other parameters are needed as well: * For an alarm that triggers at 80% usage, an alarm threshold of 80.0 should be used, along with a comparison operator representing the greater-than comparison. Thus, the alarm is triggered when the DFSUsed metric, already expressed as a percentage, crosses above 80.0. * An alarm can be made more or less sensitive by defining the length of the period over which the metric is evaluated, and the number of periods to evaluate. To be quite sensitive, specifying a period of 60 (seconds) and only one evaluation period will narrow the alarm evaluation to each minute of time. * Finally, an appropriate aggregated statistic for the metric should be chosen. Looking at the average usage is generally a good idea, but looking at the maximum over the evaluation period leads to a highly sensitive alarm. These choices lead to a sensitive alarm, which in real-life usage would likely trip more often than necessary. Instead, you would have the alarm watch the DFS usage over a longer evaluation period, perhaps 10 or 20 minutes, and only look at the average usage, so that transient heavy use of HDFS would not trigger the alarm needlessly. The AWS CLI can be used to create a new alarm: $ aws cloudwatch put-metric-alarm --alarm-name "DFS_Usage_Alarm" \ > --no-actions-enabled --namespace HadoopClusters \ > --dimensions Name=Cluster,Value=MyFirstCluster --metric-name DFSUsed \ > --statistic Maximum --period 60 --evaluation-periods 1 \ > --threshold 80.0 --comparison-operator GreaterThanThreshold After the new alarm is created, it appears in the Alarms page of the CloudWatch console. After a couple of minutes, depending on how full HDFS is, the alarm status will appear as either "OK", indicating that DFS usage is under 80%, or "ALARM", indicating that it is over 80%. Figure 17-9 shows the alarm in the "OK" state. ###### Figure 17-9. An alarm on DFS usage in CloudWatch If usage is under 80%, run `teragen` again until HDFS usage crosses the 80% threshold (be careful not to fill up HDFS), and ensure the alarm is triggered, as in Figure 17-10. Then, delete the HDFS directories holding the test data so that the usage drops again, until the alarm returns to the "OK" state. ###### Figure 17-10. A triggered alarm on DFS usage in CloudWatch You might notice that the CloudWatch interface calls out that there are no actions on the alarm. In the next section, an alarm on a different custom metric tracking the compute capacity of the cluster will trigger the addition of a new worker to the cluster. # Elastic Compute Using a Custom Metric One of the best reasons to run clusters on a cloud provider is the flexibility to add and remove instances as your needs change. "Using Temporary Instances" discussed using temporary instances as a cost-effective way to scale up clusters for short periods. Rather than scaling up "by hand," you can set up an automated process that detects when there is a need for more capacity and responds by _growing_ your cluster. This process is called _autoscaling_. Here again, a custom metric is introduced to AWS CloudWatch, but this time it tracks cluster compute capacity. When it gets too low, the action triggered by the metric's alarm adds a new worker to the cluster. ## A Custom Metric for Compute Capacity There are a few different ways to look at compute activity to determine if it is insufficient and needs more resources. A simple process could add compute instances at a fixed time in the workday, perhaps at the beginning, with the expectation that work will pick up as people arrive for work. A more targeted technique, though, is to look at how busy the compute system is, and if it crosses a threshold of activity, add more instances. In practice, this technique may need to be governed; as more capacity is added, users may simply throw more work at the cluster, driving its size higher and higher. For simplicity here, no upper limit or throttling is included. There are several ways to determine if YARN is "busy." Here, memory usage is used; low memory availability is taken to indicate that the system is running near its capacity. The `yarn` command can list the IDs of the compute nodes as well as each node's memory usage: # as yarn $ yarn node -list 2>/dev/null | grep -v Total | grep -v Node-Id | cut -d ' ' -f 1 ip-172-31-60-201.ec2.internal:57541 ip-172-31-60-202.ec2.internal:58543 ip-172-31-60-103.ec2.internal:43340 $ yarn node -status ip-172-31-60-201.ec2.internal:57541 2>/dev/null | \ > grep 'Memory-' Memory-Used : 0MB Memory-Capacity : 8192MB With this information, a general memory usage figure can be determined, as the ratio of the memory used to the memory capacity across all nodes. A script can loop over the nodes to sum up their memory statistics and then report the final ratio: #!/usr/bin/env bash used_total=0 available_total=0 for n in $(yarn node -list 2>/dev/null | grep -v Total | grep -v Node-Id | \ cut -d ' ' -f 1); do mem="$(yarn node -status "$n" 2>/dev/null | grep 'Memory-' \ | cut -d ' ' -f 3 | sed 's/MB//g' | xargs)" used=${mem%% *} available=${mem##* } used_total=$(( used_total + used )) available_total=$(( available_total + available )) done if [[ $available_total == 0 ]]; then echo 0 else bc <<< "scale=4;($used_total/$available_total)*100" fi ###### Note This script is reaching the limits of what bash shell scripting can perform easily. Specifically, it uses techniques like `xargs` without a command to concatenate lines, bash arithmetic, and `bc` with a here string to perform a floating-point calculation. In practice, you may want to use a scripting language like Python to make a more maintainable script. With a script available, a custom metric can be supplied to CloudWatch on a regular basis via a cron job: #!/usr/bin/env bash yarn_mem_used=$(/path/to/yarnmem.sh) /usr/local/bin/aws cloudwatch put-metric-data --metric-name YarnMemUsage \ --namespace HadoopClusters --unit Percent --value "$yarn_mem_used" \ --dimensions Cluster=MyFirstCluster ## Prerequisites for Autoscaling Compute To make automatically adding a new compute instance fast and robust, you need an image at the ready for it. Chapter 16 lays out how much work can be saved by crafting an image with most of the Hadoop configuration already baked in. Without a custom image, the autoscaling work involves installing all of the Hadoop components and their dependencies, along with extensive configuration work. For speed and to reduce the chance of misconfiguration, an image should be used. You can certainly use the same image that you normally would for creating a new cluster. Some configuration work must be done to a new instance before it can participate in a cluster. In "Image Preparation", several items were called out as being necessary to modify for any new instance, including IP addresses. Most of the configuration in the image can remain as it is, so the scripting needed to finish off the configuration is minimal. A modified form of the cluster-wide configuration update script in Appendix B can do the trick. Some caveats: * The script must have SSH access to the new instance, so establishing that must be part of the configuration process. * Some components may require a restart in order to accept their new configurations. At a minimum, the daemons on the new instance must be started. * To keep administration simple, add the private IP address of each new instance to the _/etc/hadoop/slaves_ file on each manager instance. ## Triggering Autoscaling with an Alarm Action YARN usage can be volatile. Under normal conditions, a cluster may experience spikes in activity followed by lulls of almost no activity. So, an alarm that can trigger adding a new instance should look for consistent heavy usage. In CloudWatch, this can be done by requiring the alarm condition to hold for more than just one consecutive evaluation period: $ aws cloudwatch put-metric-alarm --alarm-name "YARN_Mem_Alarm" \ > --no-actions-enabled --namespace HadoopClusters \ > --dimensions Name=Cluster,Value=MyFirstCluster --metric-name YarnMemUsage \ > --statistic Maximum --period 60 --evaluation-periods 5 \ > --threshold 80.0 --comparison-operator GreaterThanThreshold The preceding alarm has no actions, but one is needed to begin the process of adding an instance. With CloudWatch, there are choices as to how to architect this portion of the autoscaling flow: * An _autoscaling action_ can trigger the creation of an instance within an EC2 autoscaling group. An _autoscaling group_ in EC2 is a grouping of instances that can be automatically grown and shrunk in size. Here, an autoscaling group can represent the additional workers that are added to a cluster. When you create an autoscaling group, you create a _launch configuration_ , which includes the information needed to launch an instance, such as its AMI, subnet, and security group, and whether to request a spot instance. A tripped alarm can cause the addition of instances to the group, while an alarm subsiding can cause instances to be removed. * A _notification_ from an alarm can go to any of various listening or receiving entities, such as an HTTP server, an email address, or text message. Scripts triggered upon receipt of the message can use the AWS CLI to create a new instance as desired. The information normally in a launch configuration would be included in the scripts. This is a do-it-yourself form of autoscaling, which is more complex to set up but which relies less on AWS capabilities. Whichever path you choose, you must provide a way to run the Hadoop configuration script for the new instance (and possibly the cluster at large). When performing your own autoscaling, you can use the information from the alarm to gain context about the cluster and thereby find its IP addresses, or simply have them hardcoded in the script; the script can be run anywhere that is convenient to your architecture. When using an autoscaling group, the script may be set up to run directly on the new instance, but it must be able to retrieve information necessary for the configuration work, such as the IP addresses of the managers in the cluster it is being added to. For that reason, if you are using AWS autoscaling, you may wish to also send a notification to a helper application that can make the necessary information available to the new instance when it has finished starting up. Setting up autoscaling of Hadoop clusters is a challenging task. This section provides a plan and some starting materials for making it happen, relying on CloudWatch for metric tracking and alarming. Take the time to think about the conditions under which you'd want to scale up your clusters, and rely on automation for cluster creation you have already established to help with the similar task of adding new instances. ## What About Shrinking? Autoscaling also includes removing instances when they are no longer needed. The same metric can be used to determine when YARN memory usage (or your chosen metric) has gone back under some threshold for some length of time, and then terminate a worker that had been added (or any that are equivalent from the original cluster composition). The cluster should be configured again to no longer expect the destroyed instance to be around. If you use temporary instances, then the need to shrink is not as strong, since they will disappear on their own after a time. However, you would still want to update the cluster configuration to account for their absence. ## Other Things to Watch The alarms and actions set up under CloudWatch so far have been based on numeric metrics that are sampled over time and analyzed. The next section looks at another source of information about a cluster, logs, and also shows how to send CloudWatch alarm notifications to an email list. # Ingesting Logs into CloudWatch Aside from custom metrics that are tied to Hadoop components, logs are one of the best windows into seeing how your clusters are performing. As part of their monitoring services, each of the cloud providers offers the ability to save off log content for later analysis, either to their standard storage services or dedicated storage, and perform automated scans and alerting based on their content. The basic procedure is to identify a logfile to track, specify how its content is organized in storage, and define alerts that are triggered by patterns in the logfile as it is incrementally saved off. This section explores using AWS CloudWatch to monitor the log for an HDFS namenode and trigger alerts whenever an error appears. Before starting, determine the full path of the namenode log; the initial setup for CloudWatch logging includes configuration for the first logfile. It's assumed that the logfile exists and has some content in it already. ## Creating an IAM User for Log Streaming CloudWatch relies on an agent process running on your cloud instance to extract logfile content. The agent requires credentials to authorize itself with CloudWatch. If your instances already have IAM roles associated with them, then it's enough to add the necessary policies to a role. Otherwise, you can create a dedicated IAM user for the agent. A tailored custom policy can grant the permissions necessary for the CloudWatch agent to work. Go to the IAM service in the AWS console, and select Policies from the menu on the left side. The list of predefined IAM policies is displayed. Click the Create Policy button, as shown in Figure 17-11, to create a new custom policy. ###### Figure 17-11. Starting to create a custom IAM policy for CloudWatch Select the option to Create Your Own Policy. Then, in the form shown in Figure 17-12 for creating the policy: * Provide a policy name, such as "CloudWatchLogSubmitter". * Enter a description if desired. * Fill in a policy document that matches the EC2 quick start documentation for AWS CloudWatch. Click the Create Policy button to create the new custom policy. ###### Figure 17-12. A custom policy for CloudWatch Next, create a new IAM user with the custom policy applied. Instructions for creating a new IAM user are in "Configuring S3 Authentication". Be sure to request programmatic access, and save the access key pair. ## Installing the CloudWatch Agent AWS provides a Python script for installing and configuring the CloudWatch agent on your instances. Download it to the desired instance (e.g., the manager node hosting the HDFS namenode) and run it, specifying the region where the instance runs: $ sudo apt-get update # on Ubuntu instances only $ curl -O \ > https://s3.amazonaws.com/aws-cloudwatch/downloads/latest/awslogs-agent-setup.py $ sudo python awslogs-agent-setup.py --region us-east-1 The script installs `pip` and uses it to download and install the agent. Then it asks a series of questions to configure the agent and have it start streaming a log to CloudWatch. In the first set of questions, provide the access keys for the IAM user just created for submitting log data to CloudWatch, and the region. The output format response may be left empty. The next set of questions establishes a log stream for the first logfile to monitor. You will need to determine the name of the _log stream_ that represents the log contents as they arrive at CloudWatch, and the name of the _log group_ where the log stream resides. The organization of log groups is up to you; one suggestion is to use a log group for each type of Hadoop daemon (HDFS namenode, ZooKeeper server, Hive server) and a log stream for each instance of a Hadoop daemon. For example: * path of log: _/var/log/hadoop/hadoop-hdfs-namenode-ip-203-0-113-101.log_ * log group name: mycluster/hdfs/nn * log stream name: mycluster-hdfs-nn-manager Finally, choose a timestamp format that you prefer, and pick the start of the file for the initial position to load, so that the log's entire contents are streamed. After the agent is installed and configured, its configuration is written to _/var/awslogs/etc/awslogs.conf_. More log streams can be defined there later. If you proceed to the CloudWatch Logs service in the AWS console, you should see the new log group and log stream for the HDFS namenode log, as shown in Figures 17-13 and 17-14. ###### Figure 17-13. A CloudWatch log group for HDFS namenode logs ###### Figure 17-14. A CloudWatch log stream for the HDFS namenode log ## Creating a Metric Filter Now that namenode log data is being streamed to CloudWatch, the next step for monitoring it is to create a _metric filter_ on the log stream. A metric filter generates a metric based on patterns occurring in the log contents. Here, a metric filter is created that looks for log messages containing the string "ERROR", which indicates an error logged by the namenode. Start creating a metric filter by selecting the radio button for the new "mycluster/hdfs/nn" log group in the list of log groups, and then clicking the "Create Metric Filter" above the list, as shown in Figure 17-15. ###### Figure 17-15. Beginning to create a CloudWatch log metric filter On the next page, define the filter pattern by entering "ERROR" (without quotes) in the Filter Pattern text field. Click the Assign Metric button to continue to the next step. Fill in the remaining information for the filter on the last page, as shown in Figure 17-16: * Choose a filter name, such as "Namenode Errors". * Select a metric _namespace_ , which is used to group similar metrics together in CloudWatch. The namespace "HadoopClusters", for example, could be used to group together all metrics pertaining to your Hadoop clusters. * Select a name for the metric that is to be generated by the filter. Something simple like "NamenodeErrors" fits. * Finally, open the "Advanced Options" if necessary and assign the Metric Value of "1", which is the default. This causes the filter to post a value of 1 to the metric whenever the filter pattern, which looks for error messages, encounters a match. Click the Create Filter button to create the metric filter. ###### Figure 17-16. Definition for a new metric filter in CloudWatch The new filter is shown as one of the metric filters associated with the namenode log group, as shown in Figure 17-17. ###### Figure 17-17. A metric filter established in CloudWatch ## Creating an Alarm from a Metric Filter There is now a metric representing the presence of errors in the namenode log, but without an alarm monitoring the metric, it is up to administrators to watch it. To create an alarm for the new metric, follow the "Create Alarm" link displayed for the metric filter. A dialog appears, with the second step in the alarm creation workflow, Define Alarm, already selected. The first step already refers to the metric associated with the filter. Working in the Alarm Threshold section, first provide a name and description for the new alarm. The alarm is already focused on the "NamenodeErrors" metric; choose to have it move to an alarmed state whenever that metric is greater than or equal to 0 for one (consecutive) period. This will cause the alarm to trigger whenever an error appears in the log, because the metric filter will post a value of "1" at that time. In the Actions section of the dialog, you can define notifications to send when the alarm changes state. Begin by selecting the default value of "State is ALARM" for the "Whenever this alarm:" menu, so that notifications are sent when the alarm is triggered, that is, when an error message appears in the namenode menu. CloudWatch uses the AWS Simple Notification Service (SNS) to manage sending notifications. Rather than specifying email addresses directly for a notification, you create a named topic in SNS that includes your email address, and point to that in the alarm definition. Follow the "New List" link, and the form for the notification definition expands to allow you to enter a topic name and list of email addresses. Enter a topic name and email address of your choice. The final states of the Alarm Threshold and Actions sections of the dialog are shown in Figure 17-18. ###### Figure 17-18. Alarm threshold and actions in CloudWatch The period and statistic that the alarm uses to consider the metric is in the Alarm Preview section, shown in Figure 17-19. Together, they determine the calculation performed to decide if the alarm should be triggered. For this example, a period of 5 minutes and statistic of "Sum" states that the alarm should be tripped if the sum of the metric exceeds zero when evaluated over a 5-minute period. Since any error message will cause a value of "1" to be entered for the metric, these values will cause the alarm to be triggered within 5 minutes of an error appearing in the namenode log. ###### Figure 17-19. Alarm preview in CloudWatch Click the Create Alarm button to create the alarm. You may be presented with a dialog box asking you to confirm the email address you supplied for the notification list. You can do this now or later. Click the View Alarm button in the dialog to see the new alarm. Select the Alarms section of CloudWatch from the menu on the left side of the console to see the new alarm listed. Its state of "INSUFFICIENT_DATA" notes that there are not enough datapoints for the metric to determine a state for the alarm; this is because the metric filter does not post anything at all for the metric unless there is an error message. To get the alarm to trigger, induce an error message in the namenode log. An easy way to do that is simply to stop the namenode using the usual stop script: # as hdfs $ $HADOOP_PREFIX/sbin/stop-dfs.sh An error message should appear in the namenode log indicating that it received a SIGTERM signal. Within 5 minutes, the state for the namenode error alarm should transition to ALARM, as shown in Figure 17-20, and you should receive an email from AWS notifying you of the problem. ###### Figure 17-20. A tripped alarm for a log metric filter in CloudWatch Receiving an email is very helpful, but you could expand on the notification capabilities in SNS to do more, such as ping a paging system, or even trigger a script that automatically restarts HDFS. # So Much More to See and Do This chapter, despite its length, has only scratched the surface of the monitoring opportunities available for your clusters running in the cloud. There is much more you can learn about each cloud provider's offerings, and the reward is a much better view of the health and well-being of your clusters in the cloud. Having that assurance is both necessary to encourage moving more work to cloud providers and to keep tabs on what's already there. Eventually, your monitoring will alarm you that one of your clusters is degraded. Perhaps HDFS has crashed, or all of the worker instances have vanished. When (not if) that happens, you will need to be able to restore the cluster and the data that it held. Chapter 18 briefs you on the options you have for cluster backup and restoration. A cloud provider's own Hadoop services, like Amazon EMR, will often integrate with its monitoring. Stackdriver was originally an independent service, which Google acquired in 2014. As cloud usage for Hadoop clusters continues to increase, it is likely that the applications will become more aware of where clusters are running and provide new features to be more effective. At the time of writing, version 2 of the CLI is in development. Should this be the private IP address or public IP address? See "Hadoop Daemon Status" for discussion. You can create custom policies for more security. See "Creating an IAM User for Log Streaming" to learn about this process in the context of submitting logs to CloudWatch. # Chapter 18. Backup and Restoration Despite the reliability and availability benefits of running your clusters on a cloud provider, failures still can occur. It's essential to include disaster recovery procedures as part of your maintenance process, and that starts with safe backups of your cluster data. Even if you have faith in your cloud provider that your resources will remain operational as long as you need them, rules and regulations pertaining to your data can compel you to have a backup process in place. There are many general techniques for performing backup and restoration for Hadoop clusters. This chapter focuses on aspects of those techniques that are relevant for cloud clusters. # Patterns to Supplement Backups Besides explicit backup procedures, there are other measures you can, and should, employ to provide greater assurance that your cluster data, and clusters themselves, remain available in the face of problems. "Long-Running or Transient?" discusses the trade-offs between long-running clusters and transient clusters. By their nature, long-running clusters become more and more critical as they accumulate important data as well as unique configurations or software installations. Transient clusters, on the other hand, cannot become the permanent home of any data, and can be spun up easily with the proper automation. Adoption of transient clusters, therefore, can lead to an architecture that is more resilient to failure. When a transient cluster fails, a new similar one can be created with little trouble, and data is already stored off-cluster in robust cloud provider storage services. Another measure that effectively preserves your work is the use of images, as covered in Chapter 16, to persist the required configurations of your cluster instances. Combined with the automation necessary to create new clusters, you are freed from concern that all of the effort put into configuring your clusters properly will be lost if those clusters become corrupted or disappear. HDFS data can be similarly "imaged" by using HDFS snapshots. You can quickly create an HDFS snapshot to hold a read-only copy of a specified directory. If the directory contents become corrupted, you can restore the snapshot to return to a past, known good state. Note that HDFS snapshots, however, may be lost if a cluster loses enough datanodes. Finally, Hadoop itself supports high availability (HA) clusters, covered in depth in Chapter 10, to eliminate single points of failure in your architecture such as the HDFS namenode and the YARN resource manager. The built-in resiliency of Hadoop to the loss of other daemons like HDFS datanodes, combined with an HA configuration that works with cloud provider features such as availability zones, can result in clusters that not only intrinsically back up data, but continue functioning in the face of failure. In summary, the following architectural choices go a long way to ensuring that cluster data and configuration is backed up, before even performing direct data backup operations: * Use images to bake in cluster configuration, with scripts to fill in what's needed at deployment time. * Use transient clusters so that they do not accumulate essential configuration and data. * Store data in cloud provider storage services, pulling them into a cluster when needed; likewise, save final results to storage services for safekeeping. * Set up high availability. * Use cloud provider features like availability zones and automatic failover. After embracing some or all of these measures, you may still want an ordinary data backup. After all, a key tenet of data security, or information assurance in general, is _defense in depth_ , which means setting up multiple layers of protection. In the end, your mind may be more at ease simply knowing that, if all else fails, there's always a copy of your data somewhere else, safe and sound. # Backup via Imaging A cloud provider lets you create an image of any instance. So, why not just create images of each instance in a cluster as your backup? This can work as a backup scheme, but it has a good number of drawbacks. Among them: * The cluster components must be shut down, and often its instances stopped, in order to have a stable basis for imaging. * An image must be made of every cluster instance, because they hold unique combinations of data and have unique configurations. Therefore, this technique does not scale well to large clusters. * On restoration, all private and public IP addresses will most likely be different, so some reconfiguration work is still necessary. SSH access also needs to be updated. * The images include files from the operating system and installed software, none of which is strictly necessary for backing up a cluster. So, a lot of space is wasted. * Some of the data stored in the cluster may not need to be backed up, such as checkpoint data written in the middle of a larger workflow. So, even more space is wasted. Few situations call for this form of cluster backup. Moving an entire cluster as is from, say, one region to another could be accomplished in this fashion, and that may be easier than using a selective backup scheme to manage what data needs to be copied over. A cluster that is highly critical, and whose configuration is fragile, may need to be backed up this way, because any other technique would be too risky. However, it is much better not to get yourself into the position where backup via imaging is your only option. Instead, migrate to using base images plus automation to create clusters that can do the necessary work, and adopt transient clusters to prevent buildup of one-off configuration changes and vital data stored only in running clusters. Rely on whole-cluster imaging only for extenuating circumstances. # HDFS Replication A common pattern for backing up a Hadoop cluster is to maintain a _disaster recovery_ (DR) cluster, configured in much the same way as the original, primary cluster. The DR cluster could serve merely as a receptacle for the data that normally resides in the primary cluster, so that at recovery time the data must be copied back to a new operational cluster. Alternatively, the DR cluster could be fully capable of taking over workloads for the primary cluster, as a complete failover system. The copying of HDFS data from one cluster to another is normally performed by the `distcp` tool, which ships with Hadoop itself, and cloud clusters are no different. You only need the IP addresses or hostnames of the namenodes in the source (primary) and destination (DR) cluster: $ hadoop distcp hdfs://203.0.113.101:9820/datadir \ > hdfs://203.0.113.201:9820/datadir Consult the `distcp` documentation for information on the available options, like `-update` and `-overwrite`, that affect where and how files are copied over. Network connectivity is an important factor to consider when using `distcp`. `distcp` requires that the YARN node managers executing the copy be able to reach both the source and destination filesystems; so, network security rules that apply to the clusters must allow the communication. It's simplest for both clusters to reside in the same subnet, where unrestricted connectivity is the norm. However, since this is a backup scenario, you may wish to host the DR cluster in a separate network location, such as a separate region, so that it's less likely that it will experience an outage when the primary does. If so, check the security rules, and attempt a run or two of `distcp` to be sure that it works. A related factor here is cost. Data transfer within an availability zone is generally free, but there can be costs associated with traversing availability zones and regions. Costs are especially important to consider if the DR cluster sits outside the cloud provider entirely. You must strike a balance between the costs incurred for performing HDFS replication, where the DR cluster resides, and how often replication runs. For example, you could replicate more often to a DR cluster hosted in a different availability zone, but replicate to another DR cluster in a separate region less often. ## Cloud Storage Filesystems `distcp` takes in Hadoop filesystem URLs as arguments, so it can work with filesystem implementations that are backed by cloud provider storage services: S3 for AWS, Google Cloud Storage for Google Cloud Platform, and Azure Blob Storage or Azure Data Lake Store for Azure. For example, once the s3a filesystem is installed as described in "Configuring the S3 Filesystem", you can back up HDFS data to S3 directly: $ hadoop distcp hdfs://203.0.113.101:9820/datadir s3a://mybackupbucket/datadir This does not require a DR cluster running to work. Storage costs are significantly lower for object storage than for the block storage associated with cluster instances, and you also save on the cost of running the cluster instances themselves. The backup and replication guarantees for object storage may also be stronger than for block storage. In the case of primary cluster failure, however, you will need to not only stand up a new cluster, but copy the data out of object storage to it. So recovery time may be affected. Once again, there is a balance to be achieved, based on your goals. ## HDFS Snapshots The `distcp` tool can take a long time to run. It needs to assemble a list of files to copy, as well as run the mappers that take time to perform the copies. During this time, changes can be written to HDFS, which causes inconsistency between the set of original files and the set of backed up files. To avoid this problem, HDFS snapshots can be backed up instead of the live data. The `distcp` tool provides some performance optimizations based on analysis of the difference between snapshots. These can not just make the tool run faster, but also lead it to copy less data, an advantage that directly maps to lower cost for cloud data transfer: # initial backup as snapshot $ hdfs dfs -createSnapshot /datadir 101 $ hadoop distcp hdfs://203.0.113.101:9820/datadir/.snapshot/101 \ > hdfs://203.0.113.201:9820/datadir # make snapshot 101 in other cluster # next backup compares snapshots $ hdfs dfs -createSnapshot /datadir 102 $ hadoop distcp -update -diff 101 102 hdfs://203.0.113.101:9820/datadir \ > hdfs://203.0.113.201:9820/datadir The HDFS snapshot documentation explains how to enable, perform, and manage HDFS snapshots. # Hive Metastore Replication HDFS data isn't the only important data to preserve in a cluster. The Hive metastore, which stores mapping information for tabular data accessed by Hive and other Hadoop components, also needs to be backed up, so that those components can be recovered without having to reconfigure them from scratch. If you are using a local metastore, then its data is stored in HDFS, and HDFS replication is sufficient to back it up. Otherwise, if you are using a remote metastore, then some database server outside the cluster houses the metastore database, and it's that database that you must back up. Fortunately, if you are using your cloud provider's cloud database service to host your remote metastore, there is not much that you need to do yourself. You don't need to directly manage the instance hosting the database server; in fact, it's hidden from you, cared for completely by the provider. Database backups, replication, and failover are all handled as well. For cost and speed reasons, the metastore should reside within the cloud provider anyway, so for all these reasons, you should use a cloud database to host a Hive metastore, and delegate the work of backups. # Logs A complete backup regime for a cluster should include saving off logs for key daemons and for applications that run alongside the cluster. With logs backed up, it becomes easier to reconstruct whatever problems led to having to perform a restoration. Because cloud providers reclaim resources for other customers to use after you stop using them, deep forensic analysis of failures becomes impossible without your own log backups. For easier analysis and reconstruction, you may also want to enable audit logging for those components that support it, such as HDFS and Hive. Audit logs are more suited for analysis and reconstruction attempts than the usual daemon logs. Consult the documentation for each Hadoop component to learn about its auditing capability. Alternatively, you can deploy a separate application that supports auditing of Hadoop clusters, and use its capability to safely store audit logs. Logs generally do not need to be restored into clusters, so there are more options for where they can be saved. A great choice is to use your cloud provider's monitoring service; see "Monitoring Choices" for an overview. The services are efficient and include search and filter capabilities for easier analysis. "Ingesting Logs into CloudWatch" demonstrates how to set up AWS CloudWatch to ingest an HDFS namenode log as an example. Another option available in the cloud is to copy log data into an object storage service. You do not gain the benefits of search and monitoring, but you may save on cost. Since logs rarely need to be analyzed, they can be sent to "cold" storage tiers, where costs are even lower. Suppose all of the Hadoop logs that should be saved are in _/var/log/hadoop_. If you are running in AWS or Google Cloud Platform, you can use their respective CLIs to efficiently send new and updated files to a storage bucket: # AWS $ aws s3 sync /var/log/hadoop s3://myhadooplogs # Google Cloud Platform $ gsutil rsync -r /var/log/hadoop gs://myhadooplogs At the time of this writing, there is no equivalent command in the Azure CLI. You can use the CLI to copy individual files via the `azure storage file upload` command, but this does not skip files that are unchanged. A more efficient alternative is to use Azure File storage to mount a file share on the relevant cluster instances, and then employ the standard `rsync` command to perform backups. Consult the Azure File storage for Linux documentation to learn how to create a file share and mount it on a Linux virtual machine. # A General Cloud Hadoop Backup Strategy Your task as the maintainer of critical Hadoop clusters is to combine the usual options for backup with those available in the cloud into a strategy that meets the needs of your organization and the requirements associated with the data the clusters operate on. Every organization is different, but here are some general pointers that can form the seed of your own strategy: * Identify cluster data that must be backed up, distinct from transient data that can easily be regenerated. Have jobs work with the first set in areas separate from the second set, so that it's easier to target backups. * Adjust workflows for cloud clusters so that critical data needn't reside in the clusters for long, preferring to save long-term results in object storage services or elsewhere. This reduces the risk of clusters failing and the need to restore backups. * Designate destination storage for backups, either in DR clusters or object storage services. Make sure that security rules restrict access to protect the data within them, but also allow for backup processes to reach them and write data. * Establish regular backups, and monitor them so they cannot silently stop working. Use cloud services to set alarms if backups stop occurring. * Improve the speed and reliability of the process for standing up Hadoop clusters, using images and automation as much as possible, so that restoring from backup takes a reasonable amount of time. * Practice performing restoration. The time to discover that a backup is incomplete or a restoration process is faulty is not when you need to restore a critical cluster. Regular practice of restoration increases confidence in the backup strategy and leads to faster recovery times. * Delegate backup responsibilities to cloud services where possible. Your cloud provider has powerful backup, availability, and failover capabilities managed by experts ready for you to use. # Not So Different, But Better You may notice that some of the advice in this chapter, like identifying the essential data for backup and practicing cluster restoration, is not specific to clusters running on a cloud provider. You should employ the techniques no matter where your clusters are. The key idea is that, in the cloud, there are services at your disposal that can augment your typical practices. It's one of the most important reasons to move your clusters to the cloud, for it opens up a vast array of resources and versatile services that may be difficult or impossible to create in your organization's own data centers. You don't need to create a robust, resilient, geographically dispersed storage system. You don't need to rig up a network that is flexible to configure yet straightforward to secure. You don't even need to directly manage database servers. All of these responsibilities, and more, are handled by your cloud provider. You just need to figure out how best to take advantage of them. This doesn't apply just to performing backups, but to every aspect of cluster management. When you begin moving Hadoop clusters to the cloud, it's natural to start with the processes you are already familiar with, and that works. As you grow more comfortable and you explore cloud provider capabilities, those processes can morph and expand, perhaps beginning with a focused change or two, but eventually moving on to embracing provider services to fundamentally change how you manage clusters. This indeed can make cluster management easier and more satisfying, but it also opens up new ways of working for your organization, so you can use clusters to answer questions you couldn't before, and move faster and with more confidence. The reason to adopt a new technology then, like the cloud, is not merely to check a box. It's to advance to a higher state of functioning, which could be speed, or quantity, or complexity, or quality. The public cloud providers have provided the means to get there; it's a matter of learning about them and building on them. # To the Cloud When you look up at a cloud, it seems simple enough, and not so mysterious. But when you are in an airplane flying through one, you can barely see anything outside of your window, and the ride gets bumpy. So it is with "the cloud": It doesn't appear that complicated at first, but once you're inside it, it's easy to lose sight of where you are and hard to figure out which way to go. For moving your Hadoop clusters to the cloud, this book's goal is to be like radar, helping you discern the shape of your cloud provider and all its services, and the path through it to get your clusters up and running. Providers are ever-changing, but with enough experience, your piloting skills will be enough to see you through, as both Hadoop and the cloud continue into the future. Both of these components include an audit logger in their Log4J properties. There is an AzCopy utility that can perform copies to Azure Storage, but it works only on Windows. # Appendix A. Hadoop Component Start and Stop Scripts Some Hadoop components, like HDFS and YARN, ship with management scripts that let you start and stop all of their component daemons or servers in one command. Others do not. The scripts here fill those gaps. ###### Tip Code is available at this book's code repository. # Apache ZooKeeper The script in Example A-1 starts and stops Apache ZooKeeper servers, assuming each one is running on a worker instance in the cluster. It should be installed on the manager instance and run under the "zk" account, or any account that has passwordless SSH access to an account on each worker that may control ZooKeeper. ##### Example A-1. Control script for Apache ZooKeeper #!/usr/bin/env bash if [[ -z $1 ]]; then echo "Syntax: $0 (start|stop|status)" exit fi # Assumption is that each "slave" hosts a ZooKeeper server SLAVES=( $(cat /etc/hadoop/slaves) ) case "$1" in start) echo Starting ZooKeeper for s in "${SLAVES[@]}"; do ssh "$s" /opt/zookeeper/bin/zkServer.sh start done ;; stop) echo Stopping ZooKeeper for s in "${SLAVES[@]}"; do ssh "$s" /opt/zookeeper/bin/zkServer.sh stop done ;; status) echo Checking ZooKeeper status for s in "${SLAVES[@]}"; do ssh "$s" /opt/zookeeper/bin/zkServer.sh status done ;; esac # Apache Hive The scripts in Examples A-2 and A-3 start and stop the Hive server (HiveServer2) and the Hive metastore server, respectively. They should be installed on an instance where Hive is installed, usually a manager, under an account such as "hive" that has permission to run Hive components. The scripts do not require any remote connectivity. Ensure that the value of `SPARK_HOME` in the scripts points to a version of Spark that is compatible with Hive. ##### Example A-2. Control script for Apache Hive server #!/usr/bin/env bash if [[ -z $1 ]]; then echo "Syntax: $0 (start|stop|status)" exit fi # Define enviroment variables Hive expects export HADOOP_HOME=/opt/hadoop export HIVE_HOME=/opt/hive export SPARK_HOME=/opt/spark export PATH=${HIVE_HOME}/bin:${HADOOP_HOME}/bin:$PATH export HADOOP_CONF_DIR=/etc/hadoop HS2_PID_DIR=/var/run/hadoop HS2_PID_FILE="${HS2_PID_DIR}"/hs2.pid case "$1" in start) echo Starting HiveServer2 "${HIVE_HOME}"/bin/hiveserver2 & PID=$! echo "${PID}" > "${HS2_PID_FILE}" echo "HiveServer2 started [${PID}]" ;; stop) if [[ ! -f "${HS2_PID_FILE}" ]]; then echo HiveServer2 not running exit fi echo Stopping HiveServer2 kill "$(cat "${HS2_PID_FILE}")" ;; status) if [[ ! -f "${HS2_PID_FILE}" ]]; then echo Pid file for HiveServer2 not found exit 1 fi PID=$(cat "${HS2_PID_FILE}") if kill -0 "${PID}" 2>/dev/null; then echo "HiveServer2 is running [${PID}]" else echo "HiveServer2 is not running" fi ;; esac ##### Example A-3. Control script for Apache Hive metastore server #!/usr/bin/env bash if [[ -z $1 ]]; then echo "Syntax: $0 (start|stop|status)" exit fi # Define enviroment variables Hive expects export HADOOP_HOME=/opt/hadoop export HIVE_HOME=/opt/hive export SPARK_HOME=/opt/spark export PATH=${HIVE_HOME}/bin:${HADOOP_HOME}/bin:$PATH export HADOOP_CONF_DIR=/etc/hadoop HIVEMETA_LOG_DIR=/var/log/hive HIVEMETA_PID_DIR=/var/run/hadoop HIVEMETA_PID_FILE="${HIVEMETA_PID_DIR}"/hivemeta.pid PORT=9083 case "$1" in start) echo Starting Hive Metastore Server hive --service metastore -p ${PORT} > ${HIVEMETA_LOG_DIR}/metastore.log & PID=$! echo "${PID}" > "${HIVEMETA_PID_FILE}" echo "Hive Metastore Server started [${PID}]" ;; stop) if [[ ! -f "${HIVEMETA_PID_FILE}" ]]; then echo Hive Metastore Server not running exit fi echo Stopping Hive Metastore Server kill "$(cat "${HIVEMETA_PID_FILE}")" ;; status) if [[ ! -f "${HIVEMETA_PID_FILE}" ]]; then echo Pid file for Hive Metastore Server not found exit 1 fi PID=$(cat "${HIVEMETA_PID_FILE}") if kill -0 "${PID}" 2>/dev/null; then echo "Hive Metastore Server is running [${PID}]" else echo "Hive Metastore Server is not running" fi ;; esac # Appendix B. Hadoop Cluster Configuration Scripts To speed up the creation of Hadoop clusters in the cloud, you can create an image for one or more representative cluster instances with software already installed and, for the most part, configured. Chapter 16 describes the process. Still, there are configuration steps that can only be done once the cluster instances are running, and the scripts here can automate the work. A quick glance at the scripts should reveal that even this small slice of automation is not trivial. You might consider borrowing the techniques used here and implementing them using a different scripting language or framework. Central to them is the ability to establish SSH connections into and within the cluster, so look for frameworks that help in that regard, such as Fabric. ###### Tip Code is available at this book's code repository. # SSH Key Creation and Distribution The Hadoop installation process in Chapter 9 and elsewhere includes the creation of user accounts specific to services like HDFS, YARN, and ZooKeeper. Those accounts can already be in place in an image, but for greater security they should be configured with unique SSH keys, so that instances in one cluster cannot access instances in other clusters that were built from the same image. The Bash script in Example B-1 can be run from your local computer to orchestrate the creation of SSH key pairs on the manager instance of a Hadoop cluster for each Hadoop account, and the distribution of public keys to the manager instance and worker instances. ##### Example B-1. SSH key pair creation and distribution script #!/usr/bin/env bash # Generates SSH key pairs for accounts on one instance (manager), and distributes # public keys to that instance and other instances (workers). DEFAULT_ACCOUNTS=( ubuntu hdfs yarn zk ) usage() { cat << EOF usage: $0 options manager-ips worker1-ips ... OPTIONS: -a accts Accounts to configure (default ${DEFAULT_ACCOUNTS[*]}) Specify as space-separated list, e.g., "acct1 acct2 acct3" -G Do not generate new SSH key pairs; use what is already available -i file Identity file for SSH connections to manager -u user User for SSH connections to manager -h Shows this help message Run this script on a machine that can connect to the manager instance via SSH. The user account on the manager instance must have passwordless sudo access. Pass the public and private IP addresses for each instance in the cluster as a colon-separated pair, e.g., 203.0.113.101:192.168.1.101. EXAMPLE: $0 -a "hdfs yarn" -i /path/to/key.pem -u ubuntu \\ 203.0.113.101:192.168.1.101 \\ 203.0.113.102:192.168.1.102 \\ 203.0.113.103:192.168.1.103 \\ 203.0.113.104:192.168.1.104 EOF } ACCOUNTS=( "${DEFAULT_ACCOUNTS[@]}" ) DO_NOT_GENERATE= SSH_IDENTITY= SSH_USER= while getopts "a:Gi:u:h" opt do case $opt in h) usage exit 0 ;; a) ACCOUNTS=( $OPTARG ) ;; G) DO_NOT_GENERATE=1 ;; i) SSH_IDENTITY="$OPTARG" ;; u) SSH_USER="$OPTARG" ;; ?) usage exit ;; esac done shift $((OPTIND - 1)) if (( $# < 2 )); then echo "Supply the manager private IP address and at least one worker IP address" usage exit 1 fi if [[ ${#ACCOUNTS[@]} == 0 ]]; then echo "No accounts specified" usage exit 1 fi # Find manager IP addresses: "public IP:private IP" MANAGER_PUBLIC_IP="${1%%:*}" MANAGER_PRIVATE_IP="${1##*:}" shift # Collect remaining IP address pairs for workers WORKER_IPS=( "$@" ) NUM_WORKERS=${#WORKER_IPS[@]} MANAGER_HOSTNAME="$(hostname --fqdn)" echo "Manager public IP: $MANAGER_PUBLIC_IP" echo "Manager private IP: $MANAGER_PRIVATE_IP" echo "Manager hostname: $MANAGER_HOSTNAME" echo "${NUM_WORKERS} worker IPs: ${WORKER_IPS[*]}" echo "Accounts: ${ACCOUNTS[*]}" # Construct the SSH command with the provided identity file and username SSH_CMD=( ssh ) if [[ -n $SSH_IDENTITY ]]; then SSH_CMD+=( -i "$SSH_IDENTITY" ) fi if [[ -n $SSH_USER ]]; then SSH_CMD+=( -o "User=$SSH_USER" ) fi # For each account ... for acct in "${ACCOUNTS[@]}"; do # Note whether this account is the one used for SSH connections by this script if [[ -n $SSH_USER && "$acct" == "$SSH_USER" ]]; then issshuser=1 else issshuser= fi echo if [[ -z $DO_NOT_GENERATE ]]; then # Generate a key pair on the manager instance using ssh-keygen echo "[$acct] Generating manager SSH key pair" "${SSH_CMD[@]}" -t "${MANAGER_PUBLIC_IP}" "sudo -u \"$acct\" ssh-keygen" \ "-t rsa -b 2048 -f /home/$acct/.ssh/id_rsa -N ''" # Copy the new public key to the authorized_keys file on the manager # - If this account is the one being used by this script, then just # append it to authorized_keys, don't outright replace the file echo "[$acct] Copying public SSH key to authorized_keys on manager" if [[ -n $issshuser ]]; then "${SSH_CMD[@]}" -t "${MANAGER_PUBLIC_IP}" \ "sudo cat /home/$acct/.ssh/id_rsa.pub | sudo -u \"$acct\"" \ "tee -a /home/$acct/.ssh/authorized_keys > /dev/null" else "${SSH_CMD[@]}" -t "${MANAGER_PUBLIC_IP}" \ "sudo cat /home/$acct/.ssh/id_rsa.pub | sudo -u \"$acct\"" \ "tee /home/$acct/.ssh/authorized_keys > /dev/null" fi # Set the permissions for authorized_keys appropriately "${SSH_CMD[@]}" -t "${MANAGER_PUBLIC_IP}" \ "sudo chmod 600 /home/$acct/.ssh/authorized_keys" else echo "[$acct] Skipping manager SSH key pair generation" fi # Get the new public key echo "[$acct] Retrieving public SSH key" pubkey="$( "${SSH_CMD[@]}" -t "${MANAGER_PUBLIC_IP}" \ "sudo cat /home/$acct/.ssh/id_rsa.pub" )" echo "[$acct] Public key contents:" echo "----" echo "$pubkey" echo "----" # For each worker ... for worker_ips in "${WORKER_IPS[@]}"; do # Write the public key to the authorized_keys file on the worker, creating # it and its directory if necessary # - Again, just append to the file if the account is being used here worker=${worker_ips%%:*} echo echo "[$acct] Installing public SSH key on $worker" "${SSH_CMD[@]}" -t "${worker}" \ "sudo -u \"$acct\" mkdir -p -m 0700 /home/$acct/.ssh" "${SSH_CMD[@]}" "${worker}" "cat >> /tmp/pubkey" <<< "$pubkey" if [[ -n $issshuser ]]; then "${SSH_CMD[@]}" -t "${worker}" "sudo cat /tmp/pubkey | sudo -u \"$acct\"" \ "tee -a /home/$acct/.ssh/authorized_keys > /dev/null" else "${SSH_CMD[@]}" -t "${worker}" "sudo cat /tmp/pubkey | sudo -u \"$acct\"" \ "tee /home/$acct/.ssh/authorized_keys > /dev/null" fi "${SSH_CMD[@]}" -t "${worker}" "sudo chmod 600 /home/$acct/.ssh/authorized_keys" "${SSH_CMD[@]}" "${worker}" "rm /tmp/pubkey" done # Connect from the manager instance to itself and each worker so that the # new host keys are accepted now; this avoids being asked interactively later echo echo "[$acct] Connecting to each cluster instance from manager to" \ "accept host keys" if [[ -n $MANAGER_HOSTNAME ]]; then "${SSH_CMD[@]}" -t "${MANAGER_PUBLIC_IP}" "sudo -u \"$acct\"" \ "ssh -o StrictHostKeyChecking=no \"$MANAGER_HOSTNAME\" date > /dev/null" fi "${SSH_CMD[@]}" -t "${MANAGER_PUBLIC_IP}" "sudo -u \"$acct\"" \ "ssh -o StrictHostKeyChecking=no \"$MANAGER_PRIVATE_IP\" date > /dev/null" "${SSH_CMD[@]}" -t "${MANAGER_PUBLIC_IP}" "sudo -u \"$acct\"" \ "ssh -o StrictHostKeyChecking=no 0.0.0.0 date > /dev/null" for worker_ips in "${WORKER_IPS[@]}"; do worker=${worker_ips##*:} # connect from manager to private IP of worker "${SSH_CMD[@]}" -t "${MANAGER_PUBLIC_IP}" "sudo -u \"$acct\"" \ "ssh -o StrictHostKeyChecking=no \"$worker\" date > /dev/null" done done # Configuration Update Script The bash script in Example B-2 handles substituting cluster instance private IP addresses for tokens placed into various Hadoop configuration files, as suggested in "Image Preparation". The script is run on the manager instance (and, for HA clusters, on the second manager instance as well) and handles configuration on that instance as well as worker instances. ##### Example B-2. Hadoop configuration update script #!/usr/bin/env bash # Configures Hadoop components on a manager instance and one or more worker # instances. usage() { cat << EOF usage: $0 options manager-ip worker-ip ... OPTIONS: -d <name> Hostname of database server hosting Hive metastore -a <keys> AWS access key and secret access key, separated by a colon -H Initialize for second manager (for HA cluster) -m <ip> IP address of second manager (for HA cluster) -h Shows this help message For an HA cluster, run this script on the first manager with -m, and then on the second manager with -m and -H. Use the same manager IP addresses on each manager; do not reverse them when running on the second manager. The user account on each manager must have passwordless sudo access. EOF } HIVE_DB_SERVER= AWS_ACCESS_KEY= AWS_SECRET_KEY= ON_SECOND_MANAGER= MANAGER2_IP= while getopts "a:d:hHm:" opt do case $opt in h) usage exit 0 ;; a) AWS_ACCESS_KEY="${OPTARG%%:*}" AWS_SECRET_KEY="${OPTARG##*:}" ;; d) HIVE_DB_SERVER="$OPTARG" ;; H) ON_SECOND_MANAGER=1 ;; m) MANAGER2_IP="$OPTARG" ;; ?) usage exit ;; esac done shift $((OPTIND - 1)) if (( $# < 2 )); then echo "Supply the manager private IP address and at least one worker IP address" usage exit 1 fi if [[ -n $ON_SECOND_MANAGER && -z $MANAGER2_IP ]]; then echo "When running on second manager, -m is required" usage exit 1 fi # Collect required IP addresses: manager and workers MANAGER_IP="$1" shift WORKER_IPS=( "$@" ) NUM_WORKERS=${#WORKER_IPS[@]} echo "Manager IP: $MANAGER_IP" if [[ -n $MANAGER2_IP ]]; then echo "HA Manager IP: $MANAGER2_IP" fi echo "${NUM_WORKERS} worker IPs: ${WORKER_IPS[*]}" echo # Replaces a ${token_string} in a file with a value swap_in() { local f="$1" local token_name="$2" local repl="$3" local token='\${'"${token_name}"'}' sudo sed -i "s/${token}/${repl}/g" "$f" } echo echo "Substituting IP addresses and hostnames into Hadoop configurations" echo # Replace in core-site.xml files: manager.ip, worker<i>.ip echo "- /etc/hadoop/core-site.xml" swap_in /etc/hadoop/core-site.xml manager.ip "${MANAGER_IP}" for i in $(seq 1 "$NUM_WORKERS"); do w="${WORKER_IPS[$(( i - 1 ))]}" swap_in /etc/hadoop/core-site.xml "worker${i}.ip" "$w" done # Replace in yarn-site.xml files: manager.ip, manager2.ip, worker<i>.ip echo "- /etc/hadoop/yarn-site.xml" swap_in /etc/hadoop/yarn-site.xml manager.ip "${MANAGER_IP}" swap_in /etc/hadoop/yarn-site.xml manager2.ip "${MANAGER2_IP}" for i in $(seq 1 "$NUM_WORKERS"); do w="${WORKER_IPS[$(( i - 1 ))]}" swap_in /etc/hadoop/yarn-site.xml "worker${i}.ip" "$w" done if [[ -n $ON_SECOND_MANAGER ]]; then # Change YARN RM HA ID to rm2 on the second manager sudo sed -i 's/<value>rm1</<value>rm2</' /etc/hadoop/yarn-site.xml echo fi # Write slaves file based on known worker IP addresses echo "- /etc/hadoop/slaves" printf '%s\n' "${WORKER_IPS[@]}" | sudo tee /etc/hadoop/slaves > /dev/null # Replace in zoo.cfg files: worker<i>.ip echo "- /opt/zookeeper/conf/zoo.cfg" for i in $(seq 1 "$NUM_WORKERS"); do w="${WORKER_IPS[$(( i - 1 ))]}" swap_in /opt/zookeeper/conf/zoo.cfg "worker${i}.ip" "$w" done # Replace in hive-site.xml: manager.ip, dbserver.name echo "- /opt/hive/conf/hive-site.xml" if [[ -z $ON_SECOND_MANAGER ]]; then swap_in /opt/hive/conf/hive-site.xml manager.ip "${MANAGER_IP}" else swap_in /opt/hive/conf/hive-site.xml manager.ip "${MANAGER2_IP}" fi if [[ -n $HIVE_DB_SERVER ]]; then swap_in /opt/hive/conf/hive-site.xml dbserver.name "${HIVE_DB_SERVER}" fi echo echo "IP address and hostname substitutions complete" if [[ -n $AWS_ACCESS_KEY ]]; then echo echo "Substituting AWS keys into Hadoop configurations" echo # Replace in core-site.xml: AWS keys echo "- /etc/hadoop/core-site.xml" swap_in /etc/hadoop/core-site.xml aws.access.key "${AWS_ACCESS_KEY}" swap_in /etc/hadoop/core-site.xml aws.secret.key "${AWS_SECRET_KEY}" echo echo "AWS key substitutions complete" fi if [[ -z $ON_SECOND_MANAGER ]]; then echo echo "Copying configurations out to workers" WORKER_FILES=(/etc/hadoop/core-site.xml /etc/hadoop/yarn-site.xml /opt/zookeeper/conf/zoo.cfg) # Copy out configuration files to each worker for w in "${WORKER_IPS[@]}"; do echo "- $w" scp "${WORKER_FILES[@]}" "$w":. for f in "${WORKER_FILES[@]}"; do ssh "$w" sudo cp "$(basename "$f")" "$f" done done # If configuring for HA (and running on first manager), remove # yarn.resourcemanager.ha.id from worker copies of yarn-site.xml if [[ -n $MANAGER2_IP ]]; then echo echo "Removing YARN RM HA ID from workers" for w in "${WORKER_IPS[@]}"; do echo "- $w" ssh "$w" sudo sed -i \ '/\<name\>yarn.resourcemanager.ha.id\</,/\<property\>/d' \ /etc/hadoop/yarn-site.xml done fi # Create ZooKeeper myid files, assigning a unique number per worker echo echo "Creating ZooKeeper myid files on workers" for i in $(seq 1 "$NUM_WORKERS"); do w="${WORKER_IPS[$(( i - 1 ))]}" echo "- $w" echo "$i" | ssh "$w" "sudo tee /var/lib/zookeeper/myid > /dev/null" done fi ## New Worker Configuration Update Script When adding a new worker to an existing cluster, only a small amount of configuration is needed compared to what's done for an entire new cluster. The script in Example B-3 is a cut-down form of the previous script that works for most kinds of new worker instances, such as those hosting an HDFS datanode or a YARN node manager. See "Elastic Compute Using a Custom Metric" for how a script like this can help implement the automatic addition of workers to a busy cluster. ##### Example B-3. Hadoop configuration update script for a new worker #!/usr/bin/env bash # Configures Hadoop components on a new worker instance. usage() { cat << EOF usage: $0 new-worker-ip worker-ip ... Run this script on a manager. EOF } if (( $# < 2 )); then echo "Supply the new worker private IP address and at least one" \ "(old) worker IP address" usage exit 1 fi # Collect required IP addresses: this worker, and other workers NEW_WORKER_IP="$1" shift WORKER_IPS=( "$@" ) WORKER_IPS+=( "$NEW_WORKER_IP" ) NUM_WORKERS=${#WORKER_IPS[@]} echo "New worker IP: $NEW_WORKER_IP" echo "${NUM_WORKERS} worker IPs: ${WORKER_IPS[*]}" echo echo echo "Substituting IP addresses and hostnames into Hadoop configurations" echo # Rewrite slaves file based on known worker IP addresses echo "- /etc/hadoop/slaves" printf '%s\n' "${WORKER_IPS[@]}" | sudo tee /etc/hadoop/slaves > /dev/null echo echo "IP address and hostname substitutions complete" # Copy out configuration files to the new worker echo echo "Copying configurations out to new worker" WORKER_FILES=(/etc/hadoop/core-site.xml /etc/hadoop/yarn-site.xml /opt/zookeeper/conf/zoo.cfg) echo "- copy to $NEW_WORKER_IP" scp "${WORKER_FILES[@]}" "$NEW_WORKER_IP":. for f in "${WORKER_FILES[@]}"; do echo "- put $f in place" ssh "$NEW_WORKER_IP" sudo cp "$(basename "$f")" "$f" done # Appendix C. Monitoring Cloud Clusters with Nagios Nagios is a popular system for monitoring infrastructure. It can monitor networks, hardware, and applications using its built-in capabilities along with a plug-in architecture. Nagios is more than capable of monitoring cloud clusters for you, and a great choice if you are already familiar with the tool. It can be configured with custom checks that work with cloud provider infrastructures, Hadoop components, or anything else you can think of. ###### Tip Code is available at this book's code repository. # Where Nagios Should Run As discussed in "Hadoop Daemon Status", there are benefits and drawbacks for running a monitoring system within a cloud provider or outside it. These considerations apply to where Nagios runs as well. If you opt to run Nagios outside the cloud provider and outside a VPN with privileged access to the network where the Hadoop cluster runs, you must then loosen security rules to permit Nagios to reach all of the ports necessary for effective cluster monitoring. Also, unless you assign static public IP addresses to your instances, you will need to edit the Nagios configuration as those addresses change over time. # Instance Existence Through Ping Nagios normally checks if instances exist by attempting to ping them. The security rules set up in your cloud provider may block ping traffic, especially if it is running outside the cloud provider. You have the option of redefining the standard existence check, but you could instead simply permit ping traffic from where Nagios runs. For EC2 instances running in AWS, add a new inbound rule to the security group containing the cluster to permit pings to enter: * Type: Custom ICMP Rule (IPv4) * Protocol: Echo Request * Port Range: N/A * Source: An appropriate IP range to cover your Nagios installation The default firewall rules set up in Google Cloud Platform include one that permits ICMP traffic. Edit the rule if necessary to cover your Nagios installation. Azure as a whole disallows all ICMP traffic, so pinging a virtual machine in Azure from an outside location such as the internet is not possible. The alternative is to set up a service listening on a TCP or UDP port and check for a response from that port instead. In the host definition for each Azure virtual machine, specify a command for the `check_command` value that itself uses either `check_tcp` or `check_udp` to attempt to connect to your chosen port. For example, if you choose TCP port 55555 as the port to check, first add a new inbound security rule to the network security group containing the cluster to permit TCP traffic over that port: * Source: A CIDR block with an appropriate IP range covering your Nagios installation * Service: Custom * Protocol: TCP * Port range: 55555 * Action: Allow Set up a service listening on port 55555 on each Azure instance. You have many options here, and perhaps the simplest is to use netcat, which can listen on a TCP port for arbitrary traffic. The `-k` option allows netcat to continue running after each connection from Nagios, instead of terminating after the first one: nc -k -l 55555 > /dev/null & With this command running on a virtual machine, the following `check_command` in its host definition will configure Nagios to check port 55555 to verify that the instance is up, instead of pinging it: check_command check_tcp!55555 A functioning TCP port check is shown in Figure C-1. ###### Figure C-1. Checking TCP port connectivity in Nagios for an Azure VM # Hosts and Host Groups Create a host definition in Nagios for each instance in the Hadoop cluster. As usual, prefer using the private IP address for each instance for security and performance reasons. For ease of tracking, use the cloud provider's name for each instance for the `host_name` and/or `alias` of its corresponding host definition. Every instance in the cluster can be corralled into a single host group representing the cluster. It is also helpful to create host groups for each instance role (see "General Cluster Instance Roles") since each role has common characteristics and performance expectations; this makes it easier to target service checks appropriately. For example, if a host group covers all of the worker instances in a cluster, then service checks concerning HDFS datanode disk usage or YARN node manager utilization can be targeted only at those instances. Nagios allows you to define custom variables for objects. To support service checks involving the cloud provider, define custom variables for each host to convey provider-specific identification. Here is an example of host and host group definitions for a small Hadoop cluster on AWS. The custom variable `_INSTANCEID` holds the EC2 instance ID for each instance: define host { use linux-server host_name manager alias manager address 203.0.113.101 _INSTANCEID i-12345678901234567 } define host { use linux-server host_name worker1 alias worker1 address 203.0.113.102 _INSTANCEID i-23456789012345678 } define host { use linux-server host_name worker2 alias worker2 address 203.0.113.103 _INSTANCEID i-34567890123456789 } define host { use linux-server host_name worker3 alias worker3 address 203.0.113.104 _INSTANCEID i-45678901234567890 } define hostgroup { hostgroup_name mycluster alias My Cluster members manager,worker1,worker2,worker3 } define hostgroup { hostgroup_name mycluster_workers alias My Cluster Workers members worker1,worker2,worker3 } Figure C-2 shows how the defined host groups appear in the Nagios web interface. ###### Figure C-2. Host groups for a Hadoop cluster in Nagios # Services and Service Groups The usual Nagios checks for system health apply to cloud cluster instances. To check on the health of Hadoop daemons, the `check_tcp` service check works in a similar fashion to netcat for determining if a daemon is listening on a port. For example, to verify that a namenode is running, check on port 8020: define service { use generic-service host_name manager service_description HDFS Namenode servicegroups HDFS check_command check_tcp!8020 } A service group can collect together all of the service checks relevant to a Hadoop component, so that it is possible to assess the overall health of that component in one spot. Example service groups for a few Hadoop components are shown in Figure C-3. ###### Figure C-3. Service groups for a Hadoop cluster in Nagios # Provider CLI Integration It is not difficult to define your own scripts for use as Nagios plug-ins. Such a script can perform a specific call to the provider based on host information, interpret the results, and then return one of the expected exit codes that Nagios interprets as the outcome of the service check. Nagios requires a functioning CLI installation to use such scripts, which implies that Nagios has access to credentials for an account on the cloud provider. It's therefore important to restrict the permissions on the account, in the event that the credentials are compromised, and also to prevent badly behaving Nagios plug-ins from interfering with cluster operations. Suppose that a Hadoop cluster is running in AWS, and you want a Nagios service check that looks at the instance status of each host. Start by creating a script that uses the `describe-instance-status` command to retrieve the status information. The command requires an instance ID, and so Nagios can pass that information from the custom variable associated with the host being checked. In Example C-1, the host is passed as an ordinary script argument. ##### Example C-1. A Nagios script for checking the status of an EC2 instance #!/usr/bin/env bash usage() { cat << EOF usage: $0 options instance-id OPTIONS: -p <profile> AWS profile (no default) -h Shows this help message EOF } PROFILE= while getopts "p:h" opt do case $opt in h) usage exit 3 # UNKNOWN ;; p) PROFILE="$OPTARG" ;; ?) usage exit 3 # UNKNOWN ;; esac done shift $((OPTIND - 1)) INSTANCE_ID="$1" CMD=(aws) if [[ -n $PROFILE ]]; then CMD+=(--profile "$PROFILE") fi CMD+=(ec2 describe-instance-status "--instance-id=${INSTANCE_ID}"\ --include-all-instances --query 'InstanceStatuses[0].InstanceStatus.Status') status=$("${CMD[@]}") echo "Instance $INSTANCE_ID status: $status" if [[ $status == "\"ok\"" ]]; then exit 0 # OK else exit 1 # WARNING fi This script uses the `--query` option of the AWS CLI to isolate the instance status from the JSON returned by the command. Place this script somewhere where Nagios can call it. Then, define a command for running the script, passing in the instance ID from the custom variable associated with the host using a custom variable macro: define command { command_name check_aws_instance_status command_line /path/to/check_aws_instance_status -p $ARG1$ $_HOSTINSTANCEID$ } Finally, add a service definition using the new check for the cluster instances. You can use the host group covering the entire cluster: define service { use generic-service hostgroup_name mycluster service_description AWS Instance Status check_command check_aws_instance_status!myprofile } Be sure to set the interval for provider CLI checks to a reasonable value. If Nagios performs too many calls, the provider may begin to enforce rate limiting and deny some calls, leading to spurious warnings from Nagios. A functioning instance status check is shown in Figure C-4. ###### Figure C-4. AWS instance status check in Nagios # Index ### A * ACLs, Network ACLs-Network ACLs * alarms * metric filter alarm creation, Creating an Alarm from a Metric Filter-Creating an Alarm from a Metric Filter * setting on a custom metric, Setting an Alarm on a Custom Metric * triggering autoscaling with, Triggering Autoscaling with an Alarm Action * allow rules, Allow Versus Deny * Amazon EC2 (see EC2) * Amazon Machine Image (AMI), The manager instance, EC2 Images * Amazon RDS (see RDS) * Amazon S3 (see S3) * Amazon Web Services (see AWS) * Apache Hive (see Hive) * Apache Spark (see Spark) * Apache ZooKeeper (see ZooKeeper) * APIs, for object access, Object Access * automation, cloud cluster creation, Automated Cloud Cluster Creation-General System Management Tools * (see also images) * autoscaling * custom metric for computing capacity, A Custom Metric for Compute Capacity * prerequisites for, Prerequisites for Autoscaling Compute * removing unneeded instances, What About Shrinking? * triggering with an alarm action, Triggering Autoscaling with an Alarm Action * with custom metrics, Elastic Compute Using a Custom Metric-Other Things to Watch * availability sets, Regions and Availability Zones * availability zones * instances and, Regions and Availability Zones * network topologies and, Availability Zones-Availability Zones * pricing/performance considerations, Availability Zones * role in high availability, HDFS HA * AWS (Amazon Web Services) * availability zones, Virtual Networks and Regions * block storage in, Block Storage in AWS * CLI, AWS CLI * cloud relational databases in, Cloud Relational Databases in AWS * CloudWatch (see CloudWatch) * cluster setup in AWS EC2 (see under EC2) * EMR, Elastic MapReduce * free tier, The manager instance * Hive remote metastore setup, Switching to a Remote Metastore * Hive tables with, Hive on S3-External Table in S3 * image creation, Image Creation in AWS * image deletion, Image Deletion in AWS * image use, Image Use * Kinesis (see Kinesis) * network ACL rules, Network ACLs-Network ACLs * object storage in, Object Storage in AWS * (see also S3) * overview, Amazon Web Services * prerequisites for cluster setup, Prerequisites * reachability checks, Reachability checks using a provider CLI * routing in, Routing in AWS * securing instances, Securing the Instances * security groups, Security groups * security rules, Network Security Rules in AWS-Network ACLs * spot instances, Spot Instances * SSH keys, Generating a Key Pair * subnets in, Virtual Networks and Regions * system monitoring by, AWS system monitoring * VPCs, Virtual Networks * AWS IAM (Identity and Access Management) * creating a custom policy, Creating an IAM User for Log Streaming * creating a new user in, Configuring S3 Authentication * Azure * allocating/launching virtual machines, Creating Virtual Machines-The Worker Instances * availability sets, Regions and Availability Zones * block storage in, Block Storage in Azure * CLI, Azure CLI * cloud relational databases in, Cloud Relational Databases in Azure * cluster setup in, Setting Up in Azure-The Worker Instances * free trial, Prerequisites * Hive remote metastore setup, Switching to a Remote Metastore * Hive tables with, What About Google Cloud Platform and Azure? * image composition, Azure Images * image creation, Image Creation in Azure * image deletion, Image Deletion in Azure * image use, Image Use * instance existence checking, Instance Existence Through Ping * network security rules, Network Security Rules in Azure * object storage in, Object Storage in Azure * overview, Microsoft Azure * peered networks, Private DNS * prerequisites for cluster setup, Prerequisites * reachability checks, Reachability checks using a provider CLI * resource creation, Creating Resources-Creating Resources * resource group creation, Creating a Resource Group-Creating a Resource Group * routing in, Routing in Azure * securing instances, Next Steps * SSH keys, SSH Keys * stopped instances, Instance Control * subnets in, Virtual Networks and Regions * system monitoring by, Azure system monitoring * Azure Blob Storage, Object Storage in Azure * Azure CLI, Image Creation in Azure, Azure CLI * Azure Cosmos DB, Cloud Relational Databases in Azure * Azure Data Lake Store (ADLS), HDInsight, Block Storage in Azure, Go Bigger, What About Google Cloud Platform and Azure? * Azure Event Hubs, What About Google Cloud Platform and Azure? * Azure File Storage, Block Storage in Azure * Azure Monitor, Cloud Provider Monitoring Services * Azure SQL Database, Cloud Relational Databases in Azure ### B * backup, Backup and Restoration-Not So Different, But Better * general strategy for, A General Cloud Hadoop Backup Strategy * HDFS replication, HDFS Replication-HDFS Snapshots * logs, Logs * patterns to supplement, Patterns to Supplement Backups * via imaging, Backup via Imaging * bastion, security practices for, SSH Tunneling * blobs, Object Storage in Azure * block storage, Block Storage-Block Storage in Azure * in AWS, Block Storage in AWS * in Azure, Block Storage in Azure * in Google Cloud Platform, Block Storage in Google Cloud Platform * persistent vs. ephemeral, Persistent Versus Ephemeral Block Storage * buckets, Buckets * builders (Packer), Automated Image Creation with Packer ### C * capacity, custom metric for, A Custom Metric for Compute Capacity * CDH, Cloudera Director * CIDR notation, A Drink of CIDR * CLIs (for performance monitoring) * AWS, AWS CLI * Azure, Azure CLI * cloud providers, Cloud Provider Command-Line Interfaces-Data Formatting for CLI Results * data formatting for CLI results, Data Formatting for CLI Results * Google Cloud Platform, Google Cloud Platform CLI * Nagios and, Provider CLI Integration-Provider CLI Integration * cloud (defined), What Is the Cloud? * cloud NoSQL databases, Cloud NoSQL Databases * cloud providers, Hadoop Solutions from Cloud Providers-A Spectrum of Choices * (see also specific providers) * Amazon Web Services, Amazon Web Services * choosing, Which One Should You Use? * CLI interfaces for monitoring, Cloud Provider Command-Line Interfaces-Data Formatting for CLI Results * cluster access to, Cluster Access to the Internet and Cloud Provider Services-Cluster Access to the Internet and Cloud Provider Services * daemon status monitoring, Cloud provider custom metrics * data formatting for CLI results, Data Formatting for CLI Results * Google Cloud Platform, Google Cloud Platform * Hadoop-like services, Hadoop-Like Services * Microsoft Azure, Microsoft Azure * monitoring services, Cloud Provider Monitoring Services * overview and comparisons, Overview and Comparison of Cloud Providers-Which One Should You Use? * reachability checks using provider CLI, Reachability checks using a provider CLI * cloud relational databases, Cloud Relational Databases-Cloud Relational Databases in Azure * about, Cloud Relational Databases * Azure Cosmos DB, Cloud Relational Databases in Azure * Google Cloud Spanner, Cloud Relational Databases in Google Cloud Platform * in AWS, Cloud Relational Databases in AWS * in Azure, Cloud Relational Databases in Azure * in Google Cloud Platform, Cloud Relational Databases in Google Cloud Platform * Cloudera Director, Cloudera Director * CloudWatch * about, Cloud Provider Monitoring Services * AWS system monitoring by, AWS system monitoring * basic metrics, Basic Metrics * creating an IAM user for log streaming, Creating an IAM User for Log Streaming * custom metric for compute capacity, A Custom Metric for Compute Capacity * custom monitoring metrics in, Custom Metrics in CloudWatch-Setting an Alarm on a Custom Metric * defining a custom metric, Defining a Custom Metric * elastic compute using a custom metric, Elastic Compute Using a Custom Metric-Other Things to Watch * ingesting logs into, Ingesting Logs into CloudWatch-Creating an Alarm from a Metric Filter * installing agent, Installing the CloudWatch Agent * metric filter alarm creation, Creating an Alarm from a Metric Filter-Creating an Alarm from a Metric Filter * metric filter creation, Creating a Metric Filter * setting an alarm on a custom metric, Setting an Alarm on a Custom Metric * submitting usage information to, Feeding Custom Metric Data to CloudWatch-Feeding Custom Metric Data to CloudWatch * triggering autoscaling with an alarm action, Triggering Autoscaling with an Alarm Action * clusters * automated creation, Automated Cloud Cluster Creation-General System Management Tools * cloud-only vs. hybrid, Cloud-Only or Hybrid? * configuration scripts, Hadoop Cluster Configuration Scripts-New Worker Configuration Update Script * elastic, Long-Running or Transient? * failure management strategies (see high availability) * general system management tools, General System Management Tools * images for management of (see images) * long-running vs. transient, Long-Running or Transient?-Long-Running or Transient? * monitoring with Nagios, Monitoring Cloud Clusters with Nagios-Provider CLI Integration * self-service vs. managed, Self-Service or Managed? * setting up in AWS EC2, Setting Up in AWS-Next Steps * setting up in Azure, Setting Up in Azure-The Worker Instances * setting up in Google Cloud Platform, Setting Up in Google Cloud Platform-Securing the Instances * single-user vs. multitenant, Single-User or Multitenant? * standing up a (see standing up a cluster) * stopping/starting, Stopping and Starting Entire Clusters-Stopping and Starting Entire Clusters * topologies, Cluster Topologies-Cluster Access to the Internet and Cloud Provider Services * usage patterns (see usage patterns) * compute instance types, The Criteria * computing capacity, custom metric for, A Custom Metric for Compute Capacity * cost (see pricing) * custom metrics * autoscaling with, Elastic Compute Using a Custom Metric-Other Things to Watch * in CloudWatch, Custom Metrics in CloudWatch-Setting an Alarm on a Custom Metric ### D * daemons * for HA, Adding New HDFS and YARN Daemons-YARN HA Configuration * status monitoring, Hadoop Daemon Status-Rolling your own Hadoop daemon status checks * data objects, Data Objects * default tag, Network Security Rules in Azure * deny rules, Allow Versus Deny * disaster recovery (DR) cluster, HDFS Replication * distcp tool, HDFS Replication * DNS hostname * private, Private DNS * public, Public IP Addresses and DNS * use in Hadoop configuration files, Private DNS ### E * EC2 (Elastic Compute Cloud) * allocating/launching instances, Allocating Instances-The worker instances * images, EC2 Images * instance existence checking, Instance Existence Through Ping * reachability checks, Reachability checks using a provider CLI * spot instances, Spot Instances * SSH keys, Generating a Key Pair * Elastic Block Storage (EBS), Block Storage in AWS * elastic clusters, Long-Running or Transient? * Elastic MapReduce (EMR), Elastic MapReduce * elastic pools, Cloud Relational Databases in Azure * endpoint, S3, Configuring the S3 Endpoint * ephemeral storage, Block Storage, Persistent Versus Ephemeral Block Storage ### F * failure management strategies (see high availability) * fair scheduler, Switch YARN to the Fair Scheduler * fault domains, Regions and Availability Zones * firewall rules, Network Security Rules in Google Cloud Platform-Network Security Rules in Google Cloud Platform, Securing the Instances-Securing the Instances ### G * gateway instance, General Cluster Instance Roles, Gateway Instances * GCE (Google Compute Engine), Setting Up in Google Cloud Platform * allocating/launching instances, Allocating Instances-The worker instances * image composition, GCE Images * instance existence checking, Instance Existence Through Ping * preemptible instances, Preemptible Instances * reachability checks, Reachability checks using a provider CLI * SSH keys, SSH Keys-SSH Keys * general-purpose instance types, The Criteria * geographic distribution (see regions) * Google Cloud Dataproc, Google Cloud Dataproc * Google Cloud Platform * allocating/launching instances, Allocating Instances-The worker instances * availability zones, Virtual Networks and Regions * block storage in, Block Storage in Google Cloud Platform * CLI, Google Cloud Platform CLI * cloud relational databases in, Cloud Relational Databases in Google Cloud Platform * cluster setup in, Setting Up in Google Cloud Platform-Securing the Instances * creating a project, Creating a Project * Hive remote metastore setup, Switching to a Remote Metastore * Hive tables with, What About Google Cloud Platform and Azure? * image creation, Image Creation in Google Cloud Platform * image deletion, Image Deletion in Google Cloud Platform * image use, Image Use * instance existence checking, Instance Existence Through Ping * network security rules, Network Security Rules in Google Cloud Platform-Network Security Rules in Google Cloud Platform * object storage in, Object Storage in Google Cloud Platform * overview, Google Cloud Platform * preemptible instances, Preemptible Instances * prerequisites for cluster setup, Prerequisites * reachability checks, Reachability checks using a provider CLI * routing in, Routing in Google Cloud Platform * securing instances, Securing the Instances-Securing the Instances * SSH keys, SSH Keys-SSH Keys * subnets in, Virtual Networks and Regions * system monitoring by, Google Cloud Platform system monitoring-Google Cloud Platform system monitoring * Google Cloud Pub/Sub, What About Google Cloud Platform and Azure? * Google Cloud Spanner, Cloud Relational Databases in Google Cloud Platform * Google Cloud SQL, Cloud Relational Databases in Google Cloud Platform * Google Cloud Storage, Object Storage in Google Cloud Platform * Google Compute Engine (GCE) (see GCE) ### H * HA (see high availability) * Hadoop in the cloud * basics, Why Hadoop in the Cloud?-Getting Started * defined, What Does Hadoop in the Cloud Mean? * hybrid cloud architecture, Hybrid Clouds * reasons not to run, Reasons to Not Run Hadoop in the Cloud * reasons to run, Reasons to Run Hadoop in the Cloud * security issues, What About Security? * solutions from cloud providers, Hadoop Solutions from Cloud Providers-A Spectrum of Choices * HDCloud (Hortonworks Data Cloud), Hortonworks Data Cloud * HDFS * adding new daemons for HA, Adding New HDFS and YARN Daemons-YARN HA Configuration * and cloud storage filesystems, Cloud Storage Filesystems * configuration environment, The Environment-The Environment * HA configuration for, HDFS HA * replication as backup strategy, HDFS Replication-HDFS Snapshots * snapshots, HDFS Snapshots * XML configuration files, XML Configuration Files * HDInsight, HDInsight * HDP (Hortonworks Data Platform), HDInsight, Hortonworks Data Cloud * high availability (HA), High Availability-Grains of Salt * adding new HDFS and YARN daemons, Adding New HDFS and YARN Daemons-YARN HA Configuration * availability zones, Availability Zones * benchmarking, Benchmarking HA-Grains of Salt * configuring for HDFS, HDFS HA * configuring for YARN, YARN HA * datanodes, What about the datanodes? * HDFS configuration, HDFS HA Configuration-HDFS HA Configuration * improving the HA configuration, Improving the HA Configuration * planning in the cloud, Planning HA in the Cloud-YARN HA * second manager instance, The Second Manager * testing, Testing HA * variables affecting cluster performance, Grains of Salt * YARN configuration, YARN HA Configuration-YARN HA Configuration * ZooKeeper installation/configuration, Installing and Configuring ZooKeeper-Installing and Configuring ZooKeeper * Hive * Azure and, What About Google Cloud Platform and Azure? * configuring on Spark, Configuring Hive on Spark-Try Out Hive on Spark on YARN * control scripts, Hive Control Scripts * Google Cloud Platform and, What About Google Cloud Platform and Azure? * installing and configuring, Installing and Configuring Hive-Installing and Configuring Hive * on S3, Hive on S3-External Table in S3 * (see also S3) * planning for cloud deployment, Planning for Hive in the Cloud * relational data with, Relational Data with Apache Hive-A Different Means of Computation * Spark libraries for, Add Spark Libraries to Hive * startup, Startup * switching to remote metastore, Switching to a Remote Metastore-The Remote Metastore and Stopped Clusters * switching YARN to fair scheduler, Switch YARN to the Fair Scheduler * test queries, Running Some Test Hive Queries * transient clusters and, A Step Toward Transient Clusters * trying out Hive on Spark on YARN, Try Out Hive on Spark on YARN * Hive metastore, Installing and Configuring Hive, Switching to a Remote Metastore-The Remote Metastore and Stopped Clusters * replication as backup strategy, Hive Metastore Replication * Hortonworks Data Cloud (HDCloud), Hortonworks Data Cloud * Hortonworks Data Platform (HDP), HDInsight * hybrid cloud, Hybrid Clouds, Cloud-Only or Hybrid? ### I * images, Images * automated cloud cluster creation as alternative to, Automated Cloud Cluster Creation-General System Management Tools * automated creation with Packer, Automated Image Creation with Packer-Automated Image Creation with Packer * backup via, Backup via Imaging * composition in Azure, Azure Images * composition in EC2, EC2 Images * composition in GCE, GCE Images * creation, Image Creation-Image Creation in Azure * creation in AWS, Image Creation in AWS * creation in Azure, Image Creation in Azure * creation in Google Cloud Platform, Image Creation in Google Cloud Platform * deletion, Image Deletion * deletion in AWS, Image Deletion in AWS * deletion in Azure, Image Deletion in Azure * deletion in Google Cloud Platform, Image Deletion in Google Cloud Platform * for cluster management, Using Images for Cluster Management-Images or Tools? * limitations of, Images or Tools? * maintenance, Image Maintenance * preparation, Image Preparation-Wait, I'm Using That! * structure, The Structure of an Image * tools vs., Images or Tools? * use in AWS, Image Use * use in Azure, Image Use * use in Google Cloud Platform, Image Use * inbound rules, Inbound Versus Outbound * instance template, The worker instances * instances, Instances-No Instance Is an Island * about, Instances * allocating/launching in Azure, Creating Virtual Machines-The Worker Instances * allocating/launching in EC2, Allocating Instances-The worker instances * allocating/launching in GCE, Allocating Instances-The worker instances * availability zones, Regions and Availability Zones * basic roles in clusters, General Cluster Instance Roles-General Cluster Instance Roles * configuration update script, Configuration Update Script * control, Instance Control * creation in EC2, Allocating Instances-The worker instances * creation in Google Cloud Platform, Creating Instances-The worker instances * criteria for choosing types, The Criteria * gateway instances, Gateway Instances * image preparation, Image Preparation-Wait, I'm Using That! * images, Images * manager instance, General Cluster Instance Roles * monitoring existence of, Instance Existence, Instance Existence Through Ping * monitoring reachability of, Instance Reachability * preemptible (GCE), Preemptible Instances * pricing/performance factors, Picking Instance Types-General Cluster Instance Roles * reachability monitoring, Instance Reachability * regions, Regions and Availability Zones * securing in Azure, Next Steps * securing in EC2, Securing the Instances * securing in GCE, Securing the Instances-Securing the Instances * spot (EC2), Spot Instances * temporary, Temporary Instances-Preemptible Instances, Using Temporary Instances * terminating, Instance Control * types, Instance Types * virtual machines vs., Instances * worker instances, General Cluster Instance Roles * Internet, cluster access to, Cluster Access to the Internet and Cloud Provider Services-Cluster Access to the Internet and Cloud Provider Services * IP addresses * in CIDR notation, A Drink of CIDR * private, Virtual Networks * public, Public IP Addresses and DNS * security rules and, The Secured Public Cluster * use in Hadoop configuration files, Private DNS ### J * Java, The JDK * JDK, The JDK ### K * key pair, Generating a Key Pair * (see also SSH keys) * Kinesis, Spark Streaming from AWS Kinesis-Stopping the streaming job * creating a stream, Creating a Kinesis Stream * equivalent Google Cloud Platform/Azure services, What About Google Cloud Platform and Azure? * populating stream with data, Populating the Stream with Data-Populating the Stream with Data * Spark streaming from, Spark Streaming from AWS Kinesis-Stopping the streaming job * streaming data into Spark, Streaming Kinesis Data into Spark-Stopping the streaming job ### L * logs * as part of backup strategy, Logs * CloudWatch metric filter alarm creation, Creating an Alarm from a Metric Filter-Creating an Alarm from a Metric Filter * CloudWatch metric filter creation, Creating a Metric Filter * creating an IAM user for log streaming, Creating an IAM User for Log Streaming * ingesting into CloudWatch, Ingesting Logs into CloudWatch-Creating an Alarm from a Metric Filter * installing CloudWatch agent, Installing the CloudWatch Agent * monitoring and, Cloud Provider Monitoring Services * long-running clusters * defined, Long-Running or Transient? * transient clusters vs., Long-Running or Transient?-Long-Running or Transient? ### M * managed clusters, Self-Service or Managed? * manager instance * Azure, The Manager Instance-The Manager Instance * defined, General Cluster Instance Roles * EC2, The manager instance-The manager instance * Google Cloud Platform, The manager instance-The manager instance * second instance for HA, The Second Manager * MapReduce * for analyzing small data export, The MapReduce jobs-The MapReduce jobs * in cluster, Running a Test Job * MRBench and, MRBench * Spark as alternative to, Streaming in the Cloud with Apache Spark * Terasort and, Terasort * metric filter, CloudWatch * alarm for, Creating an Alarm from a Metric Filter-Creating an Alarm from a Metric Filter * creating, Creating a Metric Filter * Microsoft Azure (see Azure) * monitoring, Monitoring and Automation-Creating an Alarm from a Metric Filter * AWS CLI for, AWS CLI * Azure CLI for, Azure CLI * cloud cluster monitoring with Nagios, Monitoring Cloud Clusters with Nagios-Provider CLI Integration * cloud provider CLI interfaces for, Cloud Provider Command-Line Interfaces-Data Formatting for CLI Results * cloud provider services for, Cloud Provider Monitoring Services * creating your own service for, Rolling Your Own * custom metrics in CloudWatch, Custom Metrics in CloudWatch-Setting an Alarm on a Custom Metric * elastic compute using a custom metric, Elastic Compute Using a Custom Metric-Other Things to Watch * Google Cloud Platform CLI for, Google Cloud Platform CLI * Hadoop daemon status, Hadoop Daemon Status-Rolling your own Hadoop daemon status checks * ingesting logs into CloudWatch, Ingesting Logs into CloudWatch-Creating an Alarm from a Metric Filter * instance existence, Instance Existence, Instance Existence Through Ping * instance reachability, Instance Reachability * scripting and, Putting Scripting to Use * Stackdriver, Google Cloud Platform system monitoring-Google Cloud Platform system monitoring * system choices for, Monitoring Choices * system load, System Load * system monitoring by Azure, Azure system monitoring * what to monitor, What to Monitor-Putting Scripting to Use * MRBench, MRBench * multitenant clusters, Single-User or Multitenant? ### N * Nagios * cloud cluster monitoring, Monitoring Cloud Clusters with Nagios-Provider CLI Integration * host and host groups, Hosts and Host Groups * instance existence checking, Instance Existence Through Ping * provider CLI integration, Provider CLI Integration-Provider CLI Integration * services and service groups, Services and Service Groups * where to run, Where Nagios Should Run * network ACL rules, Network ACLs-Network ACLs * network address translation (NAT) gateway, Cluster Access to the Internet and Cloud Provider Services * network address translation (NAT) instance, Cluster Access to the Internet and Cloud Provider Services * network security groups, Network Security Rules in Azure * network topologies, Network Topologies-Starting Topologies * availability zones, Availability Zones-Availability Zones * cluster access to Internet/cloud provider services, Cluster Access to the Internet and Cloud Provider Services-Cluster Access to the Internet and Cloud Provider Services * cluster topologies, Cluster Topologies-Cluster Access to the Internet and Cloud Provider Services * gateway instances, Gateway Instances * geographic considerations, Geographic Considerations-Availability Zones * private cluster, The Private Cluster * public cluster, The Public Cluster * public/private subnets, Public and Private Subnets-Access from Other Subnets * regions, Regions * secured public cluster, The Secured Public Cluster-The Secured Public Cluster * SOCKS proxy server, SOCKS Proxy-SOCKS Proxy * SSH tunneling, SSH Tunneling-SSH Tunneling * starting topologies, Starting Topologies * VPN access, VPN Access * networking, Networking and Security-What About the Data? * CIDR notation, A Drink of CIDR * combining with security, Putting Networking and Security Together * routing, Routing-Routing in Azure * security rules, Network Security Rules-Network Security Rules in Azure * virtual networks, Virtual Networks-Public IP Addresses and DNS * new worker configuration update script, New Worker Configuration Update Script * next hop, Routing in Google Cloud Platform * NoSQL databases (see cloud NoSQL databases) ### O * object access, Object Access * object storage, Object Storage-Object Storage in Azure * accessing objects in, Object Access * basics, Object Storage * buckets, Buckets * containers (Azure), Buckets * data objects, Data Objects * in AWS, Object Storage in AWS * in Azure, Object Storage in Azure * in Google Cloud Platform, Object Storage in Google Cloud Platform * on-premise clusters, What Does Hadoop in the Cloud Mean? * Oracle JDK, The JDK * outbound rules, Inbound Versus Outbound ### P * Packer, Automated Image Creation with Packer-Automated Image Creation with Packer * page blobs, Block Storage in Azure * peered networks, Private DNS * per-team clusters, Single-User or Multitenant? * performance (see pricing and performance) * persistent disks, Block Storage in Google Cloud Platform * persistent storage, Block Storage, Persistent Versus Ephemeral Block Storage * port scanners, The Secured Public Cluster * preemptible instances, Preemptible Instances * pricing and performance, Pricing and Performance-Performance and Networking * as reason not to run Hadoop in the cloud, Reasons to Not Run Hadoop in the Cloud * availability zones, Availability Zones * cloud provider selection, Which One Should You Use? * cluster usage patterns, Watching Cost * geographic considerations, Geographic Considerations * instance types and, Picking Instance Types-General Cluster Instance Roles * persistent vs. ephemeral block storage, Persistent Versus Ephemeral Block Storage * regions, Regions * stopping/starting entire clusters, Stopping and Starting Entire Clusters-Stopping and Starting Entire Clusters * temporary instances, Using Temporary Instances * private cloud, What Is the Cloud? * private cluster, The Private Cluster * private DNS, Private DNS * private subnet, Routing in AWS, Public and Private Subnets * provisioners (Packer), Automated Image Creation with Packer * public cloud, What Is the Cloud? * public cluster, The Public Cluster * public DNS hostname, Public IP Addresses and DNS * public IP addresses, Public IP Addresses and DNS * public subnet, Routing in AWS, Public and Private Subnets ### Q * Qubole Data Service (QDS), Qubole Data Service * Quorum Journal Manager, HDFS HA ### R * RDS (Relational Database Service), Cloud Relational Databases in AWS * hosting remote Hive metastore, Switching to a Remote Metastore * reachability monitoring, Instance Reachability * regions * defined, Regions and Availability Zones * factors in selecting, Regions and Availability Zones * instances and, Regions and Availability Zones * network topologies and, Regions * pricing/performance considerations, Regions * virtual networks and, Virtual Networks and Regions * relational data (see Hive) * Relational Database Service (RDS) (see RDS) * relational databases (see cloud relational databases) * remote metastore, Hive, Switching to a Remote Metastore-The Remote Metastore and Stopped Clusters * resource group (Azure), Creating a Resource Group-Creating a Resource Group * resources (Azure), Creating Resources-Creating Resources * restoration (see backup) * route collection, Routing in Google Cloud Platform * routing, Routing-Routing in Azure * AWS, Routing in AWS * Azure, Routing in Azure * Google Cloud Platform, Routing in Google Cloud Platform * routing table, Routing ### S * S3 (Simple Storage Service) * adding data to, Adding Data to S3 * configuring authentication for, Configuring S3 Authentication-Configuring S3 Authentication * configuring endpoint, Configuring the S3 Endpoint * eventual consistency, Configuring the S3 Filesystem * external Hive table in, External Table in S3 * filesystem configuration, Configuring the S3 Filesystem * Hive on, Hive on S3-External Table in S3 * scripts * cluster configuration, Hadoop Cluster Configuration Scripts-New Worker Configuration Update Script * configuration update, Configuration Update Script * for monitoring, Putting Scripting to Use * new worker configuration update, New Worker Configuration Update Script * SSH key creation/distribution, SSH Key Creation and Distribution * start/stop, Hadoop Component Start and Stop Scripts * secured public cluster, The Secured Public Cluster-The Secured Public Cluster * security, Putting Networking and Security Together * (see also network topologies) * in the cloud, What About Security? * securing instances in AWS EC2, Securing the Instances * securing instances in Azure, Next Steps * securing instances in GCE, Securing the Instances-Securing the Instances * security groups, AWS, Security groups * security rules (for networking), Network Security Rules-Network Security Rules in Azure * allow vs deny, Allow Versus Deny * AWS, Network Security Rules in AWS-Network ACLs * Azure, Network Security Rules in Azure * Google Cloud Platform, Network Security Rules in Google Cloud Platform-Network Security Rules in Google Cloud Platform * inbound vs. outbound, Inbound Versus Outbound * self-service clusters, Self-Service or Managed? * service tier (Azure), Cloud Relational Databases in Azure * Simple Storage Service (see S3) * single-user clusters, Single-User or Multitenant? * snapshots * HDFS, HDFS Snapshots * of volumes in block storage, Block Storage * SOCKS proxy server, SOCKS Proxy-SOCKS Proxy * Spark * configuring Hive on, Configuring Hive on Spark-Try Out Hive on Spark on YARN * installing and configuring, Installing and Configuring Spark * planning for cloud deployment, Planning for Spark in the Cloud * running on YARN, Planning for Spark in the Cloud * startup, Startup * streaming from AWS Kinesis, Spark Streaming from AWS Kinesis-Stopping the streaming job * streaming in the cloud with, Streaming in the Cloud with Apache Spark-What About Google Cloud Platform and Azure? * test jobs, Running Some Test Jobs * trying out Hive on Spark on YARN, Try Out Hive on Spark on YARN * Spark Streaming, Spark Streaming from AWS Kinesis-Stopping the streaming job * spot instances, Spot Instances, Using Temporary Instances * SSH keys * creation/distribution scripts, SSH Key Creation and Distribution * generating for Azure, SSH Keys * generating for EC2, Generating a Key Pair * generating for GCE, SSH Keys-SSH Keys * image security and, Image Preparation * passwordless, Passwordless SSH * SSH tunneling, SSH Tunneling-SSH Tunneling * Stackdriver * about, Cloud Provider Monitoring Services * Google Cloud Platform system monitoring, Google Cloud Platform system monitoring-Google Cloud Platform system monitoring * standing up a cluster, Standing Up a Cluster-Go Bigger * analyzing a small export, Analyzing a Small Export-The MapReduce jobs * Hadoop accounts for, Hadoop Accounts * Hadoop installation, Hadoop Installation * HDFS and YARN configuration, HDFS and YARN Configuration-Finishing Up Configuration * JDK, The JDK * memory configuration, What If the Job Hangs? * passwordless SSH for, Passwordless SSH * running a test job, Running a Test Job * running basic data loading/analysis, Running Basic Data Loading and Analysis-The MapReduce jobs * running large data loading/analysis, Go Bigger-Go Bigger * SSH tunneling, SSH Tunneling * startup, Startup * Wikipedia exports for data loading/analysis, Wikipedia Exports * XML configuration files, XML Configuration Files * start/stop scripts, Hadoop Component Start and Stop Scripts * stopped clusters, Stopping and Starting Entire Clusters-Stopping and Starting Entire Clusters * Hive remote metastore and, The Remote Metastore and Stopped Clusters * pricing and performance, Stopping and Starting Entire Clusters-Stopping and Starting Entire Clusters * storage, Storage-Where to Start? * block storage, Block Storage-Block Storage in Azure * cloud NoSQL databases, Cloud NoSQL Databases * cloud relational databases, Cloud Relational Databases-Cloud Relational Databases in Azure * object storage, Object Storage-Object Storage in Azure * storage account (Azure), Object Storage in Azure * storage class, Data Objects * storage instance types, The Criteria * streaming, with Apache Spark (see Spark) * subnets * access from other subnets, Access from Other Subnets * location, Virtual Networks and Regions * location in virtual network, Virtual Networks and Regions * public/private, Public and Private Subnets-Access from Other Subnets * SOCKS proxy server, SOCKS Proxy-SOCKS Proxy * SSH tunneling, SSH Tunneling-SSH Tunneling * virtual networks and, Virtual Networks-Virtual Networks * VPN access, VPN Access * system load monitoring, System Load * system routes (Azure), Routing in Azure ### T * temporary instances, Temporary Instances-Preemptible Instances, Using Temporary Instances * adding to cluster automatically, Elastic Compute Using a Custom Metric * and removal of unneeded instances, What About Shrinking? * preemptible instances, Preemptible Instances * spot instances, Spot Instances, Using Temporary Instances * Terasort, Terasort * tools, for automated cloud cluster creation, Automated Cloud Cluster Creation-General System Management Tools * Cloudera Director, Cloudera Director * general system management tools, General System Management Tools * HDCloud, Hortonworks Data Cloud * images vs., Images or Tools? * QDS, Qubole Data Service * transient clusters * and backup, Patterns to Supplement Backups * defined, Long-Running or Transient? * long-running clusters vs., Long-Running or Transient?-Long-Running or Transient? * off-cluster storage, A Step Toward Transient Clusters ### U * URLs, for object access, Object Access * usage patterns, Patterns for Cluster Usage-The Rising Need for Automation * cloud-only vs. hybrid, Cloud-Only or Hybrid? * cost factors, Watching Cost * long-running vs. transient, Long-Running or Transient?-Long-Running or Transient? * self-service vs. managed, Self-Service or Managed? * single-user vs. multitenant, Single-User or Multitenant? ### V * Virtual Hard Disks (VHDs), Block Storage in Azure * virtual hard disks (VHDs), Azure Images * virtual machines, Instances * (see also instances) * Azure, Creating Virtual Machines-The Worker Instances * virtual networks * about, Virtual Networks-Public IP Addresses and DNS * private DNS and, Private DNS * public IP addresses and DNS hostname, Public IP Addresses and DNS * regions and, Virtual Networks and Regions * subnet location, Virtual Networks and Regions * Virtual Private Clouds (VPCs), Virtual Networks * Virtual Private Networks (VPNs), VPN Access ### W * worker instances * Azure, The Worker Instances * configuration update script, New Worker Configuration Update Script * defined, General Cluster Instance Roles * EC2, The worker instances * Google Cloud Platform, The worker instances-The worker instances ### Y * YARN * adding new daemons for HA, Adding New HDFS and YARN Daemons-YARN HA Configuration * configuration environment, The Environment-The Environment * configuration when standing up a cluster, HDFS and YARN Configuration-Finishing Up Configuration * HA configuration, YARN HA Configuration-YARN HA Configuration * HA enabling, YARN HA * running Spark on, Planning for Spark in the Cloud * switching to fair scheduler, Switch YARN to the Fair Scheduler * trying out Hive on Spark on YARN, Try Out Hive on Spark on YARN * XML configuration files, XML Configuration Files ### Z * ZooKeeper * installation/configuration for HA, Installing and Configuring ZooKeeper-Installing and Configuring ZooKeeper * start/stop scripts, Apache ZooKeeper # About the Author **Bill Havanki** is a software engineer working for Cloudera, where he has contributed to Hadoop components as well as systems for deploying Hadoop clusters into public Cloud services. Prior to joining Cloudera he worked for 15 years developing software for government contracts, focusing mostly on analytic frameworks and authentication and authorization systems. He earned his B.S. in Electrical Engineering from Rutgers University and his M.S. in Computer Engineering from North Carolina State University. A New Jersey native, he currently lives near Annapolis, Maryland with his family. # Colophon The animal on the cover of _Moving Hadoop to the Cloud_ is a southern reedbuck ( _Redunca arundinum_ ). Southern reedbucks are typically found in southern Africa. They inhabit areas of tall grass near a source of water. The grass offers camouflage from predators such as lions, leopards, cheetahs, spotted hyenas, pythons, and crocodiles. Being herbivores, the tall grass also provides sustenance. Southern reedbucks need to drink water at least every few days, which is not typical for species in this arid region of Africa. An elegant antelope, southern reedbucks have distinctive dark lines running down the front of their forelegs and lower hind legs. The color of their coat ranges between light- and greyish-brown and their underparts are white. Only the males bear forward-curving horns, about 35–45 cm (14–18 in) long. The southern reedbuck is monogamous, a pair inhabits a territory that is defended by the male from other males. A single calf is born after a gestation period of around eight months and remains hidden in the dense grass for the next two months. During this period, the female does not stay with her young but instead visits it for 10 to 30 minutes each day. This antelope has an average lifespan of ten years. The southern reedbuck makes a number of characteristic noises, including a shrill whistle through the nostrils, a clicking noise to alert others about danger, and a distinctive "popping" sound, caused by the inguinal glands, heard when the southern reedbuck jumps. Many of the animals on O'Reilly covers are endangered; all of them are important to the world. To learn more about how you can help, go to _animals.oreilly.com_. The cover image is from _Wood's Animate Creation_. The cover fonts are URW Typewriter and Guardian Sans. The text font is Adobe Minion Pro; the heading font is Adobe Myriad Condensed; and the code font is Dalton Maag's Ubuntu Mono. 1. Foreword 2. Preface 1. Who This Book Is For 2. What You Should Already Know 3. What This Book Leaves Out 4. How This Book Works 5. Which Software Versions This Book Uses 6. Conventions Used in This Book 1. IP Addresses 7. Using Code Examples 8. O'Reilly Safari 9. How to Contact Us 10. Acknowledgments 3. I. Introduction to the Cloud 4. 1. Why Hadoop in the Cloud? 1. What Is the Cloud? 2. What Does Hadoop in the Cloud Mean? 3. Reasons to Run Hadoop in the Cloud 4. Reasons to Not Run Hadoop in the Cloud 1. What About Security? 5. Hybrid Clouds 6. Hadoop Solutions from Cloud Providers 1. Elastic MapReduce 2. Google Cloud Dataproc 3. HDInsight 4. Hadoop-Like Services 5. A Spectrum of Choices 7. Getting Started 5. 2. Overview and Comparison of Cloud Providers 1. Amazon Web Services 1. References 2. Google Cloud Platform 1. References 3. Microsoft Azure 1. References 4. Which One Should You Use? 6. II. Cloud Primer 7. 3. Instances 1. Instance Types 2. Regions and Availability Zones 3. Instance Control 4. Temporary Instances 1. Spot Instances 2. Preemptible Instances 5. Images 6. No Instance Is an Island 8. 4. Networking and Security 1. A Drink of CIDR 2. Virtual Networks 1. Private DNS 2. Public IP Addresses and DNS 3. Virtual Networks and Regions 4. Routing 1. Routing in AWS 2. Routing in Google Cloud Platform 3. Routing in Azure 5. Network Security Rules 1. Inbound Versus Outbound 2. Allow Versus Deny 3. Network Security Rules in AWS 4. Network Security Rules in Google Cloud Platform 5. Network Security Rules in Azure 6. Putting Networking and Security Together 7. What About the Data? 9. 5. Storage 1. Block Storage 1. Block Storage in AWS 2. Block Storage in Google Cloud Platform 3. Block Storage in Azure 2. Object Storage 1. Buckets 2. Data Objects 3. Object Access 4. Object Storage in AWS 5. Object Storage in Google Cloud Platform 6. Object Storage in Azure 3. Cloud Relational Databases 1. Cloud Relational Databases in AWS 2. Cloud Relational Databases in Google Cloud Platform 3. Cloud Relational Databases in Azure 4. Cloud NoSQL Databases 5. Where to Start? 10. III. A Simple Cluster in the Cloud 11. 6. Setting Up in AWS 1. Prerequisites 2. Allocating Instances 1. Generating a Key Pair 2. Launching Instances 3. Securing the Instances 4. Next Steps 12. 7. Setting Up in Google Cloud Platform 1. Prerequisites 2. Creating a Project 3. Allocating Instances 1. SSH Keys 2. Creating Instances 4. Securing the Instances 5. Next Steps 13. 8. Setting Up in Azure 1. Prerequisites 2. Creating a Resource Group 3. Creating Resources 4. SSH Keys 5. Creating Virtual Machines 1. The Manager Instance 2. The Worker Instances 6. Next Steps 14. 9. Standing Up a Cluster 1. The JDK 2. Hadoop Accounts 3. Passwordless SSH 4. Hadoop Installation 5. HDFS and YARN Configuration 1. The Environment 2. XML Configuration Files 3. Finishing Up Configuration 6. Startup 7. SSH Tunneling 8. Running a Test Job 1. What If the Job Hangs? 9. Running Basic Data Loading and Analysis 1. Wikipedia Exports 2. Analyzing a Small Export 10. Go Bigger 15. IV. Enhancing Your Cluster 16. 10. High Availability 1. Planning HA in the Cloud 1. HDFS HA 2. YARN HA 2. Installing and Configuring ZooKeeper 3. Adding New HDFS and YARN Daemons 1. The Second Manager 2. HDFS HA Configuration 3. YARN HA Configuration 4. Testing HA 5. Improving the HA Configuration 1. A Bigger Cluster 2. Complete HA 3. A Third Availability Zone? 6. Benchmarking HA 1. MRBench 2. Terasort 3. Grains of Salt 17. 11. Relational Data with Apache Hive 1. Planning for Hive in the Cloud 2. Installing and Configuring Hive 3. Startup 4. Running Some Test Hive Queries 5. Switching to a Remote Metastore 1. The Remote Metastore and Stopped Clusters 6. Hive Control Scripts 7. Hive on S3 1. Configuring the S3 Filesystem 2. Adding Data to S3 3. Configuring S3 Authentication 4. Configuring the S3 Endpoint 5. External Table in S3 8. What About Google Cloud Platform and Azure? 9. A Step Toward Transient Clusters 10. A Different Means of Computation 18. 12. Streaming in the Cloud with Apache Spark 1. Planning for Spark in the Cloud 2. Installing and Configuring Spark 3. Startup 4. Running Some Test Jobs 5. Configuring Hive on Spark 1. Add Spark Libraries to Hive 2. Configure Hive for Spark 3. Switch YARN to the Fair Scheduler 4. Try Out Hive on Spark on YARN 6. Spark Streaming from AWS Kinesis 1. Creating a Kinesis Stream 2. Populating the Stream with Data 3. Streaming Kinesis Data into Spark 7. What About Google Cloud Platform and Azure? 8. Building Clusters Versus Building Clusters Well 19. V. Care and Feeding of Hadoop in the Cloud 20. 13. Pricing and Performance 1. Picking Instance Types 1. The Criteria 2. General Cluster Instance Roles 2. Persistent Versus Ephemeral Block Storage 3. Stopping and Starting Entire Clusters 4. Using Temporary Instances 5. Geographic Considerations 1. Regions 2. Availability Zones 6. Performance and Networking 21. 14. Network Topologies 1. Public and Private Subnets 1. SSH Tunneling 2. SOCKS Proxy 3. VPN Access 4. Access from Other Subnets 2. Cluster Topologies 1. The Public Cluster 2. The Secured Public Cluster 3. Gateway Instances 4. The Private Cluster 5. Cluster Access to the Internet and Cloud Provider Services 3. Geographic Considerations 1. Regions 2. Availability Zones 4. Starting Topologies 5. Higher-Level Planning 22. 15. Patterns for Cluster Usage 1. Long-Running or Transient? 2. Single-User or Multitenant? 3. Self-Service or Managed? 4. Cloud-Only or Hybrid? 5. Watching Cost 6. The Rising Need for Automation 23. 16. Using Images for Cluster Management 1. The Structure of an Image 1. EC2 Images 2. GCE Images 3. Azure Images 2. Image Preparation 1. Wait, I'm Using That! 3. Image Creation 1. Image Creation in AWS 2. Image Creation in Google Cloud Platform 3. Image Creation in Azure 4. Image Use 1. Scripting Hadoop Configuration 5. Image Maintenance 6. Image Deletion 1. Image Deletion in AWS 2. Image Deletion in Google Cloud Platform 3. Image Deletion in Azure 7. Automated Image Creation with Packer 8. Automated Cloud Cluster Creation 1. Cloudera Director 2. Hortonworks Data Cloud 3. Qubole Data Service 4. General System Management Tools 9. Images or Tools? 10. More Tooling 24. 17. Monitoring and Automation 1. Monitoring Choices 1. Cloud Provider Monitoring Services 2. Rolling Your Own 2. Cloud Provider Command-Line Interfaces 1. AWS CLI 2. Google Cloud Platform CLI 3. Azure CLI 4. Data Formatting for CLI Results 3. What to Monitor 1. Instance Existence 2. Instance Reachability 3. Hadoop Daemon Status 4. System Load 5. Putting Scripting to Use 4. Custom Metrics in CloudWatch 1. Basic Metrics 2. Defining a Custom Metric 3. Feeding Custom Metric Data to CloudWatch 4. Setting an Alarm on a Custom Metric 5. Elastic Compute Using a Custom Metric 1. A Custom Metric for Compute Capacity 2. Prerequisites for Autoscaling Compute 3. Triggering Autoscaling with an Alarm Action 4. What About Shrinking? 5. Other Things to Watch 6. Ingesting Logs into CloudWatch 1. Creating an IAM User for Log Streaming 2. Installing the CloudWatch Agent 3. Creating a Metric Filter 4. Creating an Alarm from a Metric Filter 7. So Much More to See and Do 25. 18. Backup and Restoration 1. Patterns to Supplement Backups 2. Backup via Imaging 3. HDFS Replication 1. Cloud Storage Filesystems 2. HDFS Snapshots 4. Hive Metastore Replication 5. Logs 6. A General Cloud Hadoop Backup Strategy 7. Not So Different, But Better 8. To the Cloud 26. A. Hadoop Component Start and Stop Scripts 1. Apache ZooKeeper 2. Apache Hive 27. B. Hadoop Cluster Configuration Scripts 1. SSH Key Creation and Distribution 2. Configuration Update Script 1. New Worker Configuration Update Script 28. C. Monitoring Cloud Clusters with Nagios 1. Where Nagios Should Run 2. Instance Existence Through Ping 3. Hosts and Host Groups 4. Services and Service Groups 5. Provider CLI Integration 29. Index
{ "redpajama_set_name": "RedPajamaBook" }
252
\section{Introduction} Particle detector models~\cite{Unruh1976,Unruh-Wald,DeWitt} have become an ubiquitous concept in the study of fundamental problems in quantum field theory (QFT). They provide a way of circumventing some of the conceptual and technical issues associated with the notion of measurement of localized field observables \cite{Sorkin,Benincasa_2014,fewster3,borsten}, and also yield an operationally appealing approach to common phenomenology in QFT in curved spacetimes such as the Unruh and Hawking effects (see, e.g., \cite{Unruh1976,Sciama1977,Unruh-Wald,Takagi,Louko}). Beyond their value as a fundamental tool, particle detector models are commonly employed in concrete setups in relativistic quantum information and quantum optics to model the light-matter interaction in relativistic regimes (see, e.g. \cite{Pozas2016,eduardo}). Common desired features of particle detector models include being localized, controllable and measurable nonrelativistic quantum systems that couple to a quantum field in a finite region of spacetime. Historically~\cite{DeWitt}, particle detectors have been typically considered to be pointlike objects which interact with a quantum field along timelike curves representing their trajectories. There are, however, good reasons to extend the model beyond pointlike detectors, thus including some spatial extension to the system. One reason is to regularize UV divergences in the predictions of the theory by introducing a finite lenghtscale for the size of the detector~\cite{Schlicht,Jorma}. Smeared detectors are also more appealing from the point of view of algebraic quantum field theory, where field observables are directly linked to field operators that are smeared in both time and space~\cite{kasia}, and to which it is natural to couple our detectors. Finally, one could also argue for the need for smeared particle detector models due to the fact that in all physically realistic scenarios, the devices being used as detector---for instance, an atom coupling to the electromagnetic field~\cite{ScullyBook,Pozas2016,eduardo}---is not a pointlike object, but has in fact some nontrivial spatial extension. Smeared particle detectors, however, are not devoid of their own issues. In particular, coupling a single nonrelativistic degree of freedom of the detector to a region of spacetime with finite spatial extension implies ``faster than light'' coupling of the internal constituents of the detector. In other words, one single detector's degree of freedom ``feels'' the interaction with the field simultaneously at spacelike separated points. \textcolor{black}{ This does not mean that smeared detectors should be avoided in a relativistic description of measurement in QFT. Rather, this seems intuitively compatible with the assumption that the detector is a non-relativistic system. Indeed, particle detector models do not intend to yield a fundamental description of reality, but rather, to provide an approximate description of measurements in quantum fields that is valid under certain regimes. The effects that the detector's `non-locality' of the coupling may have} on the causal behaviour of the detector model were analyzed in~\cite{martin-martinez2015}, where it was shown that as long as predictions are taken at times longer than the light-crossing time of the detectors' lengthscales, smeared particle detector models cannot signal faster than light. Furthermore, following on this, in recent work~\cite{us}, it was discussed that there are ways to covariantly prescribe the coupling between smeared detectors and fields. However, even when the detector-field Hamiltonian density is covariantly prescribed, one may wonder whether there may still be issues with the covariance of the time evolution generated by this Hamiltonian density due to the non-local nature of the coupling of smeared detectors. Indeed, taking the common Hamiltonian formulation for particle detector physics, we can ask how these non-locality issues affect the time evolution operator given by the time-ordered exponential of the Hamiltonian for the system. Although in nonrelativistic physics time is an external, absolute parameter, when considering relativistic scenarios, one has to address the issues and subtleties that arise from different choices of a time parameter. In particular, each observer has their own rest spaces and proper times, and therefore the notion of time order may become frame dependent. Namely, the ordering of events in spacetime according to different time coordinates will only be unambiguous if the events are timelike or null separated. If, on the other hand, two events are spacelike separated, one can find observers that see either event happening before or after the other. In the case of particle detectors, first principle arguments tell us that it is physically justified to prescribe the interaction in the reference frame of the detector's center of mass~\cite{eduardo,us}. However, if the interaction between the field and the detector is spatially smeared, there will be spacelike separated events in the `worldtube' of the detector. This means that the ambiguity in time ordering will impact smeared detector setups, since certainly time-ordering with respect to the detector's centre of mass proper time will in general not be equivalent to time-ordering with respect to a different frame. If taken at face value, this would be catastrophic for a detector model of a quantum field theory: suddenly, time evolution and all its predictions would be reference frame dependent. General covariance is an important foundational point of modern theoretical physics: fundamental theories must be independent of the (strictly mathematical) choice of the coordinates used to describe the laws of physics. Even though the detector based approach for probing quantum fields is not intended to be a fundamental description of nature, it is still important that its predictions are generally covariant if we are to give them physical meaning in terms of features of the quantum field. Moreover, particle detectors are used in scenarios where covariance plays an important role, such as entanglement harvesting (see, e.g.,~\cite{Valentini1991,Reznik1,reznik2,Retzker2005,RalphOlson1,RalphOlson2,Nick,Cosmo,Salton:2014jaa,Pozas-Kerstjens:2015}), where multiple detectors are present and the causal relations between the interactions of the many detectors are relevant. In the present paper, we study in detail how the spatial smearing of an UDW detector breaks covariance. First, we show that all predictions made for a system of pointlike detectors with covariant Hamiltonian densities (prescribed as in \cite{us}) are coordinate independent. In other words, systems of many pointlike particle detectors in general spacetime backgrounds are fully covariant. We then explicitly analyze the time evolution operator for smeared detectors and calculate (up to lowest nontrivial order) the magnitude of the violation of covariance due to the detectors' finite size. In particular, we show how predictions made in different coordinate systems with different notions of time-ordering deviate from each other as a function of the field-detector state, the size and shape of the detector, as well as the geometry of spacetime. We will show that if the detector is initially in a statistical mixture of states of well defined energy (eigenstates of the free Hamiltonian, thermal states, etc), then the violations of covariance are of third order (and in many cases fourth order) in the coupling strength between the detector and field. This means that predictions associated to different choices of time parameters are equivalent at the order in perturbation theory where many important phenomena manifest (e.g., entanglement harvesting, detection of the Unruh effect, etc.). Furthermore, for the cases where the violations of covariance are of leading order, we discuss in what regimes they can be made negligible. Namely, approximate covariance is restored when several requirements are met: 1) the relative motion of the detectors with respect to the frame in which we are computing should not be extreme; 2) the curvature around the detectors should also be small enough; and 3) the predictions are only taken for times much longer than the light-crossing time of each of the detectors in their respective proper frames, as well as in the coordinate frame we use to calculate. \section{Review of Spacetime intervals in curved spacetimes}\label{intervals} For the purposes of this work, it is convenient to review the notions of timelike, null and spacelike separation in curved spacetimes. In Minkowski spacetime it is easy to define the notion of spacelike and timelike separation of two events $\mathsf{p}$ and $\mathsf{q}$. If we let $\Delta \mathsf{x} = \mathsf{p}-\mathsf{q}$, we say that the two events are spacelike separated in the case in which $\eta_{\mu\nu}\Delta \mathsf{x}^\mu\Delta \mathsf{x}^\nu > 0$ and that they are timelike separated if $\eta_{\mu\nu}\Delta \mathsf{x}^\mu\Delta \mathsf{x}^\nu < 0$, where $\eta_{\mu\nu}$ stands for the metric in inertial coordinates. If $\mathsf{p}$ and $\mathsf{q}$ are spacelike separated in Minkowski spacetime, it is always possible to find an inertial timelike observer that sees both events simultaneously. If they are timelike separated, there is always an inertial timelike trajectory that goes through both of the events. Also, we say that two events are null separated if the norm of $\Delta \mf x$ is zero. Null separated events are connected by a ray of light. These concepts provide very useful insight about the causal structure of Minkowski spacetime, in the sense that events that are spacelike separated have no causal influence over one another. In the context of quantum field theory, this fact manifests itself as the microcausality condition: the commutator of quantum fields in spacelike separated regions vanishes. In Minkowski spacetimes, we can simply say timelike separated events are those events that can be connected by timelike curves, and the analogous holds for null separated events. The points that are spacelike separated are the ones that do not fit any of the categories before. In curved spacetimes, however, defining global notions analogous to timelike, null and spacelike separations is more delicate \cite{Wald1}. First, we assume that we have a spacetime $\mathcal{M}$ with a metric $\mathsf{g}$ that is globally hyperbolic and time orientable. Given a point $\mf{p}$, we then define the set of chronological events related to $\mathsf{p}$ as the set of all points that can be connected to $\mathsf{p}$ by a timelike curve. We denote the set of chronological events related to $\mathsf{p}$ by $I(\mathsf{p})$. This can be shown to be an open set \cite{Wald1} and it corresponds to the interior of the lightcone in Minkowski spacetime. We then define the set of null separated events $N(\mf p) = \overline{I(\mathsf{p})}\setminus I(\mathsf{p})$ as the boundary of the closure of $I(\mathsf{p})$. In Minkowski $N(\mf p)$ corresponds to the set of points that are in the boundary of the lightcone of $\mf p$. It should be noted however that in general this set might contain points that are not causally connected to $\mathsf{p}$ (See again \cite{Wald1} for an example). However, all null curves that go through $\mathsf{p}$ are contained in $N(\mf p)$. Note that as $N(\mf p)$ is the boundary of a region, it possesses one dimension less than the spacetime it is contained in, and volume integrals performed over it yield zero. We then define the set of non-chronological events related to $\mathsf{p}$ as $S(\mathsf{p}) = \mathcal{M}\setminus \overline{I(\mathsf{p})}$. In Minkowski this is equivalent to the region outside the lightcone of $\mathsf{p}$. This set is always open since it is the complement of a closed set, and no event in $S(\mathsf{p})$ is causally connected to the point $\mathsf{p}$. Having generalizations of spacelike and timelike separation, we notice that $\mathsf{q}\in I(\mathsf{p}) \Leftrightarrow \mathsf{p}\in I(\mathsf{q})$, so that we can define the relation between events `belonging to the chronological set of one another' that we notate $\mathsf{p}\musNatural \mathsf{q}$. This relation is what we define as timelike separation. Analogously, $\mathsf{q}\in N(\mathsf{p}) \Leftrightarrow \mathsf{p}\in N(\mathsf{q})$ so that we can define the relation between events `belonging to the null set of one another' that we denote by $\mf p \rotatebox[origin=c]{135}{\musNatural} \mf q$. This is what we will call null separation here, although it should be noted that not all null separated events can be connected by a lightlike curve \cite{Wald1}. \color{black} Consider two future-oriented timelike differential forms $\dd t$ and $\dd t'$ which foliate spacetime by achronal surfaces, and are associated to two coordinate systems \color{black} $R\equiv(t,\bm x)$ and $R'\equiv(t',\bm x')$. Now, take two events $\mathsf{p}$ and $\mathsf{q}$ of coordinates $(p^0,p^i), (p^{0'},p^{i'})$ and $(q^0,q^i), (q^{0'},q^{i'})$ respectively in $R$ and $R'$. If $\mf p \musNatural \mf q$ or $\mf p \rotatebox[origin=c]{135}{\musNatural} \mf q$ , we have that the sign of $p^0-q^0$ and $p^{0'}-q^{0'}$ is the same. Also, we will only have $p^0-q^0$ (or $p^{0'}-q^{0'}$) equal zero if $\mf p=\mf q$. Therefore, the notion of time ordering for these events is unambiguous and coordinate independent (hence reference frame independent), \textcolor{black}{provided that the surfaces of constant $t$ and $t'$ are achronal}. This will be particularly useful for the discussion of the meaning of the time ordering operation in quantum mechanics in curved spacetimes. We also define the relation $\mathsf{p}\rotatebox[origin=c]{90}{\musNatural} \mathsf{q}$ in the case in which $\mathsf{q} \in S(\mathsf{p})\Leftrightarrow\mathsf{p}\in S(\mathsf{q})$. Relevant to this paper, notice that since in this case the points $\mathsf{p}$ and $\mathsf{q}$ are not causally connected, the microcausality condition imposes that the commutator of a scalar quantum field evaluated at them must vanish. \section{The Unruh-DeWitt Model in Curved Spacetimes}\label{UDWmodel} To model the interaction of a particle detector and a quantum field in curved spacetimes we use a smeared Unruh-DeWitt (UDW) detector~\cite{DeWitt,Unruh-Wald}. That is, a two-level system interacting with a free scalar field through a minimally coupled (for simplicity) action. The UDW model captures most of the fundamental features of the light-matter interaction (barring the exchange of angular momentum~\cite{EduardoOld,eduardo}) and hence one could think of this detector as modelling the interaction of atomic probes and the electromagnetic field~\cite{Pozas2016,eduardo}. \color{black} To describe the quantum field and detector, we assume that we have a globally hyperbolic $D = n+1$ dimensional spacetime $\mathcal{M}$. Under these assumptions, the action for a (minimally coupled) classical real scalar field can be written as \begin{equation}\label{actionField} S[\phi] = \int \!\dd\mathcal{V}\left(-\dfrac{1}{2}\nabla_{\mu}\phi\nabla^{\mu}\phi - \dfrac{1}{2}m^2 \phi ^2\right), \end{equation} where $\dd \mathcal{V}$ is the invariant volume element of spacetime, given by \begin{equation} \dd \mathcal{V} \equiv \sqrt{- g} \dd^D \mathsf{x} = \sqrt{- \bar{g}} \dd^D \bar{\mathsf{x}}. \end{equation} When extremized, the action in Eq. \eqref{actionField} yields the Klein-Gordon equation of motion for the field $\phi$, \begin{equation}\label{KG} \nabla_\mu \nabla^\mu \phi - m^2 \phi = 0. \end{equation} At this point we can pick a complete set of solutions to Eq. \eqref{KG}, $\{u_{\bm k}(\mf x)\}$ which is orthonormal with respect to the Klein-Gordon inner product~\cite{Takagi,Wald2}. That is, \begin{align} (u_{\bm k},\bm u_{\bm k'}) &= \delta(\bm k - \bm k'),\\ (u_{\bm k}^*,\bm u_{\bm k'}^*) &= -\delta(\bm k - \bm k'),\\ (u_{\bm k},\bm u_{\bm k'}^*) &=0. \end{align} This allows one to write any classical solution $\phi(\mf x)$ as a linear combination of the $u_{\bm k}(\mf x)$ and $u_{\bm k}^*(\mf x)$: \begin{equation}\label{modeExp} \phi(\mf x) = \int \dd^{n} \!\bm{k}\left({a}^*_{\bm{k}} u_{\bm{k}}^*(\mathsf x)+{a}_{\bm{k}} u_{\bm{k}}( \mathsf x) \right), \end{equation} where ${a_{\bm k} = (u_{\bm k},\phi)}$. Notice that the field $\phi(\mf x)$ can be completely determined from the coefficients $a_{\bm k}$, which can be calculated in any Cauchy surface $\Sigma$ provided that both $\phi$ and its normal derivative to the surface are specified in $\Sigma$. This procedure is independent of the mode expansion performed and of the Cauchy surface chosen to prescribe the initial conditions. To canonically quantize the field $\phi(\mf x)$, one must first define the conjugate momentum to the field, $\pi(\mf x)$. The form of $\pi(\mf x)$ depends explicitly on the choice of foliation by Cauchy surfaces $\mathcal{E}_s$ and a time translation direction $s$ that connects the different sheaves, so that it can be written as \begin{equation} \pi(\mf x) = \frac{\delta S}{\delta (\partial_s \phi(\mf x))}. \end{equation} Having the momentum associated to this given foliation of spacetime, it is then possible to upgrade $\phi(\mf x)$ and $\pi(\mf x)$ to operators and impose the `equal time' canonical commutation relations \begin{align} \nonumber \big[\hat{\phi}(\mf x),\hat{\pi}(\mf x')\big] &= \delta_{\mathcal{E}_s}(\mf x,\mf x')\openone,\\ \big[\hat{\phi}(\mf x),\hat{\phi}(\mf x')\big] &= 0,\label{2}\\ \nonumber \big[{\hat{\pi}(\mf x)},{\hat{\pi}(\mf x')}\big] &= 0, \end{align} where $\delta_{\mathcal{E}_s}(\mf x,\mf x')$ is the Dirac delta distribution associated to each of the surfaces $\mathcal{E}_s$ We can then build the usual Fock representation for field states by promoting the coefficients $a_{\bm k}$ and $a_{\bm k}^*$ from Eq. \eqref{modeExp} to operators. This gives rise to the creation and annihilation operators associated to the mode expansion in terms of the basis of solutions $\{u_{\bm k}(\mf x)\}$. That is, the quantum field $\hat{\phi(\mf x)}$ can be written in any point of spacetime as \begin{equation}\label{theQField} \hat{\phi}(\mf x) = \int \dd^{n} \!\bm{k}\left(\hat{a}^\dagger_{\bm{k}} u_{\bm{k}}^*(\mathsf x)+\hat{a}_{\bm{k}}^{\phantom{\dagger}} u_{\bm{k}}( \mathsf x) \right). \end{equation} The canonical commutation relations \eqref{2} force the standard bosonic commutation relations for the creation and annihilation operators \begin{align} \big[\hat{a}_{\bm{k}}^{\phantom{\dagger}},\hat{a}^\dagger_{\bm{k'}}\big] &= \delta^{(n)}(\bm k - \bm k') \openone\nonumber,\\ \big[\hat{a}_{\bm{k}}^{\phantom{\dagger}},\hat{a}^{\phantom{\dagger}}_{\bm{k'}}\big] &= 0 ,\\ \big[\hat{a}_{\bm{k}}^{{\dagger}},\hat{a}^\dagger_{\bm{k'}}\big] &= 0.\nonumber \end{align} With this, a vacuum state $\ket{0}$ associated to this quantization is defined as the state annihilated by all the annihilation operators $\hat{a}_{\bm k}$. The Hilbert space associated to the field is built by successive applications of the creation operators $\hat{a}^\dagger_{\bm k}$ on the vacuum state. Notice that the choice of orthonormal set $\{u_{\bm k}(\mf x)\}$ is not unique and indeed there are an infinite number of ways of representing the field in terms of a sum of modes. If two different representations are unitarily equivalent then the annihilation operators $\hat{a}_{\bm k}$ and $\hat{a}^\dagger_{\bm k}$ associated to the two different set of modes annihilate the same vacuum. However, even in the simplest scenarios there are non-unitarily equivalent ways of quantizing the field. A typical example is the Rindler quantization. The vacuum associated to a quantization in terms of Minkowski modes corresponds to thermal states in the right and left wedges of a Rindler quantization~\cite{Takagi,birrelldavies}. The choice of modes determines the explicit spacetime dependence of the field and therefore fixes its free dynamics. In this manuscript we will assume that this choice has been made at the level of field quantization and the free quantum field is already given as in Eq. \eqref{theQField} for every point of spacetime. It is important to remark that this is a common assumption when using the UDW model in curved backgrounds and it is the assumption that yields covariant predictions for pointlike detectors as we will see. \color{black} Same as in (among others) \cite{us}, we assume our detector to be localized as a smeared (Fermi-Walker rigid) two-level first quantized system. We notate $\mathsf{z}(\tau)$ the trajectory of the detector's centre of mass, parametrized by proper time $\tau$. We denote $\ket{g}$ and $\ket{e}$ the ground and excited state of the detector according to the detector's free Hamiltonian $\hat H_{\text{d}}^\tau$ (which generates translations with respect to $\tau$) \begin{equation}\label{hD} \hat H_{\textrm{d}}^\tau = \Omega \hat \sigma^{+}\hat \sigma^{-} = \frac{\Omega}{2} \left(\hat{\sigma}_z+\openone\right), \end{equation} where $\Omega$ is the proper energy gap of the detector and \mbox{$\hat{\sigma}^+=\ket{e}\!\bra{g}=(\hat\sigma^{-})^\dagger$}. \color{black} In a given coordinate system the interaction Hamiltonian density $\hat{\mathfrak{h}}_I(\mf x)$ can be written in terms of a scalar Hamiltonian weight $\hat{h}_I(\mf x)$ according to \mbox{$\hat{\mathfrak{h}}_I(\mf x) = \sqrt{-g}\, \hat{h}_I(\mf x)$}, where $g$ is the determinant of the metric in the corresponding coordinates. This will simplify the analysis because unlike the Hamiltonian density, the Hamiltonian weight is a scalar, and therefore can be used without the need to explicitly mention coordinate systems. The Hamiltonian weight associated to the interaction of a two-level system with a scalar quantum field in the UDW model takes the following shape, \color{black} \begin{equation} \hat{h}_I(\barsf{x}) = \lambda \chi(\tau)f(\bar{\bm x})\hat{\mu}(\tau)\hat{\phi}(\bar{\mathsf{x}}). \end{equation} where---following the prescription from \cite{us}---we pick Fermi normal coordinates $(\tau,\bar{\bm{x}})$, associated to the centre of mass of the detector, and the monopole moment operator takes the form \begin{equation} \hat \mu(\tau) = e^{\mathrm{i}\Omega \tau}\hat \sigma^+ +e^{-\mathrm{i}\Omega\tau}\hat \sigma^-. \label{eq:monopole} \end{equation} \color{black} $\chi(\tau)$ and $f(\bar{\bm{x}})$ are the switching and smearing functions, respectively. Notice that, by construction, in the proper frame of the detector we can factor a switching function and a spatial smearing function in the interaction Hamiltonian. This is associated to the assumption that the detector is Fermi-Walker rigid, that is, it keeps its shape in its own reference frame\color{black}. In a general coordinate system there is no factorization of a switching and a smearing function and the Hamiltonian weight will be characterized instead by a spacetime smearing $\Lambda(\mathsf{x})$, that is, \begin{equation}\label{hDensityCov} \hat{h}_I(\mf x) = \lambda \Lambda(\mf x) \hat{\mu}(\tau(\mf x))\hat{\phi}(\mf x). \end{equation} As stated in \cite{us}, the integral of the above quantity in spacetime is fully covariant and coordinate independent. The Hamiltonian that generates time evolution with respect to the proper time $\tau$ of the detector is then defined as the integral over the constant $\tau$ surfaces $\Sigma_\tau$, according to \begin{equation}\label{HamiltonianTau} \hat{H}_{I}^{\tau}(\tau) = \lambda \int_{\Sigma_{\tau}}\!\!\!\dd^n \bar{\bm x} \sqrt{-\bar{g}}\chi(\tau)f(\bar{\bm x})\hat{\mu}(\tau)\hat{\phi}(\bar{\mathsf{x}}), \end{equation} while the Hamiltonian generating translations with respect to an arbitrary time coordinate $t$ can be written as \begin{equation}\label{HamiltonianT} \hat{H}_{I}^{t}(t) = \lambda \int_{\mathcal{E}_{t}}\!\!\!\dd^n \bm{x} \sqrt{-{g}}\:\Lambda(\mathsf{x})\hat{\mu}(t)\hat{\phi}({\mathsf{x}}), \end{equation} where $\mathcal{E}_t$ denotes the constant $t$ spacelike surfaces in the coordinates $\mf x = (t,\bm x)$. The time evolution operator is then defined as the time-ordered exponential \begin{align}\label{ufirst} \hat{\mathcal{U}} &= \mathcal{T}_\tau\exp\left(-\mathrm{i}\!\int_{\mathcal{M}}\!\!\dd\mathcal{V} \hat{h}_I(\mf x)\right)= \mathcal{T}_\tau\exp\left(-\mathrm{i}\!\int_\mathbb{R}\!\!\dd\tau \hat{H}_I^\tau(\tau)\right), \end{align} where \textcolor{black}{we have made it explicit that} the time ordering operator $\mathcal{T}_\tau$ represents time ordering with respect to the proper time of the detector's centre of mass $\tau$. \color{black} It is important to notice that the UDW model has historically been prescribed at the Hamiltonian level, and not from a `first-principle' action. It is indeed an effective model built to bypass the need for a full relativistic description of the detector's internal dynamics. It is nevertheless possible to obtain the interaction Hamiltonians in~\eqref{HamiltonianTau} and \eqref{HamiltonianT} from the following interaction \emph{action}: \begin{equation}\label{interactionaction} S_I = \int \dd^D\bar{\mathsf{x}} \sqrt{-\bar{g}} \mathcal{L}_I(\bar{\mathsf{x}}), \end{equation} where $\mathcal{L}_I$ is a scalar interaction Lagrangian weight. From this action, an interaction energy-momentum tensor can be assigned: \begin{equation} T^{ab}_I = -\dfrac{2}{\sqrt{-g}}\dfrac{\delta S_I}{\delta g_{ab}}. \end{equation} Now assume that the interaction Lagrangian does not explicitly depend on the metric. This is true for common potential and interaction terms in scalar field theories and certainly true for the common UDW detector models as introduced in previous literature~\cite{Unruh1976,DeWitt,Unruh-Wald}. Then, the only dependence on the metric in~\eqref{interactionaction} comes from the volume element, so that we obtain \begin{equation} T_I^{ab} = -\mathcal{L}_I(\bar{\mathsf{x}}) g^{ab}. \end{equation} The interaction Hamiltonian~\eqref{interactionhamiltonian} can then be obtained as \begin{equation}\label{interactionhamiltonian2} H^\tau_I = \int_{\Sigma_\tau} \dd \Sigma\,\, n_a T_I^{ab} \xi_b, \end{equation} where $\xi^a = (\partial_\tau)^a$, $\dd\Sigma$ is the induced volume element on the spacelike surfaces $\Sigma_\tau$ with unit normal $n^a$, and we complete the identification from~\eqref{interactionhamiltonian2} to~\eqref{interactionhamiltonian} by recognizing $h_I(\bar{\mathsf{x}}) = -\mathcal{L}_I(\bar{\mathsf{x}})$. We will take as an \emph{assumption} of the setup that, once the free quantization of the field has been performed, its spacetime dependence in the interaction picture is fully determined. In particular, this implies that any local interaction term in an interaction action between the fields in our setup will correspond to an interaction Hamiltonian weight $\hat{h}_I(\mathsf{x})$ that is a \emph{foliation-independent} scalar function of the coordinates. This is a nontrivial assumption, insofar as it is hard to justify it in general from first-principle arguments based on a careful description of the free and interacting Hamiltonians arising from splitting the full energy-momentum tensor of the theory as a ``free'' and an ``interacting'' part. Nevertheless, this has certainly been taken for granted in the standard approaches based on particle detector models with detectors in trajectories that may not correspond to the trajectories of fiducial observers according to which canonical quantization (and in particular, the definition of the vacuum) has been performed. Notice again that this choice yields covariant predictions for pointlike detectors. Since the model has been remarkably successful in QFT in many scenarios where the non-triviality manifests (for example predicting the Unruh effect~\cite{Takagi,Unruh-Wald,Unruh1976}) and our our objective is to highlight the limitations that are intrinsic to the usual strategy employed in smeared particle detector models. We find this a fair assumption upon which to base our following remarks. \color{black} \section{The Time Ordering Operation}\label{timeOrderSection} The notion of time ordering is fundamental in our understanding of time evolution in quantum theory. When a given coordinate system is chosen, $\mf x = (t,\bm x)$, the time ordering of events associated to this coordinate system is understood as an ordering with respect to the coordinate time $t$. For timelike or null separated events, time ordering is independent of the coordinate system picked. However, for spacelike events this is not the case. In this section, we will study under which conditions the time-ordered exponential of a Hamiltonian density is independent of the time parameter used to order it. \color{black}We will do so for a scalar quantum field theory in a globally hyperbolic spacetime $\mathcal{M}$ of dimension $D = n+1$ with metric $g$, in the context of the UDW model discussed in Section \ref{UDWmodel}. Consider the UDW model, as presented in Section \ref{UDWmodel}. In the Fermi normal coordinates associated to the detector's center of mass worldline, we have seen that the Hamiltonian and unitary time evolution operator are respectively given by \color{black} \begin{equation} \hat{H}_I^\tau(\tau) = \int \dd^n \bar{\bm{x}} \sqrt{-\bar{g}}\, \hat{h}_I(\bar{\mf x}),\label{interactionhamiltonian} \end{equation} \vspace{-15pt} \begin{equation} \hat{\mathcal{U}}_\tau = \mathcal{T}_\tau\exp\left(-\mathrm{i}\int_\mathbb{R}\! \dd\tau\: \hat{H}_I^\tau(\tau) \right). \end{equation} \color{black} \textcolor{black}{This time evolution operator should then be thought to evolve initial data, encoded in general as a state operator $\hat{\rho}_0$ and prescribed at an initial Cauchy surface $\Sigma_{\tau_0}$, to a final future Cauchy surface $\Sigma_{\tau_1}$. Throughout our discussion, we will in general assume $(\tau_0, \tau_1) \rightarrow (-\infty, +\infty)$. Notice that any finite nature of the interaction would be implemented through the possibly finite spacetime support in the Hamiltonian. } \textcolor{black}{Under the assumptions outlined in Section \ref{UDWmodel}, one can alternatively compute the time evolution prescribed by a different coordinate time $t$ by assigning an interaction Hamiltonian given by} \begin{equation}\label{hCovGeneral} \hat{H}^{t}_I(t) = \int_{\mathcal{E}_{t}} \!\! \dd^n \bm{x} \sqrt{-g}\:\hat{h}_I(\mathsf{x}), \end{equation} where $\bm{x}$ are spacelike coordinates on $\mathcal{E}_{t}$, which are the surfaces of simultaneity defined by constant $t$. \textcolor{black}{When comparing the time evolution generated by~\eqref{interactionhamiltonian} and~\eqref{hCovGeneral}, one should keep in mind that we are implicitly assuming that the past and future Cauchy surfaces corresponding to $(t_0, t_1)$ coincide with the ones associated to $(\tau_0, \tau_1)$---otherwise, the comparison would be meaningless, since it would involve comparing observables located in different spatial slices. Again, this does not mean that we cannot model finite-time interactions since the finiteness will be encoded in the spacetime support of $ \hat{H}^{t}_I(t)$} Having a covariantly defined Hamiltonian as in \eqref{hCovGeneral} is, however, not enough to guarantee that the time evolution operator itself will be independent of the time parameter chosen to prescribe it. This will only be true if the time ordering operation with respect to $\tau$ is actually truly independent of the time coordinate chosen. If this were not the case, it is easy to see that issues with time-ordering will appear in every order $\mathcal{O}(\lambda^n)$ with $n\geq 2$ of the Dyson expansion of $\hat{\mathcal{U}}_\tau$. Namely, if we write the Dyson expansion as \begin{equation} \hat{\mathcal{U}}_\tau=\openone+\hat{\mathcal{U}}^{(1)}_\tau+ \hat{\mathcal{U}}^{(2)}_\tau +\mathcal{O}(\lambda^3), \end{equation} then the time ordering prescription $\mathcal{T}_\tau$ associated to the the detector's proper time yields for the second order term \begin{align} \nonumber \hat{\mathcal{U}}^{(2)}_\tau &\coloneqq (-\mathrm{i})^2 \int_{-\infty}^{+\infty}\!\!\!\dd \tau \int_{-\infty}^{\tau} \!\!\!\dd\tau'\, \hat{H}^{\tau}_I(\tau)\hat{H}^{\tau'}_I(\tau')\\ &=(-\mathrm{i})^2\int_{\mathcal{M}\times\mathcal{M}} \!\!\!\!\!\!\!\!\!\!\!\!\dd \mathcal{V} \dd \mathcal{V}'\: \hat{h}_I(\bar{\mathsf{x}})\hat{h}_I(\bar{\mathsf{x}}')\theta(\tau-\tau'), \label{U2f} \end{align} where $\theta(\tau)$ is the Heaviside step function. If we now try to perform a coordinate transformation to another coordinate system \mbox{$\mathsf{x} = (t, \bm{x})$}, we get \begin{align}\label{U2tau} \hat{\mathcal{U}}^{(2)}_\tau&= (-\mathrm{i})^2\int_{\mathcal{M}\times \mathcal{M}} \!\!\!\!\!\!\!\!\!\!\!\!\dd \mathcal{V} \dd \mathcal{V}'\: \hat{h}_I({\mathsf{x}})\hat{h}_I({\mathsf{x}'})\theta\big(\tau(\mathsf{x})-\tau'(\mathsf{x}')\big)\\ &\neq (-\mathrm{i})^2 \int_{-\infty}^{+\infty}\!\!\!\dd t \int_{-\infty}^{ t } \!\!\!\dd t '\, \hat{H}^{ t }_I( t )\hat{H}^{ t '}_I( t ') = \hat{\mathcal{U}}^{(2)}_t. \nonumber \end{align} Because there can be spacelike separated events in the integral in \eqref{U2tau}, we do not get the nested integration that one would expect from carrying out time ordering $\mathcal{T}_t$ with respect to the time coordinate $t$ instead of $\tau$. Note, however, that we can split the integration region $\mathcal{M}\times \mathcal{M}$ into four subregions \begin{align} &\!\!\!\!T :=\{(\bar{\mathsf{x}},\bar{\mathsf{x}}')\in \mathcal{M}\!\times\! \mathcal{M}: \barsf{x} \musNatural \barsf{x}' \},\\ &\!\!\!\!N :=\{(\bar{\mathsf{x}},\bar{\mathsf{x}}')\in \mathcal{M}\!\times\! \mathcal{M}: \barsf{x} \rotatebox[origin=c]{135}{\musNatural} \barsf{x}' \},\\ &\!\!\!\!S_> := \{(\bar{\mathsf{x}},\bar{\mathsf{x}}')\in \mathcal{M}\!\times\! \mathcal{M}: \barsf{x} \rotatebox[origin=c]{90}{\musNatural} \barsf{x}' \textrm{ and } \tau\!>\!\tau' \Rightarrow t\!>\! t' \},\\ &\!\!\!\!S_\le := \{(\bar{\mathsf{x}},\bar{\mathsf{x}}')\in \mathcal{M}\!\times\! \mathcal{M}: \barsf{x} \rotatebox[origin=c]{90}{\musNatural} \barsf{x}' \textrm{ and } \tau\!>\!\tau' \Rightarrow t\!\le \!t' \}, \end{align} where $\mathsf{x}\musNatural \mathsf{x'}$ corresponds to timelike, $\mf x \rotatebox[origin=c]{135}{\musNatural} \mf x'$ corresponds to null and $\mathsf{x}\rotatebox[origin=c]{90}{\musNatural} \mathsf{x'}$ corresponds to spacelike separation between $\mathsf{x}$ and $\mathsf{x}'$. With this splitting we can write $\hat{\mathcal{U}}^{(2)}$ in \eqref{U2f} as a sum of integrals over the different regions \begin{align} \hat{\mathcal{U}}^{(2)}_\tau \! &=(-\mathrm{i})^2\int_{T\,\cup\, N\,\cup\, S_>}\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\! \dd \mathcal{V} \dd \mathcal{V}'\, \hat{h}_I(\bar{\mathsf{x}})\hat{h}_I(\bar{\mathsf{x}}')\theta(\tau\!-\!\tau')\nonumber\\ &+(-\mathrm{i})^2\int_{S_\leq}\!\!\dd \mathcal{V} \dd \mathcal{V}'\: \hat{h}_I(\bar{\mathsf{x}})\hat{h}_I(\bar{\mathsf{x}}')\theta(\tau\!-\!\tau'). \label{U2s} \end{align} For timelike and null separation, the time ordering between two events is the same for every observer, which means that for points on regions $T$ and $N$, $\tau(\mathsf{x})-\tau'(\mathsf{x}') > 0 \iff t - t' > 0$ as per the discussion in Section \ref{intervals}. This allows us to equate $\theta\big(\tau(\mathsf{x})-\tau(\mathsf{x}')\big) = \theta(t - t')$ in these regions. The same reasoning is true for the points in the $S_>$ region by construction, since we defined $S_>$ to be the region composed of spacetime events that preserved the previous time ordering. The only region where the coordinate transformation may cause problems is $S_\leq$, since it changes the time ordering between the two events. In this region, we can write $\theta\big(\tau(\mathsf{x})-\tau(\mathsf{x}')\big) = \theta(t' - t)$, which allows us to rewrite the integral as \begin{equation} \begin{gathered} \int_{S_\leq} \!\!\!\dd \mathcal{V} \dd \mathcal{V}' \hat{h}_I({\mathsf{x}})\hat{h}_I({\mathsf{x}'})\theta\big(\tau(\mathsf{x})-\tau(\mathsf{x}')\big)\\ =\int_{S_\leq} \!\!\!\dd \mathcal{V} \dd \mathcal{V}' \hat{h}_I({\mathsf{x}})\hat{h}_I({\mathsf{x}'})\theta\big(t' - t\big); \end{gathered} \end{equation} Then, writing $\hat{h}_I({\mathsf{x}})\hat{h}_I({\mathsf{x}'}) = \hat{h}_I({\mathsf{x}'})\hat{h}_I({\mathsf{x}}) + [\hat{h}_I({\mathsf{x}}), \hat{h}_I({\mathsf{x}'})]$, we get \begin{equation} \begin{gathered} \int_{S_\leq} \!\!\!\dd \mathcal{V} \dd \mathcal{V}' \hat{h}_I({\mathsf{x}})\hat{h}_I({\mathsf{x}'})\theta\big(t' - t\big)\\ = \int_{S_\leq} \!\!\!\dd \mathcal{V} \dd \mathcal{V}' \hat{h}_I({\mathsf{x}'})\hat{h}_I({\mathsf{x}})\theta\big(t' - t\big)\\ +\int_{S_\leq} \!\!\!\dd \mathcal{V} \dd \mathcal{V}' [\hat{h}_I({\mathsf{x}}), \hat{h}_I({\mathsf{x}'})]\theta\big(t' - t\big). \end{gathered} \end{equation} Renaming the integration variables $\mathsf{x}$ and $\mathsf{x}'$ in the first integral of the right hand side above we recover the same integrand as in Eq. \eqref{U2tau}. Adding the integrals over the regions ${T},N, S_>$ and $S_\leq$, we finally get \begin{align} \!\!\!\! \hat{\mathcal{U}}^{(2)}_\tau &=(-\mathrm{i})^2\int_{\mathcal{M}\times\mathcal{M}} \!\!\!\!\!\!\!\!\!\!\!\!\dd \mathcal{V} \dd \mathcal{V}' \hat{h}_I(\bar{\mathsf{x}})\hat{h}_I(\bar{\mathsf{x}}')\theta(\tau-\tau')\nonumber\\ \!\!\!\!\! &=(-\mathrm{i})^2\int_{\mathcal{M}\times\mathcal{M}} \!\!\!\!\!\!\!\!\!\!\!\!\dd \mathcal{V} \dd \mathcal{V}' \hat{h}_I(\mathsf{x})\hat{h}_I(\mathsf{x}')\theta(t - t')\nonumber\\ \!\!\!\!\! &+(-\mathrm{i})^2\int_{S_\leq} \!\!\!\!\!\dd \mathcal{V} \dd \mathcal{V}' [\hat{h}_I({\mathsf{x}}), \hat{h}_I({\mathsf{x}'})]\theta\big(t' - t\big)\nonumber\\ \!\!\!\!\! &= \hat{\mathcal{U}}^{(2)}_t+(-\mathrm{i})^2\int_{S_\leq} \!\!\!\!\!\dd \mathcal{V} \dd \mathcal{V}' [\hat{h}_I({\mathsf{x}}), \hat{h}_I({\mathsf{x}'})]\theta\big(t' - t\big),\label{U2correction} \end{align} where we recall $\mathcal{T}_t$ represents time ordering with respect to $t$ and $\hat{\mathcal{U}}_t$ the associated time evolution operator. The second summand in \eqref{U2correction} ultimately threatens the covariance of the time ordering prescription. This term is proportional to the commutator of the Hamiltonian densities at spacelike-separated points. To generalize the result above to higher orders, notice that the $N$th term in the Dyson series can be written as \begin{align} \nonumber\hat{\mathcal{U}}^{(N)}_\tau &= \dfrac{(-\mathrm{i})^N}{N!}\!\!\int_{\mathcal{M}^N}\!\!\!\!\!\!\dd \mathcal{\mathcal{\mathcal{V}}}_1\dots \dd \mathcal{V}_N\:\mathcal{T}_\tau \hat{h}_I(\bar{\mathsf{x}}_1)\dots\hat{h}_I(\bar{\mathsf{x}}_N)\\ &= \dfrac{(-\mathrm{i})^N}{N!}\!\!\int_{\mathcal{M}^N}\!\!\!\!\!\!\dd \mathcal{\mathcal{\mathcal{V}}}_1\dots \dd \mathcal{V}_N\:\mathcal{T}_\tau \hat{h}_I({\mathsf{x}}_1)\dots\hat{h}_I({\mathsf{x}}_N)\label{U2}\\ &\neq \dfrac{(-\mathrm{i})^N}{N!}\!\!\int_{\mathcal{M}^N}\!\!\!\!\!\!\dd \mathcal{\mathcal{\mathcal{V}}}_1\dots \dd \mathcal{V}_N\:\mathcal{T}_t \hat{h}_I({\mathsf{x}}_1)\dots\hat{h}_I({\mathsf{x}}_N).\nonumber \end{align} where $\mathcal{T}_\tau$ applied to the Hamiltonian densities time-orders the product according to the detector's centre of mass proper time $\tau$. As the second and third line of \eqref{U2} shows, we could switch from the $\bar{\mf x} = (\tau,\bar{\bm x})$ coordinates to arbitrary coordinates $\mf x = (t,\bm x)$ without picking any extra terms, but we need to keep the time ordering with respect to $\tau$. Expressing the time-ordering with respect to $\tau$ in terms of time ordering in the coordinates $(t,\bm x)$ is, in general, a nontrivial task but it is in general different from time ordering with respect to $t$. We would like to highlight that the non-coincidence of time-ordering with respect to different coordinate systems can be bypassed in many common scenarios. If the Hamiltonian weight is microcausal, that is, it satisfies \begin{equation}\label{microcausality} \mathsf{x}\rotatebox[origin=c]{90}{\musNatural}\mathsf{x}' \Rightarrow [\hat{h}(\mf x),\hat{h}(\mf x')] = 0, \end{equation} then the ambiguity in time ordering of spacelike-separated events will have no impact in the calculation of the time evolution operator. In other words, when \eqref{microcausality} is satisfied, the time evolution operator is the same with respect to any time parameter. There are many relevant interactions where the Hamiltonian density is microcausal. The postulate of microcausality in QFT implies that field operators evaluated at spacelike-separated points commute. If the interaction Hamiltonian weight $\hat{h}_I(\mf x)$ is local in the quantum fields (that is, only couples the detector to field degrees of freedom evaluated at a single point in each spatial slice) the Hamiltonian weight is microcausal. This is why in (most of) high-energy physics, where all fields are microcausal and the interactions are local, there is no need to specify a privileged time ordering and the time evolution is always covariant. This is also why a detection scheme based on the Fewster-Verch QFT measurement framework~\cite{fewster1,fewster2,fewster3} would not have any problems with covariance. However, smeared particle detectors such as the smeared UDW model involve non-local couplings to quantum fields, hence will suffer from time-ordering ambiguities as we will see. \section{Breaking of Covariance by a single smeared detector}\label{CovOneDetector} In section \ref{timeOrderSection} we have seen that local quantum field theories that satisfy microcausality (observables commute at different spacelike separated points) would produce time evolution operators that do not depend on the time parameter chosen for time ordering. When we take $\hat{h}_I(\mf x)$ to be the Hamiltonian weight associated to a single pointlike detector undergoing an arbitrary timelike trajectory in a fixed background, the interaction is local. That is, the detector's degree of freedom only couples to a single point in each space slice. This translates into the fact that the support of the Hamiltonian weight $\hat{h}_I(\mf x)$ consists of a single point in each spatial slice, which in turn implies that $\hat{h}_I(\mf x)$ satisfies a microcausality condition: it commutes with itself at spacelike separated points. In summary: predictions of the time evolution of pointlike UDW detectors coupled through Hamiltonian weights of the form \eqref{hDensityCov} are fully covariant. However, in the smeared UDW detector model \color{black} employed in the literature, the Hamiltonian weight (and therefore the Hamiltonian density) can be shown to violate microcausality. Namely, the commutator of the UDW interaction Hamiltonian densities for a single smeared detector evaluated at spacelike-separated points is not identically zero due to the smearing. To the authors' knowledge, this has not been taken into account in previous literature. This represents an important limitation of the theory that must be accounted for even for the simplest cases of inertial detectors in flat spacetimes (as we will show in an example later). This violation of general covariance can then be used to stipulate a limit of validity and better clarify under which conditions the predictions of particle detector models can be trusted. This violation (that would yield coordinate dependence of the model's predictions) is deeply linked to the fact that the spatially smeared UDW Hamiltonian itself encodes an interaction of a single degree of freedom of the detector with a field observable in a region with finite spatial extension, and is therefore inherently nonlocal. The goal of this subsection is therefore to quantify the degree to which this nonlocality of the interaction hinders the covariant nature of predictions prescribed in different coordinate systems. In other words, evaluate how good an approximation we are taking when we consider a smeared UDW detector to model the underlying covariant theory describing the interaction of field and detectors.\color{black} To quantify the break of covariance introduced by the smearing we make use of the results of Section \ref{timeOrderSection}, by taking the coordinates $\bar{\mf x} = (\tau,\bar{\bm x})$ to be the Fermi normal coordinates associated to the detector's center of mass and we take $\mf x = (t,\bm x)$ to be a different arbitrary frame. We recall that time ordering is unambiguous for the timelike and null regions $T$ and $N$. Furthermore the only region where time ordering can cause covariance problems is $S_\leq$ since, by definition, it contains all the events for which time-ordering is not the same in both frames. Considering that the quantum field theory satisfies microcausality ($[\hat{\phi}(\mf x),\hat{\phi}(\mf x')] = 0$ for $\mathsf{x}\rotatebox[origin=c]{90}{\musNatural}\mathsf{x}'$), we can write the commutator of the Hamiltonian weights in \eqref{U2correction} in terms of the commutator of the monopole operator at different times in $S_{\leq}$ as \begin{equation}\label{commhI} \!\big[\hat{h}_I(\mathsf{x}),\hat{h}_I(\mathsf{x}')\big]\!=\! \lambda^2 \Lambda(\mathsf{x})\Lambda(\mathsf{x}') \big[\hat{\mu}(\tau(\mathsf{x})),\hat{\mu}(\tau(\mathsf{x}'))\big] \hat\phi(\mathsf{x})\hat \phi(\mathsf{x'}), \end{equation} where the $\Lambda(\mathsf{x})$ is the spacetime smearing function. From \eqref{eq:monopole} we can explicitly evaluate the monopole moment commutator for a qubit UDW detector as \begin{equation} \big[\hat{\mu}(\tau),\hat{\mu}(\tau')\big] = 2\mathrm{i} \sin(\Omega(\tau-\tau'))\hat{\sigma}_z.\label{commMu} \end{equation} \color{black} Notice that this commutator vanishes only for specific times, namely, when $\tau = \tau'+\pi n /\Omega$ for integer values of $n$, hence the smeared UDW detector interaction Hamiltonian density breaks microcausality. It is important to remark that this issue is present even in the simplest scenarios already studied in the literature, such as inertial motion of particle detectors in flat spacetimes. As mentioned in Section \ref{timeOrderSection}, when an interaction Hamiltonian does not satisfy microcausality, the time ordering associated to different notions of time translations might impact the result for the time evolution operator. This implies that the uses of smeared particle detectors not relying on a quantum field theoretical description of the detector (i.e., particle detector models except for the Fewster-Verch approach~\cite{fewster1,fewster2,fewster3}) implicitly assume a notion of time translation with respect to which the calculations are performed, and, in principle, different choices of such notions might have yielded different predictions. However, a mathematical model that represents reality cannot yield different results depending on the coordinate system used to perform computations. It is thus important to quantify the difference that the different choices of coordinates introduce in the time evolution operator. If these differences were to be relevant, they may cast doubt on the accuracy of the predictions made by particle detector models. To study the possible coordinate dependence of the predictions of particle detector models let us start by comparing the time ordering operation associated to the proper time of the detector's frame $\tau$ with the time ordering with respect to a different parameter $t$, associated to a foliation $\mathcal{E}_t$. We make use of the result of Eq. \eqref{commhI}, where the commutator of $\hat{h}_I(\mf x)$ with itself at different events was explicitly evaluated. \color{black} Concretely, consider two time-ordered exponentials that define two different time evolution operators $\hat{\mathcal{U}}_\tau$ and $\hat{\mathcal{U}}_t$. On the one hand, $\hat{\mathcal{U}}_\tau$ is associated to the Hamiltonian generating time evolution with respect to the proper time of the detector $\hat{H}_I^\tau(\tau)$, that is \begin{align}\label{u30} \hat{\mathcal{U}}_\tau = \mathcal{T}_\tau\exp\left(-\mathrm{i}\! \int\!\dd \tau\, \hat{H}_I^\tau(\tau)\right). \end{align} On the other hand, the time evolution operator $\hat{\mathcal{U}}_t$ is associated to the time-order of the Hamiltonian $\hat{H}_I^t(t)$ generating translations with respect to another time parameter $t$: \begin{align} \hat{\mathcal{U}}_t = \mathcal{T}_t\exp\left(-\mathrm{i}\! \int\!\dd t\, \hat{H}_I^t(t)\right). \end{align} In a covariant formalism we should have $\hat{\mathcal{U}}_\tau=\hat{\mathcal{U}}_t$, so that the predictions do not depend on the choice of coordinates. \color{black} While this is not going to be the case for non-pointlike detectors, it is possible to precisely quantify the difference between the two time-ordering prescriptions in a general smearing scenario. \color{black} As discussed in Section \ref{timeOrderSection}, for the first order Dyson expansion term in the time evolution, we verify that $\hat{\mathcal{U}}^{(1)}_\tau = \hat{\mathcal{U}}^{(1)}_t$ and therefore the first deviation from using the two coordinate systems appears in the second order of the Dyson expansion. From \eqref{U2correction} we get \begin{equation}\label{deviationOne} \hat{\mathcal{U}}_t^{(2)} - \hat{\mathcal{U}}_\tau^{(2)} = - \int_{S_\leq} \!\!\!\dd \mathcal{V} \dd \mathcal{V}' \comm{\hat{h}_I({\mathsf{x}})}{\hat{h}_I({\mathsf{x}'})}\theta\big(t' - t\big). \end{equation} If we expand the integral above using the expression of the Hamiltonian weight $\hat{h}_I(\mathsf{x})$ in terms of the field and monopole operators and equation \eqref{commMu}, we obtain \begin{align} \nonumber \hat{\mathcal{U}}_t^{(2)} - \hat{\mathcal{U}}_\tau^{(2)}=- 2 \mathrm{i} \lambda^2 \hat{\sigma}_z\!\!&\int_{S_\leq} \!\!\!\!\!\dd \mathcal{V} \dd \mathcal{V}'\Lambda(\mathsf{x})\Lambda(\mathsf{x}')\hat\phi(\mathsf{x})\hat \phi(\mathsf{x'})\\ &\times\sin\big[\Omega(\tau-\tau')\big]\theta\big(t' - t\big). \end{align} We then define an operator $\hat{E}$ that acts only on the Hilbert space of the field as \begin{align}\label{defE} \hat{E}\!\coloneqq\! \!- 2 \mathrm{i}\!\!\int_{S_\leq} \!\!\!\!\!\dd \mathcal{\mathcal{V}} \dd \mathcal{V}'\!\Lambda(\mathsf{x})\Lambda(\mathsf{x}')\hat\phi(\mathsf{x})\hat \phi(\mathsf{x'}) \sin\!\big[\Omega(\tau\!-\!\tau')\big]\theta\big(t'\!\! - \!t\big), \end{align} so that we can write the difference between $\hat{\mathcal{U}}_t^{(2)}$ and $\hat{\mathcal{U}}_\tau^{(2)}$ as \begin{equation}\label{jonas} \hat{\mathcal{U}}_t^{(2)} - \hat{\mathcal{U}}^{(2)}_\tau = \lambda^2 \hat{\sigma}_z \hat{E}. \end{equation} Taking the adjoint of Equation \eqref{defE} and using the fact that the field operators commute when evaluated at points in $S_\leq$, one sees that $\hat{E}^\dagger = -\hat{E}$. We can evaluate the exact magnitude of the violation of covariance by choosing a particular initial state for detector and field. In particular, in the reasonable scenario that field and detector are initially uncorrelated, the initial joint state is \begin{equation} \hat{\rho}_0 = \hat{\rho}_{\text{d},0}\otimes \hat{\rho}_\phi. \end{equation} After the interaction, the state of the field-detector system will be given by \begin{equation} \hat{\rho}^\tau = \hat{\mathcal{U}}_\tau\hat{\rho}_0 \hat{\mathcal{U}}_\tau^\dagger. \end{equation} The time-evolved state of the detector is obtained after tracing over the field degrees of freedom: \mbox{$\hat{\rho}_\textrm{d} = \Tr_\phi \hat{\rho}$}. If one decides to prescribe the interaction using any other coordinate system, general covariance would demand that the time evolution implemented by $\hat{\mathcal{U}}_t$ should coincide with that of $\hat{\mathcal{U}}_\tau$. For $\hat{\mathcal{U}}_t$, the density operator used to describe the system after the interaction will be given by \begin{equation} \hat{\rho}^t = \hat{\mathcal{U}}_t \hat{\rho}_0 \hat{\mathcal{U}}_t^\dagger. \end{equation} Since the spacetime region of interaction is given by the support of the spacetime profile $\Lambda(\mf x)$ which is coordinate invariant, we can then use Equation \eqref{jonas} to compare $\hat{\rho}^{t}$ with $\hat{\rho}^\tau$. We obtain \begin{align} \nonumber \hat{\rho}^t &= \hat{\mathcal{U}}_\tau \hat{\rho}_0 \hat{\mathcal{U}}_\tau^\dagger + \lambda^2\left( \hat{\sigma}_z \hat{E} \hat{\rho}_0 \hat{\mathcal{U}}_\tau^\dagger+\hat{\mathcal{U}} _\tau\hat{\rho}_0 \hat{\sigma}_z\hat{E}^\dagger\right)+\mathcal{O}(\lambda^3)\\ & = \hat{\rho}^\tau +\lambda^2\left(\hat{\sigma}_z\hat{\rho}_{\textrm{d},0}\otimes\hat{E}\hat{\rho}_\phi+\hat{\rho}_{\textrm{d},0}\hat{\sigma}_z\otimes \hat{\rho}_\phi \hat{E}^\dagger\right) + \mathcal{O}(\lambda^3). \end{align} The covariance breaking introduced in the detector evolved states can be evaluated by partial-tracing the field. Using the cyclic property of the trace and that $\hat{E}=-{\hat{E}}^\dagger$ we can write $\hat \rho^t_{\text{d}}= \Tr_\phi \hat{\rho}^t$ as \begin{align} \hat{\rho}^t_\textrm{d} &= \hat{\rho}_\textrm{d}^\tau + \lambda^2\left( \hat{\sigma}_z\hat{\rho}_{\textrm{d},0}\Tr \hat{E}\hat{\rho}_\phi+\hat{\rho}_{\textrm{d},0}\hat{\sigma}_z\Tr \hat{\rho}_\phi \hat{E}^\dagger\right)+\mathcal{O}(\lambda^3)\nonumber\\ &= \hat{\rho}^\tau_\textrm{d} + \lambda^2\left( \hat{\sigma}_z\hat{\rho}_{\textrm{d},0}\Tr \hat{E}\hat{\rho}_\phi-\hat{\rho}_{\textrm{d},0}\hat{\sigma}_z\Tr \hat{\rho}_\phi \hat{E}\right)+\mathcal{O}(\lambda^3)\nonumber\\ &= \hat{\rho}_\textrm{d}^\tau + \lambda^2\comm{\hat{\sigma}_z}{\hat{\rho}_{\textrm{d},0}}\Tr \hat{\rho}_\phi \hat{E}+\mathcal{O}(\lambda^3), \end{align} where $\Tr \hat{\rho}_\phi\hat{E}$ can be written in terms of the field state Wightman function as \begin{align}\label{citeE} \Tr \hat{\rho}_\phi\hat{E}\!=- 2 \mathrm{i}\!\!\int_{S_\leq} \!\!\!\!\!\dd \mathcal{\mathcal{V}} \dd \mathcal{V}'\!\Lambda(\mathsf{x})&\Lambda(\mathsf{x}')W_{\hat{\rho}_\phi}(\mf x,\mf x')\\& \times\sin\!\big[\Omega(\tau\!-\!\tau')\big]\theta\big(t'\!\! - \!t\big).\nonumber \end{align} We therefore obtain that the difference between both descriptions is given by \begin{equation}\label{podeSIM} \hat{\rho}_\textrm{d}^t-\hat{\rho}_\textrm{d}^\tau = \lambda^2\comm{\hat{\sigma}_z}{\hat{\rho}_{\textrm{d},0}}\Tr \hat{\rho}_\phi \hat{E}+\mathcal{O}(\lambda^3). \end{equation}\color{black} Equation \eqref{podeSIM} quantifies how much the standard smeared UDW particle detector model changes if one decides to perform the calculations in another reference frame. It is important to remark that the predictions of such models can only be trusted up to the point where the difference between the states $\hat{\rho}_\textrm{d}^t$ and $\hat{\rho}_\textrm{d}^\tau$ is negligible. For example, smeared UDW models provide an accurate approximation for the description of a probe coupling to a quantum field up to second order if the initial state of the detector commutes with its free Hamiltonian, a common choice in many previous works. Recall that we discussed in Section~\ref{timeOrderSection} that the break of covariance is linked to the non-local coupling of a single quantum degree of freedom of the detector to multiple spacelike separated points. Indeed, we can check from Eq. \eqref{podeSIM} that $\hat{E}$ is identically zero for a pointlike detector due to the fact that the pointlike smearing (a delta function) has no points in the region $S_\leq$. \color{black} Furthermore, if the initial state of the field is a Gaussian state with vanishing one-point function---i.e., \mbox{$\langle \hat\phi(\mathsf{x})\rangle_{\hat{\rho}_\phi}=0$}, which includes not only the vacuum or any thermal state but also any squeezed thermal state---there is no breakdown of covariance even at order $\mathcal{O}(\lambda^3)$. This can be seen by noting that the corrections of order $\lambda^3$ are proportional to integrals of the three point function $\langle{\hat{\phi}(\mathsf{x_1})\hat{\phi}(\mathsf{x_2})\hat{\phi}(\mathsf{x_3})}\rangle_{\hat{\rho}_\phi}$, which is zero for any Gaussian state with vanishing one-point function. \color{black} It is also worth to point out that in the cases where there is violation of covariance at leading order, this violation is due to the smearing of the detector and is therefore suppressed with the smearing decay in spacetime as can be seen from Eq. \eqref{defE}. \color{black} This is congruent with the causality violations found in early literature associated to the smearing of particle detectors \cite{martin-martinez2015}. There, the causality violations were deemed controllable if they decayed at least as fast as the detector's smearing function tails. \color{black} Therefore, in the event where the predictions of the model are taken for proper timescales and lengthscales much larger than the light-crossing time of the detector's smearing, the difference between the two time-ordered evaluations should be negligible when the frames are related by non-extreme accelerations and curvatures, providing regimes for which the model's violation of covariance is negligible. These regimes are precisely the regimes where using particle detectors is meaningful according to other relativistic considerations~\cite{us}, and are well within the regimes where phenomena such as the Unruh effect should become observable. We explicitly illustrate this with an example in Section \ref{ExampleFlatSpacetime}. \color{black} \section{Covariance of multiple detectors} After the analysis of the covariance violations in the time-ordering for a single detector, one can wonder what happens when we have scenarios with multiple detectors where, arguably, covariance could be more subtle. These scenarios can combine detectors whose proper times are radically different, and where identifying regimes of timelike or spacelike separation between them is crucial (for example in entanglement harvesting \cite{Valentini1991,Reznik1,reznik2,Retzker2005,RalphOlson1,RalphOlson2,Nick,Cosmo,Salton:2014jaa,Pozas-Kerstjens:2015}). One can work out the deviation between the time-evolution operators defined by different time coordinates in the case of multiple detectors as a straightforward generalization of what was done in Section \ref{CovOneDetector}. Assume we have $N$ detectors, labelled by $j = 1,\dots, N$ whose centres of mass undergo trajectories $\mf z_j(\tau_j)$ parametrized by the proper time of each detector's center of mass, $\tau_{j}$. We then prescribe the interaction Hamiltonian densities (or equivalently their weights) in the Fermi normal coordinates associated to each of the detectors' worldlines, $\bar{\mf x}_{j} = (\tau_{j},\bar{\bm x}_{j})$, according to \begin{equation} \hat{h}_{I,j}(\bar{\mf x}_{j}) = \lambda_j \chi_j(\tau_j)\hat{\mu}_j(\tau_{j}) f_j(\bar{\bm x}_{j}) \hat{\phi}(\bar{\mf x}_{j}), \end{equation} where $f_j$ is the smearing function for the $j$th detector, $\hat{\mu}_j(\tau_{j})$ is its monopole moment and $\lambda_j$ the coupling strength. In Section \ref{timeOrderSection} we obtained results for a general interaction Hamiltonian weight\textcolor{black}{. W}e can now apply those results to the multiple detectors case where the Hamiltonian weight is \begin{equation}\label{hIMultiple} \hat{h}_I(\mathsf{x}) = \sum_{j=1}^{N} \hat{h}_{I,j}(\mathsf{x}). \end{equation} The time-evolution calculations can get quite complicated if the detectors are in different states of motion. This is because to obtain the total Hamiltonian or the time evolution operator, in general, we need to recast all the summands in \eqref{hIMultiple} in terms of a common set of coordinates different from at least some of the detector's proper frame. Notice, however, that in the case of pointlike detectors, and therefore with Dirac deltas as smearings $f_j(\bar{\bm x}_{j})$, the Hamiltonian weight from Equation \eqref{hIMultiple} commutes with itself at spacelike separated points. This is due to the fact that the different monopole moment operators act in different Hilbert spaces and the field operator is assumed to satisfy the axiom of microcausality. Therefore, we conclude that for a system of pointlike detectors, the time evolution operator can be written as \begin{equation} \hat{\mathcal{U}} = \mathcal{T}_{}\exp\left(-\mathrm{i} \int_\mathcal{M}\!\!\! \dd\mathcal{V} \hat{h}_I(\mf x)\right), \end{equation} with no necessity to explicitly indicate with respect to which time parameter the ordering happens. In other words, as anticipated in previous sections, the formalism for (an arbitrary number of) pointlike UDW detectors is fully covariant. Same as in the single-detector case, violations of covariance will appear when smeared detectors are considered. \color{black} In lieu of full covariance for one detector, one may be tempted to privilege the time ordering with respect to the proper time of the detector's center of mass due to the fact that interaction is prescribed in the Fermi-Walker reference frame of the detector's centre of mass. However, when multiple detectors are considered we are mixing different Hamiltonian weights prescribed with respect to different Fermi-Walker frames. The results therefore would be different if we time order the full interaction with respect to any of the many proper time parameters involved in the many-detector problem. In plain words, should we time-order the global $\hat{\mathcal{U}}$ with respect to Alice's detector's proper time? or Bob's? Or Charles's? Or none? Each prescription would yield quantitatively different predictions. Obviously this is a problem: there is no unique way of writing the time evolution operator for a system of $N$ smeared particle detectors. Since the UDW model is an effective model, we do not necessarily expect that it is fully covariant, as all fundamental models must be. The breakdown of covariance just responds to the usage of the effective model beyond the regimes in which it can be used to properly model the (covariant) physical reality. With this in mind, we will show that there are physically reasonable regimes where the covariance breakdown can be minimized and provide approximate results that can be used to define limits of validity of the theory. To quantify the dependence of the predictions of the smeared UDW model on the coordinate system used, let us first consider an arbitrary choice of time parameter $s$ associated to a foliation $\mathcal{E}_s$, yielding the following time evolution operator \color{black} \begin{equation} \hat{\mathcal{U}}_s = \mathcal{T}_{s}\exp\left(-\mathrm{i} \int_\mathcal{M}\!\!\! \dd\mathcal{V} \hat{h}_I(\mf x)\right). \end{equation} In the case of multiple detectors, we can adapt the calculation done in Section \ref{CovOneDetector} to prove a similar result: choosing an initial detectors' state that commutes with their free Hamiltonian cancels the violations of covariance at $\mathcal{O}(\lambda^2)$. Moreover, if the field state is Gaussian with a zero one-point function the difference in the predictions for $\hat{\mathcal{U}}$ with respect to different time parameters is cancelled also at $\mathcal{O}(\lambda^3)$. Furthermore, for arbitrary states, the offending deviation can be calculated at leading order from equation \eqref{U2correction} by plugging in the Hamiltonian weight \eqref{hIMultiple}. Let us consider the second order term in the Dyson expansion prescribed with respect to two notions of time ordering, $t$ and $s$ that do not necessarily agree. We then obtain two time evolution operators, $\hat{\mathcal{U}}_t$ and $\hat{\mathcal{U}}_s$ with their associated second order terms being $\hat{\mathcal{U}}_t^{(2)}$ and $\hat{\mathcal{U}}_s^{(2)}$. Recalling that in the region $S_\leq$ the field operators commute, and so do the monopole operators associated to different detectors, we have that $\big[\hat{h}_{I,i}(\mathsf{x}),\hat{h}_{I,j}(\mathsf{x}')\big] = 0$ for $i\neq j$ in $S_\leq$, and Eq. \eqref{U2correction} yields \begin{equation}\label{deviation} \hat{\mathcal{U}}_t^{(2)} - \hat{\mathcal{U}}_s^{(2)} = - \sum_{i = 1}^N\int_{S_\leq} \!\!\!\dd \mathcal{V} \dd \mathcal{V}' \comm{\hat{h}_{I,i}(\mathsf{x})}{\hat{h}_{I,i}(\mathsf{x}')}\theta\big(t' - t\big). \end{equation} This gives us \begin{equation} \hat{\mathcal{U}}_t^{(2)} - \hat{\mathcal{U}}_s^{(2)} = \lambda^2 \sum_{i = 1}^N\hat{\sigma}_{z,i} \hat{E}_i, \end{equation} where $\hat{E}_i$ corresponds exactly to the $\hat{E}$ defined in \eqref{defE} for each detector. If the system starts in an uncorrelated state of the form \begin{equation} \hat{\rho}_0 = \left(\bigotimes_{i = 1}^N\hat{\rho}_{0, i}\right)\otimes\hat{\rho}_\phi, \end{equation} the same procedure outlined in section \ref{CovOneDetector} leads to two different density operators for the detector part of the system, $\hat{\rho}^s_{\textrm{d}}$ associated to time evolution with respect to the parameter $s$, and $\hat{\rho}^t_{\textrm{d}}$ associated to the parameter $t$. Their difference will then be given by \begin{equation}\label{last} \hat{\rho}_\textrm{d}^t-\hat{\rho}^s_\textrm{d} = \lambda^2\sum_{i=1}^N\left(\bigotimes_{j \neq i}\hat{\rho}_{0, j}\right)\comm{\hat{\sigma}_{z,i}}{\hat{\rho}_{0,i}}\Tr \hat{\rho}_\phi \hat{E}_i+\mathcal{O}(\lambda^3). \end{equation} It is therefore clear that if all detectors start in a product state, with the state of each detector being a statistical mixture of eigenstates of the respective free Hamiltonian, the deviation up to second order in the coupling vanishes\color{black}, allowing the model to be used within these regimes. This means that although there is no unique non-perturbative way of writing a given time evolution operator for smeared detectors, we do not see any difference in predictions for different time ordering at leading order in the coupling. It is important to remark that the standard results obtained from techniques and setups that are dependent on multiple UDW detectors, such as entanglement harvesting and quantum energy teleportation, are dominated by second order dynamics and often use initial states for which the second order violation cancels. In all those cases there is no violation of covariance in the final result. \color{black} Moreover, same as in the case of a single detector, the violations of covariance scale with the size of the detectors as it can be seen from the definition of the $\hat E_i$ operators. This means that the violation of covariance can be made small under the following three conditions: 1) the relative motion of the detectors with respect to the frame in which we are computing $\hat{\mathcal{U}}$ is not extreme, 2) the curvature around the detectors is also not extreme, and 3) the predictions are going to be considered for times much longer than the light-crossing time of the lenghtscale of each of the detectors in their respective proper frames. In those cases, making the detector smaller suppresses the covariance violations very fast. For atomic-sized detectors one would expect these three assumptions to hold even for regimes where the Unruh effect is detectable, paralleling the discussion about orders of magnitude where these effects are relevant found in \cite{us}. We will illustrate this decay of the violations of covariance with an example in the next section. \section{Example: Smeared Inertial detector in Flat spacetime}\label{ExampleFlatSpacetime} Even the simplest possible dynamics for the detector and field---inertial motion in flat spacetimes---already suffers from the covariance violation studied in this paper. That is, the UDW model for an inertial detector (of center of mass proper time $\tau$) moving with respect to the frame used for the quantization of a scalar quantum field $(t,\bm{x})$ (that we call the lab frame) still yields different predictions if the time ordering is taken with respect to $\tau$ or $t$. Evaluating Equation \eqref{defE} explicitly for this simple case will provide intuition on the scales that play a role in determining the regimes where the breaking of covariance can be neglected. Without loss of generality, we can take the detector's centre of mass to be moving in the $x$ direction, with positive speed $v$ relative to the lab frame. We make the choice of Fermi-Walker coordinates for the detector $(\tau, \bar{x}, \bar{\bm{x}}_\perp)$, so that $\bar{\bm{x}}_\perp$ comprises the coordinates in the spatial directions that are orthogonal to the detector's velocity. The lab time $\Delta t$ elapsed between two events with coordinates $(\tau, \bar{x}, \bar{\bm{x}}_\perp)$ and $(\tau', \bar{x}', \bar{\bm{x}}'_\perp)$ is simply given by a Lorentz transformation: \begin{equation} \begin{gathered} \Delta t = \gamma\left(\Delta\tau + v\Delta \bar{x}\right),\\ \gamma \equiv \dfrac{1}{\sqrt{1 - v^2}}, \end{gathered} \end{equation} where $\Delta\tau = \tau - \tau'$, $\Delta\bar{x} = \bar{x} - \bar{x}'$. Time ordering is different in the two frames only for events in the region $S_\leq$, since in that region $\Delta\tau > 0$ and $\Delta t < 0$. This happens when \begin{equation} \Delta\bar{x} < -\dfrac{\Delta \tau}{v}. \end{equation} Therefore, in this case, the region $S_\leq$ can be written in the Fermi normal coordinates of the detector as the points $(\mathsf{\bar{x}}, \mathsf{\bar{x}}')$ parametrized by \begin{equation}\label{parametrization} \begin{gathered} \bar{\mf{x}} = (\tau, \bar{x}, \bar{\bm{x}}_\perp), \\ \bar{\mf{x}}' = (\tau - \sigma, \bar{x} - \xi, \bar{\bm{x}}_\perp') \end{gathered} \end{equation} with $\sigma > 0$, $\xi < -\sigma/v$, and $\bar{\bm{x}}_\perp, \bar{\bm{x}}_\perp'$ arbitrary. One primary consistency check for our previous claims is to see that Eq. \eqref{defE} vanishes when we set the smearing function to be \mbox{$f(\bar{x}, \bar{\bm{x}}_\perp) = \delta(\bar{x})\delta^{(n-1)}(\bar{\bm{x}}_\perp)$}, which would correspond to the case of a pointlike detector. With this choice of smearing and the parametrization of the region $S_\leq$ according to Eq.~\eqref{parametrization}, the integrals over $\bar{x}, \bar{\bm{x}}_\perp, \bar{\bm{x}}'_\perp$ in Eq.~\eqref{defE} can be trivially computed in the case of a stationary state of the field, so that we are left with \begin{align}\label{inertialerror} \Tr \hat{\rho}_\phi \hat{E} =&\, 2\mathrm{i}\int_{0}^{\infty}\!\!\!\!\dd\sigma\int_{-\infty}^{-\sigma/v}\!\!\!\!\!\!\!\!\!\!\!\dd\xi\,\, \delta(\xi)\sin(\Omega\sigma)\mathcal{W}_{\hat{\rho}_\phi}(\xi,\sigma)\nonumber\\ &\times\int_{\mathbb{R}}\!\dd\tau \chi(\tau) \chi(\tau - \sigma), \end{align} where \begin{equation} \mathcal{W}_{\hat{\rho}_\phi}(\xi,\sigma)\coloneqq \ev{\hat{\phi}(\mf x(0,0,\bm 0)) \hat{\phi}(\mf x(-\sigma, -\xi, \bm 0))}_{\hat\rho_\phi} \end{equation} is obtained from the field's Wightman function $\langle\hat\phi(\mf{x})\hat\phi(\mf{x}')\rangle$ assuming stationarity and after carrying out all the spatial integrals but $\xi$ using the delta smearing. Since the domain of integration in $\xi$ never crosses the origin, the integral in Eq. \eqref{inertialerror} yields zero. This is consistent with what we showed in Section \ref{CovOneDetector}: pointlike detectors do not introduce any covariance problems. We now compute explicitly the deviation from predictions between time-ordering with detector's proper time and an arbitrary inertial frame. For concreteness, let us consider the vacuum state of the field in three spatial dimensions. The vacuum Wightman function of a massless scalar field evaluated between spacelike points is given by: \begin{equation}\label{wightman} \bra{0}\!\hat{\phi}(\mathsf{x})\hat{\phi}(\mathsf{x}')\!\ket{0} = \dfrac{2}{{(2\pi)^2}}\dfrac{1}{\abs{\Delta \mathsf{x}}^2}, \end{equation} where $\abs{\Delta\mathsf{x}}^2 = \eta_{\mu\nu}(\Delta\mathsf{x})^\mu(\Delta\mathsf{x})^\nu$ is the invariant spacetime interval between the events $\mathsf{x}$ and $\mathsf{x}'$. In the coordinates associated to the frame of the detector, $\abs{\Delta \mf x}^2$ can be written as \begin{equation}\label{deltaX} \abs{\Delta\mathsf{x}}^2 = -\sigma^2 + \xi^2 + \abs{\bar{\bm{x}}_\perp - \bar{\bm{x}}'_\perp}^2. \end{equation} We consider a Gaussian switching function $\chi(\tau)$ with timescale $T$ and a Gaussian smearing function $f(\bm{\bar{x}})$ with length scale $\ell$ respectively: \vspace*{-8pt} \begin{align} \chi(\tau) &= \dfrac{1}{\sqrt{2\pi}}\exp\left(-\dfrac{\tau^2}{2T^2}\right), \end{align} \vspace*{-18pt} \begin{align} f(\bar{\bm{x}}) &= \dfrac{1}{\sqrt{(2\pi)^3}\ell^3}\exp\left(-\dfrac{\abs{\bar{\bm{x}}}^2}{2\ell^2}\right). \end{align} With these choices for switching and smearing, the integrals over $\tau$ and $\bar{x}$ in \eqref{defE} can be computed in closed form. The integrals in the perpendicular directions can be evaluated by changing variables from $\bar{\bm{x}}_\perp, \bar{\bm{x}}_\perp'$ to $\bm{r} = \bar{\bm{x}}_\perp - \bar{\bm{x}}_\perp'$ and $\bm{R} = \bar{\bm{x}}_\perp + \bar{\bm{x}}_\perp'$. By doing so, Eq. \eqref{defE} takes the following form \begin{widetext} \begin{align} \Tr \hat{\rho}_\phi \hat{E} =& \dfrac{4\mathrm{i}}{{(2\pi)^2}} \int_{\mathbb{R}^2}\!\!\dd^{2}\bar{\bm x}_\perp\int_{\mathbb{R}^2}\!\!\dd^{2}\bar{\bm x}_\perp'\int_{\mathbb{R}^2}\!\!\!\dd\tau\dd \bar{x}\int_{0}^{\infty}\!\!\!\dd\sigma\int_{-\infty}^{-\sigma/v}\!\!\!\dd \xi \,\dfrac{\chi(\tau)\chi(\tau - \sigma)\sin(\Omega\sigma)f(\bar{x}, \bar{\bm{x}}_\perp)f(\bar{x} - \xi, \bar{\bm{x}}_\perp')}{\left(-\sigma^2 + \xi^2 + \abs{\bar{\bm{x}}_\perp - \bar{\bm{x}}'_\perp}^2\right)}\nonumber\\ =& \dfrac{\mathrm{i} T}{{2 \pi^2}\ell^3} \int_{0}^{\infty}\dd \sigma \int_{-\infty}^{-\sigma/v}\dd \xi\, e^{-\sigma^2/4T^2}e^{-\xi^2/4 \ell^2}\sin(\Omega\sigma)\int_{\mathbb{R}^2}\dd^2r\dfrac{e^{-\abs{\bm{r}}^2/4\ell^2}}{\xi^2 - \sigma^2 + \abs{\bm{r}}^2} \nonumber\\ =& \dfrac{\mathrm{i} T}{{\pi}\ell^3} \int_{0}^{\infty}\dd \sigma \int_{-\infty}^{-\sigma/v}\dd \xi\, e^{-\sigma^2/4T^2}e^{-\xi^2/4 \ell^2}\sin(\Omega\sigma)\int_{0}^{\infty}\dd r\dfrac{re^{-r^2/4\ell^2}}{\xi^2 - \sigma^2 + r^2} \nonumber\\ =& \dfrac{\mathrm{i} T}{2{\pi}\ell^3}\int_{0}^{\infty}\dd \sigma \int_{-\infty}^{-\sigma/v}\dd \xi\,\exp\left(-\sigma^2\left(\dfrac{1}{4T^2} + \dfrac{1}{4\ell^2}\right)\right)\sin(\Omega\sigma)\,\operatorname{Ei}\left(\tfrac{-\xi^2 + \sigma^2}{4\ell^2}\right) \label{error1}\\ =& \dfrac{\mathrm{i} }{{\pi}}\left(\dfrac{T}{\ell}\right)^3 v\int_{0}^{\infty}\dd s \int_{-\infty}^{-s}\dd \zeta\,\exp\left(-\dfrac{s^2 v^2}{4}\left(1 + \dfrac{T^2}{\ell^2}\right)\right)\sin(\Omega T v s)\,\operatorname{Ei}\left((-\zeta^2 + s^2v^2)\dfrac{T^2}{4\ell^2}\right) \label{error2}, \end{align} \end{widetext} where $\operatorname{Ei}(x)$ is the exponential integral function~\cite{database}, and we get equation \eqref{error2} from \eqref{error1} by performing the change of variables $s = \sigma/vT$, $\zeta = \xi/T$. Analysis on \eqref{error2} shows that for fixed $v$, the violation of covariance computed above goes to zero as the duration of the interaction $T$ becomes much longer than the light-crossing time of the detector $\ell$. Numerical results show that for values of $T/\ell\gtrapprox 10^3$ the error becomes negligible for speeds below $v\leq0.9$. As a summary, in the limit of $T/\ell \rightarrow \infty$, the whole integrand in equation \eqref{error2} vanishes, and therefore so does the covariance breaking term as expected from the discussion in previous sections. \section{Conclusion} We have studied the breakdown of covariance that the time-ordering operation introduces in smeared particle detector models (such as the UDW model) used in QFT in general spacetimes. We have first shown how for pointlike detectors, the time-ordering operation does not introduce any coordinate dependence: all predictions of properly prescribed pointlike UDW detectors are covariant. Namely, we have explicitly shown how, for the predictions of a system of $N$ pointlike particle detectors on arbitrary trajectories in curved spacetimes, all possible choices of time-ordering are equivalent. We highlighted that all predictions are covariant even when the multiple pointlike detectors are relatively spacelike separated. This can be traced back to the fact that a) pointlike detectors only see the field along timelike trajectories---so the time ordering of the events making up each detector's worldline is unambiguous---and b) the individual Hamiltonian densities coupling each detector to the field mutually commute when the detectors are spacelike separated. In contrast, we have shown that, for smeared detectors, the fact that the detectors couple to the field at multiple spacelike separated points introduces a break of covariance in time-ordering. This is problematic because different choices of time-ordering parameter can, in principle, yield radically different predictions. This is aggravated for systems of many detectors in arbitrary states of motion since there is no physical reason in those setups to privilege one particular notion of time order. With this in mind, we explicitly evaluated the magnitude of this break of covariance and concluded that if a detector starts in a statistical mixture of eigenstates of its free Hamiltonian (such as ground, excited or thermal state), the deviations from a fully covariant prediction are of third order in the detector's coupling strength (and in most cases even fourth order), hence subleading for many interesting phenomena (e.g., the thermal response of detectors in the Unruh and Hawking effects~\cite{Unruh1976,Sciama1977,Unruh-Wald,Takagi,Louko} and typical scenarios of entanglement harvesting \cite{Valentini1991,Reznik1,reznik2,Retzker2005,RalphOlson1,RalphOlson2,Nick,Cosmo,Salton:2014jaa,Pozas-Kerstjens:2015}). Furthermore, in the cases where the breakdown of covariance is of leading order, we have argued that it is of the same magnitude as the causality violation already introduced by the mere fact of smearing a detector degree of freedom~\cite{martin-martinez2015}, and showed that these deviations from covariance are suppressed with the smearing length scales. Analogously to the discussion in \cite{us},the difference between predictions in different coordinates can be negligible in scenarios where the duration of the interaction is much longer than the light-crossing time of the detector's smearing length scale in all the detectors' center of mass frames and in the coordinate frame used to perform calculations. We have also shown a particular example of this in flat spacetime. The analysis on this paper quantifies the coordinate dependence of predictions for particle detector models in a very general setting as a function of the initial states, the shape and state of motion of the detectors, and the geometry of the spacetime they move in. Thus, these results establish the limits of validity of smeared particle detector models to covariantly extract information from a quantum field. \section{Acknowledgements} The authors thank Luis J. Garay, Jonas Neuser and Erickson Tjoa for insightful discussions. E.M-M acknowledges the support of the NSERC Discovery program as well as his Ontario Early Researcher Award. T.R.P. and B.S.L.T. thank IFT-UNESP/ICTP-SAIFR and CAPES for partial financial support. Research at Perimeter Institute is supported in part by the Government of Canada through the Department of Innovation, Science and Economic Development Canada and by the Province of Ontario through the Ministry of Colleges and Universities. \begin{comment}
{ "redpajama_set_name": "RedPajamaArXiv" }
1,224
namespace Poco { SynchronizedObject::SynchronizedObject() { } SynchronizedObject::~SynchronizedObject() { } } // namespace Poco
{ "redpajama_set_name": "RedPajamaGithub" }
1,760
There's something about running first thing which makes you think that you're moving much quicker that you actually are. Even the usual first mile which I definitely know is always intentionally slow felt quicker than usual. There must be something to this, probably because you've been lead down for the best part of 8 hours. Who knows. We're at that part of the year now where I am fully justified in using a head torch straight out of the door. However, we're also in the part where half to 3/4 way through I can turn it off and run in the dawn light. It's great. I try to time my run and devise my routes so that I'm coming across the moor at that time, and this morning I got it spot on. Mist was rolling across the landscape to either side of me, sheep and cows slept and the sun began to creep up from behind the hilly terrain in the distance. It was awesome. There's only a couple of months of the year where you get this junction of perfect conditions, the other obviously being in spring. This time of year though, it's only going to be darker for longer and thus I'll have more use for the head torch, not less. Which reminds me, I must put it on charge ready for tomorrow. Today was a "medium long run" as I believe they call it in the trade. 90mins of running pre-dawn really puts you into the training mindset. It's these runs which you're most likely to see those improvements, and I'm beginning to feel nearer to the fitness I left behind at my last race season, before the joy of summer and the hot weather took hold. How far away does that feel now, by the way? With that return to fitness however means the routes I used to run are now shorter than I need them to be. Thus, here begins a few weeks of finding those new routes to run. Always an exciting time.
{ "redpajama_set_name": "RedPajamaC4" }
248
{"url":"https:\/\/www.elitedigitalstudy.com\/11799\/find-the-equation-of-the-set-of-points-which-are-equidistant-from-the-points-1-2-3-and-3-2-1","text":"Find the equation of the set of points which are equidistant from the points (1, 2, 3) and (3, 2, \u20131).\n\nAsked by Abhisek | 11 months ago | \u00a086\n\n##### Solution :-\n\nLet A (1, 2, 3) & B (3, 2, \u2013 1)\n\nLet point P be (x, y, z)\n\nSince it is given that point P(x, y, z) is equal distance from point A(1, 2, 3) & B(3, 2, \u2013 1)\n\nPA = PB\n\nFirstly let us calculate\n\nCalculating PA\n\nP \u2261 (x, y, z) and A \u2261 (1, 2, 3)\n\nBy using the formula,\n\nDistance PA =\n\n$$\\sqrt{(x^2 \u2013 x^1)^2 + (y^2 \u2013 y^1)^2 + (z^2 \u2013 z^1)^2}$$\n\nSo here,\n\nx1\u00a0= x, y1\u00a0= y, z1\u00a0= z\n\nx2\u00a0= 1, y2\u00a0= 2, z2\u00a0= 3\n\nDistance PA\n\n$$\\sqrt{(1 \u2013 x)^2 + (2 \u2013 y)^2 + (3 \u2013 z)^2}$$\n\nCalculating PB\n\nP \u2261 (x, y, z) and B \u2261 (3, 2, \u2013 1)\n\nBy using the formula,\n\nDistance PB\u00a0=\n\n$$\\sqrt{(x^2 \u2013 x^1)^2 + (y^2 \u2013 y^1)^2 + (z^2 \u2013 z^1)^2}$$\n\nSo here,\n\nx1\u00a0= x, y1\u00a0= y, z1\u00a0= z\n\nx2\u00a0= 3, y2\u00a0= 2, z2\u00a0= \u2013 1\n\nDistance PB\u00a0=\n\n$$\\sqrt{(3 \u2013 x)^2 + (2 \u2013 y)^2 + (-1 \u2013 z)^2}$$\n\nSince PA = PB\n\nSquare on both the sides, we get\n\nPA2\u00a0= PB2\n\n(1 \u2013 x)2\u00a0+ (2 \u2013 y)2\u00a0+ (3 \u2013 z)2\u00a0= (3 \u2013 x)2\u00a0+ (2 \u2013 y)2\u00a0+ (\u2013 1 \u2013 z)2\n\n(1 + x2\u00a0\u2013 2x) + (4 + y2\u00a0\u2013 4y) + (9 + z2\u00a0\u2013 6z)\n\n(9 + x2\u00a0\u2013 6x) + (4 + y2\u00a0\u2013 4y) + (1 + z2\u00a0+ 2z)\n\n\u2013 2x \u2013 4y \u2013 6z + 14 = \u2013 6x \u2013 4y + 2z + 14\n\n4x \u2013 8z = 0\n\nx \u2013 2z = 0\n\nThe required equation is x \u2013 2z = 0\n\nAnswered by Pragya Singh | 11 months ago\n\n### Related Questions\n\n#### A(1, 2, 3), B(0, 4, 1), C(-1, -1, -3) are the vertices of a triangle ABC. Find the point in which the bisector of the\n\nA(1, 2, 3), B(0, 4, 1), C(-1, -1, -3) are the vertices of a triangle ABC. Find the point in which the bisector of the angle\u00a0\u2220BAC meets BC.\n\n#### The mid-points of the sides of a triangle ABC are given by (-2, 3, 5), (4, -1, 7) and (6, 5, 3). Find the coordinates\n\nThe mid-points of the sides of a triangle ABC are given by (-2, 3, 5), (4, -1, 7) and (6, 5, 3). Find the coordinates of A, B and C.\n\n#### If the points A(3, 2, -4), B(9, 8, -10) and C(5, 4, -6) are collinear, find the ratio in which C divided AB.\n\nIf the points A(3, 2, -4), B(9, 8, -10) and C(5, 4, -6) are collinear, find the ratio in which C divided AB.","date":"2022-11-30 07:41:51","metadata":"{\"extraction_info\": {\"found_math\": true, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 0, \"mathjax_display_tex\": 1, \"mathjax_asciimath\": 0, \"img_math\": 0, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.5736891031265259, \"perplexity\": 977.358387204662}, \"config\": {\"markdown_headings\": true, \"markdown_code\": true, \"boilerplate_config\": {\"ratio_threshold\": 0.18, \"absolute_threshold\": 10, \"end_threshold\": 15, \"enable\": true}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2022-49\/segments\/1669446710733.87\/warc\/CC-MAIN-20221130060525-20221130090525-00732.warc.gz\"}"}
null
null
Q: Get a specific object from url ( API ) and print the value in html Please i want to get a value from API with JSON , but the object wanted is duplicated and i don't know how to chose the value of this object in the screen I have an object named "region" but it's duplicated many times, so i want to get just the first value and this is my code javascript <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>Document</title> </head> <body> cas confirmé<p id="1"></p> <br> <br> cas recovered<p id="2"></p> <br> <br> cas decedés<p id="3"></p> </body> <script> const api = 'https://covidma.herokuapp.com/api?fbclid=IwAR2Zsptom8RZPknstJrmlJwaCKfSTvxyO5fOCAUt_NNN9YvbsSPq1b_kF0o'; async function getData() { const response = await fetch(api); const data = await response.json(); const [{ confirmed , recovered , region }] = data; document.getElementById('1').textContent = confirmed; document.getElementById('2').textContent = recovered; document.getElementById('3').textContent = region[0]; } getData(); </script> </html> A: As a comment has noted, it's always easiest to post code instead of a screenshot. From what I could tell, the correct index should be: const { confirmed, recovered, region } = data[0][0] If above doesn't work, please update your question with actual code, instead of screenshots. You can use markdown codeblocks: ```code```
{ "redpajama_set_name": "RedPajamaStackExchange" }
6,993
Dandy Warhols | Showbox | Seattle, WA | Review Article Contributed by SonicHiFi | Published on Monday, June 25, 2012 Thunderous oscillations expand violently from center stage, miraculously freed from a vintage Moog chipset only to be captured by my outer pinna, which sends the tone swirling inward toward the depths of my cochlea. The synthetic drone weaves through a latticework of scenestirs and technocrats occupying Seattle's Showbox Theater this evening. Ensuing layers of tonal stew self-oscillate, self-sustain, and self-evolve into an overwhelming muck that rattles the cinderblock before receding back toward its creator.The creator, one Courtney Taylor-Taylor, remains stoic -- unaffected if not wholly underwhelmed by the magnitude of sound coming from his custom stack and subsequent house PA. He turns his back to the audience and adjusts his rig, spinning knobs with no discernible impact and ingesting liquid of no discernible proof. As a spectator, its unclear what accounts for Taylor's stature; his is not a modest or shy presence but indeed the lack of a presence. Distinct from the "aloof persona," a trait all-to-common amongst songwriters and musicians, Taylor is a specimen simultaneously here and gone, visible yet transparent. Perhaps he's frustrated with the sound system, perhaps he's under the influence, or perhaps he's simply over it all: playing identical set after identical set, living on the road, setting up and breaking down, the life of a frontman -- even of a band as successful as The Dandy Warhols -- can't be as romantic as it sounds.But Taylor thrusts onward, turns to the crowd, and overlays a vocal drone that breaks the psychedelic tension of a forever building, forever breaking, forever bubbling synthetic stew. The opening song evolves and dissolves, elaborates and degenerates, sings, whispers, screams and bickers, calls forth as the Siren yet falls short to beguile. It demands to be art, and treated as such. It is neither alive nor dead, just like its creator, the man who wasn't there.The Dandys continue to interplay self-oscillating muck amidst a string of toe tapping classics including "Not If You Were The Last Dandy" and "We Used To Be Friends." But this incarnation is not the same band of Dig fame, indeed they barley resemble the ragtag rockers who achieved pop art celebrity with the help of David LaChapelle, or the experimentalists who conquered Europe with the help of chiseled cheekbones and fitted shirts. It's not even the same band that had the adrenaline and ego to go jab-for-jab with Anthony Newcombe. Their renditions of these hits felt less like crowd pleasers and more like introspective meditations of past glory. They had none of the spite one typically expects from a band bored to death of playing their most popular cuts, but rather in its place the deeper tragedy of no longer feeling it. Simply put, they were going through the motions.Sonic structure continued as such, The Dandys trading off between synthetic stew and strung-out transcendentalism. By halftime, Taylor's voice was tired and unemotional. Come encore, digital drone overtook harmonic content. And by the end of the night, we had witnessed the inevitable vanish of a band waning in relevance, and the disappearance a man who wasn't there. Insightful evening? Quite. But do yourself a favor, and stick to the recordings. Bumbershoot part 2
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
2,210
La Prédication de saint Pierre est une fresque de Masolino décorant la chapelle Brancacci dans l'église Santa Maria del Carmine à Florence. L'œuvre, datable d'environ 1424-1425 (), représente une scène des Histoires de saint Pierre tirée des Actes des Apôtres (II, 14-41). Histoire Les fresques de la chapelle Brancacci sont une énigme pour les historiens du fait de l'absence de documentation authentifiée. Peut-être commandées à Masolino, qui avait le jeune Masaccio comme assistant, des preuves indirectes permettent de savoir qu'elles ont dû être commencées en 1424 et qu'à partir de 1425, elles sont exécutées par Masaccio seul après le départ de Masolino pour la Hongrie. Cette scène, sauvée des repeints baroques de la voûte, est ressortie noircie par l'incendie de 1771 qui a détruit une grande partie de la basilique. Ce n'est qu'avec la restauration de 1983-1990 qu'il a été possible de retrouver la couleur brillante d'origine et que les repeints ont été éliminées. Description et style La scène de la Prédication se trouve sur le mur du fond dans le registre central, côté gauche, à côté du Paiement du tribut de Masaccio. L'histoire de référence est celle présente dans les Actes des Apôtres (II 14-41) dans laquelle saint Pierre commence à prêcher à la foule après la Pentecôte, exhortant le peuple au baptême. Dans cette scène, Pierre est représenté seul, tandis que dans le texte des Actes il est en compagnie des autres apôtres : ce choix souligne fortement sa primauté et sa personnification avec toute l'Église. Masolino a peint la fresque en huit jours, et on suppose que Masaccio aurait participé à la peinture des montagnes en arrière-plan, qui sont liées à celles du Tribut. Seules les montagnes sont très certainement de Masaccio, qui semblent être en continuation de la scène précédente du Tribut, et qui sont très différentes des roches escarpées et angulaires typiques de Masolino (comme à Castiglione Olona ), au style giottesque avec des roches anguleuses. Elles sont ici traitées comme des masses informes et gonflées, avec un contour doux d'arbres et d'arbustes peints à sec. Pierre est représenté comme un orateur ardent habillé dans le style romain (qui pourrait être un rappel du Saint Jean de Giotto dans la scène de la Résurrection de Drusiana dans la chapelle Peruzzi à Florence). Il se trouve devant la foule tandis qu'il prêche d'un geste éloquent. Cette figure énergique avait dans le passé été attribuée à Masaccio, mais le traitement miniaturiste des boucles de ses cheveux et de sa barbe, ainsi que les visages doux et uniformes des spectateurs, sont des signes évidents de l'art de Masolino. Les expressions des spectateurs sont des plus variées, de la douce attention de la religieuse voilée au premier plan, à l'engourdissement de la fille et du vieil homme barbu, à la peur de la femme en arrière-plan, dont les seuls yeux froncés sont visibles. Les trois visages de jeunes gens derrière le saint sont probablement des portraits de contemporains, ainsi que les deux frères sur la droite, peut-être deux carmélites du couvent du Carmel qui, dans le passé, étaient également attribués à Masaccio. Bibliographie John_Spike, Masaccio, Rizzoli libri illustrati, Milan, 2002 Mario Carniani, La Cappella Brancacci a Santa Maria del Carmine, in AA.VV., Cappelle del Rinascimento a Firenze, Editrice Giusti, Florence, 1998. Pierluigi De Vecchi ed Elda Cerchiari, I tempi dell'arte, volume 2, Bompiani, Milan, 1999 Source de traduction Articles connexes Chapelle Brancacci Gothique international italien Peinture de la Renaissance Renaissance florentine Renaissance italienne Fresque de Masaccio Pierre apôtre dans la peinture Œuvre d'art à Florence Chapelle Brancacci
{ "redpajama_set_name": "RedPajamaWikipedia" }
2,423
September 1, 2017 September 1, 2017 heynineteenmusic Hair Down – Mollie King – Review It was a real tragedy when Girls Aloud split, wasn't it? The best girl band since the Spice Girls, their inventive, off-kilter style of pop was an absolute delight, earning the band a record breaking run of top 10 hits. The wind in Girls Aloud's sails was undoubtedly Xenomania, the songwriting machine that manufactured hit after hit, each one innovative and unique. But since the group disbanded, Xenomania haven't quite found the right act in which to channel their genius. Enter Mollie King. Former member of middling girl band The Saturdays (very much the Tesco Value to Girls Aloud's Tesco's Finest), she's no stranger to Xenomania, having worked with the songwriting/production team during her girl group days. Knowing which side her bread is buttered, she's teamed up with the hit-makers again, this time on her own for solo single 'Hair Down'. What a Girls Aloud song this would be. You can picture the choreography, the girls in unison, hands on hips, heads bobbing. There are echoes of 'Sexy! No No No' to be heard here, though the track's focal point is certainly the blaring brass that gives the song an impossible-not-to-love bounce. If Girls Aloud were still around, this is the kind of single they'd be releasing. But enough about Girls Aloud (only joking, you can never have too much GA). King is a fitting collaborator for Xenomania, her voice malleable and easily engineered. But though her name is on the record, this is a Xenomania affair through and through. The swaggering 'na-na-na' hook, the no-room-for-nuance brassy arrangement, the clumsy lyrics (imagine Kimberley singing "Pleased to meet your barber shop quartet, but that means you obviously aren't getting any sex"!!). It's Xenomania's genius condensed into a gaudy and incredibly fun blast of no-nonsense pop, their best since the heady days when GA were ruling the roost. King has done a cracking job on her latest single, snagging the best pop pioneers in the business and concocting a fantastically camp, flashy and addictive track. Only time will tell whether the notoriously bland tastes of the music buying public will allow such a colourful track to become a hit – but then, these are the people who sent Ed Sheeran to number one for a hundred years. So who really cares what they think, right? @alexsnorris Previous Freedom Child – The Script – Review Next …Ready For It? – Taylor Swift – Review
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
8,556
\section{Introduction} Unambiguous experimental realization of a quantum spin liquid (QSL) state remains an enduring challenge \cite{Balents10:464,Zhou17:89,broholm20:367}. Characterized by a ground state featuring highly entangled spins exhibiting no long-range magnetic order, QSL states are born out of an intricate and often subtle interplay of comparable, often competing, energy scales and are thought to be quenched by relatively small perturbations. Thus, understanding and controlling crystalline disorder, structural distortions, chemical impurities, and intrinsic defects are critical challenges when developing QSL phenomenology in real materials. NaRuO$_2$ is a newly proposed, candidate QSL host that straddles a unique energy landscape -- one where Heisenberg-Kitaev interactions as well as extended exchange foster a native, quantum disordered ground state \cite{ortizNaRuO2}. NaRuO$_2$ is a member of the layered family of $AB$O$_2$ delafossite-like oxides, a larger family of $R\overline{3}m$ quasi-two-dimensional materials that support ideal antiferromagnetic triangular lattices on the $B$-site sublattice. Specifically, NaRuO$_2$ (Figure \ref{fig:Crystal}) features a triangular lattice of Ru$^{3+}$ ions separated by planes of Na$^+$. The edge-sharing RuO$_6$ octahedra place the Ru$^{3+}$ (4d$^5$) ions in a lightly trigonally distorted cubic crystal field. With appreciable spin-orbit coupling $\lambda$ and Coulomb repulsion $U$, the system is capable of supporting a half-filled $J_\text{eff}=1/2$ orbital. The result is a weak $J_\text{eff}=1/2$ Mott state with a disordered magnetic ground state and energetic antiferromagnetic interactions \cite{ortizNaRuO2}. Despite lacking native chemical disorder such as that present in triangular lattice compounds like YbMgGaO$_{4}$ \cite{Paddison17:13,li19:2}, off-stoichometry and the resulting defects are a persistent concern among the alkali metal delafossite variants \cite{Dally17:459,clarke1998synthesis}. The typical culprit tends to be alkali-metal vacancies, whose presence is traditionally countered by the introduction of an excess of alkali precursors during growth. However, the historical precedent for alkali-vacancies as the dominant defect often neglects complex structure-defect-property relationships that can dominate in real systems -- NaRuO$_2$ is one such example. In this work, we examine the defect chemistry of the Heisenberg-Kitaev candidate material NaRuO$_{2}$, mapping the Na--Ru--O phase diagram in the vicinity of NaRuO$_{2}$ to understand the extent and type of off-stoichiometry supported by the compound. We demonstrate the formation of a single solid-solution Na$_{3+x}$Ru$_{3-x}$O$_6$~between the triangular lattice compound NaRuO$_{2}$ and the disordered honeycomb lattice compound Na$_{2}$RuO$_{3}$ \cite{mogare2004syntheses}, highlighting the tendency for NaRuO$_{2}$ to form Na-rich Na$_\text{Ru}$ defects. A combination of bulk magnetization and electron transport measurements highlight strong property changes as a function of Na-loading, highlighting the importance, and more importantly, the ability to control stoichiometry in NaRuO$_{2}$. \begin{figure} \includegraphics[width=1\linewidth]{CrystalStructure.png} \caption{Delafossite ($R\bar{3}m$) crystal structure assumed by the Na$_{3+x}$Ru$_{3-x}$O$_6$~solid solution between the ternary end members NaRuO$_{2}$ ($x$=0) and disordered Na$_{2}$RuO$_{3}$ ($x$=1). Na$_{3+x}$Ru$_{3-x}$O$_6$~forms a triangular sublattice comprised of edge-sharing Ru$^{3+}$ (4$d^{5}$) octahedra. Na-rich conditions overwhelmingly favor formation of Na$_\text{Ru}$ anti-site defects, diluting the Ru$^{3+}$ sublattice with nonmagnetic Na$^{+}$.} \label{fig:Crystal} \end{figure} \section{Experimental Methods} \subsection{Synthesis} Polycrystalline members of the Na$_{3+x}$Ru$_{3-x}$O$_6$~solid solution were synthesized using mechanochemical methods. Na$_{2}$O$_{2}$ beads (Sigma, 97\%), RuO$_{2}$ powder (Alfa, 99.95\%), and Na metal (Alfa 99.8\%) were combined in a pre-seasoned tungsten carbide ball mill vial and sealed under Ar. Due to the volitility of Na and and potential oxygen off-stoichiometry in RuO$_{2-x}$, adjustments are required to the nominal Na:Ru:O ratios. Specifically, both the compositions for Na$_2$RuO$_3$ and NaRuO$_2$ were empirically tuned to yield phase-pure compositions at Na$_{1.07}$(RuO$_2$)$_{1.13}$(Na$_2$O$_2$)$_{0.70}$ (Na$_{2.0}$Ru$_{0.9}$O$_{3.0}$) and Na$_{1.07}$(RuO$_2$)$_{1.37}$(Na$_2$O$_2$)$_{0.37}$ (Na$_{1.0}$Ru$_{0.8}$O$_{2.0}$) respectively. Using a combination of excess Na metal, Na$_2$O$_2$ and RuO$_2$, we iteratively narrowed down the single-phase region of the NaRuO$_2$--Na$_2$RuO$_3$ alloy, adjusting the compositional vectors until secondary phases were eliminated. All alloys were generated through a subsequent linear interpolation of the \textit{tuned} compositions of Na$_2$RuO$_3$ and NaRuO$_2$. Empirical tuning and interpolation is essential, as the compensating ratio of Na:Ru:O that yields phase pure NaRuO$_2$ is not the same as the compensation required for Na$_2$RuO$_3$. The resulting mixture was milled for 60~min in a Spex 8000D Mixer/Mill using four 7.9~mm tungsten carbide balls. The reaction generates a substantial amount of heat, and care must be taken with large sample volumes. The resulting precursor is confirmed amorphous by powder x-ray diffraction. The milled powder was then lightly ground in an agate mortar under Ar to disperse any agglomerates, sieved through a 100 micron sieve, and loaded into 2~mL alumina cylindrical crucibles (CoorsTek). In addition, a small portion of the milled powder was cold-pressed into 5~mm diameter pellets and buried within the powder bed. The crucibles were subsequently sealed under 1~atm of Ar in fused silica ampoules and placed within a 900$^{\circ}$C preheated furnace. Samples were annealed for 30~min and then immediately air-quenched before extracting powders under Ar. The final powders and sintered pellets are largely phase pure with trace amounts of Ru metal ($<$2~\%). Powders are black and moisture sensitive, with sensitivity increasing dramatically with additional Na content. \subsection{Structural Characterization} Phase purity was initially examined with powder x-ray diffraction (XRD) measurements at room temperature on a Panalytical Empyrean diffractometer (Cu K$_{\alpha_{1,2}}$) in Bragg-Brentano ($\theta$-$\theta$) geometry. Na$_{3+x}$Ru$_{3-x}$O$_6$~powders were placed on a Si zero-diffraction plate under argon and capped with a 12~mm$\times$12~mm piece Kapton film to shield against atmospheric moisture. Pawley and Rietveld refinements were performed using \texttt{TOPAS Academic} v6 \cite{Coelho}. Structural models and visualization utilized the \textsc{VESTA} software package \cite{Momma2011}. \subsection{Magnetization and Electron Transport Measurements} Temperature dependent dc-magnetization data under zero-field-cooled (ZFC) and field-cooled (FC) conditions were collected on a 7~T Quantum Design Magnetic Property Measurement System (MPMS3) SQUID magnetometer. Samples were sealed in polypropylene holders under argon to minimize absorption of atmospheric moisture. Data was collected continuously in sweep mode with a ramp rate of 2~K/min in the presence of an external DC field of 1000~Oe. Isothermal dc-magnetization measurements at 2~K were collected continuously in sweep mode with a ramp rate of 100~Oe/sec. Resistivity measurements were performed on sintered pellets of Na$_{3+x}$Ru$_{3-x}$O$_6$~that were sectioned into rectangular bars with approximate dimensions of 1$\times$2$\times$0.5~mm. Electrical contacts were made in a standard four-point geometry with contacts being made with a combination of gold wire and silver paint. Thermal contact and electrical isolation was ensured using layers of GE varnish and cigarette paper. The temperature dependence of the electrical resistivity was measured with the Electrical Transport Option (ETO) in a 9~T Quantum Design Dynacool Physical Property Measurement System (PPMS) using a drive current of 10 $\mu$A and drive frequency of 100~Hz. Data was collected continuously in sweep mode with a ramp rate of 2~K/min. \section{Results \& Discussion} \subsection{Synthesis \& Structure} Motivated by the combination of strong spin-orbit coupling, the expanded nature of the Ru $d$-orbitals, and remnant Coulomb interaction effects, ruthenates have continued to garner substantial attention. Owing to the many stable oxidation states of Ru, the Na--Ru--O phase diagram is remarkably complex. Within a relatively narrow set of chemical potentials there are at least 7 reported Na--Ru--O ternary compounds: NaRuO$_2$ \cite{shikano2004naruo2}, NaRu$_2$O$_4$ \cite{shikano2004synthesis}, Na$_2$RuO$_3$ \cite{mogare2004syntheses}, Na$_3$RuO$_4$ \cite{regan2005isolated}, Na$_2$RuO$_4$ \cite{mogare2004syntheses}, Na$_{27}$Ru$_{14}$O$_{48}$ \cite{allred2011na27ru14o48}, and Na$_{3-x}$Ru$_4$O$_9$ \cite{regan2006structure}. NaRuO$_2$ is of particular interest due to the triangular sublattice of Ru$^{3+}$ and the potential applications as a QSL candidate material \cite{ortizNaRuO2}. Remarkably, a survey of adjacent phases to NaRuO$_2$ reveals the ``disordered'' ($R\bar{3}m$) polymorph of Na$_2$RuO$_3$ is structurally identical to NaRuO$_2$, except for the random dilution of the Ru$^{3+}$ triangular sublattice with nonmagnetic Na$_\text{Ru}$ defects. It is important to note that while Na$_2$RuO$_3$ can also crystallize in a ordered $C2/c$ monoclinic structure, it is not clear which phase is the thermodynamic ground state. Such a relationship and the resulting potential for off-stoichiometry in NaRuO$_{2}$ is supported by a comparison the available crystallographic data. The original synthesis procedure reported for NaRuO$_2$ involves a three step decomposition process where: 1) \ce{Na2RuO4} was synthesized from a stoichiometric mixture of \ce{Na2O2} and \ce{RuO2}, 2) stoichiometric amounts of \ce{Na2RuO4} and Ru metal were mixed, dried, and sealed inside gold tubing, and finally 3) the mixture was heated at 1173~K for 12~h and then 1273~K for 120~h \cite{shikano2004synthesis}. This processing route produces material with lattice parameters [$a,c$] : [3.02~\AA, 16.49~\AA]. We have developed a new, rapid, mechanochemical route for the synthesis of NaRuO$_{2}$ \cite{ortizNaRuO2}, which is the method utilized in the present study. This processing route renders NaRuO$_2$ with lattice parameters [3.06~\AA, 16.18~\AA]. The difference observed in the $c$-axis lattice parameters reported in this work \cite{ortizNaRuO2} and prior work by Shikano et al. \cite{shikano2004naruo2} is substantial and noteworthy. One potential origin of this discrepancy is the impact of Na off-stoichiometry, which would naturally impact the interlayer spacing. Looking to the analogous titanate structure (Na$_{1-x}$TiO$_{2}$), detailed structural studies have identified a contraction along \textit{c} and an expansion in \textit{a} as Na-vacancies were eliminated and the composition approached nominal NaTiO$_2$ \cite{clarke1998synthesis}. We suggest that the smaller \textit{c}-axis lattice parameter of NaRuO$_{2}$ synthesized via the mechanochemical route presented herein are closer to the ideal 1:1:2 stoichiometry. This is further supported by our previous neutron powder diffraction refinement \cite{ortizNaRuO2}, which indicates that the \textit{tuned} NaRuO$_2$ composition is stoichiometric within the resolution of our measurement. The discrepancy between the prior report and our results suggests that off-stoichiometry and defect control are important factors in NaRuO$_2$. Drawing inspiration from the thermoelectric community and the concept of ``phase boundary mapping" \cite{pbmortiz2019carrier, pbmohno2017achieving,pbmohno2018phase,pbmcrawford2018experimental}, we sought to map the phase space surrounding NaRuO$_2$. Wide swaths of the space immediately surrounding NaRuO$_2$ are dominated by 2-phase equilibria, which is unexpected if NaRuO$_2$ is a prototypical line compound. This is instead consistent with the formation of a large single-phase region or an extended alloy. Furthermore, NaRuO$_2$ shows an unusual proclivity to incorporate excess Na into the structure. Considering the structural similarity of disordered Na$_2$RuO$_3$, an extended solid solution between NaRuO$_2$ and Na$_2$RuO$_3$ could exist. In support of this conjecture, synthesizing Na$_{2}$RuO$_{3}$ using the same synthetic conditions as NaRuO$_{2}$ results in the formation of disordered $R\bar{3}m$ Na$_{2}$RuO$_{3}$. This disordered Na$_{2}$RuO$_{3}$ polymorph persists after extended annealing and appears to be the stable structure under our processing conditions. \begin{figure} \includegraphics[width=1\linewidth]{Scattering.png} \caption{X-ray patterns of Na$_{3+x}$Ru$_{3-x}$O$_6$ alloy series demonstrate Successful alloying of NaRuO$_{2}$ ($x$=0) and Na$_2$RuO$_3$ ($x$=1) through continuous shifts in the peak positions and intensities. Black traces indicate resulting Pawley refinements in the $R\overline{3}m$ structure. All samples up to $x$=1 are predominately phase-pure Na$_{3+x}$Ru$_{3-x}$O$_6$ with trace Ru metal. Samples extending beyond nominal Na$_{2}$RuO$_{3}$ ($x$=1) exhibit increased Ru formation, suggesting a geometrical shift in the single-phase boundary.} \label{fig:Scattering} \end{figure} To verify the solid-solution hypothesis, a series of samples ranging from NaRuO$_{2}$--Na$_{2}$RuO$_{3}$ were synthesized. For the sake of convenience, we will refer to the series using the renormalized stoichiometry Na$_{3+x}$Ru$_{3-x}$O$_6$ where the end members of $x$=0 and $x$=1 correspond to nominal NaRuO$_{2}$ and Na$_{2}$RuO$_{3}$, respectively. As illustrated in Fig.~\ref{fig:Scattering}, x-ray and neutron diffraction data confirm that the series of alloys constructed along the NaRuO$_2$--Na$_2$RuO$_3$ pseudobinary phase diagram are predominantly single phase, with a only a small secondary fraction of Ru metal. In the spirt of phase-boundary mapping \cite{pbmcrawford2018experimental,pbmohno2017achieving,pbmohno2018phase,pbmortiz2019carrier}, this impurity was intentionally introduced to pin the samples to the Ru-rich edge of the single-phase region. Significant changes in peak positions and the corresponding lattice parameters (Fig.~\ref{fig:Vegard}) are clearly observed in the x-ray scattering measurements. A summary of the changes in the crystallographic parameters accompanying the transition from NaRuO$_{2}$ to Na$_{2}$RuO$_{3}$ is presented in Fig.~\ref{fig:Vegard}. The cell volume increases both monotonically and linearly from NaRuO$_{2}$ ($x$=0) to Na$_{2}$RuO$_{3}$ ($x$=1), consistent with Vegard's Law. This serves as confirmation of a solid solution, and further highlights the propensity for the formation of Na$_\text{Ru}$ antisite defects in NaRuO$_{2}$. Unexpectedly, the off-stoichometry of disordered Na$_{2}$RuO$_{3}$ is similarly complex and has the ability to absorb excess Na up to $x$=4/3. Past this point, samples become multiphase and exhibit a mixture of Na-rich Na$_{3+x}$Ru$_{3-x}$O$_6$ and Na$_{3}$RuO$_{4}$. It is interesting to note that the symmetry of Na$_{3}$RuO$_{4}$ (space group $C2/m$) is a subgroup for $R\bar{3}m$ and is structurally similar to NaRuO$_{2}$ and Na$_{2}$RuO$_{3}$ ($e.g.$ 6-coordinate Na/Ru, approximate planes of metal cations). \begin{figure} \includegraphics[width=1\linewidth]{VegardLaw.png} \caption{(a) Compositional dependence of the lattice parameters and cell volume for the Na$_{3+x}$Ru$_{3-x}$O$_6$~solid solution extracted from Pawley refinements of room temperature pXRD data. (b) Tentative processing ternary phase diagram at 900$^{\circ}$C isotherm for Na--Ru--O space surrounding the Na$_{3+x}$Ru$_{3-x}$O$_6$~solid solution. } \label{fig:Vegard} \end{figure} The volumetric expansion of the lattice observed in Fig.~\ref{fig:Vegard} with additional Na-loading can be rationalized through simple ionic radii arguments. In a 6-coordinate environment, the Shannon radius of Ru$^{3+}$ is 0.68~\AA\ and Ru$^{4+}$ is 0.62~\AA. While excess Na is expected to convert Ru$^{3+}$ to Ru$^{4+}$, the effect of substituting the much larger Na$^+$ (1.02~\AA) on Ru$^{3+}$ dominates. Thus, a general expansion of the lattice is expected as Na$_\text{Ru}$ defects accumulate. The Na$_{3+x}$Ru$_{3-x}$O$_6$~solid solution poses a synthetic challenge, particularly when the stoichiometry of polycrystalline NaRuO$_2$ needs to be tightly controlled. As illustrated in Fig.~\ref{fig:Vegard}(b), the Na$_{3+x}$Ru$_{3-x}$O$_6$~solid solution creates several large 2-phase (blue) regions where Na$_{3+x}$Ru$_{3-x}$O$_6$~ is at equilibrium with NaRu$_{2}$O$_{4}$ under O-rich conditions, Ru metal under O-poor conditions, and Na$_{3}$RuO$_{4}$ under Na-rich conditions. Three unique three-phase (gray) equilibria were identified between Na$_{3+x}$Ru$_{3-x}$O$_6$--NaRu$_2$O$_4$--Ru, Na$_{3+x}$Ru$_{3-x}$O$_6$--Na$_2$RuO$_4$--Na$_3$RuO$_4$, and Na$_{3+x}$Ru$_{3-x}$O$_6$--Na$_3$RuO$_4$--Ru. In our experience, the NaRuO$_2$--Na$_2$RuO$_3$ alloy does not readily support off-stoichiometry in the Ru-rich direction beyond NaRuO$_2$. Employing the principles of phase boundary mapping, we would aim to synthesize NaRuO$_2$ under conditions that place it in equilibrium with NaRu$_2$O$_4$ and Ru metal. A convenient metric would be to minimize the cell volume of NaRuO$_2$. Attempts to make samples in the O-rich region above nominal Na$_{2}$RuO$_{3}$ indicate the presence of \textit{at least one} unknown Na--Ru--O ternary, complicating the mapping process. Although we would na\"{i}vely suspect samples to contain Na$_{28}$Ru$_{14}$O$_{48}$ \cite{allred2011na27ru14o48}, this phase could not be reproduced using the processing techniques described here. Considering the potential complexity in this region of the diagram, we refrain from postulating on the phase equilibria in this region. This is complicated by the existence of the Na$_{3-x}$Ru$_4$O$_9$ solid-solution, creating large swaths of 2-phase regions. Future work will be required to fully understand the O-rich side of the Na--Ru--O phase diagram. Regardless of the additional complexities present in the O-rich regime, the isothermal phase diagram presented here establishes a reliable method for Ru-rich processing of NaRuO$_{2}$, minimizing the substitution of nonmagnetic Na$_\text{Ru}$ defects on the Ru triangular lattice. Compositions located in the three-phase NaRuO$_2$--NaRu$_2$O$_4$--Ru Alkemade triangle will reliably produce NaRuO$_{2}$ at the compositional invariant point where the ternary Alkemade triangle adjoins the vertex of the Na$_{3+x}$Ru$_{3-x}$O$_6$~single-phase region. Tuning the composition to produce NaRuO$_{2}$ at this vertex with minimal contributions from Ru-metal and NaRu$_2$O$_4$ enables stoichiometry control in a system with a complex phase diagram containing volatile elements. \begin{figure} \includegraphics[width=\linewidth]{Resistivity.png} \caption{Temperature dependence of electronic resistivity of Na$_{3+x}$Ru$_{3-x}$O$_6$~alloys up to $x=2/3$ is consistent with a lightly doped insulator, with (inset) resistivity increasing exponentially with Na incorporation.} \label{fig:Transport} \end{figure} \begin{figure*} \includegraphics[width=1\textwidth]{MagnetizationData.png} \caption{(a) Temperature dependence of the ZFC and FC dc magnetic susceptibility for Na$_{3+x}$Ru$_{3-x}$O$_6$ alloys in an external applied field of 1000~Oe. Black triangles denote bifurcation temperatures of the ZFC/FC curves. (b) Compositional dependence of the ZFC/FC bifurcation temperature. Peaking for intermediate compositions, ZFC/FC splitting falls below 2~K for the nominal end members $x$=0 and 1. (c) Field dependence of the dc isothermal magnetization at 2~K with (d) magnified view about $H=0$, highlighting non-zero coercivity for intermediate Na loading. Note that the coercivity vanishes to within the level of background for $x$=0 and 1. (e) Temperature dependence of the in-phase component $\chi'$ of the ac susceptibility in the absence of an external dc field with (f) corresponding Arrhenius plot.} \label{fig:Mag} \end{figure*} \subsection{Magnetization and Electrical Transport} Our prior investigation on both the magnetic and electronic properties of stoichiometric NaRuO$_{2}$ identified the system as a magnetic insulator with a quantum disordered ground state \cite{ortizNaRuO2}. Considering that Na$_{2}$RuO$_{3}$ was considered a distinct compound to date, the discovery of the Na$_{3+x}$Ru$_{3-x}$O$_6$~solid solution should provide an experimental route to exploring the physical properties and possibly unique crossovers ($e.g.$ metal-to-insulator) between the endpoint members. However, literature reports on the magnetic and electronic properties of Na$_{2}$RuO$_{3}$ are varied. Much of the variation stems from the ambiguity whether the ordered or disordered polymorph is present. Even within studies focused predominantly on disordered Na$_{2}$RuO$_{3}$ or mixtures of the ordered/disordered phase, there are conflicting reports. Some works suggest insulating behavior with long range antiferromagnetic order \cite{Wang14:90,gapontsev2017spectral}, while others report a paramagnetic, moderately correlated electron metal with no observable magnetic excitations \cite{Veiga20:4}. This lack of consensus on Na$_{2}$RuO$_{3}$ is likely driven by the existence of the Na$_{3+x}$Ru$_{3-x}$O$_6$~solid-solution. Since Na$_{2}$RuO$_{3}$ is not a line compound, the stoichiometry of a given synthesis is not well-defined. In the case of disordered Na$_{2}$RuO$_{3}$, the majority of samples were produced as a product of decomposition reactions, yielding lattice parameters \textit{a} : [3.11--3.17~\AA] and \textit{c} : [15.94-16.04~\AA] \cite{mogare2004syntheses,tamaru2013layered,Veiga20:4}. One of the ``hallmark'' features of disordered Na$_2$RuO$_3$ in prior work is the merger of the (101) and (006) peak positions. In good agreement with prior literature, we find that the peak merger occurs with \textit{a}=3.11~\AA~and \textit{c}=15.94~\AA. However, our nominal stoichiometry at that point is only $x$=2/3 instead of $x$=1. This is conceptually consistent with our findings that the Na--Ru--O systems require additional Na and O to compensate for volitility issues. Furthermore, Na incorporation continues well past the point of peak merger -- and well beyond nominal Na$_{2}$RuO$_{3}$ (Fig.~\ref{fig:Vegard}). The Na$_{3+x}$Ru$_{3-x}$O$_6$~solid solution presents an opportunity to study the defect-sensitivity of NaRuO$_2$ and the consequence of diluting the Ru-sublattice. We first address the electrical resistivity to determine whether all members of the Na$_{3+x}$Ru$_{3-x}$O$_6$~solid solution remain insulating, or whether the Na$_\text{Ru}$ defects cause any increase in the free carrier concentration. As illustrated in Fig.~\ref{fig:Transport}, the resistivity at room temperature for many of the series falls within the lightly doped semiconducting regime (10-100\,m$\Omega$-cm), and rises exponentially with decreasing temperature. Both observations suggest that members of the Na$_{3+x}$Ru$_{3-x}$O$_6$ solid solution up to $x$=2/3 are insulators or small-gap semiconductors. The isothermal resistivity at 300~K (Fig.~\ref{fig:Transport}(inset)) exhibits an exponential \textit{increase} with Na content, contradicting the most facile defect formation ($e.g.$ $\text{Na}_\text{Ru} + 2\text{h})$ and instead supports the localization of holes via a shift of Ru into a higher oxidation state. The influence of poorly screened, higher charged Ru$^{4+}$ -- coupled with increased alloy/disorder scattering likely contribute to the strong resistivity increases. Potentially more complex compensation reactions such as oxygen vacancies could be present, and more research (e.g. DFT defect studies) will be important for fully understanding the defect energetics in the alloys. We note here that members with higher Na content ($x\geq$1) become progressively deliquescent and will condense atmospheric water on the surfaces, precluding reliable measurement of the resistivity. The dc susceptibility data for select Na$_{3+x}$Ru$_{3-x}$O$_6$ compositions are plotted in Fig.~\ref{fig:Mag}(a). A manual vertical offset has been introduced to facilitate a visual qualitative comparison, and an unscaled set of magnetization curves is included in the supplementary information for comparison \cite{ESI}. Notably, an onset of irreversibility in the ZFC/FC curves appears in compositions with nonintenger $x$. This irreversibility is absent in the stoichiometric $x$=0 end member above 2 K. Then, as summarized in Fig.~\ref{fig:Mag}(b), ZFC/FC irreversibility onsets at finite $x$ and increases in temperature as further disorder is introduced. Near the midpoint between NaRuO$_2$ and Na$_2$RuO$_3$, the irreversibility temperature reaches a local maximum and then begins to decrease again as $x=1$ is approached. In the nominal $x$=1 composition with uniform Ru$^{4+}$ sites, the system naively assumes a $J_\text{eff}=0$ nonmagnetic singlet state and irreversibility vanishes. With continued Na loading beyond $x=1$, moments are reintroduced and a sharp reemergence of irreversibility occurs. It should be noted that as $x=0,1/6,1$ samples exhibit no discernible splitting by 2~K, this lower limit on the onset of an irreversibility temperature is denoted as open circles in Fig.~\ref{fig:Mag}(b). As illustrated in Figs.~\ref{fig:Mag}(c,d), the main qualitative trends presented in Fig.~\ref{fig:Mag}(b) are also reflected in the compositional dependence of the isothermal dc magnetization. Compositions with higher irrversibility temperatures exhibit larger coercivity, particularly for those samples where $x>1$ (Fig.~\ref{fig:Mag}(d)). Irreversibility in FC/ZFC data reflect that local Ru moments freeze, and Fig.~\ref{fig:Mag}(e) illustrates this freezing further in the Na-rich side of the phase diagram with $x=7/6$. The ac-susceptibility data reveal a clear frequency-dependence associated with local moment freezing and an activation energy $E_{a}/R$ $\sim$ 150~K for the higher temperature feature. Further work exploring this freezing process and whether long-range correlations form will require neutron scattering measurements on single crystals. It is worth stressing here that even in the nominal $x=0$ composition, a low-temperature cusp appears in the ac-susceptibility below 2 K \cite{ortizNaRuO2}. Near 1.7 K, signs of partial moment freezing were observed, indicating a weak spin freezing transition and crossover in the low frequency spin dynamics. We attribute this crossover/partial freezing as likely driven by a small percentage of remnant Na defects (~1 $\%$). This is consistent with the amplification of the freezing onset upon the intentional introduction of additional Na defects along the solid solution line between NaRuO$_2$ and Na$_2$RuO$_3$. \section{Conclusions} Born from the need to control and understand defect relationships in the Heisenberg-Kitaev candidate material NaRuO$_{2}$, we studied the chemical potential phase space surrounding NaRuO$_{2}$. We discovered the existence of a full solid-solution Na$_{3+x}$Ru$_{3-x}$O$_6$~between NaRuO$_{2}$ ($x$=0) and disordered Na$_2$RuO$_3$ ($x$=1). While resistivity measurements demonstrate that all members of Na$_{3+x}$Ru$_{3-x}$O$_6$~are insulators, increased Na-incorporation into the alloy results in a glass-like freezing of local Ru moments between stoichiometric endpoints. At small $x$, this is conceptually consistent with moment dilution/induced freezing on a highly frustrated Ru$^{3+}$ sublattice. Our study provides key information needed to control chemical disorder and off-stoichiometry in the Heisenberg-Kitaev candidate material NaRuO$_2$. \section{Acknowledgments} We acknowledge fruitful conversations with A.~A.~Aczel, G.~Pokharel, and A.~R.~Ericks. This work was supported by the US Department of Energy (DOE), Office of Basic Energy Sciences, Division of Materials Sciences and Engineering under Grant No. DE-SC0017752. B.R.O. and P.M.S. both acknowledge financial support from the California NanoSystems Institute through the Elings Fellowship program. The research made use of the shared facilities of the NSF Materials Research Science and Engineering Center at UC Santa Barbara (DMR- 1720256). The UC Santa Barbara MRSEC is a member of the Materials Research Facilities Network. (www.mrfn.org). This work also used facilities supported via the UC Santa Barbara NSF Quantum Foundry funded via the Q-AMASE-i program under award DMR-1906325. Use of the Advanced Photon Source at Argonne National Laboratory was supported by the U. S. Department of Energy, Office of Science, Office of Basic Energy Sciences, under Contract No. DE-AC02-06CH11357. A portion of this research used resources at the High Flux Isotope Reactor (HFIR), which is a DOE Office of Science User Facility operated by Oak Ridge National Laboratory.
{ "redpajama_set_name": "RedPajamaArXiv" }
8,297
Current202120202019201820172016201520142013201220112010200920082007200620052004200320022001 Luxury SUV ranked by Resale Value "If you are willing to accept the compromises that come with the coupe styling -- and coupes are all about style -- ZDX is one terrific piece of work." — USA Today See More Reviews no Resale Value data for 2012 no Resale Value "Underway, it's very comfortable and very quiet, considering that the LR4 is quite a big box that catches lots of air and rides on enormous tires. " — New Car Test Drive See More Reviews no Resale Value "It looks more like a concept car than anything else that can be had for less than $100,000, and it's even more arresting in person than in photos." — Car and Driver See More Reviews no Resale Value "Cornering is actually quite good for a vehicle of this size, height and weight. " — New Car Test Drive See More Reviews no Resale Value "The hybrid model is particularly well sorted out, and both RXs are easier to use as mind-numbing, commute-erasing devices than they were before. Even as enthusiasts, we have to admit there are plenty of days when such a device (especially for this Los Angeles-based editor) would come in handy." — Car and Driver See More Reviews no Resale Value "Other than the goofy proportions and polarizing snout, perhaps the most immediately noteworthy thing about the MKT is how pleasant it is inside its cabin. The interior is serenely quiet, even at triple-digit speeds, thanks to heaps of sound deadening; laminated, thicker windows; and aerodynamic tuning that included optimizing the shape of the side mirrors." — Car and Driver See More Reviews no Resale Value "The Mercedes-Benz GL-Class is large and capable off road yet feels surprisingly car-like on the road. That car-like feeling comes in part because this is the first full-size SUV built around a unibody architecture instead of traditional body-on-frame construction." — New Car Test Drive See More Reviews no Resale Value "From a purely practical standpoint, the GLK makes a lot of sense, with a great driving position and plenty of space for four adults (three can fit in a pinch in back)." — The Car Connection See More Reviews no Resale Value "As Arrival Vehicles go, this one gives the fashionistas something to look at: a high-waisted shape that flares dramatically as it sweeps back to huge sculptural taillights. Better yet, this visual entertainment takes place without encroaching on the capacity within." — Car and Driver See More Reviews no Resale Value
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
9,793
{"url":"https:\/\/jeremykun.com\/tag\/image-manipulation\/","text":"# Making Hybrid Images\n\nThe Mona Lisa\n\nLeonardo da Vinci\u2019s Mona Lisa is one of the most famous paintings of all time. And there has always been a discussion around her enigmatic smile. He used a trademark Renaissance technique called\u00a0sfumato,\u00a0which involves many thin layers of glaze mixed with subtle pigments. The striking result is that when you look directly at Mona Lisa\u2019s smile, it seems to disappear. But when you look at the background your peripherals see a smiling face.\n\nOne could spend decades studying the works of these masters from various perspectives, but if we want to hone in on the disappearing nature of that\u00a0smile, mathematics can provide valuable insights. Indeed, though he may not have known the relationship between his work and da Vinci\u2019s, hundreds of years later Salvador Dali did the artist\u2019s equivalent of mathematically\u00a0isolating the problem with his painting, \u201cGala Contemplating\u00a0the Mediterranean Sea.\u201d\n\nGala Contemplating the Mediterranean Sea (Salvador Dali, 1976)\n\nHere you see a woman in the foreground, but step back quite far from the picture and there is a (more or less) clear image of Abraham Lincoln. Here the question of gaze is the blaring focus of the work. Now of course Dali and\u00a0da Vinci weren\u2019t scribbling down equations and computing integrals; their artistic expression\u00a0was much less well-defined. But we the artistically\u00a0challenged have tools of our own:\u00a0mathematics, science, and programming.\n\nIn 2006 Aude Oliva,\u00a0Antonio Torralba, and\u00a0Philippe. G. Schyns used those tools to merge the distance of\u00a0Dali and the faded smiles of da Vinci into one cohesive idea. In their 2006 paper they presented the notion of a \u201chybrid image,\u201d presented below.\n\nThe Mona Lisas of Science\n\nIf you look closely, you\u2019ll see three women,\u00a0each of which looks the teensiest bit strange, like they might be trying to suppress a smile, but none of them\u00a0are\u00a0smiling. Blur your eyes or step back\u00a0a few meters, and they clearly look happy. The effect is quite dramatic. At the risk of being overly dramatic, these three women are literally modern day versions of Mona Lisa, the \u201cMona Lisas of Science,\u201d if you will.\n\nAnother, perhaps more famous version of their technique, since it was more widely publicized, is their \u201cMarilyn Einstein,\u201d which up close is Albert Einstein and from far away is Marilyn Monroe.\n\nMarilyn Einstein\n\nThis one gets to the heart of the question of what the eye sees at close range versus long range. And it turns out that you can address this question (and create\u00a0brilliant works of art like the ones above) with some basic Fourier analysis.\n\n## Intuitive Fourier analysis (and references)\n\nThe basic idea of Fourier analysis is the idea that smooth functions are hard to understand, and realization of\u00a0how great it would be if we could decompose them into simpler pieces. Decomposing complex things into simpler parts is one of the main tools in all of mathematics, and Fourier analysis is one of the clearest examples\u00a0of its application.\n\nIn particular, the things we care about are functions $f(x)$ with specific properties I won\u2019t detail here\u00a0like \u201csmoothness\u201d and \u201cfiniteness.\u201d\u00a0And the building blocks are the complex exponential functions\n\n$\\displaystyle e^{2 \\pi i kx}$\n\nwhere $k$ can be any integer. If you have done some linear algebra (and ignore this if you haven\u2019t), then I can summarize the idea succinctly by saying the complex exponentials\u00a0form an orthonormal basis for the vector space of square-integrable functions.\n\nBack in colloquial language, what the Fourier theorem says is that\u00a0any function\u00a0of the kind we care about can be broken down into (perhaps infinitely many) pieces of this form called Fourier coefficients\u00a0(I\u2019m abusing the word \u201ccoefficient\u201d here). The way it\u2019s breaking down is also pleasingly simple: it\u2019s a linear combination. Informally that means you\u2019re just adding up all the complex exponentials with specific\u00a0weights for each one. Mathematically, the conversion from the function to its Fourier coefficients is called the Fourier transform,\u00a0and the set of all Fourier coefficients together is called the Fourier spectrum.\u00a0So if you want to learn about your function $f$, or more importantly modify it in some way, you can inspect and modify\u00a0its spectrum\u00a0instead. The reason this is useful is that Fourier coefficients\u00a0have very natural interpretations in sound and images, as we\u2019ll see for the latter.\n\nWe wrote $f(x)$ and the complex exponential as a function of\u00a0one\u00a0real variable, but you can do the\u00a0same thing for\u00a0two variables (or a hundred!). And, if you\u2019re willing to do some abusing and ignore the complexness of complex numbers, then you can visualize \u201ccomplex exponentials in two variables\u201d as images of stripes whose orientation and thickness correspond to two parameters (i.e., the $k$ in the offset equation becomes two coefficients). The video below shows how such complex exponentials can be used to build up an image of striking detail. The left frame shows which complex exponential is currently being added, and the right frame shows the layers all put together.\u00a0I think the result is quite beautiful.\n\nThis just goes to show how powerful da Vinci\u2019s idea of fine layering is: it\u2019s as\u00a0powerful as possible because it can create any image!\n\nNow for digital\u00a0images like the one above, everything is\u00a0finite. So rather than have an infinitely precise function and a corresponding infinite set of Fourier coefficients, you get a finite list of sampled values (pixels) and a corresponding\u00a0grid of Fourier coefficients.\u00a0But\u00a0the\u00a0important and beautiful theorem is, and I want to emphasize how groundbreakingly important this is:\n\nIf you give me an\u00a0image (or any function!) I can\u00a0compute\u00a0the decomposition very\u00a0efficiently.\n\nAnd the same theorem lets you go the other way: if you give me the decomposition, I can compute the original function\u2019s samples quite easily.\u00a0The algorithm to do this is called the Fast Fourier transform, and if any piece of mathematics or computer science\u00a0has a legitimate claim to changing the world, it\u2019s the Fast Fourier transform. It\u2019s hard to pinpoint specific applications, because the transform is so\u00a0ubiquitous across science and engineering, but we definitely would not have cell phones, satellites, internet, or electronics anywhere near as small as we do without the Fourier transform and the ability to compute it quickly.\n\nConstructing hybrid images is one particularly nice\u00a0example of\u00a0manipulating the Fourier spectrum of two images, and then combining them back into a single image. That\u2019s what we\u2019ll do now.\n\nAs a side note,\u00a0by the nature of brevity, the discussion above is a big disservice to the mathematics involved. I summarized and abused in ways that mathematicians would object to. If you want to see a much better treatment of the material, this blog has a long series of posts developing Fourier transforms and their discrete analogues\u00a0from scratch. See\u00a0our\u00a0four\u00a0primers, which lead into the main content posts where we implement the Fast Fourier transform in\u00a0Python and use it to apply digital watermarks to an image. Note that in those posts, as in this one, all of the materials and code used are posted on this blog\u2019s Github page.\n\n## High\u00a0and low frequencies\n\nFor images, interpreting\u00a0ranges of Fourier coefficients is easy to do.\u00a0You can imagine the coefficients lying on a grid in the plane like so:\n\nEach dot in this grid corresponds to how \u201cintense\u201d the Fourier coefficient is. That is, it\u2019s the magnitude of the (complex) coefficient of the corresponding complex exponential. Now the points that are closer to the origin correspond\u00a0informally to the broad, smooth changes in the image. These are called \u201clow frequency\u201d coefficients. And points that are further away correspond to sharp changes and edges, and are likewise called \u201chigh frequency\u201d components. So the if you wanted to\u00a0\u201chybridize\u201d two images, you\u2019d pick ones with complementary intensities in these regions. That\u2019s why\u00a0Einstein (with all his wiry hair and wrinkles) and Monroe (with smooth features) are such good candidates. That\u2019s also why, when we layered the Fourier components one by one in the video from earlier, we see the fuzzy shapes emerge before the fine details.\n\nMoreover, we can \u201cextract\u201d the\u00a0high frequency Fourier components by simply removing the low frequency ones. It\u2019s a bit more complicated than that, since you want the transition from \u201csomething\u201d to \u201cnothing\u201d to be smooth in sone sense. A proper discussion of this would go into sampling and the Nyquist frequency, but that\u2019s beyond the scope of this post. Rather, we\u2019ll just define a family of \u201cfiltering functions\u201d without motivation and observe\u00a0that they work well.\n\nDefinition:\u00a0The\u00a0Gaussian filter function with\u00a0variance $\\sigma$ and center $(a, b)$ is the function\n\n$\\displaystyle g(x,y) = e^{-\\frac{(x - a)^2 + (y - b)^2}{2 \\sigma^2}}$\n\nIt looks like this\n\nimage credit Wikipedia\n\nIn particular, at zero the\u00a0function\u00a0is 1 and it gradually drops to zero as you get farther away. The parameter $\\sigma$ controls the rate at which it vanishes, and in the picture above the center is set to $(0,0)$.\n\nNow what we\u2019ll do is take our image, compute its spectrum, and multiply coordinatewise with a certain Gaussian function. If we\u2019re\u00a0trying to get rid of high-frequency components (called a \u201clow-pass filter\u201d because it lets the low\u00a0frequencies through), we can just multiply the Fourier coefficients directly by the filter values $g(x,y)$,\u00a0and if we\u2019re doing a \u201chigh-pass filter\u201d we multiply by $1 - g(x,y)$.\n\nBefore we get to the code, here\u2019s an example of a low-pass filter. First, take this image of Marilyn Monroe\n\nNow compute its Fourier transform\n\nApply the low-pass filter\n\nAnd reverse the Fourier transform to get an image\n\nIn fact, this is a common operation in programs like photoshop for blurring an image (it\u2019s called a\u00a0Gaussian blur for obvious reasons).\u00a0Here\u2019s the\u00a0python code to do this.\u00a0You can download it\u00a0along with all of the other\u00a0resources used in making this post on this blog\u2019s Github page.\n\nimport numpy\nfrom numpy.fft import fft2, ifft2, fftshift, ifftshift\nfrom scipy import misc\nfrom scipy import ndimage\nimport math\n\ndef makeGaussianFilter(numRows, numCols, sigma, highPass=True):\ncenterI = int(numRows\/2) + 1 if numRows % 2 == 1 else int(numRows\/2)\ncenterJ = int(numCols\/2) + 1 if numCols % 2 == 1 else int(numCols\/2)\n\ndef gaussian(i,j):\ncoefficient = math.exp(-1.0 * ((i - centerI)**2 + (j - centerJ)**2) \/ (2 * sigma**2))\nreturn 1 - coefficient if highPass else coefficient\n\nreturn numpy.array([[gaussian(i,j) for j in range(numCols)] for i in range(numRows)])\n\ndef filterDFT(imageMatrix, filterMatrix):\nshiftedDFT = fftshift(fft2(imageMatrix))\nfilteredDFT = shiftedDFT * filterMatrix\nreturn ifft2(ifftshift(filteredDFT))\n\ndef lowPass(imageMatrix, sigma):\nn,m = imageMatrix.shape\nreturn filterDFT(imageMatrix, makeGaussianFilter(n, m, sigma, highPass=False))\n\ndef highPass(imageMatrix, sigma):\nn,m = imageMatrix.shape\nreturn filterDFT(imageMatrix, makeGaussianFilter(n, m, sigma, highPass=True))\n\nif __name__ == \"__main__\":\nlowPassedMarilyn = lowPass(marilyn, 20)\nmisc.imsave(\"low-passed-marilyn.png\", numpy.real(lowPassedMarilyn))\n\n\nThe first function samples the values from a Gaussian function with the specified parameters, discretizing the function and storing the values in a matrix. Then the filterDFT function applies the filter by doing coordinatewise multiplication (note these are all numpy arrays). We can do the same thing with a high-pass filter, producing the edgy image below\n\nAnd if we compute the average of these two images, we basically get back to the original.\n\nSo the only difference between this and a hybrid image is that you take the low-passed part of one image and the high-passed part of another. Then the art is in balancing the parameters so as to make the averaged image look right. Indeed, with the following picture of Einstein and the above shot of Monroe, we can get a pretty good recreation of the Oliva-Torralba-Schyns piece. I think with more tinkering it could be even better (I did barely any centering\/aligning\/resizing to the original images).\n\nAlbert Einstein, Marilyn Monroe, and their hybridization.\n\nAnd here\u2019s the code for it\n\ndef hybridImage(highFreqImg, lowFreqImg, sigmaHigh, sigmaLow):\nhighPassed = highPass(highFreqImg, sigmaHigh)\nlowPassed = lowPass(lowFreqImg, sigmaLow)\n\nreturn highPassed + lowPassed\n\n\nInterestingly enough, doing it in reverse doesn\u2019t give quite as pleasing results, but it still technically works. So there\u2019s something particularly important that the high-passed image does have a lot of high-frequency components, and vice versa for the low pass.\n\nYou can see some of the other hybrid images Oliva et al constructed over at their web gallery.\n\n## Next Steps\n\nHow can we take this idea further? There are a few avenues I can think of. The most obvious one would be to see how this extends to video. Could one come up with generic\u00a0parameters so that when two videos are\u00a0hybridized (frame by frame, using this technique) it is only easy to see one at close distance? Or else, could we apply a three-dimensional transform to a video and modify that in some principled way? I think one would\u00a0not likely\u00a0find anything astounding, but who knows?\n\nSecond would be to look at the many other transforms\u00a0we have at our disposal. How does\u00a0manipulating\u00a0the spectra of these transforms affect the original image, and can you make images that are hybridized in senses other than this one?\n\nAnd finally, can we bring this idea down in dimension to work with one-dimensional signals? In particular, can we hybridize music? It could usher in a new generation of mashup songs that sound different depending on whether you wear\u00a0earmuffs \ud83d\ude42\n\nUntil next time!\n\n# The Two-Dimensional Fourier Transform and Digital Watermarking\n\nWe\u2019ve studied the Fourier transform quite a bit on this blog: with four primers and the Fast Fourier Transform algorithm under our belt, it\u2019s about time we opened up our eyes to higher dimensions.\n\nIndeed, in the decades since Cooley & Tukey\u2019s landmark paper, the most interesting applications of the discrete Fourier transform have occurred in dimensions greater than 1. But for all our work we haven\u2019t yet discussed what it means to take an \u201cn-dimensional\u201d Fourier transform. Our past toiling and troubling will pay off, though, because the higher Fourier transform and its 1-dimensional cousin are quite similar. Indeed, the shortest way to describe the $n$-dimensional transform is as the 1-dimensional transform with inner products of vector variables replacing regular products of variables.\n\nIn this post we\u2019ll flush out these details. We\u2019ll define the multivariable Fourier transform and it\u2019s discrete partner, implement an algorithm to compute it (FFT-style), and then apply the transform to the problem of digitally watermarking images.\n\nAs usual, all the code, images, and examples used in this post are available on this blog\u2019s Github page.\n\n## Sweeping Some Details Under the Rug\n\nWe spent our first and second primers on Fourier analysis describing the Fourier series in one variable, and taking a limit of the period to get the Fourier transform in one variable. By all accounts, it was a downright mess of notation and symbol manipulation that culminated in the realization that the Fourier series looks a lot like a Riemann sum. So it was in one dimension, it is in arbitrary dimension, but to save our stamina for the applications we\u2019re going to treat the $n$-dimensional transform differently. We\u2019ll use the 1-dimensional transform as a model, and magically generalize it to operate on a\u00a0vector-valued variable. Then the reader will take it on faith that we could achieve the same end as a limit of some kind of multidimensional Fourier series (and all that nonsense with Schwarz functions and tempered distributions is left to the analysts), or if not we\u2019ll provide external notes with the full details.\n\nSo we start with a real-valued (or complex-valued) function $f : \\mathbb{R}^n \\to \\mathbb{R}$, and we write the variable as $x = (x_1, \\dots, x_n)$, so that we can stick to using the notation $f(x)$. Rather than think of the components of $x$ as \u201ctime variables\u201d as we did in the one-dimensional case, we\u2019ll usually think of $x$ as representing physical\u00a0space.\u00a0And so the periodic behavior of the function $f$ represents periodicity in space.\u00a0On the other hand our transformed variables will be \u201cfrequency\u201d in space, and this will correspond to a vector variable $\\xi = (\\xi_1, \\dots, \\xi_n)$. We\u2019ll come back to what the heck \u201cperiodicity in space\u201d means momentarily.\n\nRemember that in one dimension the Fourier transform was defined by\n\n$\\displaystyle \\mathscr{F}f(s) = \\int_{-\\infty}^\\infty e^{-2\\pi ist}f(t) dt$.\n\nAnd it\u2019s inverse transform was\n\n$\\displaystyle \\mathscr{F}^{-1}g(t) = \\int_{-\\infty}^\\infty e^{2\\pi ist}f(s) ds$.\n\nIndeed, with the vector $x$ replacing $t$ and $\\xi$ replacing $s$, we have to figure out how to make an analogous definition. The obvious thing to do is to take the place where $st$ is multiplied and replace it with the inner product of $x$ and $\\xi$, which for this post I\u2019ll write $x \\cdot \\xi$ (usually I write $\\left \\langle x, \\xi \\right \\rangle$). This gives us the $n$-dimensional transform\n\n$\\displaystyle \\mathscr{F}f(\\xi) = \\int_{\\mathbb{R}^n} e^{-2\\pi i x \\cdot \\xi}f(x) dx$,\n\nand its inverse\n\n$\\displaystyle \\mathscr{F}^{-1}g(t) = \\int_{\\mathbb{R}^n} e^{2\\pi i x \\cdot \\xi}f( \\xi ) d \\xi$\n\nNote that the integral is over all of $\\mathbb{R}^n$. To give a clarifying example, if we are in two dimensions we can write everything out in coordinates: $x = (x_1, x_2), \\xi = (\\xi_1, \\xi_2)$, and the formula for the transform becomes\n\n$\\displaystyle \\mathscr{F}f(\\xi_1, \\xi_2) = \\int_{-\\infty}^{\\infty} \\int_{-\\infty}^{\\infty} e^{-2 \\pi i (x_1 \\xi_1 + x_2 \\xi_2)} f(\\xi_1, \\xi_2) dx_1 dx_2$.\n\nNow that\u2019s a nasty integral if I\u2019ve ever seen one. But for our purposes in this post, this will be as nasty as it gets, for we\u2019re primarily concerned with image analysis. So representing things as vectors of arbitrary dimension is more compact, and we don\u2019t lose anything for it.\n\n## Periodicity in Space? It\u2019s All Mostly the Same\n\nBecause arithmetic with vectors and arithmetic with numbers is so similar, it turns out that most of the properties of the 1-dimensional Fourier transform hold in arbitrary dimension. For example, the duality of the Fourier transform and its inverse holds, because for vectors $e^{-2 \\pi i x \\cdot (-\\xi)} = e^{2 \\pi i x \\cdot \\xi}$. So just like in on dimension, we have\n\n$\\mathscr{F}f(-\\xi) = \\mathscr{F}^{-1}f(\\xi)$\n\nAnd again we have correspondences between algebraic operations: convolution in the spatial domain corresponds to convolution in the frequency domain, the spectrum is symmetric about the origin, etc.\n\nAt a more geometric level, though, the Fourier transform does the same sort of thing as it did in the one-dimensional case. Again the complex exponentials form the building blocks of any function we want, and performing a Fourier transform on an $n$-dimensional function decomposes that function into its frequency components. So a function that is perfectly periodic corresponds to a Fourier spectrum that\u2019s perfectly concentrated at a point.\n\nBut what the hell, the reader might ask, is \u2018periodicity in space\u2019? Since we\u2019re talking about images anyway, the variables we care about (the coordinates of a pixel) are spatial variables.\u00a0You could, if you were so inclined, have a function of multiple time variables, and to mathematicians a physical interpretation of dimension is just that, an interpretation.\u00a0But as confusing as it might sound, it\u2019s actually not so hard to understand the Fourier transform when it\u2019s specialized to image analysis. The idea is that complex exponentials $e^{\\pm 2 \\pi i s \\cdot \\xi}$ oscillate in the $x$ variable for a fixed $\\xi$ (and since $\\mathscr{F}$ has $\\xi$ as its input, we do want to fix $\\xi$). The brief mathematical analysis goes like this: if we fix $\\xi$ then the complex exponential is periodic with magnitudinal peaks along parallel lines spaced out at a distance of $1\/ \\left \\| \\xi \\right \\|$ apart. In particular any image is a sum of a bunch of these \u201ccomplex exponential with a fixed $\\xi$\u201d images that look like stripes with varying widths and orientations (what you see here is just the real part of a particular complex exponential).\n\nAny image can be made from a sum of a whole lot of images like the ones on top. They correspond to single points in the Fourier spectrum (and their symmetries), as on bottom.\n\nWhat you see on top is an image, and on bottom its Fourier spectrum. That is, each brightly colored pixel corresponds to a point $[x_1, x_2]$ with a large magnitude for that frequency component $|\\mathscr{F}f[x_1, x_2]|$.\n\nIt might be a bit surprising that every image can be constructed as a sum of stripey things, but so was it that any sound can be constructed as a sum of sines and cosines. It\u2019s really just a statement about a basis of some vector space of functions. The long version of this story is laid out beautifully in\u00a0pages 4 \u2013 7 of these notes. The whole set of notes is wonderful, but this section is mathematically tidy and needs no background; the remainder of the notes outline the details about multidimensional Fourier series mentioned earlier, as well as a lot of other things. In higher dimensions the \u201cparallel lines\u201d idea is much the same, but with lines replaced by hyperplanes normal to the given vector.\n\n## Discretizing the Transform\n\nRecall that for a continuous function $f$ of one variable, we spent a bit of time figuring out how to find a good discrete approximation of $f$, how to find a good discrete approximation of the Fourier transform $\\mathscr{F}f$, and how to find a quick way to transition between the two. In brief: $f$ was approximated by a vector of samples $(f[0], f[1], \\dots, f[N])$, reconstructed the original function (which was only correct at the sampled points) and computed the Fourier transform of\u00a0that, calling it the discrete Fourier transform, or DFT. We got to this definition, using square brackets to denote list indexing (or vector indexing, whatever):\n\nDefinition: Let $f = (f[1], \\dots f[N])$ be a vector in $\\mathbb{R}^N$. Then the discrete Fourier transform of $f$ is defined by the vector $(\\mathscr{F}f[1], \\dots, \\mathscr{F}f[N])$, where\n\n$\\displaystyle \\mathscr{F}f[j] = \\sum_{k=0}^{N-1} f[k]e^{-2 \\pi i jk\/N}$\n\nJust as with the one-dimensional case, we can do the same analysis and arrive at a discrete approximation of an $n$-dimensional function. Instead of a vector it would be an $N \\times N \\times \\dots \\times N$ matrix, where there are $n$ terms in the matrix, one for each variable. In two dimensions, this means the discrete approximation of a function is a matrix of samples taken at evenly-spaced intervals in both directions.\n\nSticking with two dimensions, the Fourier transform is then a linear operator taking matrices to matrices (which is called a tensor if you want to scare people). It has its own representation like the one above, where each term is a double sum. In terms of image analysis, we can imagine that each term in the sum requires us to look at every pixel of the original image\n\nDefinition:\u00a0Let $f = (f[s,t])$ be a vector in $\\mathbb{R}^N \\times \\mathbb{R}^M$, where $s$ ranges from $0, \\dots, N-1$ and $t$ from $0, \\dots, M-1$. Then the discrete Fourier transform of $f$ is defined by the vector $(\\mathscr{F}f[s,t])$, where each entry is given by\n\n$\\displaystyle \\mathscr{F}f[x_1, x_2] = \\sum_{s=0}^{N-1} \\sum_{t=0}^{M-1} f[s, t] e^{-2 \\pi i (s x_1 \/ N + t x_2 \/ M)}$\n\nIn the one-dimensional case the inverse transform had a sign change in the exponent and an extra $1\/N$ normalization factor. Similarly, in two dimensions the inverse transform has a normalization factor of $1\/NM$ (1 over the total number of samples). Again we use a capital $F$ to denote the transformed version of $f$. The higher dimensional transforms are analogous: you get $n$ sums, one for each component, and the normalization factor is the inverse of the total number of samples.\n\n$\\displaystyle \\mathscr{F}^{-1}F[x_1, x_2] = \\frac{1}{NM} \\sum_{s=0}^{N-1} \\sum_{t=0}^{M-1} f[s,t] e^{2 \\pi i (sx_1 \/ N + tx_2 \/ M)}$\n\nUnfortunately, the world of the DFT disagrees a lot on the choice of normalization factor. It turns out that all that really matters is that the exponent is negated in the inverse, and that the product of the constant terms on both the transform and its inverse is $1\/NM$. So some people will normalize both the Fourier transform and its inverse by $1\/ \\sqrt{NM}$. The reason for this is that it makes the transform and its inverse more similar-looking (it\u2019s just that, cosmetic). The choice of normalization isn\u2019t particularly important for us, but beware: non-canonical choices are out there, and they do affect formulas by adding multiplicative constants.\n\n## The Fast Fourier Transform, Revisited\n\nNow one might expect that there is another clever algorithm to drastically reduce the runtime of the 2-dimensional DFT, akin to the fast Fourier transform algorithm (FFT). But actually there is almost no additional insight required to understand the \u201cfast\u201d higher dimensional Fourier transform algorithm, because all the work was done for us in the one dimensional case.\n\nAll that we do is realize that each of the inner summations is a 1-dimensional DFT. That is, if we write the inner-most sum as a function of two parameters\n\n$\\displaystyle g(s, x_2) = \\sum_{t=0}^{M-1} f(s,t) e^{-2 \\pi i (tx_2 \/ M)}$\n\nthen the 2-dimensional FFT is simply\n\n$\\displaystyle \\mathscr{F}f[x_1, x_2] = \\sum_{s=0}^{N-1} g(s, x_2) e^{-2 \\pi i (sx_1\/N)}$\n\nBut now notice, that we can forget that $g(s,x_2)$ was ever a separate, two-dimensional function. Indeed, since it only depends on the $x_2$ parameter from out of the sum this is precisely the formula for a 1-dimensional DFT! And so if we want to compute the 2-dimensional DFT using the 1-dimensional FFT algorithm, we can compute the matrix of 1-dimensional DFT entries for all choices of $s, x_2$ by fixing each value of $s$ in turn and running FFT on the resulting \u201ccolumn\u201d of values. If you followed the program from our last FFT post, then the only difficulty is in understanding how the data is shuffled around and which variables are fixed during the computation of the sub-DFT\u2019s.\n\nTo remedy the confusion, we give an example. Say we have the following 3\u00d73 matrix whose DFT we want to compute. Remember, these values are the sampled values of a 2-variable function.\n\n$\\displaystyle \\begin{pmatrix} f[0,0] & f[0,1] & f[0,2] \\\\ f[1,0] & f[1,1] & f[1,2] \\\\ f[2,0] & f[2,1] & f[2,2] \\end{pmatrix}$\n\nThe first step in the algorithm is to fix a choice of row, $s$, and compute the DFT of the resulting row. So let\u2019s fix $s = 0$, and then we have the resulting row\n\n$\\displaystyle f_0 = (f[0,0], f[0,1], f[0,2])$\n\nIt\u2019s DFT is computed (intentionally using the same notation as the inner summation above), as\n\n$\\displaystyle g[0,x_2] = (\\mathscr{F}f_0)[x_2] = \\sum_{t=0}^{M-1} f_0[t] e^{- 2 \\pi i (t x_2 \/ M)}$\n\nNote that $f_0[t] = f[s,t]$ for our fixed choice of $s=0$. And so if we do this for all $N$ rows (all 3 rows, in this example), we\u2019ll have performed $N$ FFT\u2019s of size $M$ to get a matrix of values\n\n$\\displaystyle \\begin{pmatrix} g[0,0] & g[0,1] & g[0,2] \\\\ g[1,0] & g[1,1] & g[1,2] \\\\ g[2,0] & g[2,1] & g[2,2] \\end{pmatrix}$\n\nNow we want to compute the rest of the 2-dimensional DFT to the end, and it\u2019s easy: now each column consists of the terms in the outermost sum above (since $s$ is the iterating variable). So if we fix a value of $x_2$, say $x_2 = 1$, we get the resulting column\n\n$\\displaystyle g_1 = (g[0, 1], g[1,1], g[2,1])$\n\nand computing a DFT on this row gives\n\n$\\displaystyle \\mathscr{F}f[x_1, 1] = \\sum_{s=0}^{N-1} g_1[s] e^{-2 \\pi i sx_1 \/ N}$.\n\nExpanding the definition of $g$ as a DFT gets us back to the original formula for the 2-dimensional DFT, so we know we did it right. In the end we get a matrix of the computed DFT values for all $x_1, x_2$.\n\nLet\u2019s analyze the runtime of this algorithm: in the first round of DFT\u2019s we computed $N$ DFT\u2019s of size $M$, requiring a total of $O(N M \\log M)$, since we know FFT takes time $O(M \\log M)$ for a list of length $M$. In the second round we did it the other way around, computing $M$ DFT\u2019s of size $N$ each, giving a total of\n\n$O(NM \\log M + NM \\log N) = O(NM (\\log N + \\log M)) = O(NM \\log (NM))$\n\nIn other words, if the size of the image is $n = NM$, then we are achieving an $O(n \\log n)$-time algorithm, which was precisely the speedup that the FFT algorithm gave us for one-dimension. We also know a lower bound on this problem: we can\u2019t do better than $NM$ since we have to look at every pixel at least once. So we know that we\u2019re only a logarithmic factor away from a trivial lower bound. And indeed, all other known DFT algorithms have the same runtime. Without any assumptions on the input data (or any parallelization), nobody knows of a faster algorithm.\n\nNow let\u2019s turn to the code. If we use our FFT algorithm from last time, the pure Python one (read: very slow), then we can implement the 2D Fourier transform in just two lines of Python code. Full disclosure: we left out some numpy stuff in this code for readability. You can view the entire source file on this blog\u2019s Github page.\n\ndef fft2d(matrix):\nfftRows = [fft(row) for row in matrix]\nreturn transpose([fft(row) for row in transpose(fftRows)])\n\n\nAnd we can test it on a simple matrix with one nonzero value in it:\n\nA = [[0,0,0,0], [0,1,0,0], [0,0,0,0], [0,0,0,0]]\nfor row in fft2d(A):\nprint(', '.join(['%.3f + %.3fi' % (x.real, x.imag) for x in row]))\n\n\nThe output is (reformatted in LaTeX, obviously):\n\n$\\displaystyle \\begin{pmatrix} 1 & -i & -1 & i \\\\ -i & -1 & i & 1 \\\\ -1 & i & 1 & -i \\\\ i & 1 & -i & -1 \\end{pmatrix}$\n\nThe reader can verify by hand that this is correct (there\u2019s only one nonzero term in the double sum, so it just boils down to figuring out the complex exponential $e^{2 \\pi i (x_1 + x_2 \/ 4)}$). We leave it as an additional exercise to the reader to implement the inverse transform, as well as to generalize this algorithm to higher dimensional DFTs.\n\n## Some Experiments and Animations\n\nAs we did with the 1-dimensional FFT, we\u2019re now going to switch to using an industry-strength FFT algorithm for the applications. We\u2019ll be using the numpy library and its \u201cfft2\u201d function, along with scipy\u2019s ndimage module for image manipulation. Getting all of this set up was a nightmare (thank goodness for people who guide users like me through this stuff, but even then the headache seemed unending!). As usual, all of the code and images used in the making of this post is available on this blog\u2019s Github page.\n\nAnd so we can start playing with a sample image, a still from one of my favorite television shows:\n\nThe Fourier transform of this image (after we convert it to grayscale) can be computed in python:\n\ndef fourierSpectrumExample(filename):\nunshiftedfft = numpy.fft.fft2(A)\nspectrum = numpy.log10(numpy.absolute(unshiftedfft) + numpy.ones(A.shape))\nmisc.imsave(\"%s-spectrum-unshifted.png\" % (filename.split('.')[0]), spectrum)\n\n\nWith the result:\n\nThe Fourier spectrum of Sherlock and Watson (and London).\n\nA few notes: we use the ndimage library to load the image and flatten the colors to grayscale. Then, after we compute the spectrum, we shift and take a logarithm. This is because the raw spectrum values are too massive; plotting them without modification makes the image contrast too high.\n\nSomething is odd, though, because the brightest regions are on the edges of the image, where we might expect the highest-frequency elements to be. Actually, it turns out that a raw DFT (as computed by numpy, anyhow) is \u201cshifted.\u201d That is, the indices are much like they were in our original FFT post, so that the \u201ccenter\u201d of the spectrum (the lowest frequency component) is actually in the corner of the image array.\n\nThe numpy folks have a special function designed to alleviate this called fftshift. Applying it before we plot the image gives the following spectrum:\n\nNow that\u2019s more like it.\u00a0For more details on what\u2019s going on with shifting and how to use the shifting functions, see\u00a0this matlab thread. (As a side note, the \u201csmudges\u201d in this image are interesting. We wonder what property of the original image contributes to the smudges)\n\nShifted or unshifted, this image represents the frequency spectrum of the image. In other words, we could take the inverse DFT of each pixel (and its symmetric partner) of this image separately, add them all together, and get back to our original image! We did just that using a different image (one of size 266 x 189, requiring a mere 25137 frequency components), to produce this video of the process:\n\nMany thanks to James Hance for his relentlessly cheerful art (I have a reddish version of this particular masterpiece on my bedroom wall).\n\nFor the interested reader, I followed this youtube video\u2019s recommended workflow to make the time-lapsed movie, along with some additional steps to make the videos play side by side. It took quite a while to generate and process the images, and the frames take up a lot of space. So instead of storing all the frames, the interested reader may find the script used to generate the frames on this blog\u2019s Github page\u00a0(along with all of the rest of the code used in this blog post).\n\n## Digital Watermarking\n\nNow we turn to the main application of Fourier transforms to this post, the task of adding an invisible digital watermark to an image. Just in case the reader lives in a cave, a watermark\u00a0is a security device used to protect the ownership or authenticity of a particular good. Usually they\u2019re used on money to prevent counterfeits, but they\u2019re often applied to high-resolution images on the web to protect copyrights. But perhaps more than just protect existing copyrights, watermarks as they\u2019re used today are ugly, and mostly prevent people from taking the image (paid for or not) in the first place. Here\u2019s an example from a big proponent of ugly watermarks, Shutterstock.com.\n\nNow if you were the business of copyright litigation, you\u2019d make a lot of money by suing people who took your clients\u2019 images without permission. So rather than prevent people from stealing in the first place, you could\u00a0put in an invisible watermark into all of your images and then crawl the web looking for stolen images with your watermark. It would be easy enough to automate (Google already did most of the work for you, if you just want to use Google\u2019s search by image feature).\n\nNow I\u2019m more on the side of Fair Use For All, so I wouldn\u2019t hope for a company to actually implement this and make using the internet that much scarier of a place. But the idea makes for an interesting thought experiment and blog post.\u00a0The idea is simply to modify the spectrum of an image by adding in small, artificial frequency components. That is, the watermarked image will look identical to the original image to a human, but the Fourier spectrum will contain suspicious entries that we can extract if we know where to look.\n\nImplementing the watermarking feature is quite easy, so let\u2019s do that first. Let\u2019s work again with James Hance\u2019s fine artwork.\n\nLet\u2019s call our image\u2019s pixel matrix $A$ and say we\u2019re working with grayscale images for simplicity (for color, we just do the same thing to all three color channels). Then we can define a watermark matrix $W$ by the following procedure:\n\n1. Pick a radius $r$, a length $L$, a watermark strength $\\alpha$, and a secret key $k$.\n2. Using $k$ as a seed to a random number generator, define a random binary vector $v$ of length $L$.\n3. Pick a subset $S$ of the circle of coordinates centered at the image\u2019s center of radius $r$, chosen or rejected based on the entries of $v$.\n4. Let $W$ be the matrix of all zeros (of the same dimension as $A$ with 1\u2019s in the entries of $S$.\n5. Compute the watermarked image as $\\mathscr{F}^{-1}(\\mathscr{F}(A) + \\alpha W)$. That is, compute the DFT of $A$, add $\\alpha W$ to it, and then compute the inverse Fourier transform of the result.\n\nThe code for this is simple enough. To create a random vector:\n\nimport random\ndef randomVector(seed, length):\nrandom.seed(secretKey)\nreturn [random.choice([0,1]) for _ in range(length)]\n\n\nTo make the watermark (and flush out all of the technical details of how it\u2019s done:\n\ndef makeWatermark(imageShape, radius, secretKey, vectorLength=50):\nwatermark = numpy.zeros(imageShape)\ncenter = (int(imageShape[0] \/ 2) + 1, int(imageShape[1] \/ 2) + 1)\n\nvector = randomVector(secretKey, vectorLength)\n\nx = lambda t: center[0] + int(radius * math.cos(t * 2 * math.pi \/ vectorLength))\ny = lambda t: center[1] + int(radius * math.sin(t * 2 * math.pi \/ vectorLength))\nindices = [(x(t), y(t)) for t in range(vectorLength)]\n\nfor i,location in enumerate(indices):\nwatermark[location] = vector[i]\n\nreturn watermark\n\n\nWe use the usual parameterization of the circle as $t \\mapsto (\\cos(2 \\pi t \/ n), \\sin(2 \\pi t \/ n)$ scaled to the appropriate radius. Here\u2019s what the watermark looks like as a spectrum:\n\nIt\u2019s hard to see the individual pixels, so click it to enlarge.\n\nAnd then applying a given watermark to an image is super simple.\n\ndef applyWatermark(imageMatrix, watermarkMatrix, alpha):\nshiftedDFT = fftshift(fft2(imageMatrix))\nwatermarkedDFT = shiftedDFT + alpha * watermarkMatrix\nwatermarkedImage = ifft2(ifftshift(watermarkedDFT))\n\nreturn watermarkedImage\n\n\nAnd that\u2019s all there is to it! One might wonder how the choice of $\\alpha$ affects the intensity of the watermark, and indeed here we show a few example values of this method applied to Hance\u2019s piece:\n\nClick to enlarge. The effects are most visible in the rightmost image where alpha = 1,000,000\n\nIt appears that it\u2019s not until $\\alpha$ becomes egregiously large (over 10,000) that we visibly notice the effects. This could be in part due to the fact that this is an image of a canvas (which has lots of small textures in the background). But it\u2019s good to keep in mind the range of acceptable values when designing a decoding mechanism.\n\nIndeed, a decoding mechanism is conceptually much messier; it\u2019s the art to the encoding mechanism\u2019s science. This paper details one possible way to do it, which is essentially to scale everything up or down to 512\u00d7512 pixels and try circles of every possible radius until you find one (or don\u2019t) which is statistically similar to the your random vector. And note that since we have the secret key we can generate the exact same random vector. So what the author of that paper suggests is to extract each circle of pixels from the Fourier spectrum, treating it as a single vector with first entry at angle 0. Then you do some statistical magic (compute cross-correlation or some other similarity measure) between the extracted pixels and your secret-key-generated random vector. If they\u2019re sufficiently similar, then you\u2019ve found your watermark, and otherwise there\u2019s no watermark present.\n\nThe code required to do this only requires a few extra lines that aren\u2019t present in the code we\u2019re already presented in this article (numpy does cross-correlation for you), so we leave it as an exercise to the reader: write a program that determines if an image contains our watermark, and test the algorithm on various $\\alpha$ and with modifications of the image like rotation, scaling, cropping, and jpeg compression. Part of the benefit of Fourier-based techniques is the resilience of the spectrum to mild applications of these transformations.\n\nNext time we\u2019ll use the Fourier transform to do other cool things to images, like designing filters and combining images in interesting ways.\n\nUntil then!","date":"2021-10-16 01:48:28","metadata":"{\"extraction_info\": {\"found_math\": true, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 0, \"mathjax_display_tex\": 0, \"mathjax_asciimath\": 1, \"img_math\": 142, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.7941579222679138, \"perplexity\": 600.257973398532}, \"config\": {\"markdown_headings\": true, \"markdown_code\": true, \"boilerplate_config\": {\"ratio_threshold\": 0.18, \"absolute_threshold\": 10, \"end_threshold\": 15, \"enable\": true}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2021-43\/segments\/1634323583408.93\/warc\/CC-MAIN-20211016013436-20211016043436-00185.warc.gz\"}"}
null
null
Best blog of Dead Sea Minerals Cosmetics. Dead Sea minerals cosmetics products actually come from the deepest and lowest point of earth ever. These products range from body, face and hair, which contains all natural Dead Sea ingredients specifically pure minerals. We need to keep our skin healthier because this is a significant part of our body, not only making us appear great, but also making us feel fabulously cool and better. As we age, we need to be more careful about our skincare. There are countless products available in the market which promises nourishing the skin, with ingredients like vitamins and minerals, but in truth, they are chemical based and contain synthetic, artificial and sometimes harmful ingredients that can be hazardous to the skin and health as a whole. Dead Sea products however, contain the purest substances such as salts, mud and other essential minerals that are best for all types of skin. Moisture levels is one of the common and biggest problems that people encounter. Dry skin is a problem too, because this can cause itchiness and soreness. Other people experience oily skin, which is the main factor that makes the pores clogged and causes pimples and acne problems. Even normal skin can have a real bad balance because of the environmental factors such as heat, dust, or air pollution. Dead Sea products can help combat, and calm these problems by using them on your face and any part of the body that is always exposed and prone to dirt and other substances. There are various essential minerals that you can find in Dead Sea products, all of them are useful, healthy, and provide the necessary nutrients needed by the skin. Boron. This mineral helps minimize and provides relief on symptoms of dry, scaly skin. Bromine. This type calms and relaxes the nerves and facial muscles. It has also inflammatory agents that cut down on swelling. Calcium. This mineral is responsible for skin regeneration of different cells under the skin's surface. Magnesium. This also works as anti-inflammatory agent and promotes cell regeneration. Potassium. This regulates the level of moisture keeping it on a balanced level. Sodium. This one reduces muscles fatigue and enhances skin cells to function properly. Sulfur. For acne problems, this is the best mineral that has the anti-bacterial and anti-fungal properties. Visit Dead Sea Minerals cosmetics shop for best Dead Sea cosmetics skin care products and get 15% discount coupon (C8297G).
{ "redpajama_set_name": "RedPajamaC4" }
5,382
{"url":"https:\/\/theromanxpl0it.github.io\/ctf_codeblue2017\/2017\/11\/11\/paillier.html","text":"# Codeblue CTF 2017 - Paillier Oracle\n\nby chq-matteo\nNovember 11, 2017\n\nWe have a service and we are given the source code.\nWhen we connect we have to submit a proof of work, after that we will receive the encrypted flag.\nWe can then send cipher text to the server and get the least significant bit of the decrypted text.\n\nThe first thing you find looking for the Pailler Cryptosystem is that:\n\n1. $(n, g)$ is the public key\n2. given an ecrypted message $c = enc(m)$ you can craft another encrypted message so that is decrypts to $m + m_1$ or $mm_2$.\n\nSo we can control the decrypted text (kind of).\n\nI worked offline at first with a mock flag.\n\nThe first idea I came up with was to send a message that decrypts to $m2^{-1}$ and build the flag 1 bit at a time. This worked for a couple of bit, but sometimes randomly not.\n\nThat\u2019s because multiplying for $2^{-1} \\mod n^2$ is not really an integer division!\n\nSo I came up with this:\n\n1. if the binary representation of $m$ (the flag for example) ends with $0$ we can craft a message that decrypts to $m2^{-1}$ and get the bit following the last zero (like a shift to the right)\n2. if $m$ does not end with $0$ we can send a message that decrypts to $(m - 1) * 2^{-1}$ and get the next bit\n\nThe server can tell us the last bit of $m$. So how we get the flag?\n\n1. Get the encrypted_flag (ef) from the server\n2. Get the least significant bit and set it on our partial flag\n3. Send m so that dec(m) $= (ef - flag)\/ 2^{len(flag)} = ef \\gg len(flag)$\n4. Repeat from 2\n\nIt was pretty cool because when I started the script and I got } as the first character and I was like \u2018wow it works\u2019, but then I started to get random hex characters and not my mock flag.\n\nWell I had forgotten that I switched to the remote server :P\n\nI had a video of the run, but it got overwritten by an attempt to solve Smoke on the Water.\n\n## Python solution\n\nI have pwntools on a virtualenv and it didn\u2019t play well with SageMath, so back to plain old python\n\nflag = 0\nl = 0\n# i = g^(-1), j = 2^(-1)\nwhile l < 8 * 100:\n# dec((ef * g^(-flag)) ^ (2^(-l))) = (flag - knownbits) >> l\nflag |= (getLSB(pow(encrypted_flag * pow(i, flag, n2), pow(j, l, n2), n2)) << l)\nl += 1\n# print pt\nif l % 8 == 0:\nprint unhexlify(format(pt, 'x'))\n\n\n\nWe have these two nice properties in the Paillier Cryptosystem\n\n$dec(m g^{k}) = m + k \\mod n^2$ $dec(m^{k}) = mk \\mod n^2$\n\n### Helper functions\n\ndef getLSB(m):\n'''\nGet LSB from the server\n'''\nr.sendline(str(m))\nes = r.recvline()\nlsb = int(es[-2])\nr.recvuntil(loop)\nreturn lsb","date":"2021-08-04 12:56:55","metadata":"{\"extraction_info\": {\"found_math\": true, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 2, \"mathjax_display_tex\": 0, \"mathjax_asciimath\": 1, \"img_math\": 0, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.5446035861968994, \"perplexity\": 2259.1996319693753}, \"config\": {\"markdown_headings\": true, \"markdown_code\": true, \"boilerplate_config\": {\"ratio_threshold\": 0.18, \"absolute_threshold\": 10, \"end_threshold\": 5, \"enable\": true}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2021-31\/segments\/1627046154805.72\/warc\/CC-MAIN-20210804111738-20210804141738-00065.warc.gz\"}"}
null
null
Everything You Need to Know About the EmDrive Thruster Even if you don't keep up with developments in space propulsion technology, you've still probably heard about the EmDrive. You've probably seen headlines declaring it the key to interstellar travel, and claims that it will drastically reduce travel time across our solar system, making our dreams of people walking on other planets even more of a reality. There have even been claims that this highly controversial technology is the key to creating warp drives.These are bold claims, and as the great cosmologist and astrophysicist Carl Sagan once said, "extraordinary claims require extraordinary evidence." With that in mind, we thought it'd be helpful to break down what we know about the enigmatic EmDrive, and whether it is, in fact, the key to mankind exploring the stars. science Outer Space science in universe science So without further ado, here's absolutely everything you need to know about the world's most puzzling propulsion device. science Outer Space science in universe science A new, leaked NASA paper points to potentially working EmDrive A leaked NASA paper obtained by the International Business Times via a post by a user on the NASA Spaceflight forums. The post was originally deleted by the forum's moderators, however, the document has since been posted and remains currently viewable. science Outer Space science in universe science The paper is ostensibly the same that was discussed earlier in the year (reported below). The information in the paper clearly points to a working version of the EmDrive, and while it's yet to be published, it is still set to run in the Institute of Aeronautics and Astronautics' scientific journal, AIAA Journal of Propulsion and Power. science Outer Space science in universe science As discussed below, this is a massive step forward for the EmDrive and for those who believe in the theoretical technology. If the paper on NASA's findings does in fact pass muster and see the light of day — which seems very likely — it'll be a boon for further research and development of the EmDrive tech. This would open the door for continued study and tests, and may finally put humans on the road to fast, lightweight space travel. science Outer Space science in universe science An EmDrive paper has finally been accepted by peer review Originally, this article pointed out that previous studies and papers on the EmDrive have either not been submitted, or passed peer review. Those days are in the past, however, given a NASA Eagleworks' paper on the EmDrive test which has reportedly passed the peer review process and will soon be published by the American Institute of Aeronautics and Astronautics' AIAA Journal of Propulsion and Power. science Outer Space science in universe science This is an important step for the EmDrive as it adds legitimacy to the technology and the tests done thus far, opening the door for other groups to replicate the tests. This will also allow other groups to devote more resources to uncovering why and how it works, and how to iterate on the drive to make it a viable form of propulsion. So, while a single peer-reviewed paper isn't going to suddenly equip the human race with interplanetary travel, it's the first step toward eventually realizing that possible future. science Outer Space science in universe science What is the EmDrive? Simply put, the EmDrive is a conundrum. First designed in 2001 by aerospace engineer Roger Shawyer, the technology can be summed up as a propellantless propulsion system, meaning the engine doesn't use fuel to cause a reaction. Removing the need for fuel makes a craft substantially lighter, and therefore easier to move (and cheaper to make, theoretically). In addition, the hypothetical drive is able to reach extremely high speeds — we're talking potentially getting humans to the outer reaches of the solar system in a matter of months. The issue is, the entire concept of a reactionless drive is inconsistent with Newton's conservation of momentum, which states that within a closed system, linear and angular momentum remain constant regardless of any changes that take place within said system. More plainly: Unless an outside force is applied, an object will not move. Reactionless drives are named as such because they lack the "reaction" defined in Newton's third law: "For every action there is an equal and opposite reaction." But this goes against our current fundamental understanding of physics: An action (propulsion of a craft) taking place without a reaction (ignition of fuel and expulsion of mass) should be impossible. For such a thing to occur, it would mean an as-yet-undefined phenomenon is taking place — or our understanding of physics is completely wrong. How does the EmDrive "work?" Setting aside the potentially physics-breaking improbabilities of the technology, let's break down in simple terms how the proposed drive operates. The EmDrive is what is called an RF resonant cavity thruster, and is one of several hypothetical machines that use this model. These designs work by having a magnetron push microwaves into a closed truncated cone, then push against the short end of the cone, and propel the craft forward. This is in contrast to the form of propulsion current spacecraft use, which burn large quantities of fuel to expel a massive amount of energy and mass to rocket the craft into the air. An often-used metaphor for the inefficacy of this is to compare the particles pushing against the enclosure and producing thrust to the act of sitting in a car and pushing a steering wheel to move the car forward. While tests have been done on experimental versions of the drive — with low energy inputs resulting in a few micronewtons of thrust (about as much force as the weight of a penny) — The first peer-reviewed paper has only been recently accepted, and none of the findings from other tests have ever been published in a peer-reviewed journal. It's possible some positive thrust results may have been caused by interference or an unaccounted error with test equipment. The fact that NASA Eagleworks' paper has been reportedly accepted by peer review and will be published in AIAA Journal of Propulsion and Power does add quite a bit of legitimacy to these claims, however. Although there's been much skepticism regarding the EmDrive prior to the Eagleworks paper, it's important to note that there's been a number of people who have tested the drive and reported achieving thrust. In 2001, Shawyer was given a £45,000 grant from the British government to test the EmDrive. His test reportedly achieved 0.016 Newtons of force and required 850 watts of power, but no peer review of the tests verified this. It's worth noting, however, that this number was low enough that it was potentially an experimental error. In 2008, Yang Juan and a team of Chinese researches at the Northwestern Polytechnical University allegedly verified the theory behind RF resonant cavity thrusters, and subsequently built their own version in 2010, testing the drive multiple times from 2012 to 2014. Tests results were purportedly positive, achieving up yo 750 mN (millinewtons) of thrust, and requiring 2,500 watts of power. In 2014, NASA researchers, tested their own version of an EmDrive, including in a hard vacuum. Once again, the group reported thrust (about 1/1,000 of Shawyer's claims), and once again, the data was never published through peer-reviewed sources. Other NASA groups are skeptical of researchers' claims, but in their paper, it is clearly stated that these findings neither confirm nor refute the drive, instead calling for further tests. In 2015, that same NASA group tested a version of chemical engineer Guido Fetta's Cannae Drive (née Q Drive), and reported positive net thrust. Similarly, a research group at Dresden University of Technology also tested the drive, again reporting thrust, both predicted and unexpected. Yet another test by a NASA research group, Eagleworks, in late 2015seemingly confirmed the validity of the EmDrive. The test corrected errors that had occurred in the previous tests, and surprisingly, the drive achieved thrust. However, the group has not yet submitted their findings for peer review. It's possible that other unforeseen errors in the experiment may have cause thrust (the most likely of which is that the vacuum was compromised, causing heat to expand air within it testing environment and move the drive). Whether the findings are ultimately published or not, more tests need to be done. That's exactly what Glenn Research Center in Cleveland, Ohio, NASA's Jet Propulsion Laboratory, and Johns Hopkins University Applied Physics Laboratory intend to do. For EmDrive believers, there seems to be some hope. In mid-2016, a new theory was put forth by physicist Michael McCulloch, a researcher from Plymouth University in the United Kingdom, which may offer an explanation of the thrust observed in tests. McCulloch's theory deals with inertia and something called the Unruh effect — a concept predicted by relativity, which makes the universe appear hotter the more you accelerate, with the heat observed relative to the acceleration. McCulloch's new theory deals with the unconfirmed concept of Unruh radiation, which infers that particles form out of the vacuum of space as a direct result from the observed heating of the universe due to acceleration. This theoretical concept largely fits into our current understanding of the universe and predicts the results of inertia we currently observe, albeit with one notable exception: small accelerations on the scale of about what has been observed while testing the EM Drive. This acceleration comes as a result of the Unruh radiation particles, whose wavelengths increase as acceleration decreases. Unruh particles at different wavelengths would have to fit at either end of the EM Drive's cone, and as they bounce around inside the cone, their inertia would change as well, which would ultimately result in thrust. McCulloch's theory is, admittedly, a bit difficult to parlay into succinct layman's terms. If you're curious and want to delve into further reading on the theory, you can read McCulloch's entire paper discussing his theory here. The point here is that, should the Unruh Effect and Unruh Radiation be confirmed, it offers an entirely plausible explanation for the EM Drive's seemingly heretofore impossible thrust observations. This will require further research and experimentation, and gives the propulsion system even more momentum for testing. Implications of a working EmDrive It's easy to see how many in the scientific community are wary of EmDrive and RF resonant cavity thrusts altogether. But on the other hand, the wealth of studies raises a few questions: Why is there such a interest in the technology, and why do so many people wish to test it? What exactly are the claims being made about the drive that make it such an attractive idea? While everything from atmospheric temperature-controlling satellites, to safer and more efficient automobiles have been drummed up as potential applications for the drive, the real draw of the technology — and the impetus for its creation in the first place — is the implications for space travel. Spacecraft equipped with a reactionless drive could potentially make it to the moon in just a few hours, Mars in two to three months, and Pluto within two years. These are extremely bold claims, but if the EmDrive does turn out to be a legitimate technology, they may not be all that outlandish. And with no need to pack several tons-worth of fuel, spacecraft become cheaper and easier to produce, and far lighter. For NASA and other such organizations, including the numerous private space corporations like SpaceX, lightweight, affordable spacecraft that can travel to remote parts of space fast are something of a unicorn. Still, for that to become a reality, the science has to add up. Shawyer is adamant that there is no need for pseudoscience or quantum theories to explain how EmDrive works. Instead, he believes that current models of Newtonian physics offer an explanation, and has written papers on the subject, one of which is currently being peer reviewed (separate from the Eagleworks paper). He expects the paper to be published sometime this year. While in the past Shawyer has been criticized by other scientists for incorrect and inconsistent science, if the paper does indeed get published, it may begin to legitimize the EmDrive and spur more testing and research. Despite his insistence that the drive behaves within the laws of physics, it hasn't prevented him from making bold assertions regarding EmDrive. Shawyer has gone on record saying that this new drive produced warp bubbles which allow the drive to move, claiming that this is how NASA's test results were likely achieved. Assertions such as these have garnered much interest online, but have no clear supporting data and will (at the very least) require extensive testing and debate in order to be taken seriously by the scientific community — the majority of which remain skeptical of Shawyer's claims. Hopefully, with this new peer reviewed paper, more EmDrive tests will be undertaken, helping elucidate just how this thing works.Colin Johnston of the Armagh Planetarium wrote an extensive critique of the EmDrive and the inconclusive findings of numerous tests. Similarly, Corey S. Powell of Discovery wrote his own indictment of both Shawyer's EmDrive and Fetta's Cannae Drive, as well as the recent fervor over NASA's findings. Both point out the need for greater discretion when reporting on such instances. Professor and mathematical physicist, John C. Baez expressed his exhaustion at the conceptual technology's persistence in debates and discussions, calling the entire notion of a reactionless drive "baloney." His impassioned dismissal echoes the sentiments of many others.Shawyer's EmDrive has been met with enthusiasm elsewhere, including the website NASASpaceFlight.com — where information about the most recent Eagleworks' tests was first posted — and the popular journal New Scientist, which published a favorable and optimistic paper on EmDrive. (The editors later issued a statement that, despite enduring excitement over the idea, they should have shown more tact when writing on the controversial subject.)NASA Eagleworks' paper opens the door for better understanding of the technology, and for further refinement of it. A demonstrable, working EmDrive could open up exciting possibilities for both space and terrestrial travel — not to mention call into question our entire understanding of physics.
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
6,435
Sarajevo to Paris, Marleen Daniëls Veerle Windels Sarajevo to Paris, fashion or reportage, deciding on the title of a book is mind-boggling. I call myself a documentary photographer that accidentally ended up doing fashion. The end of the '80s was an interesting and intense time in world history, and a particularly creative time in the world of fashion. As a young female photographer I was interested in both worlds. I was travelling for newspapers and magazines to the fashion weeks in Milan and Paris and to the conflict zones of Lebanon and Iraq. It was during the war in the former Socialist Federal Republic of Yugoslavia and the siege of Sarajevo that I matured in documentary photography, fortunately without being injured. Thirty years later, when looking back, those two worlds — documentary and fashion — still define my work. Both are equally represented in my archives. This book, of my fashion work, is the first to be published. I called it Sarajevo to Paris because sometimes I would travel directly from one to the other. These two cities had a big impact on my life. Marleen Daniëls, May 2021 Uitgever Stockmans Art Books
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
8,417
Q: Sending a renamed file using Intent.ACTION_SEND Let's say I have a save file, saves.xyz, and I want to share it, by mail. Intent intent = new Intent(Intent.ACTION_SEND); intent.putExtra(Intent.EXTRA_SUBJECT, content.getShareSubject()); intent.putExtra(Intent.EXTRA_TEXT, content.getShareText()); File savesFile = new File(Environment.getExternalStorageDirectory(), filePath); Uri savesUri = Uri.fromFile(savesFile); intent.putExtra(Intent.EXTRA_STREAM, savesUri); String fileType = activity.getString(R.string.saves_file_type); //"text/xyz" intent.setType(fileType); String chooserMessage = activity.getString(R.string.saves_chooser_message); activity.startActivity(Intent.createChooser(intent, chooserMessage)); This works fine enough. However, I now want to be able to rename the attached file (say saves-01-01-2017.xyz). I've thought about copying the file, sending it, then deleting it, but haven't found a way to delete it cleanly afterwards (see this). I also tried to implement my own FileProvider (as advised here) and redirecting saves-*.xyz to saves.xyz, but I couldn't get the FileProvider to work (I probably didn't grasp their function fully) : manifest.xml <manifest xmlns:android="http://schemas.android.com/apk/res/android" package="com.mydomain.myapp" > ... <application ... > <provider android:name="com.mydomain.myapp.MyFileProvider" android:authorities="com.mydomain.fileprovider" android:exported="false" android:grantUriPermissions="true" > <meta-data android:name="android.support.FILE_PROVIDER_PATHS" android:resource="@xml/file_provider_paths" /> </provider> ... </application> </manifest> file_provider_paths.xml <paths xmlns:android="http://schemas.android.com/apk/res/android"> <files-path name="saves_folder" path="/" /> </paths> MyFileProvider class public class MyFileProvider extends FileProvider { @Override public ParcelFileDescriptor openFile(Uri uri, String mode) throws FileNotFoundException { //doesn't print anything Log.d(MyFileProvider.class.getSimpleName(), uri.toString()); return super.openFile(uri, mode); } } I'd be grateful if I were to be enlightened here. A: You may wanna try this way File savesFile = new File(Environment.getExternalStorageDirectory(), filePath); //rename your file here File rename = new File(context.getCacheDir(), "renameithere.txt"); if (savesFile.exists()) { savesFile.renameTo(rename); } Also if you're using a FileProvider, then use this way to get the Uri. try { return FileProvider.getUriForFile(context, authority, viewFile); } catch (Exception ex) { return Uri.fromFile(viewFile); } Hope this helps. A: I've found a cleaner way than FileProvider (felt way too overkill, and I couldn't get it to work anyway), using startActivityForResult and onSaveInstanceState. Copying the file to the desired name: try { copyFile(saves_file, saves_tmp_file); } catch (IOException ex) { return false; } Uri saves_uri = Uri.fromFile(saves_tmp_file) ; Starting the intent's activity with startActivityForResult: activity.startActivityForResult(Intent.createChooser(intent, chooserMessage), MY_REQUEST_CODE); Saving the temporary file's name in the activity's state: @Override protected void onSaveInstanceState(Bundle outState) { super.onSaveInstanceState(outState); outstate.putCharArray(TO_DELETE_PATH_BUNDLE_KEY, tmpFilePath.toCharArray()); } Restoring it: @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); //... if (savedInstanceState != null) { char[] array = savedInstanceState.getCharArray(TO_DELETE_PATH_BUNDLE_KEY); if (array != null) tmpFilePath = new String(array); { } Deleting the file: @Override protected void onActivityResult(int requestCode, int resultCode, Intent data) { super.onActivityResult(requestCode, resultCode, data); if (requestCode == MY_REQUEST_CODE && tmpFilePath != null) new File(Environment.getExternalStorageDirectory(), tmpFilePath).delete(); } I guess this method isn't the safest, but it should be safe and clean enough for my uses.
{ "redpajama_set_name": "RedPajamaStackExchange" }
8,671
{"url":"https:\/\/portal.kobv.de\/advancedSearch.do?fq=topic%3AAstrophysics&sortCrit=score&sortOrder=desc&hitsPerPage=10&usedLibs=DE-B763&usedLibs=DE-204&usedLibs=DE-523&usedLibs=DE-600&usedLibs=DE-B1528&usedLibs=DE-522&usedLibs=DE-B486&usedLibs=DE-521&usedLibs=DE-Bo133&usedLibs=DE-526&usedLibs=DE-ER522&usedLibs=DE-525&usedLibs=DE-Bo410&usedLibs=DE-Po79&usedLibs=DE-287&usedLibs=DE-364&usedLibs=DE-Po75&usedLibs=DE-2070s&usedLibs=DE-Mun1&usedLibs=DE-B1570&usedLibs=DE-F131&usedLibs=DE-B2223&usedLibs=DE-609&usedLibs=DE-B1532&usedLibs=DE-B2224&usedLibs=DE-83&usedLibs=DE-B1575&usedLibs=DE-B1533&usedLibs=DE-2552&usedLibs=DE-B1536&usedLibs=DE-2110&usedLibs=DE-B1579&usedLibs=DE-B1535&usedLibs=DE-B479&usedLibs=DE-2273&usedLibs=DE-B478&usedLibs=DE-634&usedLibs=DE-B4&usedLibs=DE-B433&usedLibs=DE-Eb1&usedLibs=DE-Po82&usedLibs=DE-517&usedLibs=DE-CP521&usedLibs=DE-11&usedLibs=DE-B1563&usedLibs=DE-B1562&usedLibs=DE-B1566&usedLibs=DE-B1525&usedLibs=DE-B785&usedLibs=DE-B103&usedLibs=DE-B464&usedLibs=DE-B185&usedLibs=DE-186&usedLibs=DE-188&usedLibs=DE-2291&usedLibs=DE-B1550&usedLibs=DE-B1595&usedLibs=DE-2533&usedLibs=DE-2377&usedLibs=DE-B775&usedLibs=DE-578&usedLibs=DE-B1539&usedLibs=DE-B496&usedLibs=DE-B177&usedLibs=DE-B171&usedLibs=DE-VOEB&usedLibs=DE-B170&usedLibs=DE-Po24&usedLibs=DE-B15&usedLibs=DE-B1583&usedLibs=DE-181&usedLibs=DE-B1543&usedLibs=DE-2565&usedLibs=DE-B1586&usedLibs=DE-1&usedLibs=DE-B768&usedLibs=DE-B1547&usedLibs=DE-B11&usedLibs=DE-B1549&unownedTitles=true&index=primoCentral&f1=author&v1=Bowman%2C+Judd+D.&conj1=&f2=&v2=&conj2=&f3=&v3=&conj3=&f4=&v4=&conj4=&f5=&v5=&conj5=&f6=&v6=&conj6=&f7=&v7=&plv=2","text":"# Kooperativer Bibliotheksverbund\n\n## Berlin Brandenburg\n\nand\nand\n\nAn error occurred while sending the email. Please try again.\n\nProceed reservation?\n\nExport\n\u2022 1\nArticle\nLanguage: English\nIn: Nature, December 2018, Vol.564(7736), pp.E35\nDescription: [...]their choice to use it over the full band was not justified. Judd D. Bowman1\u00b7, Alan E. E. Rogers2, Raul A. Monsalve1'3'4'5'6, Thomas J. Mozdzen1 & Nivedita Mahesh1 1School of Earth and Space Exploration, Arizona State University, Tempe, AZ, USA. 2Haystack Observatory, Massachusetts Institute of Technology, Westford, MA, USA. 3Department of Physics, McGill University, Montr\u00e9al, Quebec, Canada. 4McGill Space Institute, McGill University, Montr\u00e9al, Quebec, Canada. 5Center for Astrophysics and Space Astronomy, University of Colorado, Boulder, CO, USA. 6Facultad de Ingenier\u00eda, Universidad Cat\u00f3lica de la Sant\u00edsima Concepci\u00f3n, Concepci\u00f3n, Chile. *e-mail: judd.bowman@asu.edu Published online 19 December 2018. First results on the epoch of reionization from first light with SARAS 2.\nKeywords: United States\u2013Us ; Massachusetts ; Canada ; Quebec Canada ; Arizona ; Chile ; Space Exploration ; Astronomy ; Ionization ; Astronomy ; Calibration ; Astrophysics ; Ionosphere ; Space Exploration ; Parameter Estimation ; Massachusetts Institute of Technology ; Arizona State University ; University of Colorado ; Mcgill University;\nISSN: 00280836\nE-ISSN: 1476-4687\nLibrary Location Call Number Volume\/Issue\/Year Availability\nOthers were also interested in ...\n\u2022 2\nArticle\nIn: Nature, 2018, Vol.555(7694), p.67\nDescription: After stars formed in the early Universe, their ultraviolet light is expected, eventually, to have penetrated the primordial hydrogen gas and altered the excitation state of its 21-centimetre hyperfine line. This alteration would cause the gas to absorb photons from the cosmic microwave background, producing a spectral distortion that should be observable today at radio frequencies of less than 200 megahertz. Here we report the detection of a flattened absorption profile in the sky-averaged radio spectrum, which is centred at a frequency of 78 megahertz and has a best-fitting full-width at half-maximum of 19 megahertz and an amplitude of 0.5 kelvin. The profile is largely consistent with expectations for the 21-centimetre signal induced by early stars, however, the best-fitting amplitude of the profile is more than a factor of two greater than the largest predictions. This discrepancy suggests that either the primordial gas was much colder than expected or the background radiation temperature was hotter than expected. Astrophysical phenomena (such as radiation from stars and stellar remnants) are unlikely to account for this discrepancy, of the proposed extensions to the standard model of cosmology and particle physics, only cooling of the gas as a result of interactions between dark matter and baryons seems to explain the observed amplitude. The low-frequency edge of the observed profile indicates that stars existed and had produced a background of Lyman-alpha photons by 180 million years after the Big Bang. The high-frequency edge indicates that the gas was heated to above the radiation temperature less than 100 million years later. Comment: Accepted version of article published March 1, 2018. Full edited version available through Nature Springer SharedIt at: http:\/\/rdcu.be\/H0pE\nKeywords: Astrophysics - Cosmology And Nongalactic Astrophysics ; Astrophysics - Instrumentation And Methods For Astrophysics;\nISSN: 0028-0836\nE-ISSN: 1476-4687\nLibrary Location Call Number Volume\/Issue\/Year Availability\nOthers were also interested in ...\n\u2022 3\nArticle\nIn: Nature, Volume 468, Issue 7325, pp. 796-798 (2010)\nDescription: Observations of the 21-centimetre line of atomic hydrogen in the early Universe directly probe the history of the reionization of the gas between galaxies. The observations are challenging, though, because of the low expected signal strength (~10 mK), and contamination by strong (\u232a100 K) foreground synchrotron emission in the Milky Way and extragalactic continuum sources2. If reionization happened rapidly, there should be a characteristic signature visible against the smooth foreground in an all-sky spectrum. Here we report an all-sky spectrum between 100 and 200 MHz, corresponding to the redshift range 6 \u2329 z \u2329 13 for the 21-centimetre line. The data exclude a rapid reionization timescale of dz \u2329 0.06 at the 95% confidence level. Comment: 8 pages, 2 figures, Published in Nature, Volume 468, Issue 7325, pp. 796-798 (2010)\nKeywords: Astrophysics - Cosmology And Nongalactic Astrophysics\nSource: Cornell University\nLibrary Location Call Number Volume\/Issue\/Year Availability\nOthers were also interested in ...\n\u2022 4\nArticle\nDescription: A new method of absolute calibration of sky noise temperature using a three-position switched spectrometer, measurements of antenna and low noise amplifier impedance with a vector network analyzer, and ancillary measurements of the amplifier noise waves is described. The details of the method and its application to accurate wideband measurements of the spectral index of the sky noise are described and compared with other methods. Comment: 15 pages, 10 figures, published in Radio Science\nKeywords: Astrophysics - Instrumentation And Methods For Astrophysics\nSource: Cornell University\nLibrary Location Call Number Volume\/Issue\/Year Availability\nOthers were also interested in ...\n\u2022 5\nArticle\nIn: Monthly Notices of the Royal Astronomical Society, 2017, Vol. 470(4), pp.4720-4731\nDescription: We present the E-field Parallel Imaging Calibration (EPICal) algorithm, which addresses the need for a fast calibration method for direct imaging radio astronomy correlators. Direct imaging involves a spatial fast Fourier transform of antenna signals, alleviating an $\\mathcal {O}(N_{\\mathrm{a}} ^2)$ computational bottleneck typical in radio correlators, and yielding a more gentle $\\mathcal {O}(N_{\\mathrm{g}} \\log _2 N_{\\mathrm{g}})$ scaling, where N a is the number of antennas in the array and N g is the number of gridpoints in the imaging analysis. This can save orders of magnitude in computation cost for next generation arrays consisting of hundreds or thousands of antennas. However, because antenna signals are mixed in the imaging correlator without creating visibilities, gain correction must be applied prior to imaging, rather than on visibilities post-correlation. We develop the EPICal algorithm to form gain solutions quickly and without ever forming visibilities. This method scales as the number of antennas, and produces results comparable to those from visibilities. We use simulations to demonstrate the EPICal technique and study the noise properties of our gain solutions, showing they are similar to visibility-based solutions in realistic situations. By applying EPICal to 2\u00a0s of Long Wavelength Array data, we achieve a 65\u00a0per\u00a0cent dynamic range improvement compared to uncalibrated images, showing this algorithm is a promising solution for next generation instruments.\nKeywords: Instrumentation: Interferometers ; Techniques: Image Processing ; Techniques: Interferometric\nISSN: 0035-8711\nE-ISSN: 1365-2966\nLibrary Location Call Number Volume\/Issue\/Year Availability\nOthers were also interested in ...\n\u2022 6\nArticle\nIn: Monthly Notices of the Royal Astronomical Society, 2017, Vol. 467(1), pp.715-730\nDescription: Modern radio telescopes are favouring densely packed array layouts with large numbers of antennas ( N A \u2273 1000). Since the complexity of traditional correlators scales as $\\mathcal {O}(N_{\\rm A}^2)$ , there will be a steep cost for realizing the full imaging potential of these powerful instruments. Through our generic and efficient E-field Parallel Imaging Correlator ( epic ), we present the first software demonstration of a generalized direct imaging algorithm, namely the Modular Optimal Frequency Fourier imager. Not only does it bring down the cost for dense layouts to $\\mathcal {O}(N_{\\rm A}\\log _2N_{\\rm A})$ but can also image from irregular layouts and heterogeneous arrays of antennas. epic is highly modular, parallelizable, implemented in object-oriented python , and publicly available. We have verified the images produced to be equivalent to those from traditional techniques to within a precision set by gridding coarseness. We have also validated our implementation on data observed with the Long Wavelength Array (LWA1). We provide a detailed framework for imaging with heterogeneous arrays and show that epic robustly estimates the input sky model for such arrays. Antenna layouts with dense filling factors consisting of a large number of antennas such as LWA, the Square Kilometre Array, Hydrogen Epoch of Reionization Array, and Canadian Hydrogen Intensity Mapping Experiment will gain significant computational advantage by deploying an optimized version of epic . The algorithm is a strong candidate for instruments targeting transient searches of fast radio bursts as well as planetary and exoplanetary phenomena due to the availability of high-speed calibrated time-domain images and low output bandwidth relative to visibility-based systems.\nKeywords: Instrumentation: Interferometers ; Techniques: Image Processing ; Techniques: Interferometric ; Telescopes\nISSN: 0035-8711\nE-ISSN: 1365-2966\nLibrary Location Call Number Volume\/Issue\/Year Availability\nOthers were also interested in ...\n\u2022 7\nArticle\nLanguage: English\nIn: IEEE Transactions on Microwave Theory and Techniques, August 2016, Vol.64(8), pp.2631-2639\nDescription: This paper introduces a one-port method for estimating model parameters of vector network analyzer calibration standards. The method involves measuring the standards through an asymmetrical passive network connected in direct mode and then in reverse mode, and using these measurements to compute the S-parameters of the network. The free parameters of the calibration standards are estimated by minimizing a figure of merit based on the expected equality of the S-parameters of the network when used in direct and reverse modes. The capabilities of the method are demonstrated through simulations, and real measurements are used to estimate the actual offset delay of a 50-\u03a9 calibration load that is assigned zero delay by the manufacturer. The estimated delay is 38.8 ps with a 1 \u03c3 uncertainty of 2.1 ps for this particular load. This result is verified through measurements of a terminated airline. The measurements agree better with theoretical models of the airline when the reference plane is calibrated using the new estimate for the load delay.\nKeywords: Standards ; Transmission Line Measurements ; Calibration ; Delays ; Scattering Parameters ; Ports (Computers) ; Extraterrestrial Measurements ; Delay ; Impedance ; Reflection Standards ; Scattering Parameters ; Vector Network Analyzer (Vna) ; Engineering\nISSN: 0018-9480\nE-ISSN: 1557-9670\nLibrary Location Call Number Volume\/Issue\/Year Availability\nOthers were also interested in ...\n\u2022 8\nArticle\nIn: Monthly Notices of the Royal Astronomical Society, 2012, Vol. 419(2), pp.1070-1084\nDescription: Efforts are being made to observe the 21-cm signal from the \u2018cosmic dawn\u2019 using sky-averaged observations with individual radio dipoles. In this paper, we develop a model of the observations accounting for the 21-cm signal, foregrounds and several major instrumental effects. Given this model, we apply Markov Chain Monte Carlo techniques to demonstrate the ability of these instruments to separate the 21-cm signal from foregrounds and quantify their ability to constrain properties of the first galaxies. For concreteness, we investigate observations between 40 and 120\u2003MHz with the proposed\u2002 Dark Ages Radio Explorer \u2002mission in lunar orbit, showing its potential for science return.\nKeywords: Methods: Statistical ; Cosmology: Theory ; Diffuse Radiation ; Radio Lines: General\nISSN: 0035-8711\nE-ISSN: 1365-2966\nLibrary Location Call Number Volume\/Issue\/Year Availability\nOthers were also interested in ...\n\u2022 9\nArticle\nIn: Monthly Notices of the Royal Astronomical Society, 2017, Vol. 474(4), pp.4487-4499\nDescription: We present a baseline sensitivity analysis of the Hydrogen Epoch of Reionization Array (HERA) and its build-out stages to one-point statistics (variance, skewness, and kurtosis) of redshifted 21\u2009cm intensity fluctuation from the Epoch of Reionization (EoR) based on realistic mock observations. By developing a full-sky 21\u2009cm light-cone model, taking into account the proper field of view and frequency bandwidth, utilizing a realistic measurement scheme, and assuming perfect foreground removal, we show that HERA will be able to recover statistics of the sky model with high sensitivity by averaging over measurements from multiple fields. All build-out stages will be able to detect variance, while skewness and kurtosis should be detectable for HERA128 and larger. We identify sample variance as the limiting constraint of the measurements at the end of reionization. The sensitivity can also be further improved by performing frequency windowing. In addition, we find that strong sample variance fluctuation in the kurtosis measured from an individual field of observation indicates the presence of outlying cold or hot regions in the underlying fluctuations, a feature that can potentially be used as an EoR bubble indicator.\nKeywords: Methods: Statistical ; Dark Ages, Reionization, First Stars ; Cosmology: Observations\nISSN: 0035-8711\nE-ISSN: 1365-2966\nLibrary Location Call Number Volume\/Issue\/Year Availability\nOthers were also interested in ...\n\u2022 10\nArticle\nDescription: Changes in the sky noise spectrum are used to characterize perturbations in the ionosphere. Observations were made at the same sidereal time on multiple days using a calibrated broadband dipole and radio spectrometer covering 80 to 185 MHz. In this frequency range, an ionospheric opacity perturbation changes both the electron thermal emission from the ionosphere and the absorption of the sky noise background. For the first time, these changes are confirmed to have the expected spectral signature and are used to derive the opacity and electron temperature associated with the perturbations as a function of local time. The observations were acquired at the Murchison Radio-astronomy Observatory in Western Australia from 18 April 2014 to 6 May 2014. They show perturbations that increase at sunrise, continue during the day, and decline after sunset. Magnitudes corresponding to an opacity of about 1 percent at 150 MHz with a typical electron temperature of about 800 K, were measured for the strongest perturbations. Comment: 11 pages including 6 figures. Submitted to Radio Science\nKeywords: Astrophysics - Instrumentation And Methods For Astrophysics\nISSN: 00486604\nE-ISSN: 1944799X\nLibrary Location Call Number Volume\/Issue\/Year Availability\nOthers were also interested in ...\nClose \u2297\nThis website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages","date":"2019-12-06 22:42:19","metadata":"{\"extraction_info\": {\"found_math\": true, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 1, \"mathjax_display_tex\": 0, \"mathjax_asciimath\": 0, \"img_math\": 0, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.4604869484901428, \"perplexity\": 2903.0291906815332}, \"config\": {\"markdown_headings\": true, \"markdown_code\": true, \"boilerplate_config\": {\"ratio_threshold\": 0.18, \"absolute_threshold\": 10, \"end_threshold\": 15, \"enable\": true}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2019-51\/segments\/1575540491491.18\/warc\/CC-MAIN-20191206222837-20191207010837-00509.warc.gz\"}"}
null
null
Covington Credit San Antonio easy installment loans deliver quick cash when you need it most. Unlike payday loans, our personal installment loans offer the advantage of reduced, more affordable payments. From car payments to mortgage payments, our installment loans are used for a variety of reasons. If you find yourself living paycheck to paycheck, installment loans can give you the fast cash you need for a financial boost. For example, if you get behind on even one car payment and, it can be nearly impossible to catch up. Thankfully, cash loans with Covington Credit can help you get back on your feet in no time. Our credit specialists have got you covered with cash loans ranging from $300 to $1,400. Take advantage of the flexibility as well as reliability of Covington Credit quick personal loans. The easy cash pros at Covington Credit are ready to give a hand with your bills and expenses. Give us a call today (866) 413-1836!
{ "redpajama_set_name": "RedPajamaC4" }
8,732
{"url":"https:\/\/www.yuanmas.com\/info\/GlypPnP1y2.html","text":"# Machine Learning - III. Linear Algebra Review (Week 1, Optional)\n\nwhat are matrices\u77e9\u9635\n\nmatrix is just another way for saying, is a 2D or a two dimensional array.\n\ndimension of the matrix\nis going to be written as the number of row times the number of columns in the matrix.\n\nwritten out as R4 by 2 or concretely what people will sometimes say this matrix is an element of the set R 4 by 2.\n\nmatrix elements,(entries of matrix) the numbers inside the matrix.\n\nthe matrix gets you a way of letting you quickly organize, index and access lots of data.\n\nwhat are vectors\u5411\u91cf\n\nA vector turns out to be a special case of a matrix.A vector is a matrix that has only 1 column so you have an N x 1 matrix.{\u672ccourse\u4e2d\u7684vector\u90fd\u662f\u5217\u5411\u91cf}\n\ndimension:if have N equals four elements here.so we also call this is a four dimensional vector, just means that this is a vector with four elements, with four numbers in it.\n\nrefer to this as a vector in the set R4.\n\nNotation\u5173\u4e8e\u7b26\u53f7\u7684\u89c4\u8303\u8868\u793a:\n\nthroughout the rest of these videos on linear algebra review, I will be using one index vectors.\u8bfe\u7a0b\u4e2d\u5927\u591a\u5411\u91cf\u4e0b\u6807\u90fd\u662f\u4ece1\u5f00\u59cb\u3002\n\nwhen talking about machine learning applications, sometimes explicitly say when we need to switch to, when we need to use the zero index vectors as well.\u8ba8\u8bba\u673a\u5668\u5b66\u4e60\u5e94\u7528\u65f6\u4f1a\u8f6c\u6362\u5230\u4e0b\u6807\u4ece0\u5f00\u59cb\u3002\n\nFinally, by convention,use upper case to refer to matrices.So we\u2018re going to use capital letters like A, B, C.and usually we\u2018ll use lowercase,like a, b, x, y,to refer to either numbers,or just raw numbers or scalars or to vectors.\n\nfrom:\n\n## ON THE EVOLUTION OF MACHINE LEARNING: FROM LINEAR MODELS TO NEURAL NETWORKS\n\nON THE EVOLUTION OF MACHINE LEARNING: FROM LINEAR MODELS TO NEURAL NETWORKS We recently interviewed Reza Zadeh (@Reza_Zadeh). Reza is a Consulting Professor in the Institute for Computational and Mathematical Engineering at Stanford University and a\n\n## Machine Learning - II. Linear Regression with One Variable (Week 1)\n\nhttp:\/\/blog.csdn.net\/pipisorry\/article\/details\/43115525 \u673a\u5668\u5b66\u4e60Machine Learning - Andrew NG courses\u5b66\u4e60\u7b14\u8bb0 \u5355\u53d8\u91cf\u7ebf\u6027\u56de\u5f52Linear regression with one variable \u6a21\u578b\u8868\u793aModel representation \u4f8b\u5b50: \u8fd9\u662fRegression Problem(one of supervised learning)\u5e76\u4e14\u662fUnivariate linear regressi\n\n## Machine Learning\uff1aLinear Regression With Multiple Variables\n\nMachine Learning:Linear Regression With Multiple Variables \u63a5\u7740\u4e0a\u6b21\u9884\u6d4b\u623f\u5b50\u552e\u4ef7\u7684\u4f8b\u5b50,\u5f15\u51fa\u591a\u53d8\u91cf\u7684\u7ebf\u6027\u56de\u5f52. \u5728\u8fd9\u91cc\u6211\u4eec\u7528\u5411\u91cf\u7684\u8868\u793a\u65b9\u6cd5\u4f7f\u8868\u8fbe\u5f0f\u66f4\u52a0\u7b80\u6d01. \u53d8\u91cf\u68af\u5ea6\u4e0b\u964d\u8ddf\u5355\u53d8\u91cf\u4e00\u6837\u9700\u540c\u6b65\u66f4\u65b0\u6240\u6709\u7684theta\u503c. \u8fdb\u884cfeature scaling\u7684\u539f\u56e0\u662f\u4e3a\u4e86\u4f7fgradient descent\u7b97\u6cd5\u6536\u655b\u901f\u5ea6\u52a0\u5feb.\u5982\u4e0b\u56fe\u6240\u793a,\u5de6\u56fetheta2\u4e0etheta1\u7684\u91cf\u7ea7\u76f8\u5dee\u592a\u5927,\u8fd9\u6837\u5bfc\u81f4Cost Function\u7684\u7b49\u9ad8\u56fe\u4e3a\u4e00\u4e2a\u7ec6\u9ad8\u7684\u692d\u5706\u5f62\u72b6,\u53ef\u4ee5\u770b\u5230\n\n## Machine Learning\uff1aLinear Regression With One Variable\n\nMachine Learning:Linear Regression With One Variable \u673a\u5668\u5b66\u4e60\u53ef\u4ee5\u5e94\u7528\u4e8e\u8ba1\u7b97\u673a\u89c6\u89c9,\u81ea\u7136\u8bed\u8a00\u5904\u7406,\u6570\u636e\u6316\u6398\u7b49\u9886\u57df,\u53ef\u4ee5\u5206\u4e3a\u76d1\u7763\u5b66\u4e60(Supervised Learning),\u65e0\u76d1\u7763\u5b66\u4e60(Unsupervised Learning),\u5f3a\u5316\u5b66\u4e60(Reinforcement Learning)\u7b49. \u9996\u5148\u6211\u4eec\u4ece\u4e00\u4e2a\u7b80\u5355\u7684\u76d1\u7763\u5b66\u4e60\u5165\u624b:\u5047\u5982\u7ed9\u6211\u4eec\u4e00\u7ec4\u8bad\u7ec3\u96c6(\u5728\u8fd9\u91cc\u5c31\u662fSize\u548cPrice),\u6211\u4eec\u5982\u4f55\u624d\u80fd\u5efa\u7acb\u4e00\u4e2a\u53ef\u4ee5\u9884\u6d4b\u623f\u4ef7\u7684\u6a21\u578b\u5462? \u8fd9\u91cc(x,y)\u79f0\u4e3a\u4e00\n\n## CheeseZH: Stanford University: Machine Learning Ex1:Linear Regression\n\n(1) How to comput the Cost function in Univirate\/Multivariate Linear Regression; (2) How to comput the Batch Gradient Descent function in Univirate\/Multivariate Linear Regression; (3) How to scale features by mean value and standard deviation; (4) Ho\n\n## Machine Learning - IV. Linear Regression with Multiple Variables (Week 2)\n\nhttp:\/\/blog.csdn.net\/pipisorry\/article\/details\/43529845 \u673a\u5668\u5b66\u4e60Machine Learning - Andrew NG courses\u5b66\u4e60\u7b14\u8bb0 multivariate linear regression\u591a\u53d8\u91cf\u7ebf\u6027\u89c4\u5212 (linear regression works with multiple variables or with multiple features) Multiple Features(variables)\u591a\u7279\u5f81(\u53d8\u91cf)","date":"2020-07-03 15:47:30","metadata":"{\"extraction_info\": {\"found_math\": true, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 1, \"mathjax_display_tex\": 0, \"mathjax_asciimath\": 0, \"img_math\": 0, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.4044513702392578, \"perplexity\": 2830.1511848098307}, \"config\": {\"markdown_headings\": true, \"markdown_code\": true, \"boilerplate_config\": {\"ratio_threshold\": 0.18, \"absolute_threshold\": 10, \"end_threshold\": 15, \"enable\": true}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2020-29\/segments\/1593655882634.5\/warc\/CC-MAIN-20200703153451-20200703183451-00481.warc.gz\"}"}
null
null
Last edited by Zulusho 1 edition of State of Washington irrigation guide found in the catalog. Published 1985 by The Service in [Washington, D.C.?] . Irrigation -- Washington (State) -- Handbooks, manuals, etc, Irrigation -- Washington (State) -- Tables Statement prepared by United States Department of Agriculture, Soil Conservation Service, in cooperation with Washington State Cooperative Extension Service Contributions United States. Soil Conservation Service, Washington State University. Extension Service Pagination 2 v. (loose-leaf) : Additional Physical Format: Online version: Waller, O.L. (Osmar Lysander), Irrigation in the state of Washington. Washington, Govt. Print. This isolation was reflected in national politics, in which the state had little impact until after World War II, when Warren G. Magnusen, who represented Washington in the U.S. Senate from to , and Henry M. Jackson, who served in the Senate from until his death, acquired considerable influence in health, consumer affairs, foreign. Read the Landowner's Guide to Washington Water Rights; Water availability in Washington. Washington is known as a water-rich state, particularly on the west side of the Cascade Mountains. But water for new uses is becoming more difficult to come by . Washington wine is wine produced from grape varieties grown in the U.S. state of gton ranks second in the United States (behind California) in the production of wine. By , the state had o acres ( km 2) of vineyards, a harvest of , short tons (, t) of grapes, and exports going to over 40 countries around the world from the + wineries . WSU Extension Guide to Watering Home Gardens and Landscape Plants - An extensive, but easy to follow guide, detailing many aspects of irrigation and garden watering especially as it pertains to the Inland Northwest.. WSU Extension Drought, Conservation, and Irrigation Guide - An extensive list of resources detailing water conservation strategies including planting drought tolerant . Disincorporation of irrigation or reclamation districts located in counties with a population of two hundred ten thousand or more and inactive for five years: Chapter RCW. Hospitalization and medical aid for public employees and dependents — Premiums, governmental . The open window USDA Forest Service environmental statement, zone vegetation management project using selective herbicides (July 1, 1975 - June 30, 1976) Numerical simulation of snow avalanche flow Arachnomania The Ballad of Reading Gaol changeless and the changing in Islamic-Arabic-Hispanic cultures Outline of the main divisions of the Universal decimal classification with special regard to proposal 528.7, photogrammetry JFS1460 F07 READINGS:WEEK 4 (OCT.3) Specialty Gas Analysis Lilith Insight Industrial conference at Madrid, Spain. birth of China State of Washington irrigation guide Download PDF EPUB FB2 The WA Irrigation Guide is a very large document. After you have used the "Save Target As" function as outlined above, it is recommended the 'bookmark' feature in Adobe Acrobat be used to quickly access specific sections of interest within the guide and appendix. WA Irrigation Guide (PDF. Irrigation Guide, Partis a new handbook to the family of references in the NRCS, National Engineering Handbook series. It is written for NRCS employees who provide technical assistance to the water user with con. Currently, the Washington Irrigation Guide (WIG by Washington State Conservation Engineering) contains 76 selected National Weather Service (NWS) stations. In this revised project, weather data from stations from NWS, Agrimet and Washington AgWeatherNet were used in our calculations. Washington Irrigation. Washington's designation as "The Evergreen State" really only applies to half of the state. The Cascade Mountain Range effectively drains most of the moisture from the atmosphere onto the west side of the mountains leaving the east side with plenty of sunshine, but very little rainfall. For more information, email [email protected] or call Rich soils, diverse climates and large-scale irrigation make Washington State one of the most productive agricultural regions in the world, allowing us to produce over different crops. This version of the Standard Specifications is in X 11 format and is available as a printed document from Washington State Department of Enterprise Services, myPrint as an X 11 inch document in a 3-ring binder. Related Resources: x. CCC Rules (PDF, DOH ) - Washington State CCC regulations (WAC ) and related definitions. CCC Guidance Manual for Small Water Systems (DOH ) - Washington State guidance to help water systems develop and implement CCC Programs. Water System Design Manual DOH Pub Revised October About The Washington State Government Channel. The YouTube channel of the Washington State Government, linking you to videos from state agencies, departments, and elected officials. More State. View and download the Washington State driver guide. Skip to main content UPDATE. Limited in-person driver licensing appointments available. Learn more. Extensions granted for some expiring driver licenses and instruction permits. If the information on this translated website is unclear, please contact us at for help in your. The Revised Code of Washington (RCW) is the compilation of all permanent laws now in force. It is a collection of Session Laws (enacted by the Legislature, and signed by the Governor, or enacted via the initiative process), arranged by topic, with. History of Irrigation in the State of Washington ~63 particular section. But we have more direct evidence that these mission fathers and carried on irrigation from A. Splawn's book. Having discussed the first ditch built by the whites (Ka-mi-akin,pp. ), he says: "The first one was built by the Indians many. The Official Washington State Visitors' Guide is the essential, one-stop source for Washington State travelers. With stunning photography, detailed maps, and insider information on the state's must-see attractions, the guide highlights the unique and appealing aspects of each of the state. Landscape Drip Application Guide: A Practical Guide for Designing and Installing Drip Irrigation Systems. This helpful 68 page guide contains a wealth of useful information to help irrigation professionals save water with efficient drip irrigation systems. It begins with an anatomy of a drip system and an overview of various products used in. Figure 1. Washington climate factors affecting vegetable production: length of growing season (frost-free days) (A); average last killing frost date in spring (B); and average first killing frost date in fall (C) (adapted from Antonelli et al.4). Table 1. Crops well-suited to warm and cool temperatures in Washington. Washington State Department of Labor & Industries Prevailing Wage Section PO BOX Olympia WA Location Linderson Way SW Tumwater WA The formation of an irrigation district may be subject to potential review by a boundary review board under chapter RCW. The alteration of the boundaries of an irrigation district, including but not limited to a consolidation, addition of lands, exclusion of lands, or merger, may be subject to potential review by a boundary review board under chapter RCW, except that additions or. An October Washington State Supreme Court case impacts permit -exempt well use, which may affect some of the information provided in this publication. Water Rights in Washington. For. The Department of Ecology (Ecology) manages the state's water resources, working to meet all the varied demands on Washington's public waters. Reviser's note: The language "this act," "this chapter," and words of similar import appear throughout chapter RCW. This chapter is almost entirely comprised of the basic irrigation act of p et seq. as amended and as expressly added thereto by subsequent enactments. Contact information for the Washington governor and key state agencies. Find contact information and major state agencies and offices for the government of Washington. On This Page. USAGov is the Official Guide to Government Information and Services.Recommended: six months or 1, hours of irrigation-related field experience. Pass the irrigation technician exam. The three-hour exam includes equally weighted, multiple-choice questions on basic irrigation principles, basic electrical principles and basic hydraulics. Comply with the Select Certified Code of Ethics. Remain in good standing.Washington has reciprocal certification with Idaho for journey level plumbers. All other plumbers working in Washington must pass the Washington state plumber examination to work in the state. To apply, you will need to submit a copy of your government-issued photo ID and your out-of-state license for review by the plumber certification program. botanicusart.com - State of Washington irrigation guide book © 2020
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
4,194
Non Denominational Churches In Cincinnati Prayer Before Sleep Angel God I have friends who excel in prayer. They inhale heaven and exhale God. They would rather pray than sleep. I sleep when I should pray. We think of speaking softly to God, humbling ourselves before G. Dec 8, 2015. A child's bedtime prayer is normally short and rhyming to make them. "Now, before I run to Bridgetown Church of Christ is a non-denominational Christian church on the Westside of Cincinnati, Ohio. Started in 1933, BCC exists to love our community and invite them into a life-changing relatio. Early Washington Co. Pennsylvania Histories with References to Spalding, Rigdon, Mormonism, etc. Solomon Spalding's "Temperance Inn" and Residence (1814-16) at Amity, PA CINCINNATI. a non-denominational pastor, was brainstorming about connecting with his unchurched or "de-churched" neighbors. He knew they wouldn't be interested in any religious activities hosted by. Evangelical Community Church Cincinnati Ohio service times, driving directions and parking information, church photos and videos, children and youth programs and more. Non-denominational churches in Cincinnati, OH. Christ Centered Worship Center Cincinnati Bible Way Church Connect Christian Church the nation's largest churches are disproportionately independent, non-denominational. Reflecting a recent trend, 40% of the more than 1,500 mega churches in North America and a majority of the hundred. The churches are non denominational and thus giving everyone the possibility to attend the church. A number of resources. A number of resources. 39.100204,-84.386965 A recent article on WCPO.com about Cincinnati House Groups at Vineyard Northwest. Click here. CONTACT 9165 Round Top Road, Cincinnati, OH 45251. Like the bell, made from a mold by the Cincinnati Bell Foundry decades ago. Romania and Central America. Services for the non-denominational church are temporarily being held at the nearby St. John. Seven Hills Church is a non-denominational church located in the greater metro Cincinnati and the Northern Kentucky area. We know that there are a lot of. Easter Info. Partners for Sacred Places lives at the intersection of heritage, faith, and community. Partners' staff brings a wide variety of skills and backgrounds, grounded in a passion for the value of historic sacred places as valuable community assets. Crossroads are about as common as First Baptists among today's non-denominational, contemporary churches. But this particular Crossroads, based in Cincinnati, could have a location near you in coming. Find the Best Cincinnati, OH Non Denominational Churches on Superpages. We have multiple consumer reviews, photos and opening hours. Mosaic Church is a growing community of faith that consists of a diverse group of people all with unique stories. We are committed to three core values:. Lifespring Christian Church. Joining God in Restoring a Broken World Join us for worship this Sunday at 8:45, 10:00 or 11:15 a.m. We meet on Galbraith Road. Oct 11, 2017 · Americans like things supersized, even their churches. Millions of Americans attend megachurches — Protestant Christian congregations with regular attendance of. Cathedral of San Juan Bautista: San Juan, Puerto Rico: PR 1521–1540 Roman Catholic The oldest church built in the United States and in the (non incorporated) U.S. territory of Puerto Rico. Nov 27, 2015. Vineyard Westside, Cincinnati's home for non-denominational worship, was founded in 2004 by Pastor Tim Urmston. The church grew out of. Find Non Denominational Churches in Cincinnati OH online yellow pages. California Sam Luce—Redeemer Church (Non-denominational) in Utica, New York Lou Cha—Kenwood Baptist Church (ABC) in Cincinnati, Ohio Kathie Phillips—Central Presbyterian Church (PCUSA) in Baltimore, M. Welcome to Love City Church. We are a church in Cincinnati, Ohio. We exist to Love God. Love People. Make Disciples. Lead teaching pastor, Vince Marquis. Find A Church In Your City. Pastor Joel and Victoria would like to invite you to attend a good Bible-based church in your area. As a Pastor himself, Joel knows how important it is for every believer to have a healthy church home where they can connect with other believers and grow in their faith. Carmel Christian Church – which is building a new worship center in Union Township – bills itself as a "casual congregation." But Senior Minister John "Didi" Bacon says the non-denominational. be f. 4. Houston Baptist University: Visionary Education. Houston, Texas Tweet this! Houston Baptist University ranks #4 on The 25 Best Schools for Studying the Bible! Non denominational Churches in Cincinnati, OH Recently Updated Non denominational Church Listings in Cincinnati Central Synagogue Yom Kippur Prayer Book Download Naija Gospel Music Prof Kpamor JT Orkar, a Second Republic commissioner in Benue state, former national vice chairman of the defunct National Party of Nigeria (NPN. My favourite music is gospel music and aside this i. Free music download! Africa's best hits and biggest catalogue. Stream and download high quality mp3 and listen to popular Mar 3, 2014. Nondenominational CityGate Church will expand its reach Sunday with the opening of a satellite location at Savannah Center, 5533 Chappel. Non-denominational Churches in Cincinnati, OH Find Non-denominational Churches in Cincinnati, OH. Listings include Crossroads Church, New Thought Unity Center, Christ Emmanuel Christian Fellowship, Passion Community Church, Solid Rock Church. Non-Denomination Christian church under the leadership of Bishop Gary G. Hayles and Pastor Andrea A. Hayles. DETROIT — Declaring "the fight is on," a formidable coalition of conservative Christian groups filed legal briefs in federal appellate court Wednesday supporting Michigan's ban on gay marriage. and. Official website of Community Christian Church. We are a church with 2 locations in Butler county. One in Fairfield Township on Millikin Rd. The other is on. White Oak is one church meeting in multiple locations. All of our campuses offer modern worship, relevant teaching and excellent children's programs. At White. The Institute for Welcoming Resources is a consortium of denominational representatives of the Welcoming Church Movement. This ecumenical group provides resources to facilitate a paradigm shift in multiple denominations whereby churches. This is a list of the largest megachurches in the United States with more than 2,000 members. Celebration Church, Austin, TX, Joe Champion, 5,000, Non- denominational. Celebration Church. "Vineyard Cincinnati Locations". Retrieved 1. Highland is non-denominational and doesn't have the "club" mentality. Jesus" [formally known as the "King of Kings"] sculpture at the Solid Rock Church north of Cincinnati by I-75 that was struck b. WELCOME TO THE. This is the official site of the Cincinnati Church of Christ, a non-denominational Christian church committed to the mission of Jesus Christ. Michael Clark is an inspiring speaker, teacher, and motivator. He's a former pastor, church planter, and ministry leader. He has been in Baptist, Presbyterian, Wesleyan, and non-denominational churche. New City is a church serving in Cincinnati's eastside neighborhoods. to the Presbyterian Church in America (our denomination), and Acts 29 (a church planting. 30+ items · 48 Non-Denominational Church Companies in Cincinnati, Ohio. Search or browse our list of Non-Denominational Church companies in Cincinnati, Ohio by category. Articles and Media: Nontechnical information on hearing aid compatible assistive listening has been authored or produced by. The New York Times (2011, front page), Scientific American (2010), the Chicago Tribune (2010, front page), the American Psychological Association's magazine (2011), NPR's Science Friday (2010), All Things Considered (2011), the Hearing Journal (2012), The Washington. He's a former pastor, church planter, and ministry leader. He has been in Baptist, Presbyterian, Wesleyan, and non-denominational churches, and white, black, Korean American, and Latino congregations. CINCINNATI – Brian Cromer believes a higher power called. With the help of online media that non-denominational church now sees more than 38,000 people attend its services, according to an article. This is a list of the largest megachurches in the United States with more than 2,000 members. The Hartford Institute's database lists more than 1,300 such Protestant and Evangelical churches in the United States. According to that data, approximately 50 churches on the list have attendance ranging from 10,000 to 47,000. Dayspring Church is a culturally rich, ethnically diverse group of Christians who meet and worship together in Forest Park, Ohio. This church is welcoming to. Spiritual Thoughts Quotes Today – Feb. 20, 2017 – is Presidents Day. It's a time set aside to honor all those who served as America's Commander in Chief. There have been 45 Chief Executives, ranging from the first president, G. Only the quality, that is the social surrounding, the physical appearance and the mental abilities of a person are We're a growing community of families in East Cincinnati committed to following Jesus. Join us for Sunday services in the Parish Center at 9:00 and 11:00 a.m. Find Solid Rock Church in Cincinnati with Address, Phone number from Yahoo US Local. Includes Solid Rock. Solid Rock Church. Nondenominational Church. Since Nov. 4, Smith's non-denominational congregation of Faith. From there, the Smith family moved to Cincinnati where he became senior pastor of the River of Life Church, a position he kept until. CINCINNATI – When the housing market surged in 2018. in Milford and serves as the administrative pastor of Grace Fellowship. It's a small non-denominational Church that now meets at Neville's home. In 2007 they founded a ministry called and 3 years ago, started a new non-denominational church called New Hope Community, which they are currently co-pastoring. After going through a life-threatening. Download Naija Gospel Music Prof Kpamor JT Orkar, a Second Republic commissioner in Benue state, former national vice chairman of the defunct National Party of Nigeria (NPN. My favourite music is gospel music and aside this i. Free music download! Africa's best hits and biggest catalogue. Stream and download high quality mp3 and listen to popular playlists. Bad Religion Suffer A well-attended non-denominational church service was held the next morning. Induction of Ewe Association of Cincinnati-Dayton into CEANA. 4. Approval of Ewe Association of Charlotte, North Carolin. The River Church (Liberty Township, OH) is a relational community that builds. 5546 Cincinnati Dayton Road, Liberty Township, OH 45044; Sunday Services:. This is the official App of the Cincinnati Church of Christ, a non-denominational Christian church committed to the mission of Jesus Christ. Get inspired. Get information. Get Connected. Here's a grea. Vineyard Westside is an honest, diverse, and inviting non-denominational church located in Cincinnati, Ohio that holds the central belief that every being longs. Upci Church Locator By State Islam Empire Of Faith Video Questions Answer Key Religion Outside The Box Previous Previous post: Characteristics Of Spiritual Organization Next Next post: Homeric Hymn Aphrodite
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
7,640
{"url":"https:\/\/studydaddy.com\/question\/how-many-liters-of-a-3-0-m-h3po4-solution-are-required-to-react-with-4-5-g-of-zi","text":"Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.\n\nQUESTION\n\n# How many liters of a 3.0 M H3PO4 solution are required to react with 4.5 g of zinc? __ H3PO4 + __ Zn _x0001_ __ Zn3(PO4)2 + __ H2\n\nThe volume is 15.6 mL, or 0.0156 L\n\n2H_3PO_4 + 3Zn -> Zn_3(PO_4)_2 + 3H_2\n\nAs you can see, we have a 2:3 mole ratio between H_3PO_4 and Zn. Knowing that the molar mass of Zn is 65.4 g\/(mol), we can determine the number of Zn moles to be\n\nn_(Zn) = m\/(molar mass) = (4.5 g)\/(65.4 g\/(mol)) = 0.07\n\nThis means that the number of H_3PO_4 moles is equal to\n\nn_(H_3PO_4) = 0.07 * 2\/3 = 0.047\n\nTherefore, the volume required is\n\nV = n_(H_3PO_4)\/C = (0.047 m ol e s)\/(3 (mo l e s)\/L) = 0.0156 L = 15.6 mL","date":"2019-05-25 15:53:54","metadata":"{\"extraction_info\": {\"found_math\": true, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 0, \"mathjax_display_tex\": 0, \"mathjax_asciimath\": 1, \"img_math\": 0, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.4642585813999176, \"perplexity\": 6431.238148218048}, \"config\": {\"markdown_headings\": true, \"markdown_code\": true, \"boilerplate_config\": {\"ratio_threshold\": 0.18, \"absolute_threshold\": 10, \"end_threshold\": 15, \"enable\": true}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2019-22\/segments\/1558232258120.87\/warc\/CC-MAIN-20190525144906-20190525170906-00119.warc.gz\"}"}
null
null
<?php require("common.php"); if(empty($_SESSION['user'])) { header("Location: login.php"); exit("Redirecting to login.php"); } header("Location: home.php"); ?>
{ "redpajama_set_name": "RedPajamaGithub" }
8,426
{"url":"https:\/\/socratic.org\/questions\/how-do-you-calculate-expected-value#188679","text":"# How do you calculate expected value?\n\nNov 15, 2015\n\nSame thing as the mean\n\n#### Explanation:\n\nExpected value is another way of stating the mean. It can be calculated one of two ways:\n\nFor a set of numbers, take the sum divided by the number of data points. So 4,6,11: (4+6+11)\/3 = 21\/3 = 7\n\nIf it's a probability distribution then it's the sum of probabilities times each possible outcome\n\nX=1 with probability 0.5\nX=2 with probability 0.2\nX=3 with probability 0.3\n\nMean = 1(.5) + 2(.2) + 3(.3) = .5 + .4 + .9 = 1.8","date":"2022-08-09 17:58:55","metadata":"{\"extraction_info\": {\"found_math\": false, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 0, \"mathjax_display_tex\": 0, \"mathjax_asciimath\": 0, \"img_math\": 0, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.9685139656066895, \"perplexity\": 1199.5700535188034}, \"config\": {\"markdown_headings\": true, \"markdown_code\": true, \"boilerplate_config\": {\"ratio_threshold\": 0.18, \"absolute_threshold\": 10, \"end_threshold\": 15, \"enable\": true}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2022-33\/segments\/1659882571056.58\/warc\/CC-MAIN-20220809155137-20220809185137-00551.warc.gz\"}"}
null
null
A variable annuity is a contract between an individual and an insurance company in which the individual will make payments to the insurance company in return for periodic payments from the insurer. The annuitant purchasing the annuity is given several options as to how to invest their purchase payments; thus, variable annuities differ from traditional annuities as their rate of growth is not fixed, but variable. The annuity's variable growth rate allows for substantial gains as well as losses. What are the licensing requirements to sell Variable Annuities? Applicant must be registered with the Financial Industry Regulatory Authority (FINRA). Applicant must have successfully completed the Securities Industry Essentials (SIE) exam; and either the FINRA Series 6 or 7 examinations. Applicant must pass the Michigan variable annuities examination. Applicant must hold a variable annuities/variable life line of authority in his or her home state. Applicant must have successfully completed FINRA Series 6 or 7 examinations. Applicant must pass the Michigan variable annuities examination if the applicant has not passed an exam in their home state. A fixed annuity is a contract between an individual and an insurance company in which the insurer guarantees a fixed growth rate for the individual's account. In addition, the periodic payments made by the insurer to the individual are guaranteed at a fixed dollar amount. Payments are made to the annuitant over the term of the contract (this is usually life or some other specified date). What are the licensing requirements to sell Fixed Annuities? Unlike variable annuities, fixed annuities do not bear any risk. Fixed annuities are viewed as life insurance products and thus, an individual wishing to sell fixed annuities must possess a Producer Life Insurance License in good standing.
{ "redpajama_set_name": "RedPajamaC4" }
4,822
Genter GmbH offers sophisticated solutions in metal and plastics machining. Our team of skilled experts is in high demand as project partner for the production of machine parts and components. Our core business encompasses prototypes, individual and series parts, ranging from 1 mm to 1600 mm in diameter, and lengths up to a maximum of 3600 mm. From the initial idea to the final processing of their materials, customers in industry, research, and development have come to trust our expertise, innovative know-how, precision, and reliability. Highly efficient production processes and our network of machining centers guarantee short lead and processing times. We continuously invest in state-of-the-art technology, process automation, and the ongoing training of our staff. We fulfill our customers' toughest demands with our CNC machinery, use of CAD/CAM software, and for quality assurance, our 3D coordinate measuring technology. At the threshold of industry 4.0, our tool management, highly qualified, innovative, and motivated staff as well as long-term partners, like RWTH Aachen, give us that crucial competitive edge. For many years now, customers in general mechanical engineering, the cable and food industry, industrial assembly, and special mechanical engineering have been entrusting us with their projects and challenging materials.
{ "redpajama_set_name": "RedPajamaC4" }
3,281
We work with the world's most ambi­tious organ­i­sa­tions to inspire new think­ing, ignite action and cre­ate impact. Our proven, holistic methodology empowers your teams to grasp new oppor­tu­ni­ties, gen­er­ate fresh solutions themselves and unlock the busi­ness mod­els to make it a reality. We inspire and challenge your teams to think in rad­i­cal ways about tech­nolo­gies and business models which threaten to disrupt your market, with a structured process and playful, hands‐on technology and innovation tools. We coach your teams to develop your own ability to inno­vate, flipping the con­sul­tancy model on its head – building your own capacity to repeatedly create breakthroughs and growth. Get in touch to discuss how we can use innovation to help your organisation grow.
{ "redpajama_set_name": "RedPajamaC4" }
6,711
{"url":"https:\/\/eprints.iisc.ac.in\/2831\/","text":"# Conformational Analysis of an Active Chemotactic Peptide Analog Containing Z-dehydrophbnylalanine at Position 3\n\nChauhan, VS and Kaur, Paramjeet and Sen, Nirupa and Uma, K and Jacob, Jose and Balaram, P (1988) Conformational Analysis of an Active Chemotactic Peptide Analog Containing Z-dehydrophbnylalanine at Position 3. In: Tetrahedron, 44 (8). pp. 2359-2366.\n\n Preview\nPDF\nconformational.pdf\n\n$Formyl-Met-Leu-{\\Delta}^z-Phe-Ome$, an analog of the chemotactic tripeptide Formyl-Met-Leu-Phe has been synthesized to evaluate the effect of substitution of \\alpha, \\beta-dehydrophenylalanine on activity and conformation. The analog peptide shows high biological activity in stimulating superoxide production by rabbit neutrophils. An NMR analysis of the solution conformation of the ${\\Delta}^z-Phe$ analog, using nuclear Overhauser effects and comparisons with the corresponding saturated peptides, favours a significant population of extended backbone conformations.","date":"2023-04-01 01:13:28","metadata":"{\"extraction_info\": {\"found_math\": true, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 1, \"mathjax_display_tex\": 0, \"mathjax_asciimath\": 0, \"img_math\": 0, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.8326290845870972, \"perplexity\": 14898.427949509065}, \"config\": {\"markdown_headings\": true, \"markdown_code\": true, \"boilerplate_config\": {\"ratio_threshold\": 0.18, \"absolute_threshold\": 10, \"end_threshold\": 15, \"enable\": true}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2023-14\/segments\/1679296949694.55\/warc\/CC-MAIN-20230401001704-20230401031704-00162.warc.gz\"}"}
null
null
BR Home Page > Box Scores > 2004 ALDS1 > 2004 American League Division Series (ALDS) Game 3, Angels at Red Sox, October 8 Anaheim Angels Schedule 2004 American League Division Series (ALDS) Game 3, Angels at Red Sox, October 8 2004 AL Division Series Game 1, October 5 BOS 9 Final ANA 6 Final BOS 8 (10) Series Summary Prev Game Venue: Fenway Park Day Game, on grass Anaheim Angels 0 0 0 1 0 0 5 0 0 0 6 8 2 Boston Red Sox 0 0 2 3 1 0 0 0 0 2 8 12 0 WP: Derek Lowe (1-0) • LP: Francisco Rodriguez (0-2) Winning Run scored with 2 outs You are here: BR Home Page > Box Scores > 2004 ALDS1 > 2004 American League Division Series (ALDS) Game 3, Angels at Red Sox, October 8
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
7,415
{"url":"https:\/\/mathoverflow.net\/questions\/296087\/baricentric-distributions","text":"# baricentric distributions\n\nLet $\\mathcal{P}$ be the convex hull of a point set $p_1, \\dotsc, p_n$ (for simplicity, assume that no $p \\in P$ lies in the convex hull of the other points.) Now, pick a point uniformly at random from the simplex $x_1 + \\dotsc + x_n = 1, x_i \\geq 0,$ and take $\\phi=\\sum x_i p_i.$ The point $\\phi$ will be contained in $\\mathcal{P}$ and in the simple case where $\\mathcal{P}$ is a triangle, $\\phi$ is uniformly distributed. In general, however, it is not: The two graphics are for the case $\\mathcal{P}$ is a square. The first is a simple plot of a million points sampled from the distribution - the distribution looks like it is trying to be supported on the quadrangle spanned by the midpoints of the sides of the square.\n\nThe second is the density histogram:\n\nwhich seems to indicate that the distribution has a bit of a peak at the center of gravity.\n\nAny deep thoughts?\n\n\u2022 For the square, the density seems to be proportional to $\\min\\{x+y,2-x-y\\}-\\max\\{x-y,y-x\\}=2\\min\\{x,y,1-x,1-y\\}$ (take the uniform distribution in the tetrahedron spanned by $(0,0,0)$, $(1,1,0)$, $(1,0,1)$, $(0,1,1)$ and project it on the $xy$ plane), which does not agree with your plots. What did I miss? \u2013\u00a0Mateusz Kwa\u015bnicki Mar 24 '18 at 19:50\n\u2022 Linearity of expectation implies that $E(\\sum X_i P_i)=\\sum E(X_i)P_i =\\sum \\frac{1}{n}P_i=G,$ where $G$ is the center of gravity. Also, you should have a look at this paper: dtic.mil\/dtic\/tr\/fulltext\/u2\/273207.pdf \u2013\u00a0Donatien B\u00e9n\u00e9at Mar 25 '18 at 7:20\n\u2022 Maybe the fact that barycentric coordinates aren't equal to the $x_i$ for polygons, that are not triangles, plays a r\u00f4le, c.f. uniqueness issues for barycentric coordinates \u2013\u00a0Manfred Weis Mar 25 '18 at 18:18\n\n## 1 Answer\n\nThe problem seems to lie in the way you sample the unit simplex. Let $(U_i)_{1\\leq i\\leq n}$ be a sequence of i.i.d. uniform random variables, $S=\\sum U_i$ and define $X_i=U_i\/S.$ Then non-intuitively, $(X_1,\\dots,X_n)$ is not uniformly distributed over the unit simplex. The following plot shows 300000 points on the unit square with barycentric coordinates generated using this method:\n\nFirst method\n\nThe method can easily be fixed: if the $U_i$s defined above are i.i.d. exponential random variables, then $(X_1,\\dots,X_n)$ is uniformly distributed over the simplex. Again, the following plot shows 300000 points generated according to this second method:\n\nSecond method\n\nIt should be noted that uniformly distributed $X_i$s doesn't imply uniformly distributed $\\phi,$ as said by Mateusz Kwa\u015bnicki in a comment.\n\n\u2022 As a side remark: Another simple method is to generate $X_1,X_2,\\ldots,X_n$ is to arrange $U_1,U_2,\\ldots,U_{n-1}$ in a non-decreasing order, $V_1\\leqslant V_2\\leqslant \\ldots \\leqslant V_{n-1}$, and set $X_i = V_{i+1}-V_i$ for $i = 1, 2,\\ldots, n - 1$, $X_n = 1 + X_1 - X_n$. \u2013\u00a0Mateusz Kwa\u015bnicki Mar 26 '18 at 7:50","date":"2019-07-23 12:47:27","metadata":"{\"extraction_info\": {\"found_math\": true, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 1, \"mathjax_display_tex\": 0, \"mathjax_asciimath\": 0, \"img_math\": 0, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.8761243224143982, \"perplexity\": 128.29621048352186}, \"config\": {\"markdown_headings\": true, \"markdown_code\": true, \"boilerplate_config\": {\"ratio_threshold\": 0.3, \"absolute_threshold\": 10, \"end_threshold\": 15, \"enable\": false}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2019-30\/segments\/1563195529276.65\/warc\/CC-MAIN-20190723105707-20190723131707-00009.warc.gz\"}"}
null
null
Norbert A. Schlei, key lawyer in the Kennedy and Johnson administrations who found legal underpinning for the 1962 blockade of Cuba, wrote landmark civil rights legislation and once waged a strong bid to replace an entrenched Republican California secretary of state, has died. He was 73. Schlei died Thursday at an acute care hospital in Los Angeles of infections caused by long-term immobility, his wife, Joan, said Saturday. She said Schlei had been virtually unconscious since suffering a heart attack March 25, 2002, while jogging in Santa Monica. Considered a legal wunderkind, Schlei was the Democratic candidate for the 57th California Assembly District in 1962 when he was tapped by President John F. Kennedy as an assistant attorney general in charge of the office of legal counsel. At the time, Atty. Gen. Robert F. Kennedy, the president's younger brother, quipped that Schlei -- only 33 -- had been named so there would finally be "someone younger" than he in the Justice Department. But Schlei, who clerked for Supreme Court Justice John Harlan after graduating from Yale Law School, proved a scholarly asset to the Kennedys and later to President Lyndon B. Johnson and Atty. Gen. Nicolas Katzenbach during crises and in forging the landmark Kennedy-Johnson civil rights reforms. Schlei was the principal draftsman of the Civil Rights Act of 1964, the Economic Opportunity Act of 1964, the Voting Rights Act of 1965 and the Immigration Reform Act of 1967. "I felt I was lucky," Schlei told the New York Times in 1995, "because I was able to turn what ability I had to something important." Schlei had barely moved into his quarters in August 1962 as head of the office of legal counsel just vacated by Katzenbach, when he was put to work. The University of Mississippi had refused to allow James Meredith, a black student, to enroll that fall, and Kennedy sent Schlei to Oxford, Miss., to get Meredith into the school. Hardly a month later, as the Cuban Missile Crisis developed, Kennedy asked Schlei to study the legal basis for presidential action in connection with Cuba after U.S. surveillance confirmed that Russia was installing surface-to-air missile sites in the Communist island nation. Schlei responded with what became Kennedy's October justification for a naval quarantine on all offensive military equipment being shipped to Cuba. "It is our view," he wrote, "that international law would permit use by the United States of relatively extreme measures, including various forms and degree of force, for the purpose of terminating or preventing the realization of such a threat to the peace and security of the Western Hemisphere." The lawyer supported the view with references to self-defense rights, the collective and multilateral security obligations of the U.S. and the 1934 Cuban-U.S. Treaty, which established U.S. rights for its naval base at Guantanamo. Although Schlei had to abandon his bid for assemblyman to go to Washington (incumbent Republican Charles Conrad was reelected), he tried for election in California four years later when he ran for secretary of state. Schlei handily defeated six others in the 1966 Democratic primary, polling nearly twice as many votes as were received by his nearest competitor. He also collected more than 2.7 million votes, a remarkable tally for a Democratic statewide office seeker in that penultimate general election against Republican Frank M. Jordan, incumbent for 23 years and at the time the only Republican statewide officeholder. Nevertheless, Schlei lost the general election Nov. 10, 1966, as Jordan was swept to victory in the Ronald Reagan Republican landslide. Schlei, a personable Democratic campaigner, was only yards from Robert Kennedy at Los Angeles' Ambassador Hotel when Kennedy was fatally shot on the night of the California primary in 1968. He largely bowed out of politics after serving as a delegate to the Democratic National Convention that year in Chicago. A highly successful trial and securities lawyer who represented such clients as Howard Hughes' Summa Corp. in lengthy litigation brought by ousted Hughes executive Robert Maheu, Schlei himself was tried in a Florida federal courtroom in 1995. The charges and their aftermath were a cloud on Schlei's brilliant career. Schlei was acquitted of eight counts, including wire and bank fraud and money laundering, but was convicted by a jury of conspiracy and securities fraud for purportedly helping five others sell $16 billion in fake Japanese government bonds from the mid-1980s to 1992. He was sentenced to five years in federal prison and lost his license to practice law for 3 1/2 years. But he never went to prison, remaining free on appeal. The 11th Circuit Court of Appeals vacated the judgment and, in 1998, Schlei abandoned motions for a new trial to clear his name. Instead he agreed to a negotiated settlement of a year's unsupervised probation on one misdemeanor count of conspiracy to possess counterfeit foreign securities, and resumed his law practice in L.A. Joan Schlei said Saturday that Schlei had been completely exonerated after federal prosecutors conceded that there was a "possibility the instruments are valid" and that Schlei had been wrongly prosecuted. Schlei maintained all along that he had done nothing illegal, and that prosecutors who issued charges against the others after a sting operation had added him only because of his high profile in Democratic and government circles to "get in the papers" and make the trial "newsworthy." At issue were bonds the Japanese government claimed were counterfeit and created by a forger they imprisoned in 1983. Schlei countered that the securities were legitimate, that they had been issued in 1983 by Japan's minister of finance, Michio Watanabe, at the request of former Prime Minister Kakuei Tanaka after Tanaka left office in a bribery scandal. Schlei said he had never sold the securities and had simply tried to help about 30 clients purchase them with the understanding that the securities would be redeemable only if they could persuade a current Japanese government to honor them. Among the highly prominent character witnesses who testified on Schlei's behalf during the trial was key Republican U.S. Sen. Arlen Specter of Pennsylvania, who had known Schlei since they were students together at Yale. Born Norbert Anthony Schlei on June 14, 1929, in Dayton, Ohio, Schlei grew up in meager financial circumstances, taking odd jobs delivering papers and groceries to help his family. He paid his way through Ohio State University as a waiter, but managed to graduate with honors in English literature and international relations and earned three varsity letters for golf. He served as a Navy officer during the Korean War and later went to Yale Law, where he graduated first in his class and was editor of the Yale Law Journal. After a year clerking for Harlan, he moved to Los Angeles in 1957 to work for the prestigious law firm of O'Melveny and Myers. In 1959, Schlei helped form the firm Greenberg, Shafton and Schlei where he remained until he went to the Justice Department in 1962. In later years, he was associated with different law firms, most notably the Wall Street firm of Hughes Hubbard & Reed from 1972 until 1989, whose Los Angeles office he established. He was co-author of "Studies in World Public Order," a book on international law published in 1961, and in 1962 wrote the book "State Regulation of Corporate Financial Practices." Schlei sat on the boards of several corporations involved in international real estate and securities. Long involved in real estate development, Schlei had begun in 1959 to represent Janss Corp., which developed Westwood Village and the Conejo Ranch area near Thousand Oaks. In addition to his wife, the former Joan Masson, he is survived by three sons and three daughters from his earlier marriages to Jane Moore and to attorney Barbara Lindemann -- William, Andrew, Bradford, Anne, Blake and Elizabeth; and four grandchildren. Two other sons, Graham and Norbert L. Schlei, preceded him in death. Calling hours will be 4 p.m. to 8 p.m. Wednesday at Gates-Kingsley Funeral Home, 19th Street and Arizona Avenue, Santa Monica. Graveside services are planned for 11 a.m. April 29 at Forest Lawn Hollywood Hills. His wife asked that memorial contributions be made to any of these organizations: Amnesty International, the American Heart Assn., the American Cancer Society, the ACLU or the Constitutional Rights Foundation.
{ "redpajama_set_name": "RedPajamaC4" }
3,706
/// <autosync enabled="true" /> /// <reference path="bootstrap.js" /> /// <reference path="jquery.validate.min.js" /> /// <reference path="jquery.validate.unobtrusive.js" /> /// <reference path="jquery-2.2.0.js" /> /// <reference path="jquery-2.2.0.min.js" />
{ "redpajama_set_name": "RedPajamaGithub" }
8,143
ABC Schedule and thoughts Earlier this week ABC announced their upcoming fall lineup, but I was too busy to make my comments regarding the upcoming schedule. Now...at last, my time has come. Continuing the trend of other networks, the majority of ABC's new orders are for Dramas (7), with a few Comedies (4) added for good measure. The current era of television seems to be as dominated by the Drama and Dramedy as the 90s were with the half-hour comedy. Which is one way of saying that TV networks will go with a good thing until they beat it to death and then they'll see if they can kick a couple of death throes out of it. Only then, will they move on to the next best thing. A less cynical way of saying that might be that networks go with what works. The new television series include everything from modern man to cavemen. Yes you read that right, ABC is premiering a series based on the Geico commercials. Some of these series are: "Big Shots," "Carpoolers," "Cashmere Mafia," "Cavemen," "Dirty Sexy Money," "Eli Stone," "Miss/Guided," "Private Practice," "Pushing Daisies," "Sam I Am" and "Women's Murder Club." The proposed fall lineup, and my comments are below (with the new shows in italics): 8:00 p.m.: "Dancing with the Stars" -- I only watch this show in spurts. I understand the appeal, heck I used to love "Circus of the Stars," but like "Circus" this is more of a one time thing for me than a weekly commitment. 9:30 p.m.: "Sam I Am" (new comedy series) -- This is Christina Applegate's new series about a person who has an accident and forgets who they are, only to discover they weren't very likable. The show's tension will rest on a "nature vs. nurture" irony, she wants to be good but isn't. (deadpan)I am laughing already. This is such a funny idea. No one ever though of a bad person trying to be good, but can't actually succeed at being good story before.(end deadpan) I will watch the show once, but I won't be very forgiving. When a terrible accident leaves Samantha "Sam" Newly in a coma for eight days, she wakes up with no recollection of any past experiences, memories or events. Faced with amnesia, Sam must start over. To her dismay she discovers that she wasn't a particularly honest, good-hearted or loving person. In fact she was self-involved, narcissistic and devoid of real relationships - essentially a bitch. Sam must now struggle with her desire to be good and her temptation to be...not so good. Finding the line between good and evil is never easy. 10:00 p.m.: "The Bachelor" -- The fact that people watch this show makes me worry for the state of our civilization. "Look ma! It's women being treated like cattle by a man who they all plot in Machiavellian fashion to seduce." 8:00 p.m. "Cavemen" The commercials are funny, but somehow I think that placing this show in the suburban South will spell quick doom for this show. That and the fact that the dinosaur version of the "Honeymooners" didn't last too long either. Cavemen is a unique buddy comedy that offers a clever twist on stereotypes and turns race relations on their head. Inspired by the popular Geico Insurance commercials, the series looks at life through the eyes of the ultimate outsiders - three modern cavemen - as they struggle to find their place in the world. Joel, his cynical best friend, Nick, and easy-going little brother, Jamie, are contemporary cavemen who live in the suburban south and simply want to be treated like ordinary thirty-something guys. Despite their attempts at assimilation, Nick doesn't believe mainstream society will ever completely accept them, Jamie seems to take it all in stride and Joel straddles the middle, torn between his friends, his more traditional values and his loving fiancée. 8:30 p.m. "Carpoolers" -- Hopefully this show will have moments that take place outside of the car. Though that makes me wonder how that would be different from an Office Space show. I'll watch it once, but if they don't get out of the car I won't be back. I want you to remember that this show is about 4 people. That seems to be a theme. Less about saving the environment than male bonding, four guys from very different backgrounds relish their daily commute as they commiserate about their lives, jobs and families in the carpool lane. There's Laird, the recently divorced playboy; Aubrey, the timid homemaker and breadwinner; the conservative and traditional Gracen; and eager newlywed Dougie. Together, between the pressures of home and work, these men find time to be themselves while driving to and from the office. 9:00 p.m. : "Dancing with the Stars the Results Show" -- See above. 10:00 p.m.: "Boston Legal" -- Glad to see the show back for another season. Shatner! WEDNESDAY: A night completely filled with new shows? That is a potential risk. 8:00 p.m. "Pushing Daisies" -- I am intrigued by this twist on a procedural and the romantic tension possible has potential. Ideal scenario for me as viewer is if this show is a well thought out single season narrative with a final episode that resolves the season long arc. From Bryan Fuller ("Heroes") and Barry Sonnenfeld ("Men in Black") comes an unprecedented blend of romance, crime procedural and high-concept fantasy in a forensic fairytale about a young man with a very special gift. Once upon a time, a mild-mannered boy named Ned realized he could touch dead things and bring them back to life. Grown-up Ned puts his ability to good use, not only touching dead fruit and making it ripe with everlasting flavor, but working with an investigator to crack murder cases by asking the deceased to name their killers. But the tale gets complicated, as all tales do, when Ned brings his childhood sweetheart, Chuck, back from the dead and keeps her alive. Chuck encourages him to use his power to help others, instead of merely solving mysteries and collecting the rewards. Life would be perfect for Ned and Chuck, except for one cruel twist: If he ever touches her again, she'll go back to being dead, this time for good. 9:00 p.m.: "Private Practice" -- "Grey's Anatomy 2?" No thanks. I stopped watching "Grey's Anatomy" when they killed the dog just to end a romantic storyline. I still like Kate Walsh, but I won't watch this show. The best "Grey's Anatomy" moment, in my opinion, was during the last season of "The OC" when Summer's father moved to Seattle. From Shonda Rhimes, the Golden Globe-winning creator of "Grey's Anatomy," comes a story about new beginnings and old friends. Addison Forbes Montgomery is a renowned neonatal surgeon, respected by her friends and colleagues at Seattle Grace Hospital. Deciding she can no longer healthily co-exist with her ex-husband, McDreamy, and her ex-lover, McSteamy, Addison heads to Los Angeles for sunnier weather and happier possibilities. Reunited with her once-married, newly divorced medical school friends, Naomi and Sam, Addison joins their chic private practice. Featuring an all-star cast including Kate Walsh, Amy Brenneman, Tim Daly and Taye Diggs, "Private Practice" tells the story of a woman unafraid of change and willing to begin a new life. 10:00 p.m. "Dirty Sexy Money" -- I think it is good to see the return of the evening Soap, but this just doesn't seem to do it for me. Besides wasn't the "I'll have access to a lot of money to do good things" tension a part of 2 Week's Notice? (Minus the Soapy mysterious death etc.) This show would have to be funny to attract me. And the "Darling" clan? Please, shoot me now. Some people say money is the root of all evil. They may be right. Nick George's whole life has been lived in the shadow of the Darling family, but as an adult he's leading the perfect life as an idealistic lawyer, until his father's suspicious death. The absurdly wealthy Darlings of New York have asked him to take over his father's job as their personal lawyer, but the money that will allow him the freedom to be an altruistic do-gooder is only part of the picture. That same money pulls him into the dubious doings of the Darling clan. Power, privilege and family money are a volatile cocktail. 8:00 p.m.: "Ugly Betty" -- One of my favorite shows, but I hope they do like a real telenovella and let the story end at some point. 9:00 p.m. "Grey's Anatomy" -- As I said, I stopped watching it when they killed the dog just to eliminate a romantic rivalry. 10:00 p.m. "Big Shots" -- It's "Carpoolers," but serious. By the way, what is up with the whole "4 friends" thing? Can't we have three friends? Or even five friends? This is the story of four friends at the top of their game...until the women in their lives enter the room. Lines between boardroom and bedroom blur when these competitive but dysfunctional CEOs take refuge in their friendship, discussing business, confiding secrets, seeking advice and supporting each other through life's surprising twists and turns. 8:00 p.m.: "MEN IN TREES" -- Don't watch it, so I have no opinion one way or the other. 9:00 p.m.: "Women's Murder Club" -- "CSI: Vigilante" with a dash of possible romantic subplots? Okay, I'm down for that. But what is with the whole 4 friends thing again? Based on James Patterson's bestselling novels, The Women's Murder Club, four working women in San Francisco - a detective, a district attorney, a medical examiner and a reporter - use their expertise and unique talents to solve murder cases. Each woman is successful in her own field, but because of their unique friendship, they realize that pooling their resources during investigations leads to undiscovered clues and answers in both work and their personal lives. 10:00 p.m.: "20/20" -- For those who have no internet or are baffled by the "tubes" that make the interwebs work. SATURDAY: 8:00 p.m.: "Saturday Night College Football" -- Depends on who's playing. 7:00 p.m.: "America's Funniest Home Videos" -- Watch Jimmy hit someone in the crotch! No. Don't watch this. Won't watch this. 8:00 p.m.: "Extreme Makeover: Home Edition" -- I watched one season of this show. I like the premise, but don't watch it. 9:00 p.m.: "Desperate Housewives" -- I don't watch this, but I have nothing against it. I have to read books some time. 10:00 p.m.: "Brothers & Sisters" -- Sunday at 10? I might be watching "Lipstick Jungle" on NBC. I might not. The remaining shows will be mid-season pick ups after "Dancing with the Stars" and "The Bachelor" conclude their fall seasons. I will probably watch both "Cashmere Mafia" and "Miss/Guided" at least once. Labels: ABC, Disney, Television
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
4,533
Q: File sharing not working on iPad I am trying to get file sharing to work on my app in iPad. I've added UIFileSharingEnabled to the plist, I've queried the documents dir and written a file there (and verified it is there by looking at it through Organizer). iTunes just refuses to display the file sharing info in the device's apps tab. Does anyone know of any obscure step I might be missing, or some edge case that might be causing my problem? I've tried all the rebooting, clean building avenues. A: Try running a sync of your iPad to iTunes. That did it for me. A: Here's what fixed this for me: I built an ad-hoc distribution and installed it on my iPad. I believe once the app was installed/recognized as an actual "app" in itunes (versus something that shows up as a function of building through xcode), it was able to handle recognizing it as being able to share documents.
{ "redpajama_set_name": "RedPajamaStackExchange" }
252
Young soy beans in pod. Crispy breaded tofu with special broth. Sliced beef rolled with green onion. Lightly battered fried jumbo shrimp and veggies. Lightly battered fried jumbo chicken and veggies. Crispy fried breaded soft shell crab. Spicy tuna, seasoned seaweed, crabmeat and sliced avocado with Koi house dressing. Yellowtail wrapper with cucumber and jalapeno on the inside and tobiko on top. Wrapped in a cucumber with tuna, crabmeat, avocado, salmon or spicy tuna naruto with miso soup. Shrimp, fish cake, white fish, tofu and vegetables. Snow crab with crunch served with eel and spicy sauce. Green salad with sliced avocado. Lobster, mango topped with spicy tuna and Koi special sauce. Pepper tuna, avocado roll topped with spicy salmon and crunchy. Crunchy spicy tuna rolled on avocado and caviar. Spicy tuna, avocado roll topped with whole broiled eel and caviar. Fried soft shell crab with avocado, lettuce, cucumber, caviar, mayonnaise eel sauce. Tempura fried roll with eel, fish, crabstick, asparagus, cheese and spicy sauce. Broiled eel and avocado on top of the shrimp tempura roll. Broiled eel, cucumber roll topped with avocado and red caviar. Shrimp tempura wrapped in soy paper, topped with cooking, scallop, crabmeat, caviar and cheese. Crunch spicy crab and asparagus with super white tuna on top. Yellowtail, avocado, scallion inside wrapped with fresh mango. Choice: spicy salmon, spicy crab, spicy white tuna, spicy vegetable with spicy mayonnaise tobiko and tempura crisp. Spicy salmon, tobiko, avocado, crisp and deep fried spicy mayo. Unagi. Fresh water boiled eel. Chef's eight pieces sushi selection and crunch spicy salmon roll. Served with miso soup or salad. Fifteen pieces assorted fillet of fresh raw fish. Served with miso soup or salad. Four pieces sushi, 10 pieces sashimi and crunch spicy tuna roll. Served with miso soup or salad. Spicy tuna crunch roll, eel, avocado roll and shrimp tempura. Served with miso soup or salad. Assorted sashimi and a bed of sushi rice. Served with miso soup or salad. Sixteen pieces with crunch spicy tuna roll and a rainbow roll. Served with miso soup or salad. Eight pieces of sushi, twelve pieces sashimi with a crunch spicy tuna roll and a super dynamite roll. Served with miso soup or salad. Crabstick, shrimp, cucumber, avocado, lettuce with mayonnaise. Fried squid and cucumber, served with eel sauce. Cucumber, crabstick, egg, custard and oshinko. Asparagus, cook salmon, cream cheese with eel sauce. With teriyaki style or spicy black bean sauce. Served with miso soup or green salad. With onions and carrots. Served with miso soup or green salad. Broiled eel over rice. Served with miso soup or green salad. Fried breaded chicken cutlet. Served with miso soup or green salad. Fried breaded pork cutlet. Served with miso soup or green salad. Chicken, veggies, egg and shrimp tempura noodle soup. Tuesday - Saturday: 11:00 am - 3:00 pm.
{ "redpajama_set_name": "RedPajamaC4" }
1,217
{"url":"https:\/\/gateoverflow.in\/19504\/dijkstras-algo","text":"553 views\n\n### 1 comment\n\nnot visible\n\nafter analysis on this i found.\n\n1) yes but they all infinite distance apart from source.\n\n2)yes \u00a0as mentioned in algorithm while(Q!=phi) dijkstra's will always terminate\n\n3)yes because for each vertex call extract min which is take O(log v) i.e total O(v log v) and in that for each edge we have relax all the adjacent edge which internally call decrease function call which take O(log v) i.e for each edge relaxation will be done only once so tatal for this O(e logv)\n\nso total time O((v+e)logv) but in worst case there may be chance that no relaxation performed in that case time O(vlogv +e).\n\n4)when no relaxation will performed in that case all vertices have cost infinity so simply extract one of them\nby\n\n### 1 comment\n\nGreat Explanation sir !\n\n1 vote\n1\n286 views","date":"2023-02-03 22:31:47","metadata":"{\"extraction_info\": {\"found_math\": false, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 0, \"mathjax_display_tex\": 0, \"mathjax_asciimath\": 0, \"img_math\": 0, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.8099042773246765, \"perplexity\": 4971.464871208229}, \"config\": {\"markdown_headings\": true, \"markdown_code\": false, \"boilerplate_config\": {\"ratio_threshold\": 0.18, \"absolute_threshold\": 10, \"end_threshold\": 15, \"enable\": true}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2023-06\/segments\/1674764500076.87\/warc\/CC-MAIN-20230203221113-20230204011113-00762.warc.gz\"}"}
null
null
\section{Introduction} The design of Network-on-Chip (NoC) interconnects for embedded systems requires the careful balance of multiple trade-offs. Over the past decades, a significant amount of work has addressed the trade-offs between performance and other secondary objectives such as energy~\cite{Silvano10}, fault-tolerance~\cite{Radetzki13}, and chip area~\cite{Pestana04}. Less work has addressed such trade-offs in NoCs with hard real-time constraints, with some inroads towards improving energy~\cite{Sayuti13} and area efficiency (by optimising buffering in virtual channels ~\cite{Nikolic13}) while meeting deadlines of all packets even in the worst-case scenario. In this paper, we consider NoCs with hard real-time constraints, and address a novel trade-off that has increasing importance in embedded systems: security. Because of their key role in interconnecting the multiple components of an embedded system, NoCs can be seen as a major security vulnerability. If an attacker can extract information from the NoC interconnect, they can potentially compromise the security of the complete embedded system. Therefore, many mechanisms have been designed to improve NoC security (as reviewed in Section \ref{RelWor}) and many more will certainly be developed in the coming years. However, most of such mechanisms impose performance overheads, and therefore can potentially jeopardise the ability of the NoC to provide real-time guarantees. So we argue in this paper that, just like in the previously mentioned trade-offs, security can be seen as an optimisation objective in NoC resource management: designers must carefully consider the resources they have available to increase NoC security without sacrificing performance guarantees (which in the case of hard real-time NoCs will always be the primary objective). In Section \ref{RelWor}, we review the most relevant NoC security mechanisms and the types of attacks they aim to prevent, discussing their performance overheads and resource usage, and highlighting the need for the contributions of this paper. Then, in Section \ref{Prob} we provide details on the specific problem we address in this paper, which is a security mechanism that aims to improve the NoC resilience to side-channel attacks. Such attacks try to break a secure system by gathering information from the system's timing behaviour, power consumption, temperature or electromagnetic emissions. Just like some of the related work~\cite{WAS14}~\cite{ESL15}, we address the problem of side channel attacks by randomising the behaviour of the NoC, aiming to make it difficult for an attacker to identify patterns and correlations between the functionality of the system and the timing, power, temperature and electromagnetic behaviour of the NoC. As expected, such an approach has a direct impact on NoC resource usage, and therefore on its real-time guarantees, so in Section \ref{Random} we identify techniques that support NoC designers in improving NoC resilience against side-channel attacks while still maintaining full system schedulability. The paper is closed with extensive experimental work based on schedulability analysis and simulation in Section \ref{Eval}, and with a summary of our findings. \section{Related Work}\label{RelWor} Multiprocessor embedded systems are target of attacks by means of malicious hardware or software~\cite{DIG07}. Hardware-based attacks depend on design-time access to the system, which is then modified in a way that can be exploited during operation (e.g. by adding hardware able to leak information by changing chip temperature~\cite{Iakymchuk11}). Software-based attacks are the most common cause of security incidents in such types of systems~\cite{PAP15}, and are carried out by malicious software installed at design time or after deployment. NoC-based systems have been shown to be vulnerable to a variety of attacks, both hardware and software-based. Active NoC attacks, such as code injection~\cite{DAC15}, malware ~\cite{FIO08} and control hijacking ~\cite{LEK11}, or passive NoC attacks, such as side-channel exploitation, can be used to read sensitive communications, modify the system behaviour or prevent correct NoC operation. NoCs are especially vulnerable to side-channel attacks that exploit traffic interference as timing channels ~\cite{WAN12}~\cite{ESL15}. The shared nature of NoCs can be exploited by an attacker to obtain sensitive information. By forcing traffic collision with sensitive packet flows, an attacker can observe the throughput variations and infer sensitive data, as shown in ~\cite{WAN12}~\cite{ESL15}~\cite{WAS14}. Security-enhancing mechanisms have been added to NoC platforms to provide authentication~\cite{SEP12}, access control~\cite{FIO08}, integrity~\cite{ICE14}, and confidentiality services~\cite{REC15}. By monitoring and controlling the data exchange inside the chip, NoCs can detect and avoid attacks. Firewall-based and crypto-based techniques integrated at the network interface are the most commonly used approaches against active NoC attacks over the past decade~\cite{FIO08}~\cite{PAS16}. Firewalls implement authentication, access control and integrity services by means of traffic matching with a security table. Authorized transactions are allowed and injected to the NoC, otherwise they are denied and thus dropped. Crypto-based NoCs implement the confidentiality service by creating a shared secret among the sensitive cores and perform the encoded data exchange. While achieving desirable security enhancements, such approaches have an unpredictable impact upon the performance of the NoC and thus the overall system. Firewalls and crypto-based NoCs are the state-of-the-art in NoC security, but they are not able to protect the system against passive NoC attacks. Randomised arbitration~\cite{ESL15}, virtual channel allocation~\cite{FLO16} and routing~\cite{WAS14} have been investigated and evaluated as countermeasures against timing attacks. By randomising the characteristics of sensitive packet flows, it is possible to break the correlation between the traffic characteristics (e.g. volume and access patterns) and the sensitive data thus avoiding information leakage. Among those mechanisms, random routing has achieved the best levels of security enhancement with the lowest energy and area overhead~\cite{WAS14}. By spreading sensitive traffic over the NoC, the spatial distribution makes it harder for compromised cores or external attackers to gather sufficient side-channel information to infer correlations with sensitive data. Similarly to firewalls and crypto-based approaches, the focus of randomisation approaches is to increase security and none of the works in the state-of-the-art consider the performance requirements of the applications. In this paper, we argue that NoCs supporting real-time applications require a careful balance of a trade-off between security and performance. In most cases, we envisage that the level of security will be constrained by the NoC's ability to support attack countermeasures while at the same time ensuring performance guarantees to the application. Thus, the main contributions of this paper are the identification of a test to evaluate whether performance guarantees can hold under a specific side-channel attack countermeasure (namely route randomisation), and a technique that uses that test to better balance the trade-off between performance guarantees, resource usage and security. \section{Problem Description}\label{Prob} \subsection{Network-on-Chip Architecture}\label{NoC} While the contribution of this paper can be applied to a large variety of NoC architectures, we believe it is easier to explain it with the help of a concrete architecture. Therefore, we open this section with the description of such architecture, and postpone to Section \ref{conc} the discussion about the applicability of the proposed approach to other NoC architectures. We assume a NoC architecture with a 2D-mesh topology and wormhole switching protocol, because such features are commonly used in embedded systems for their simplicity and moderate resource overheads: \begin{itemize} \item In a 2D-mesh topology, every core is connected to a NoC switch via a network interface (NI), which is responsible for packetising and depacketising data, and controlling the injection of packets into the network. We use the term core very loosely, so it can mean a processing core, a memory controller, an I/O controller (e.g. wireless communication interface) or any other hardware resource that requires chip-level communication. The regularity of such a topology is attractive because it simplifies packet routing, and because it facilitates chip floorplanning, placement and routing. \item The use of wormhole switching protocols allows packets to be gradually sent over the NoC in smaller units called flits. Once a flit is received by a switch, it can be forwarded to the next switch down the packet route as long as that switch has sufficient buffering to hold it. This means that at any given time a packet could have its flits temporarily stored by multiple switches, so each of them are not required to hold a complete packet, thus reducing the overall buffering requirements of the NoC. \end{itemize} There is a downside to this choice of topology and switching protocol, which is the difficulty in predicting packet latencies. Since a packet can be simultaneously occupying multiple NoC buffers and links, there is a significant amount of competition for resources throughout the NoC at all times. The wide variety of interference patterns makes it hard to predict how long it takes for a packet to reach its destination. Different resource arbitration policies can make such predictions more or less difficult, especially in the case of hard real-time NoCs when an upper-bound worst-case latency is needed. Previous work has considered NoC arbitration based on packet priority~\cite{Shi10}, time multiplexing~\cite{Schoeberl07} and round robin~\cite{Dasari14}, and has devised analytical models that can be used to find latency upper-bounds for packet flows transmitted over such NoCs~\cite{Kiasari13}. Any of those approaches could be used in this paper, and we chose a priority-arbitrated NoC because of its ability to provide upper-bound latency guarantees that are customisable to different levels of packet urgency while allowing for high NoC link utilisation~\cite{Indrusiak14}. \subsection{Side-channel Attacks and Countermeasures} In this paper, we aim to improve NoC resilience against side-channel attacks by making it harder for an attacker to gain information about secure applications running over the NoC. Side-channel attackers monitor physical, non-functional characteristics of a NoC implementation (e.g. timing, power dissipation, temperature, electromagnetic emissions), and try to identify patterns that can be correlated with functional characteristics of a secure application (e.g. time to decrypt a message, length of a private key, location of a private key on the chip's distributed memory~\cite{ESL15}). This follows a commonly used approach based on the randomisation of the information leaking over side channels. There are many of the components that are not easy to randomise unless one has full control over the NoC design, such as the arbitration and flow control latencies (which are defined by the NoC architecture) and the physical characteristics of the NoC (which are defined by the chip fabrication process). We consider those approaches to be outside the scope of this paper and focus instead on approaches that do not require significant changes on the NoC. Specifically, we focus on the randomisation of packet routes. By randomly changing the route of every packet injected into the NoC, we can introduce random effects to all side-channels of interest, such as packet timing, energy dissipation, temperature and electromagnetic emissions. In this paper, we concentrate on a threat model based on packet timing, as described in the next subsection. \subsection{Threat Model}\label{ThrMod} In this paper, we assume that the NoC and its interfaces to the cores are secure. We also assume that secure tasks execute in secure cores (i.e. cores that do not allow the execution of unsecured tasks). For this threat model, we assume that the NoC communicates sensitive information between two secure tasks, which we refer as the sensitive communication. We then assume an adversary that has knowledge about the NoC architecture, about the mapping of secure tasks to (secure) NoC cores, and is able to gain control of at most two non-secure NoC cores. A successfull attack happens when the adversary is able to infect two cores that can communicate over a route that intersects with that of the sensitive communication. In that case, the adversary is able to use one of the infected cores to inject low priority packets into the NoC towards the second infected core. The latency interference imposed by the sensitive communication over the malicious low priority traffic can provide the attacker with valuable information about the timing, frequency and volume of the secure communication. This threat model is not new, and its variations have also been used in best-effort NoC-based systems by ~\cite{WAN12} and~\cite{FLO16}. The timing nature of the threat is also the same used in hard real-time uniprocessor systems by~\cite{Yoon16}. By using a route randomisation approach, it is possible to prevent the adversary from obtaining accurate information about the sensitive communication. Because not every packet of the secure communication will interfere on the malicious flows injected by the attacker, the information about timing, frequency and volume they can obtain will be less accurate, which as a consequence increases the resilience of the NoC against the threat. There are many ways to introduce route randomisation in NoCs, and we will discuss our design decisions in subsection \ref{Design}. Figure \ref{FIG-Routes} shows an example of the described threat model. It shows an adversary controlling cores F and G, and using a malicious packet flow (shown as a purple dashed line) to infer data about a sensitive communication between secure cores C and E (shown as a red dotted line, representing the case of a NoC with deterministic XY routing). In the case of a NoC with randomised routing, all routes between C and E will be used (red dashed and dotted lines), preventing the adversary from inspecting the complete sensitive communication. \begin{figure}[!htb] \centering \includegraphics*[width=\linewidth]{graphs/routes} \caption{Threat model, and examples of route randomisation with pseudo-adaptive XY (from A to B) and west-first (from C to D and C to E) algorithms} \label{FIG-Routes} \end{figure} \subsection{System Model}\label{SysMod} To increase NoC resilience against side-channel attacks while providing hard real-time guarantees to the application tasks running on it, we must make assumptions about the application behaviour such as upper-bounds on resource usage by every application task and packet. In this paper, we follow the well-known and widely used sporadic task model, which makes assumptions about the worst-case execution time (WCET) of all tasks and their shortest inter-arrival interval (i.e. their period). Since we are concerned about NoC communications, we follow an extension of the sporadic task model that considers that tasks inject packets to the NoC only after their execution completes, and that the maximum packet size is known~\cite{Indrusiak14}. Thus, a hard real-time application $\Gamma$ comprises $n$ real-time tasks $\Gamma$ =$ \{\tau_1,\tau_2, \ldots, \tau_n\}$. Each task $\tau_i$ is a 6-tuple $\tau_i$ = ($C_i$, $T_i$, $D_i$, $J_i$, $P_i$, $\{\phi_i\}$) indicating respectively its worst case computation time, period, deadline, release jitter and priority. The sixth element of the tuple is an extension to the sporadic task model proposed by~\cite{Indrusiak14}, and represents the communication packets sent by $\tau_i$ at the end of its execution. Each packet $\phi_i$ is defined as a 3-tuple $\phi_i$ = ($\tau_d$,$Z_i$,$K_i$) representing its destination task, size and maximum release jitter. In this paper, we assume for simplicity that a single packet is released at the end of each execution of each task, but the contributions presented here can be generalised for any number of released packets. Such applications are executed over a NoC platform like the one described in subsection \ref{NoC} above. We model such a platform as a set of cores $\Pi$ =$\{\pi_a,\pi_b, \ldots, \pi_z\}$, a set of switches $\Xi$ =$\{\xi_1,\xi_2, \ldots, \xi_m\}$, and a set of unidirectional links $\Lambda$ =$\{\lambda_{a1},\lambda_{1a}, \lambda_{12}, \lambda_{21}, \ldots, \lambda_{zm}, \lambda_{mz}\}$. We also model the mapping of tasks to cores with the function $map(\tau_i)$ = $\pi_a$. The routing of packets over the NoC can be modelled by the function $route(\pi_a,\pi_b)$ = $\{\lambda_{a1},\lambda_{12},\ldots,\lambda_{mb}\}$, denoting the subset of $\Lambda$ used to transfer packets from core $\pi_a$ to core $\pi_b$. We can then extend the function $map$ to also model the mapping of a packet to its route: $map(\phi_i)$ = $route(map(\tau_i), map(\tau_d))$. With the knowledge of the NoC architectural characteristics such as the latency to cross a link or to route a packet header, and with the knowledge of the length of a packet's route (i.e. its hop count, or $|route(\pi_a,\pi_b)|$ as expressed in~\cite{Indrusiak14}), it is possible to calculate the no-load latency $L_i$ of every packet $\phi_i$: the time it takes to completely cross the NoC from its source to destination without any interference or contention from other packets. For the NoC described in subsection \ref{NoC}, and for most commercial and academic NoCs, the no-load latency of a packet can be deterministically obtained, and will not change if its route and the NoC operation frequency do not change. \section{NoC Routing Randomisation}\label{Random} \subsection{Design Choices and Constraints}\label{Design} There are many design choices related to packet routing in different NoC architectures~\cite{Pasricha10}. As expected, those choices also define whether and how route randomisation can be achieved. For example, some NoC architectures use deterministic routing~\cite{Moraes04}, meaning that there is only one possible route between a source and a destination, effectively preventing the approach proposed here. Among NoCs supporting dynamic or adaptive routing, which are the ones we target, there is a key design choice affecting the randomisation approach: source or distributed routing. In source-routed NoCs, the routing decision is done by the source core or its respective NI. This is usually implemented as multiple packet header flits that contain the next-hop information for each of the switches along the packet's route. Once a switch routes one of the packet headers by assigning its output port, it discards that header flit and forwards the rest of the packet through that port. The next switch will route the subsequent header flit, discard it, forward the rest of the packet, and this is repeated all the way towards the packet destination. By following this approach, it is possible to program the source core or its NI to perform full route randomisation before every packet release. In NoCs with distributed routing, the next-hop decision is made by each switch individually. Typically, they have far less resources than the cores (and often than the NIs), so the routing decisions are based on simple rules related to the relative position of the destination core with regards to the switch holding the packet header (e.g. pseudo-adaptive XY~\cite{Dehyadgari05}, turn model~\cite{Glass92}). In those cases, it is only possible to randomly choose from a predefined subset of all possible routes. For instance, pseudo-adaptive XY switches can only randomly choose between two routes between a source and a destination (e.g. routes between cores A and B in Figure \ref{FIG-Routes}). Switches implementing turn model routing may have a larger number of alternative routes to randomly choose from in most cases, but must behave deterministically for some specific cases. Figure \ref{FIG-Routes} shows two routes created by a west-first turn model: packets between core C and D have only one possible route, as the destination is located on the west of the source, while packets from core C to E can take a variety of possible routes. In both source and distributed routing, the NoC component making random decisions must have access to a source of random data, such as a pseudo-random number generator (PRNG, generated by a deterministic algorithm) or a true random number generator (TRNG, often generated out of low level noise signals). Such sources can have significant hardware overhead, thus favouring source routing because of the low area constraints for NoC switches. For the route randomisation approaches reviewed above, however, overheads should be minimal in either case as they only require random sources with one-bit output. Additional issues when randomising packet routes include the potential increase of the packet route, the possibility of deadlocks, and the potential increase of packet latency (and therefore the potential violation of real-time constraints). Let us now address each of them. All the routing approaches reviewed above are minimal: the route they choose has the smallest possible hop count between source and destination. This is because of their obvious advantages in terms of latency, network contention and energy dissipation. However, from the point of view of side-channel attack resilience, it may be interesting to exploit non-minimal randomised routing in order to decorrelate the side channels with the functional properties of the packet communication (e.g. short packet transmission between neighbouring cores would not necessarily have the shortest latency and lowest energy dissipation if they are forced to take a long route across the chip). Deadlock-free packet communication is a critical characteristic for NoCs. This can be achieved at the link arbitration layer, e.g. with priority-preemptive virtual channels~\cite{Indrusiak14}, or at the network layer by restricting the possible turns of the routing algorithm (either in source or in distributed routing). In NoCs that ensure deadlock-freeness at the network layer, special care must be taken by the route randomisation approach to avoid introducing turns that can lead to deadlocks. Finally, route randomisation is likely to change the latencies of packets, both because for every release their routes may have different hop counts (leading to different no-load latencies) and because different routes may trigger different contention scenarios (leading to different blocking times). In our approach, such variability is actually desirable because it is a key aspect to increasing the NoC's resilience against side channel attacks. In the case of hard real-time systems, however, it is critical that such variability is bounded and that the worst-case latencies of all packets are always less than their deadlines. In the next subsection, we propose an extension to existing schedulability analysis to evaluate if that is the case for a given application mapped to a given NoC architecture. The proposed approach is simple, yet general enough to analyse randomised routing approaches following any of the design choices reviewed above: source or distributed, minimal or non-minimal, and with deadline-freeness ensured at the link or network layer. \subsection{Schedulability Analysis}\label{Sched} Schedulability analysis for a set of sporadic packets transferred over a priority-preemptive wormhole switching NoC was presented in~\cite{Shi08}. A set of packets is deemed schedulable if the worst-case latency of each packet is less than their deadline. By coupling that analysis with classical response time analysis for uniprocessor fixed-priority scheduling, an end-to-end schedulability analysis for that type of NoC was proposed in~\cite{Indrusiak14}, considering the worst-case response times of tasks and the worst-case latency of the packets they generate. Both the original analysis from~\cite{Shi08} and the end-to-end extension from~\cite{Indrusiak14} assume static routing, so a different formulation is needed before it can be used for the purpose of this paper. First, we review those formulations, but using the notation described in subsection \ref{SysMod}. According to \cite{Shi08}, the worst-case latency $S_i$ of a packet $\phi_i$ can be obtained from Equation \ref{stan}. This equation is defined recursively and iterated until a stable fixed point is discovered. \begin{equation}\label{stan} S_i \ = \ L_i \ + \ \sum_{\phi_j \in \mathbf{interf}(i)} { \left\lceil {\frac{S_i + K_j + K_j^I}{T_j}} \right\rceil L_j }, \end{equation} The set $\mathbf{interf}(i)$ is the set of higher priority packets $\phi_j$ whose route shares at least one link with the route of $\phi_i$ and therefore can interfere with it. Precisely, $\mathbf{interf}(i)$ = $\{ \phi_j \in \phi : map(\phi_i) \cap map(\phi_j) \ne \emptyset \}$. The two terms $K_j$ and $K_j^I$ denote respectively the maximum release jitter of the interfering packet $\phi_j$ and its maximum indirect interference jitter. As shown in~\cite{Indrusiak14}, $K_j$ is equal to the worst case response time $R_j$ of task $\tau_j$ which produces $\phi_j$, assuming that $\phi_j$ will be released immediately after the end of $\tau_j$'s execution. $R_j$ can be calculated using uniprocessor response time analysis, considering the type of task scheduling by the operating system at each core (e.g. priority-preemptive). And as shown in \cite{Shi08}, the indirect interference jitter $K_j^I$ can be bound by $S_j - L_j$. It can be seen in Equation \ref{stan} that the route of a packet affects its worst-case latency because it defines the set of packets that can add to the interference term of the equation (i.e. sum operator). Route randomisation would change the set $\mathbf{interf}(i)$ at each packet release, since different routes would produce different interference patterns. An intuitive way to find the worst-case latency of a packet with a randomised route would be to calculate the worst-case latency of each of its possible routes with Equation \ref{stan}, and pick the highest value. However, that approach works only if there is a single packet with randomised route, and all others following deterministic routes. A general analysis where all packets could potentially have randomised routes is more complex: all possible routes of a packet would have to be tested with all possible routes of all other packets before the worst case could be found. Furthermore, if one cannot make probabilistic assumptions on the randomisation approach, pathological cases must also be taken into account (e.g. the same route could be chosen again and again for a single packet over a long period of time, even though that is very unlikely). In this paper we assume that, in the worst case, if there is a way for a high-priority packet to interfere with a low priority packet, it would interfere with it in every possible release. This means that even though there may be routes when packets do not interfere with each other, we assume that in the worst case the random choice of route would always pick the ones where there is interference. This is perfectly reasonable when packets have similar periods, but it gets more and more pessimistic as we reduce the periods of higher priority packets. In that case, high priority packets would have a larger number of releases within a single release of a low priority packet, thus interfering more often with it, even though the larger number of releases would make less likely that an interfering route would be chosen every time. To calculate worst-case latencies for the general problem where all packets could have randomised routes, we define the set $\mathbf{interf_r}(i)$ as the set of higher priority packets $\phi_j$ who could, with any of their possible routes, interfere with any of the possible routes of the packet of interest $\phi_i$. To precisely define that set, we must first define a new function $route_r(\pi_a,\pi_b)$ = $\{\lambda_{a1},\lambda_{12},\lambda_{13},\lambda_{14}, \dotsc,\lambda_{mb}\}$, denoting the subset of $\Lambda$ that contains all the links that could be part of any of the routes that could be randomly chosen to transfer packets from core $\pi_a$ to core $\pi_b$, and a new function $map_r(\phi_i)$ = $route_r(map(\tau_i), map(\tau_d))$. Then, $\mathbf{interf_r}(i)$ = $\{ \phi_j \in \phi : map_r(\phi_i) \cap map_r(\phi_j) \ne \emptyset \}$. By applying Equation \ref{stan} with the summation over the set $\mathbf{interf_r}(i)$ instead of the original $\mathbf{interf}(i)$, we can then find an upper bound to the packet latencies over a NoC with randomised routing. \subsection{Optimising the Performance-Security Trade-off}\label{Opt} The schedulability analysis proposed in the previous subsection can only be used to test whether a particular randomised NoC configuration can meet the hard real-time constraints of an application. It offers no alternatives in case of negative results, i.e. when performance constraints are not met. In this subsection we show how the schedulability test can be exploited as a fitness function in a design space exploration process. Similarly to~\cite{Sayuti13} and~\cite{Indrusiak14}, we follow an evolutionary approach to navigate over a key part of the design space: task-core mapping. By changing that mapping, it is possible to achieve fine-grained improvements on schedulability of tasks over cores and packet flows over NoC infrastructure (e.g. tasks that are barely unschedulable can become schedulable by a simple remapping of one of the higher priority tasks that interfere with their computation or communication, thus changing the set $\mathbf{interf}$ in Equation \ref{stan}). The same can happen in the case of route randomisation, since changes on mapping can determine which randomised routes interfere with each other and in turn affect schedulability through changes in the $\mathbf{interf_r}$ set. Figure \ref{FIG-GA} shows the evolutionary pipeline proposed here, which start with an arbitrary population of task mappings using a given route randomisation approach and a given level of security. It then uses evolutionary operators such as mutation and crossover to improve the mapping population with regards to the percentage of schedulable tasks and packets calculated using the proposed modification of Equation \ref{stan}. For every generation of the population, those with the larger number of schedulable tasks and packets are selected to the next generation, where they will be again mutated, crossed-over, evaluated and selected to the subsequent generation. The pipeline stops after a fully schedulable mapping is found, or a predefined maximum number of generations is reached. Unlike many constructive task mapping approaches, the evolutionary pipeline proposed here does not necessarily try to map communicating tasks to the same or neighbouring cores. Its fitness function can be tuned, for instance, to keep communicating tasks as far apart as possible while keeping their communication packets schedulable over a variety of randomly-chosen routes. \begin{figure}[!htb] \centering \includegraphics*[width=\linewidth]{graphs/ga} \caption{Evolutionary pipeline to optimise performance-security trade-off} \label{FIG-GA} \end{figure} In this paper, we consider two types of route randomisation which can be implemented either as source or distributed routing, namely random XY/YX and random west-first. Random XY/YX is a randomised version of pseudo-adaptive XY routing used in~\cite{Dehyadgari05}, so the route of the packet to its destination is randomly chosen between the XY or the YX route prior to the injection of the packet header into the network. In random west-first, we randomise one of the turn model routing approaches~\cite{Glass92} so that whenever a packet is allowed more than one route it randomly chooses one of them (i.e. uniform probability among all alternatives). We then allow for multiple levels of security by changing how many packet flows are allowed to have their routes randomised. A baseline with no randomisation should have the best results regarding schedulability, given that packets suffer less interference and therefore are more likely to be schedulable. Then, increased levels of security can be achieved by randomised larger percentages of packet flows, up to a fully randomised configuration where all packets follow randomised routes on every release. In the next section, we show experimentally that the proposed schedulability test and evolutionary optimisation pipeline can produce NoC configurations able to hold hard real-time guarantees with maximised security potential. \section{Experimental Work}\label{Eval} We evaluate the proposed approach in two distinct experimental setups. The first uses the proposed schedulability test and evolutionary pipeline to balance the trade-off between performance guarantees and security over a large set of synthetically generated applications. The second uses a cycle-accurate NoC simulator to show the effects of route randomisation upon latency with a realistic application. \subsection{Schedulability-driven optimisation of route randomisation}\label{Eval-sched} This section presents the workflow for analytic schedulability evaluation, and evolution with an evolutionary pipeline based on a genetic algorithm (GA). It follows the pipeline presented in Figure \ref{FIG-GA}. To evaluate the challenge of optimising different applications with different levels of load, we synthetically generate thousands of applications, each of them composed of tasks that communicate with each other with different numbers of packet flows. We then apply the evolutionary pipeline to each one of those applications, aiming to optimise the mappings of tasks in such a way that the whole set of tasks and flows is schedulable at different levels of security. We then plot the percentage of schedulable applications we could achieve for each level of security and each level of load. For the sake of reproducibility, we provide below more details on the whole process. For a single experiment upon a given NoC and set of parameters (e.g. topology, operating frequency, switch and link latencies), a range of packet flow counts are identified, each of which represents a level of communication within the application, and therefore a utilisation load upon the NoC. For each flow count chosen for experimental evaluation, a set of tasksets and packet flowsets are generated, each containing the chosen number of flows. The number of tasks is kept roughly constant, and all of them are either source or destination of at least one packet flow. Therefore, flowsets with higher flow counts represent increasing packet contention between the same endpoints. Flows are assigned to particular source and destination tasks with uniform random probability. This implies that the average number of flows transmitted is even across all tasks, although as a result of the random assignment there may be unique hotspots. Following this, an experiment is initialised by defining a population of initial mappings, and a setting for the target level of security case setting. The levels of security settings are defined as either unsecured, or 25\%, 50\%, 75\% and 100\% secured flows. The secured flows are those that will use randomised routing, providing increased potential protection against side-channel attacks. In case of a partial provision of security e.g. 50\%, security is assigned to the flows in their order of priority, with the highest priority flows being randomised. The rationale is to enforce overall random interference patterns, since higher priority packets are the ones causing interference. A population of chromosomes (each representing of a mapping of tasks to cores upon the NoC, as shown in the upper-left corner of Figure \ref{FIG-GA}) is specified for each level of load (i.e. synthetically generated taskset and flowset with a specific flow count). A genetic algorithm is then used to evolve these chromosomes, performing mutation, crossover and evaluation of the population according to a fitness function based on the modified Equation \ref{stan}. This is done separately for each level of security, each of them generating a different $\mathbf{interf_r}(i)$ set representing the randomised routes of different packet flows. By applying the modified Equation \ref{stan} for every packet flow of the application, it is possible to check whether each of them is schedulable, i.e. their end-to-end latency is less than the respective deadline. The overall fitness of an application is then assumed to be the number of schedulable packet flows. Following the fitness function evaluation, the population is culled to retain only the chromosomes that are at the top of the fitness ranking. If the fitness function indicates that the top-ranked chromosome represents a mapping where all flows are schedulable, then the GA terminates early. Otherwise, following the completion of the chromosome improvement process at a fixed number of generations, the best chromosome (output mapping) and schedulability obtained (both aggregate flows and flowsets) is output for display. To show the impact of the level of security on performance guarantees and resource usage, we have produced several experimental series: \begin{LaTeXdescription} \item[No security (NS)] Deterministic routing, fitness function incorporates schedulability calculated using Equation \ref{stan} with the original $\mathbf{interf}(i)$ set. \item[Percentage security (PS(\%))]A given percentage of the packet flows use randomised routing, fitness function evaluated using Equation \ref{stan} with the proposed $\mathbf{interf_r}(i)$ set reflecting that percentage. \item[Application of security a posteriori (SAP)]Evolution is performed using a fitness function that tests the schedulability without any security mechanisms (only deterministic routing), aiming to find a schedulable mapping without security considerations. Following the completion of this evolutionary process, the evolved best application mapping has 100\% of its packet routes randomised, and is then evaluated with Equation \ref{stan} with the proposed $\mathbf{interf_r}(i)$ set. This experiment therefore aims to show that the optimisation of the mapping should take into account route randomisation, and that poor results can be expected from applying randomisation to a mapping that was optimised for deterministic routing. \end{LaTeXdescription} \begin{table}[!tb] \begin{tabular}{|l|l|l|} \hline NoC/Packet flowset parameters & Value\\ \hline Maximum packet flow no-load latency & 100 ms\\ Maximum period & 500 ms\\ Priority assignment & Deadline monotonic\\ Route randomisation & Random XY/YX\\ Standard NoC topology & 4x4\\ Enlarged NoC topology & 8x8\\ Flowsets per data point & 100\\ \hline GA parameters & \\ \hline Population size & 100\\ Mutation individual task moving probability & 0.3\\ Maximum generations & 50\\ \hline \end{tabular} \caption{Evaluation parameters} \label{TAB-SIM-PARAMS} \end{table} \subsubsection{Results} Figure \ref{FIG-SCHED-FLOWS-4x4} shows the aggregate schedulability of flows after improvement with the GA, as a mean proportion across all flowsets generated for that data point. It is clear that the ordering of the results series in the illustrated plot follows the proportion of security provided, with an increasing number of flows in the flowsets (and therefore an increasing load upon the NoC) providing a slight reduction in schedulability of the evolved cases. This is as anticipated, in that the worst-case schedulability analysis would be affected by the increased interference present from the optional random routes. However, since each GA run is an independent evolutionary process, the ordering of the series does not always follow the anticipated order. In the SAP series (security a posteriori), evolution is performed using a fitness function that tested schedulability under the no security case (XY routing). However, following the completion of the GA the evolved mapping schedulability was evaluated with all flows using randomised routing. As anticipated, the schedulability of SAP is considerably worse than the NS or PS series, since the evolution was performed using a routing strategy that assumes lower interference than the final evaluation case. Figure \ref{FIG-SCHED-FLOWSETS-4x4} shows the schedulability of flowsets. A flowset is only considered schedulable if every flow within it is schedulable. The results follow the same general trend as in Figure \ref{FIG-SCHED-FLOWS-4x4}, although they reach zero earlier since flowset schedulability requires every component flow to be schedulable. \begin{figure}[!tb] \centering \includegraphics*[width=\linewidth,height=5.5cm]{graphs/sched_flows_4x4} \caption{Flow schedulability results in the 4x4 case} \label{FIG-SCHED-FLOWS-4x4} \end{figure} \begin{figure}[!tb] \centering \includegraphics*[width=\linewidth,height=5.5cm]{graphs/sched_flowsets_4x4} \caption{Flowset schedulability results in the 4x4 case} \label{FIG-SCHED-FLOWSETS-4x4} \vspace{-0.3cm} \end{figure} For the 8x8 example evaluation case, the results are presented in Figures \ref{FIG-SCHED-FLOWS-8x8} and \ref{FIG-SCHED-FLOWSETS-8x8}. The results show a greater separation between the NS and PS series after NoC evolution, due to the increased NoC size and number of flows allowing a greater complexity of interference graphs when randomised routing is enabled. The SAP case also has significantly lower schedulability, since its evolved mapping was obtained without routing randomisation and imposing randomisation later affects schedulability. In the schedulability of flowsets in Figure \ref{FIG-SCHED-FLOWSETS-8x8}, it is clear there is a wider difference in schedulability between the PS(100) secured case and NS (no security) particularly in flowsets with 70 to 85 flows. This illustrates that as the interference graph becomes more complex it is harder for the GA to find schedulable mappings. \begin{figure}[!tb] \centering \includegraphics*[width=\linewidth,height=5.5cm]{graphs/sched_flows_8x8} \caption{Flow schedulability results in the 8x8 case} \label{FIG-SCHED-FLOWS-8x8} \end{figure} \begin{figure}[!tb] \centering \includegraphics*[width=\linewidth,height=5.5cm]{graphs/sched_flowsets_8x8} \caption{Flowset schedulability results in the 8x8 case} \label{FIG-SCHED-FLOWSETS-8x8} \vspace{-0.3cm} \end{figure} \subsection{Cycle-accurate simulation of route randomisation}\label{Eval-sim} One of the key concerns in altering network routing is the impact that it will have upon latency for packet transmission, particularly in latency-sensitive real time applications. This section considers via simulation the impact of randomising of the routing protocol on the latency of a previously published real-time application case, the autonomous vehicle application \cite{Indrusiak14}. The simulation framework used for this section is a cycle-accurate NoC model with support for priority preemption and virtual channels. This simulator has been extensively validated in our previous work, frequently being used as a baseline for results in latency and power analysis~\cite{Indrusiak15}~\cite{Harbin16}. \subsubsection{Application Structure} The application used in this application is an autonomous vehicle (AV) application~\cite{Indrusiak14}. This application consists of 38 communicating flows between a set of tasks that represent video processing, system monitoring and control for a robotic vehicle. As is the convention throughout this paper, priorities are defined such that lower priority index values represent the highest priority transmissions. The priorities, data transmission rates, frequencies and deadlines of these application transmissions are as defined in \cite{Indrusiak14}, although a different mapping has been used in order to show the impact of routing protocols on a randomly selected mapping without artificial tuning to favour a particular routing protocol. The application has been mapped onto a 4x3 NoC, and the video resolution of the AV application video streams is 640x480. Since the application mapping is static and a single priority level is used per packet, a packet always travels between a fixed source-destination pair during the simulation. \subsubsection{Routing Alternatives} In this simulation evaluation, two routing alternatives incorporating randomisation are used, in addition to the baseline comparison of XY routing. The first routing alternative uses the XY/YX approach. In this approach, traffic producers determine uniformly randomly on injection whether a data packet will use XY or YX routing, and following this decision a flag is set in the data packet to control the routing behaviour. As a result, the chosen routing algorithm (either XY or YX) is used throughout packet transmission. In addition, an alternative routing structure known as random west first (RWF) routing is also implemented, which allows randomised routing decisions to be taken by individual arbiters during data transmission. RWF requires the packet always be forwarded towards the west when the destination node is west of the current arbiter. However, any other destination port can be chosen uniformly randomly (east, north or south) as long as the direction taken is towards the destination. Therefore, the RWF approach permits a more diverse range of transmission paths than the XY/YX selection approach, providing more potential protection against side channel attacks. \subsubsection{Evaluation Results} The results are presented in Figures \ref{FIG-SIM-RESULTS} and \ref{FIG-SIM-RESULTS-NORM}, illustrating the max-min-mean latencies and normalised latencies for the randomised routing cases (XY/YX and RWF) versus the baseline. Normalised latency is calculated by dividing the end-to-end latency of the packets by the packet size, which provides a metric of latency per flit. This metric is therefore more sensitive to delays in the transmission of short packets. The latency results presented in Figure \ref{FIG-SIM-RESULTS} illustrate that routing randomisation typically increases the communication latencies for the majority of packets compared to fixed XY routing. This is particularly evident in the case of the packets with priority 8 under RWF routing, which experience an increased latency due to contention with other higher priority flows on some of the randomly chosen routes. In the XY/YX routing case, increased latency is also observed for the packets with priorities 21 and 26 in some cases. Interestingly, for some of the packet transmissions with priority 10 and 13, the use of randomised routing is also to reduce latency in the best case, either by routing a higher priority packet so that it no longer causes interference, or routing the current packet around the interferer. Considering the normalised latency results in Figure \ref{FIG-SIM-RESULTS-NORM}, it is clear that the relative impact of route randomisation is most significant upon packets with priorities 13, 15, 18 and 26. These transmissions represent some of the shortest packets in the system, which are therefore more greatly impacted on a relative basis by contention with other packets. As depicted in the previous figure, some priority 13 packets encounter a large reduction in latency during some transmissions as a result of avoiding interference. \begin{figure}[!tb] \centering \includegraphics[width=1.0\linewidth]{graphs/latencies_avapp_xy_rwf} \caption{Communication latency results for the randomised routing case on the AV application} \label{FIG-SIM-RESULTS} \end{figure} \begin{figure}[!tb] \centering \includegraphics[width=1.0\linewidth]{graphs/latencies_avapp_xy_rwf_norm} \caption{Communication latency results (normalised) for the randomised routing case on the AV application} \label{FIG-SIM-RESULTS-NORM} \end{figure} \section{Conclusions and Future Work}\label{conc} This paper has addressed the trade-off between security and hard real-time performance guarantees in Networks-on-Chip. It has proposed route randomisation as a way to increase NoC resilience against side-channel attacks, and has discussed a number of design alternatives for the randomisation approach. It then has proposed a schedulability test for applications running over a secure priority-preemptive NoCs using route randomisation. Finally, the paper identifies an optimisation pipeline which can be guided by the proposed schedulability test towards configurations that can achieve full schedulability while maximising the provided level of security. Extensive experimental work using 4x4 and 8x8 NoCs with random XY/YX routing running thousands of synthetically generated applications show the performance guarantees that can be achieved by the proposed approach at four different levels of security, compared against two baselines (no security, and full security applied a posteriori). Additional experiments with a realistic application running over 4x3 NoCs with random XY/YX and random west-first routing were performed with a cycle-accurate simulator, aiming to show the impact of route randomisation on latency variability, which in turn shows the increased resilience against side-channel attacks. Since this is the first paper addressing the trade-off between security and hard real-time performance in NoCs, it had to make several assumptions to be able to attack the problem. Lifting some of those assumptions will certainly open new avenues of research, such as using different NoC arbitration mechanisms (e.g. TDM) or different route randomisation techniques (e.g. if randomised routes of subsequent releases of packets are never the same, a less pessimistic schedulability test can be used). Addressing those cases will require new schedulability tests, but could still reuse the proposed optimisation pipeline. \subsection*{Acknowledgements} The research described in this paper is funded, in part, by the EPSRC grant, MCC (EP/K011626/1). No new primary data were created during this study.
{ "redpajama_set_name": "RedPajamaArXiv" }
6,113
Q: office 365 IMAP mailbox migration error: MigrationRecipientNotFoundException I have tried to do this migration twice now and I get the same error. Error: MigrationRecipientNotFoundException: A recipient wasn‎'t found for "orders@example.com" on the target. Create a recipient of the appropriate type for this migration on the target and try again. I know that on my target (Exchange online server) I have an account named orders@mydomain.com and have an account named orders@example.com at the source. I have two domains, the default example.net and the example.com. Any help would be greatly appreciated. A: Issue had to do with the fact that even though the user was created in office 365, it didn't have a corresponding exchange mailbox. By creating a mailbox for this Office 365 user the migration succeeded.
{ "redpajama_set_name": "RedPajamaStackExchange" }
764
\section{Introduction} The United Nations~(UN) state that inhabitants of settlements that meet any of the following criteria are defined to be living in an informal settlement~\cite{united2012state}: \begin{quote} \begin{enumerate} \item Inhabitants have no security of tenure vis-\`a-vis the land or dwellings they inhabit, with modalities ranging from squatting to informal rental housing. \item The neighborhoods usually lack, or are cut off from, basic services and city infrastructure. \item The housing may not comply with current planning and building regulations, and is often situated in geographically and environmentally hazardous areas. \end{enumerate} \end{quote} Slums, an example of informal settlements, are the most deprived and excluded form of informal settlements. They can be characterized by poverty and large agglomerations of dilapidated housing, located in the most hazardous urban land, near industries and dump sites, in swamps, degraded soils and flood-prone zones~\cite{Kohli2016}. Slum dwellers are constantly exposed to eviction, disease and violence~\cite{Sclar2005}, which stems from and leads to more severe economic and social constraints~\cite{WEKESA2011238}. Although informal settlements are well studied in the humanities and remote sensing communities \cite{fincher2003planning,WEKESA2011238,united2012state,huchzermeyer2006informal,hofmann2008detecting} in machine learning, only a small amount of research has been conducted on informal settlements, with all of that research using VHR and high resolution(HR) satellite imagery~\cite{mahabir2018critical,mboga2017detection,varshney2015targeting}, a cost prohibitive option for many NGOs and governments of developing nations. In contrast, there is an abundance of freely available and globally accessible LR satellite imagery, provided by the European Space Agency~(ESA), which provides updated imagery of the entire land mass of the Earth every 5 days~\cite{Waitr2016,Esas2img,Esasent2}. To the authors knowledge, no previous approaches have used LR imagery. The ability to map and locate these settlements would give organizations such as UNICEF and other NGOs the ability to provide effective social and economic aid~\cite{pais2002poverty}. This in turn would enable those communities to evolve in a sustainable way, allowing the people living in those environments to gain a much better quality of life addressing multiple of the UN sustainable development goals~\cite{UNsus}. These goals aim to eliminate poverty, increase good health and well-being, provide quality education, clean water and sanitation, affordable and clean energy, sustainable work and economic growth, access to industry, innovation and infrastructure.\\ \begin{figure}[t!] \begin{minipage}{.25\textwidth} \includegraphics[width=0.8775\linewidth]{images/kibera_1.png} \end{minipage}% \begin{minipage}{.25\textwidth} \includegraphics[width=0.8775\linewidth]{images/kibera_2.png} \end{minipage} \caption{Two images of the same informal settlement in Kibera, representing the difference between VHR and LR imagery. \textit{Left}: A DigitalGlobe 30cm VHR image. \textit{Right}: The Sentinel-2 10m resolution image.} \label{fig:compresimg} \end{figure} However, solving this problem is challenging due to several factors. 1) It requires collaboration among multiple parties: the NGOs, local government, the remote sensing and machine learning communities. 2) The locations and distribution of these informal settlements have yet to be mapped thoroughly on the ground or aerially, as the mapping demands dedicated human and financial resources. This often leads to partially completed, or completely un-annotated data-sets. 3) Informal settlements tend to grow sporadically (both in space and time), which adds an additional layer of complexity. 4) Even though we have access to satellite imagery for the entire globe, much of this raw data is not in a usable format for machine learning frameworks, making it difficult to extract actionable insights at scale~\cite{xie2015transfer}. 5) There may be no local government structure in a particular settlement, which can inhibit our ability to gather data quickly. and make it difficult to extract good quality ground truth data, see Section \ref{sec:data}.\\ In order to address these challenges, in this work we propose a semi-automated framework that takes a satellite image, directly extracted in its \textit{raw}-user form and outputs a trained classifier that produces binary maps highlighting the locations of informal settlements. Our first approach, the cost-effective approach, takes advantage of the pixel level contextual information by training a classifier to learn a unique spectral signal for informal settlements. When we require finer grained features, such as the roof size, or the density of the surrounding settlements to determine whether or not there exists an informal settlement, we demonstrate a second approach that uses a semantic segmentation neural network to extract these features, the cost-prohibitive solution. See Section~\ref{sec:method}.\\ To ensure that this work can be applied in the field, we have had an active partnership with UNICEF, to understand what we can do to facilitate their needs further and how we can facilitate the needs of other NGOs. Because of this, we focused on developing a system that will work in a computationally efficient and monetary effective manner. Our main approach runs efficiently on a laptop, or desktop CPU and is cost-effective as we only use freely available, openly accessible LR satellite imagery, rather than VHR imagery which can cost hundreds-of-thousands of dollars. \noindent Within this paper we make the following \textbf{contributions}: \begin{quote} \begin{itemize} \item We introduce and extensively validate two machine learning based approaches to detect and map informal settlements. One is cost-effective, the other is cost-prohibitive, but is required when contextual information is needed. \item We demonstrate for the first-time that informal settlements can be detected effectively using only freely and openly accessible LR satellite imagery. \item We release to the public two informal settlement benchmarks for LR and VHR satellite imagery, with accompanying ground truths. \item We provide all source code and models. \end{itemize} \end{quote} In Section~\ref{sec:data} we provide details of the data used and the challenges involved in collecting it. In Section~\ref{sec:relatedwork} we provide a condensed overview of related work and current approaches. In Section~\ref{sec:method} we introduce details of our methodologies and present the results of our contributions in Section~\ref{sec:results}. Finally we conclude and present future work in Section~\ref{sec:conclusions}. \section{Data Acquisition} \label{sec:data} In this work we use a combination of satellite imagery and on-the-ground measurements. However, to take advantage of machine learning frameworks we require an absolute \emph{ground truth}, which facilitates robust training and validation. Ground truth data for this project was very sparse, in part due to the difficulties and financial costs in obtaining the data across vast regions of developing nations. This meant that much of the accessible data was incomplete. Even when the data was available, it was not necessarily in a workable format; either it was provided as part of a PDF, with no external meta-data, or it was simply in an inaccessible format. As part of this work we fused these data sets together, to generate usable data sets that can be used by the community for developing new machine learning models. Data sets can be found here: \url{https://frontierdevelopmentlab.github.io/informal-settlements/}. \subsection{Satellite Data} In the last ten-years there has been an exponential increase in the number of satellites being launched due to the increase in commercial interests. This has accelerated the amount of satellite imagery available and continues to lower the cost of gaining access to VHR data. However, VHR imagery can still cost hundreds, to thousands, to hundreds-of-thousands of dollars per image, or collection of images and is typically only available through commercial providers. Institutions such as the National Aeronautics and Space Administration~(NASA) and ESA do provide a multitude of freely available multi-spectral imagery, but this is typically of a much lower resolution, approximately $10-20 m$ resolution per pixel, and many of the fine grained features are blurred, see Figure \ref{fig:compresimg}. This makes it difficult to use a deep learning approach effectively to extract optical features that would be required for distinguishing informal and formal settlements, whereas the VHR imagery, less than $1 m$ resolution per pixel, enables us to do this, especially when we require contextual information, Section~\ref{sec:method}. \subsubsection{Sentinel-2} \begin{figure}[t!] \centering \includegraphics[width=0.45\textwidth, height=3cm]{images/sentinel-l1c-l2a.png} \caption{Image provided by the~\protect\citeauthor{Esas2img}.\textit{Top}: Represents the Sentinel-2 Level-1C uncorrected image. \textit{Bottom}: Represents the Sentinel-2 Level-2A corrected image. This lower image requires an additional time-consuming computational step to correct for atmospheric distortions in the spectral data. Our method does not require the use of this pre-processing step.} \label{fig:s2l1cl2a} \end{figure} The Sentinel-2 mission is part of the Copernicus program by the European Commission (EC). A global earth observation service addressing six thematic areas: land, marine, atmosphere, climate change, emergency management and security through its Sentinel missions. ESA is responsible for the observation infrastructure of the Sentinels~\cite{Copernicussent2}. The data provided by the Sentinels has a free and open data policy implying that the data from the Sentinel missions is available free of charge to everyone. The ease of data access and use, allows all users from the public, private or research communities to reap the socio-economic benefits of such data~\cite{Waitr2016}. A Sentinel-2 image is provided to the end user at Level-1C~\cite{sent2userhandbook} and has already gone through a series of pre-processing steps before it reaches the end user. However, these images have not been corrected for atmospheric distortions. This correction requires additional processing time to convert the image into Level-2A product, resulting in bottom of the atmosphere reflectances, see Figure~\ref{fig:s2l1cl2a} for a comparison. Within this work we directly use the Level-1C images for our computationally and cost efficient approach, mitigating the need to do the computationally costly processing. \paragraph{Multi-spectral Data} The Sentinel-2 satellites map the entire global land mass every 5-days at various resolutions of 10 to 60$m$ per pixel, which means that each pixel represents an area of between $10m^{2}$ to $60m^{2}$. At each resolution, spectral information at the top of the atmosphere (TOA) is provided, creating a total of 13 spectral bands covering the visible, near infrared (NIR) and the shortwave infrared (SWIR) part of the electromagnetic spectrum~\cite{sent2userhandbook,Zhang2017,Drusch2012}. Although there are 13 spectral bands in total, we exclude bands 1, 9 and 10 as they interfere strongly with the atmosphere due to their 60$m$ resolution. This means that we only use the bands 2, 3, 4, 5, 6, 7, 8, 8A, 11, 12 as these bands have minimal interactions with the atmosphere and are provided at either a 10$m$ or 20$m$ spatial resolution.\\ \subsubsection{Very-High-Resolution Satellite Images} In addition to freely available multi-spectral LR satellite images, we use VHR images with a resolution of up to 30cm per pixel, kindly provided by DigitalGlobe through Satellite Applications Catapult. See Figure~\ref{fig:compresimg} to see the difference in resolution between Sentinel-2 and VHR imagery.We emphasize that VHR imagery is only used in the cost-prohibitive method. \subsection{Annotated Satellite Imagery} We have annotated satellite imagery for the locations of informal settlements in parts of Kenya, South Africa, Nigeria, Sudan, Colombia and Mumbai. We then project these masks on to the satellite image and extract the necessary spectral information at those specific points, see Figure~\ref{fig:mumbaiannotated} for a example of an annotated ground truth map. We have open sourced the necessary code to do this here: \url{https://frontierdevelopmentlab.github.io/informal-settlements/}. \begin{figure}[t!] \centering \includegraphics[width=0.45\linewidth,height=7cm]{images/Mumbai_gt.jpg} \includegraphics[width=0.45\linewidth,height=7cm]{images/india3.png} \caption{An example of annotated ground truth map. \textit{Left:} The city is Mumbai, the white dots represent informal settlements and the black dots represent the environment. \textit{Right:} The Sentinel-2 image of Mumbai.} \label{fig:mumbaiannotated} \end{figure} \section{Related Work} \label{sec:relatedwork} Recent publications applying machine learning to remote sensing data, in particular to satellite imagery, that have focused on detecting, or mapping informal settlements \cite{xie2015transfer,varshney2015targeting,mboga2017detection,mahabir2018critical,kuffer2016slums,ASMAT2012650,Kohli2016} have typically been trained on a specific region, or feature in combination with VHR \cite{4610942,gevaert2016classification,4610942,kuffer2016slums}. The approaches most in spirit to our own are~\cite{varshney2015targeting,xie2015transfer,Jean790}. \citeauthor{varshney2015targeting} focus on detecting roofs in Eastern Africa using a template matching algorithm and random forest, they take advantage of Google Earths' API to extract high resolution imagery, which although is free to researchers, is not openly available to everyone. \citeauthor{xie2015transfer} and \citeauthor{Jean790} use a mixture of data sources and transfer learning across different data sets to generate poverty maps by taking advantage of night time imagery through the National Oceanic and Atmospheric Administration (NOAA) and daytime imagery through Google Earths' API. However, to our knowledge there exists no previous work on predicting informal settlements solely from LR data, or predicting informal settlements in the way that we present here. This inhibits our ability to benchmark against previous methods. Thus, by providing the data sets and the baselines in this paper, we provide a robust way to compare the effectiveness of any future approaches and facilitate the creation of new machine learning methodologies. \section{Methods} \label{sec:method} In this section, we describe our approaches for detecting and mapping informal settlements. We introduce two different methods; a cost-efficient method and cost-prohibitive method. Our \textbf{first method} trains a classifier to learn what the spectrum of an informal settlement is, using LR freely available Sentinel-2 data. To do this, we employ a pixel-wise classification, where the system learns whether or not a 10-band spectra is associated to an informal settlement or the environment, which encompasses everything that is not an informal settlement. Our \textbf{second method}, is a semantic segmentation deep neural network that uses VHR satellite imagery, which is useful when informal settlements do not have unique spectra when compared to the environment, like those in Sudan, see Figure~\ref{fig:sudaninffor}. \subsection{Cost Effective Method} \textbf{Canonical Correlation Forests}~(CCFs)~\cite{rainforth2015canonical} are a decision tree ensemble method for classification and regression. CCFs are the state-of-the-art random forest technique, which have shown to achieve remarkable results for numerous regression and classification tasks~\cite{rainforth2015canonical}. Individual canonical correlation trees are binary decision trees with hyper-plane splits based on local canonical correlation coefficients calculated during training. Like most random forest based approaches, CCFs have very few hyper-parameters to tune and typically provide very good performance out of the box. All that has to be set is the number of trees, $n_{trees}$. For CCFs, setting $n_{trees} = 15$ provides a performance that is empirically equivalent to a random forest that has $n_{trees} = 500$~\cite{rainforth2015canonical}, meaning CCFs have lower computational costs, whilst providing better classification. CCFs work by using canonical correlation analysis~(CCA) and projection bootstrapping during the training of each tree, which projects the data into a space that maximally correlates the inputs with the outputs. This is particularly useful when we have small data-sets, like in our case, as it reduces the amount of artificial randomness required to be added during the tree training procedure and improves the ensemble predictive performance~\cite{rainforth2015canonical}.\\ The computational efficiency aspects of CCFs and their suitability to both small and large data-sets, makes them ideal for detecting informal settlements for three reasons. First, many of the organisations that we aim to help will not have access to a large amount of compute resources, therefore computational efficiency is important. Second, to run the CCFs for both training and prediction, all that has to be called is one function. This ensures that the end user does not need to be an expert in ensemble methods and makes the method akin to plug and play. Finally, some of our ground truth data sets are relatively small, which means that we must use the data as efficiently as possible, which CCFs allow us to do. When VHR and computational cost are not a restriction we can employ a deep learning approach using convolution neural networks~(CNN) to detect informal settlements. \subsection{Cost Prohibitive Method} Since informal settlements can also be classified by the rooftop size and the surrounding building density, we employ a state-of-the-art semantic segmentation neural network on optical~(RGB) VHR satellite imagery to detect these contextual features. These contextual features are important when it is not possible to distinguish informal settlements from the environment by spectral signal in the same region. An example of such an informal settlement is shown in Figure~\ref{fig:sudaninffor}. We see that the informal settlements in a rural region of Al Geneina, Sudan have a very low building density, and also the roof tops of both formal and informal settlements are built out of concrete, meaning they have the same spectral signal. This is in contrast to the dense slums in Nairobi and Mumbai. \begin{figure} \begin{minipage}{.25\textwidth} \includegraphics[width=0.88\linewidth]{images/sudan_1_a.png} \end{minipage}% \begin{minipage}{.25\textwidth} \includegraphics[width=0.88\linewidth]{images/sudan_2_a.png} \end{minipage} \caption{A VHR image comparing an informal, \textit{left} and formal settlement, \textit{right}, in Al Geneina, Sudan. The main distinguishing feature is the wider contextual information, as the material spectrum's are the same.} \label{fig:sudaninffor} \end{figure} \subsubsection{Encoder-Decoder with Atrous Separable Convolution} \begin{figure*}[ht!] \centering \begin{minipage}[b]{0.33\textwidth} \includegraphics[height=2.45cm, keepaspectratio]{images/pred_kibera_ccf_corrected.png} \end{minipage} \begin{minipage}[b]{0.33\textwidth} \includegraphics[height=2.45cm, keepaspectratio]{images/pred_kibera_dl_corrected.png} \end{minipage} \begin{minipage}[b]{0.33\textwidth} \includegraphics[height=2.45cm, keepaspectratio]{images/gt_kibera_corrected.png} \end{minipage} \caption{Predictions of informal settlements (white pixels) in Kibera, Nairobi. \textit{Left:} The CCF prediction of informal settlements in Kibera on low-resolution Sentinel-2 spectral imagery. \textit{Middle:} Deep learning based prediction of informal settlements in Kibera, trained on VHR imagery. \textit{Right: }The ground truth informal settlement mask for Kibera.} \label{fig:compDLandCCF} \end{figure*} For the task of semantic segmentation of informal settlements we use the DeepLabv3+ encoder-decoder architecture. DeepLabv3+ ~\cite{deeplabv3plus2018} is a deep CNN that extends the prior DeepLabv3 network~\cite{chen2017rethinking} with a decoder module to refine the segmentation results of the previous encoder-decoder architecture particularly at the object boarders. The DeepLabv3 architecture uses Atrous Spatial Pyramid Pooling~(ASPP) with Atrous convolutions to explicitly control the resolution at which feature responses are computed within the CNN. This ASPP module is augmented with image level features to capture longer range information. We use a Xception 65 network backbone in the encoder-decoder architecture. The beneficial use of this Xception model together with applying depth wise separable convolution to ASPP and the decoder modules have been shown in~\cite{deeplabv3plus2018}. \subsubsection{Implementation details} We train the entire network end-to-end with the usual back-propagation algorithm using eight Tesla V100 GPUs with 16 GBs of memory each. We initialize the layer weights using those from the pre-trained PASCAL VOC 2012 model~\cite{pascal-voc-2012}. We then fine-tune in turn the finer strides on the training/validation data. We train our deep network with a batch size of 32, an initial learning rate of 0.001 and a learning rate decay factor of 0.1 every 2.000 steps until convergence. Our experiments are based on a single-scale evaluation. All other hyper-parameters are the same as in the DeepLabv3+ model~\cite{deeplabv3plus2018}. \section{Results} \label{sec:results} \paragraph{Experimental Setup} For each region we have a 10-20$m$ resolution Sentinel-2 image, the corresponding VHR 30-50$cm$ resolution image and the ground truth annotations. We have ensured that the images and annotations are aligned in space and time to reduce any additional noise in the data. When training and validating a model on the same region we use a 80-20 split. We ensure that each class contains the same number of points, we then randomly sample 80\% of each class to generate the training data and then use the remaining 20\% of each class to construct our test set, which is comprised of a different set of points. We then center the training data (testing data accordingly) to have a mean of zero and standard deviation of one. We set the $n_{trees} =10$ for training the CCF. For validating our methods we report both pixel accuracy, and mean intersection over union~(IoU). We use the standard definition of mean IOU, $ meanIOU = \frac{1}{n_{class}}\frac{t_{ii}}{(t_{i} + \sum_j n_{ji} - n_{ii})} $ and pixel classification, $pxclass = \frac{\sum_i n_{ii}}{t_i}$, where $n_{class}$ is the total number of classes, $n_{ij}$ is the number of pixels of class $i$ predicted to belong to class $j$, and $t_i$ is the total number of pixels of class $i$ in ground truth segmentation.\\ We provide a comparison of both the pixel-wise classification with CCFs and the contextual classification with CNNs for the detection and mapping of informal settlements, see Table~\ref{tab:res2}. The CCFs trained solely on freely available and easily accessible low-resolution data perform well, although they are unable to match the performance of the CNN trained on VHR imagery, except for Kibera. Figure~\ref{fig:compDLandCCF} shows the predictions of both methods and the ground truth annotations. Despite having access to very high resolution data, the CNN still manages to miss-classify structural elements of the informal settlements in Kibera. Whereas the CCF, although more granular, incorporates the full structure of the informal settlement in Kibera via only the spectral information. \subsubsection{Generalizability} To demonstrate the adaptability of our approach we train each model on different parts of the world and use that model to perform predictions on other unseen regions across the globe. For this paper we train two models, one on Northern Nairobi, Kenya and another on Medellin, Colombia. The results can be found in Table~\ref{tab:res3}. Even though we only have a small amount of data, we are able to demonstrate that our models can generalize moderately well, even with data that is noisy and partially incomplete. We provide several more results in the appendix~\ref{sec:all} of this paper. \begin{table}[h!] \centering \begin{tabular}{lcc|cc} \toprule & \multicolumn{2}{c}{\textbf{Pixel Acc.}} & \multicolumn{2}{c}{\textbf{Mean IOU}} \\ \midrule \textbf{Region} & \textbf{CCF} & \textbf{CNN} & \textbf{CCF} & \textbf{CNN} \\ \midrule Kenya, Northern Nairobi & 69.4 & 93.1 & 62.0 & 80.8 \\ Kenya, Kibera & 69.0 & 78.2 & 73.3 & 65.5 \\ South Africa, Capetown* & 92.0 & - & 33.2 & - \\ Sudan, El Daien & 78.0 & 86.0 & 61.3 & 73.4 \\ Sudan, Al Geneina & 83.2 & 89.2 & 35.7 & 76.3 \\ Nigeria, Makoko* & 76.2 & 87.4 & 59.9 & 74.0 \\ Colombia, Medellin* & 84.2 & 95.3 & 74.0 & 83.0 \\ India, Mumbai* & 97.0 & - & 40.3 & - \end{tabular} \caption{Pixel accuracy and mean IOU (\%) results for informal settlement detection using the CCF pixel-wise classification and the contextual classification with CNNs. CCFs are trained and tested on low resolution imagery, CNNs are trained and tested on VHR imagery. *Represents that the ground truth annotations are less than 75\% complete for the region.} \label{tab:res2} \end{table} \begin{table}[h!] \centering \begin{tabular}{lcc|cc} \toprule & \multicolumn{2}{c}{\textbf{Pixel Acc.}} & \multicolumn{2}{c}{\textbf{Mean IOU}} \\ \midrule \textbf{Region} & \textbf{NN} & \textbf{M} & \textbf{NN} & \textbf{M} \\ \midrule Kenya, Northern Nairobi & 69.4 & 55.0 & 62.0 & 54.4 \\ Kenya, Kibera & 67.3 & 63.8 & 54.1 & 56.0\\ South Africa, Capetown* & 41.3 & 71.5 & 43.1 & 32.0 \\ Sudan, El Daien & 14.2 & 1.1 & 37.9 & 34.0 \\ Sudan, Al Geneina & 27.1 & 6.0 & 34.9 & 41.0 \\ Nigeria, Makoko* & 59.0 & 77.0 & 37.8 & 34.6 \\ Colombia, Medellin* & 65.0 & 84.2 & 46.9 & 74.0 \\ India, Mumbai* & 37.9 & 63.0 & 32.4 & 34.4 \end{tabular} \caption{Pixel accuracy and mean IOU (\%) results for informal settlement detection using pixel-wise classification with CCFs trained on a particular region and testing on all other regions. Results are for a model trained on Northern Nairobi~(NN) and a model trained on Medellin~(M). * Represents that the ground truth annotations are less than 75\% complete for the region.} \label{tab:res3} \end{table} \newpage \section{Conclusions and Future Work} \label{sec:conclusions} \paragraph{Conclusion} In this work we have composed a series of annotated ground truth data-sets and have provided for the first time benchmarks for detecting informal settlements. We have provided a comprehensive list of the challenges faced in mapping informal settlements and some of the constraints faced by NGOs. In addition to this, we have proposed two different methods for detecting informal settlements, one a cost-effective method, the other a cost-prohibitive method. The first method used computationally efficient CCFs to learn the spectral signal of informal settlements from LR satellite imagery. The second used a CNN combined with VHR satellite imagery to extract finer grained features. We extensively evaluated the proposed methods and demonstrated the generalization capabilities of our methods to detect informal settlements not just in a local region, but globally. In particular, we demonstrated for the first time that informal settlements can be detected effectively using only freely and openly accessible multi-spectral low-resolution satellite imagery. \paragraph{Future work} Because of the uncertainties within the ground truth annotations and the differences in informal settlements across the world, we believe that this problem would be very useful for testing transfer learning and meta-learning approaches. In addition to this, Bayesian approaches would enable us to characterize these uncertainties via probabilistic models. This would provide an effective way to create adaptable models that learn what it means for an informal settlement to be informal, as the model absorbs new information. It is also interesting to note that a 1~$km^{2}$ area containing informal settlements could house up to 129089 people~\cite{desgroppes2011kibera} and so each pixel could represent up to 13 people~\footnote{$100m^{2} = 0.00001km^{2}$, therefore $129089 \times 0.00001 \sim 13 $ people per pixel~($ppx^{-1}$).}. This therefore allows us to also add population estimates to our maps, which UNICEF state is also crucial. This would enable governments and NGOs to understand how much infrastructure is required and how much aid needs to be provided. Although we could have added population estimates in this current work, we have chosen to omit them as it would be irresponsible of us to provide estimates when not enough ground truth data exists, regarding average population numbers in informal settlements. We are actively working with UNICEF to gather more ground truth data for this and additional annotations for informal settlements, as UNICEF would actively like to deploy a system like the one that we have developed here to provide both mapping and population estimates of rural and urban informal settlements. \section{Acknowledgements} This project was executed during the Frontier Development Lab, Europe program, a partnership between the $\phi$-Lab at ESA, the Satellite Applications~(SA) Catapult, Nvidia Corporation, Oxford University and Kellogg College. We gratefully acknowledge the support of Adrien Muller and Tom Jones of SA Catapult for their useful comments, providing VHR imagery and ground truth annotations for Nairobi. We thank UNICEF, in particular Do-Hyung Kim and Clara Palau Montava, for valuable discussions and AIData for access to geo-located Afrobarometer data. We thank Nvidia for computation resources. We thank Yarin Gal, Adam Golinski and Ben Fernando for their for their helpful comments. Bradley Gram-Hansen was also supported by the UK EPSRC CDT in Autonomous Intelligent Machines and Systems (EP/L015897/1). Patrick Helber was supported by the NVIDIA AI Lab program and the BMBF project DeFuseNN (Grant 01IW17002). \newpage \bibliographystyle{ACM-Reference-Format} \balance
{ "redpajama_set_name": "RedPajamaArXiv" }
1,247
{"url":"https:\/\/www.freemathhelp.com\/forum\/threads\/factor-by-grouping.116074\/","text":"# Factor By Grouping\n\nStatus\nNot open for further replies.\n\n##### Full Member\nFactor by grouping.\n\nx^3 - 3x^2 - x + 3\n\nx^2(x - 3) - (- x + 3)\n\nx^2(x - 3) + (x - 3)\n\n(x^2 - 1)(x - 3)\n\n(x - 1)(x + 1)(x - 3)\n\nCorrect?\n\n#### Romsek\n\n##### Full Member\ndid you try multiplying out your result and seeing if it matched the original expression?\n\n#### Jomo\n\n##### Elite Member\nFactor by grouping.\n\nx^3 - 3x^2 - x + 3\n\nx^2(x - 3) - (- x + 3)\nx^2(x - 3) - (- x + 3) = x^2(x - 3) - 1(- x + 3) = x^3 -3x^2 +x -3 which is wrong\n\n#### Jomo\n\n##### Elite Member\nx^2(x - 3) + (x - 3)\n\n(x^2 - 1)(x - 3)\nx^2(x - 3) + (x - 3) = x^2(x - 3) + 1(x - 3) = (x^2 + 1)(x-3) which is not what you got!\n\n##### Full Member\ndid you try multiplying out your result and seeing if it matched the original expression?\nNo. I did not multiply the result.\n\n##### Full Member\nx^2(x - 3) + (x - 3) = x^2(x - 3) + 1(x - 3) = (x^2 + 1)(x-3) which is not what you got!\nWhich is what I tried to get. Give me credit or walk away.\n\n#### Harry_the_cat\n\n##### Senior Member\nFactor by grouping.\n\nx^3 - 3x^2 - x + 3\n\nx^2(x - 3) - (- x + 3) this should be x^2(x - 3) + (-x + 3)\n\nx^2(x - 3) + (x - 3) \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026. x^2(x - 3) + -1(x - 3)\n\n(x^2 - 1)(x - 3) \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026. this is correct, but doesn't follow from your previous line\n\n(x - 1)(x + 1)(x - 3) \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026.. yes this is correct, but you have made several mistakes in your working.\n\nCheck your factorising by expanding this out and see if you get the original expression.\n\nCorrect?\n\n#### lookagain\n\n##### Senior Member\nFactor by grouping.\n\nx^3 - 3x^2 - x + 3\nAddress the potential confusion head-on for the sign of the quantity that you are factoring out in the second pair.\nThen, there should be no doubts:\n\n$$\\displaystyle x^3 - 3x^2 - x + 3 \\ =$$\n\n$$\\displaystyle x^2(x - 3) - x + 3$$\n\nFor this expression to factor, there must be an (x - 3) factor in the second pair, so deliberately write it there,\nwith a few spaces in front of it for a plus sign or subtraction sign (depending), and a constant for a placeholder.\n\n$$\\displaystyle x^2(x - 3) \\ \\ \\ \\ \\ (x - 3) \\$$\n\nWhat multiplied by x equals -x? Negative one does. Write this in as a subtraction sign and 1 next to the second\n(x - 3) factor.\n\n$$\\displaystyle x^2(x - 3) - 1(x - 3) \\$$\n\nLastly, check to see if (-1) multiplied by the (-3) of (x - 3) gives 3, the last term of the original polynomial expression.\nIt does.\n\nFactor out the common factor of (x - 3), either to the right, or to the left, of $$\\displaystyle \\ (x^2 - 1)$$.\n\nThen, $$\\displaystyle (x^2 - 1)(x - 3) \\ =$$\n\n$$\\displaystyle (x - 1)(x + 1)(x - 3)$$\n\nIt just took me a lot of words and some minutes of hen-and-peck typing to explain this, but a newer student could\ncasually write out the steps on paper to fully factoring this by the grouping method in about 20 seconds, give or\ntake some seconds.\n\n- - - - - - - - - - - - - - - - - - - - - --\n\nThis could also been factored by grouping this way, with keeping the highest degree term first:\n\n$$\\displaystyle x^3 - 3x^3 - x + 3 \\ =$$\n\n$$\\displaystyle x^3 - x - 3x^2 + 3 \\ =$$\n\n$$\\displaystyle x(x^2 - 1) \\ - \\ 3(x^2 - 1) \\ =$$\n\n$$\\displaystyle (x^2 - 1)(x - 3) \\ =$$\n\n$$\\displaystyle (x - 1)(x + 1)(x - 3)$$\n\nLast edited:\n\n#### Jomo\n\n##### Elite Member\nWhich is what I tried to get. Give me credit or walk away.\nNo, I will not give you credit if you are wrong. I hate when teachers do that. When you are wrong I will tell that you are wrong and when you are right I will say that.\n\n##### Full Member\nAddress the potential confusion head-on for the sign of the quantity that you are factoring out in the second pair.\nThen, there should be no doubts:\n\n$$\\displaystyle x^3 - 3x^2 - x + 3 \\ =$$\n\n$$\\displaystyle x^2(x - 3) - x + 3$$\n\nFor this expression to factor, there must be an (x - 3) factor in the second pair, so deliberately write it there,\nwith a few spaces in front of it for a plus sign or subtraction sign (depending), and a constant for a placeholder.\n\n$$\\displaystyle x^2(x - 3) \\ \\ \\ \\ \\ (x - 3) \\$$\n\nWhat multiplied by x equals -x? Negative one does. Write this in as a subtraction sign and 1 next to the second\n(x - 3) factor.\n\n$$\\displaystyle x^2(x - 3) - 1(x - 3) \\$$\n\nLastly, check to see if (-1) multiplied by the (-3) of (x - 3) gives 3, the last term of the original polynomial expression.\nIt does.\n\nFactor out the common factor of (x - 3), either to the right, or to the left, of $$\\displaystyle \\ (x^2 - 1)$$.\n\nThen, $$\\displaystyle (x^2 - 1)(x - 3) \\ =$$\n\n$$\\displaystyle (x - 1)(x + 1)(x - 3)$$\n\nIt just took me a lot of words and some minutes of hen-and-peck typing to explain this, but a newer student could\ncasually write out the steps on paper to fully factoring this by the grouping method in about 20 seconds, give or\ntake some seconds.\n\n- - - - - - - - - - - - - - - - - - - - - --\n\nThis could also been factored by grouping this way, with keeping the highest degree term first:\n\n$$\\displaystyle x^3 - 3x^3 - x + 3 \\ =$$\n\n$$\\displaystyle x^3 - x - 3x^2 + 3 \\ =$$\n\n$$\\displaystyle x(x^2 - 1) \\ - \\ 3(x^2 - 1) \\ =$$\n\n$$\\displaystyle (x^2 - 1)(x - 3) \\ =$$\n\n$$\\displaystyle (x - 1)(x + 1)(x - 3)$$\nNicely done.\n\n##### Full Member\nNo, I will not give you credit if you are wrong. I hate when teachers do that. When you are wrong I will tell that you are wrong and when you are right I will say that.\nFair enough. I am also old school.\n\n#### Otis\n\n##### Senior Member\n... Give me credit or walk away.\nThat's not very nice. It's an example of one of the same types of bad behavior that got you banned from two other math sites.\n\n$$\\;$$\n\n$$\\;$$","date":"2019-08-20 16:03:28","metadata":"{\"extraction_info\": {\"found_math\": true, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 0, \"mathjax_display_tex\": 1, \"mathjax_asciimath\": 0, \"img_math\": 0, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.35042768716812134, \"perplexity\": 758.4581818290645}, \"config\": {\"markdown_headings\": true, \"markdown_code\": true, \"boilerplate_config\": {\"ratio_threshold\": 0.18, \"absolute_threshold\": 10, \"end_threshold\": 15, \"enable\": true}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2019-35\/segments\/1566027315551.61\/warc\/CC-MAIN-20190820154633-20190820180633-00393.warc.gz\"}"}
null
null
require 'securerandom' require 'digest/sha3' module DEVp2p class RLPxSession SUPPORTED_RLPX_VERSION = 4 ENC_CIPHER = 'AES-256-CTR' MAC_CIPHER = 'AES-256-ECB' extend Configurable add_config( eip8_auth_sedes: RLP::Sedes::List.new( elements: [ RLP::Sedes::Binary.new(min_length: 65, max_length: 65), # sig RLP::Sedes::Binary.new(min_length: 64, max_length: 64), # pubkey RLP::Sedes::Binary.new(min_length: 32, max_length: 32), # nonce RLP::Sedes::BigEndianInt.new, # version ], strict: false ), eip8_ack_sedes: RLP::Sedes::List.new( elements: [ RLP::Sedes::Binary.new(min_length: 64, max_length: 64), # ephemeral pubkey RLP::Sedes::Binary.new(min_length: 32, max_length: 32), # nonce RLP::Sedes::BigEndianInt.new # version ], strict: false ) ) attr :ecc, :ephemeral_ecc, :initiator_nonce, :responder_nonce, :remote_version, :remote_pubkey, :remote_ephemeral_pubkey def initialize(ecc, is_initiator=false, ephemeral_privkey=nil) @ecc = ecc @is_initiator = is_initiator @ephemeral_ecc = Crypto::ECCx.new ephemeral_privkey @ready = false @got_eip8_auth, @got_eip8_ack = false, false end ### Frame Handling def encrypt(header, frame) raise RLPxSessionError, 'not ready' unless ready? raise ArgumentError, 'invalid header length' unless header.size == 16 raise ArgumentError, 'invalid frame padding' unless frame.size % 16 == 0 header_ciphertext = aes_enc header raise RLPxSessionError unless header_ciphertext.size == header.size header_mac = egress_mac(Utils.sxor(mac_enc(egress_mac[0,16]), header_ciphertext))[0,16] frame_ciphertext = aes_enc frame raise RLPxSessionError unless frame_ciphertext.size == frame.size fmac_seed = egress_mac frame_ciphertext frame_mac = egress_mac(Utils.sxor(mac_enc(egress_mac[0,16]), fmac_seed[0,16]))[0,16] header_ciphertext + header_mac + frame_ciphertext + frame_mac end def decrypt_header(data) raise RLPxSessionError, 'not ready' unless ready? raise ArgumentError, 'invalid data length' unless data.size == 32 header_ciphertext = data[0,16] header_mac = data[16,16] expected_header_mac = ingress_mac(Utils.sxor(mac_enc(ingress_mac[0,16]), header_ciphertext))[0,16] raise AuthenticationError, 'invalid header mac' unless expected_header_mac == header_mac aes_dec header_ciphertext end def decrypt_body(data, body_size) raise RLPxSessionError, 'not ready' unless ready? read_size = Utils.ceil16 body_size raise FormatError, 'insufficient body length' unless data.size >= read_size + 16 frame_ciphertext = data[0, read_size] frame_mac = data[read_size, 16] raise RLPxSessionError, 'invalid frame mac length' unless frame_mac.size == 16 fmac_seed = ingress_mac frame_ciphertext expected_frame_mac = ingress_mac(Utils.sxor(mac_enc(ingress_mac[0,16]), fmac_seed[0,16]))[0,16] raise AuthenticationError, 'invalid frame mac' unless expected_frame_mac == frame_mac aes_dec(frame_ciphertext)[0,body_size] end def decrypt(data) header = decrypt_header data[0,32] body_size = Frame.decode_body_size header len = 32 + Utils.ceil16(body_size) + 16 raise FormatError, 'insufficient body length' unless data.size >= len frame = decrypt_body data[32..-1], body_size {header: header, frame: frame, bytes_read: len} end ### Handshake Auth Message Handling ## # 1. initiator generates ecdhe-random and nonce and creates auth # 2. initiator connects to remote and sends auth # # New: # # E(remote-pubk, # S(ephemeral-privk, ecdh-shared-secret ^ nonce) || # H(ephemeral-pubk) || pubk || nonce || 0x0 # ) # # Known: # # E(remote-pubk, # S(ephemeral-privk, token ^ nonce) || # H(ephemeral-pubk) || pubk || nonce || 0x1 # ) # def create_auth_message(remote_pubkey, ephemeral_privkey=nil, nonce=nil) raise RLPxSessionError, 'must be initiator' unless initiator? raise InvalidKeyError, 'invalid remote pubkey' unless Crypto::ECCx.valid_key?(remote_pubkey) @remote_pubkey = remote_pubkey token = @ecc.get_ecdh_key remote_pubkey flag = 0x0 @initiator_nonce = nonce || Crypto.keccak256(Utils.int_to_big_endian(SecureRandom.random_number(TT256))) raise RLPxSessionError, 'invalid nonce length' unless @initiator_nonce.size == 32 token_xor_nonce = Utils.sxor token, @initiator_nonce raise RLPxSessionError, 'invalid token xor nonce length' unless token_xor_nonce.size == 32 ephemeral_pubkey = @ephemeral_ecc.raw_pubkey raise InvalidKeyError, 'invalid ephemeral pubkey' unless ephemeral_pubkey.size == 512 / 8 && Crypto::ECCx.valid_key?(ephemeral_pubkey) sig = @ephemeral_ecc.sign token_xor_nonce raise RLPxSessionError, 'invalid signature' unless sig.size == 65 auth_message = "#{sig}#{Crypto.keccak256(ephemeral_pubkey)}#{@ecc.raw_pubkey}#{@initiator_nonce}#{flag.chr}" raise RLPxSessionError, 'invalid auth message length' unless auth_message.size == 194 auth_message end def encrypt_auth_message(auth_message, remote_pubkey=nil) raise RLPxSessionError, 'must be initiator' unless initiator? remote_pubkey ||= @remote_pubkey @auth_init = @ecc.ecies_encrypt auth_message, remote_pubkey raise RLPxSessionError, 'invalid encrypted auth message length' unless @auth_init.size == 307 @auth_init end ## # 3. optionally, remote decrypts and verifies auth (checks that recovery of # signature == H(ephemeral-pubk)) # 4. remote generates authAck from remote-ephemeral-pubk and nonce (authAck # = authRecipient handshake) # # optional: remote derives secrets and preemptively sends # protocol-handshake (steps 9,11,8,10) # def decode_authentication(ciphertext) raise RLPxSessionError, 'must not be initiator' if initiator? raise ArgumentError, 'invalid ciphertext length' unless ciphertext.size >= 307 result = nil begin result = decode_auth_plain ciphertext rescue AuthenticationError result = decode_auth_eip8 ciphertext @got_eip8_auth = true end size, sig, initiator_pubkey, nonce, version = result @auth_init = ciphertext[0, size] token = @ecc.get_ecdh_key initiator_pubkey @remote_ephemeral_pubkey = Crypto.ecdsa_recover(Utils.sxor(token, nonce), sig) raise InvalidKeyError, 'invalid remote ephemeral pubkey' unless Crypto::ECCx.valid_key?(@remote_ephemeral_pubkey) @initiator_nonce = nonce @remote_pubkey = initiator_pubkey @remote_version = version ciphertext[size..-1] end ### Handshake ack message handling ## # authRecipient = E(remote-pubk, remote-ephemeral-pubk || nonce || 0x1) // token found # authRecipient = E(remote-pubk, remote-ephemeral-pubk || nonce || 0x0) // token not found # # nonce, ephemeral_pubkey, version are local # def create_auth_ack_message(ephemeral_pubkey=nil, nonce=nil, version=SUPPORTED_RLPX_VERSION, eip8=false) raise RLPxSessionError, 'must not be initiator' if initiator? ephemeral_pubkey = ephemeral_pubkey || @ephemeral_ecc.raw_pubkey @responder_nonce = nonce || Crypto.keccak256(Utils.int_to_big_endian(SecureRandom.random_number(TT256))) if eip8 || @got_eip8_auth msg = create_eip8_auth_ack_message ephemeral_pubkey, @responder_nonce, version raise RLPxSessionError, 'invalid msg size' unless msg.size > 97 else msg = "#{ephemeral_pubkey}#{@responder_nonce}\x00" raise RLPxSessionError, 'invalid msg size' unless msg.size == 97 end msg end def create_eip8_auth_ack_message(ephemeral_pubkey, nonce, version) data = RLP.encode [ephemeral_pubkey, nonce, version], sedes: eip8_ack_sedes pad = SecureRandom.random_bytes(SecureRandom.random_number(151)+100) # (100..150) random bytes "#{data}#{pad}" end def encrypt_auth_ack_message(ack_message, eip8=false, remote_pubkey=nil) raise RLPxSessionError, 'must not be initiator' if initiator? remote_pubkey ||= @remote_pubkey if eip8 || @got_eip8_auth # The EIP-8 version has an authenticated length prefix prefix = [ack_message.size + Crypto::ECIES::ENCRYPT_OVERHEAD_LENGTH].pack("S>") @auth_ack = "#{prefix}#{@ecc.ecies_encrypt(ack_message, remote_pubkey, prefix)}" else @auth_ack = @ecc.ecies_encrypt ack_message, remote_pubkey raise RLPxSessionError, 'invalid auth ack message length' unless @auth_ack.size == 210 end @auth_ack end def decode_auth_ack_message(ciphertext) raise RLPxSessionError, 'must be initiator' unless initiator? raise ArgumentError, 'invalid ciphertext length' unless ciphertext.size >= 210 result = nil begin result = decode_ack_plain ciphertext rescue AuthenticationError result = decode_ack_eip8 ciphertext @got_eip8_ack = true end size, ephemeral_pubkey, nonce, version = result @auth_ack = ciphertext[0,size] @remote_ephemeral_pubkey = ephemeral_pubkey[0,64] @responder_nonce = nonce @remote_version = version raise InvalidKeyError, 'invalid remote ephemeral pubkey' unless Crypto::ECCx.valid_key?(@remote_ephemeral_pubkey) ciphertext[size..-1] end ### Handshake Key Derivation def setup_cipher raise RLPxSessionError, 'missing responder nonce' unless @responder_nonce raise RLPxSessionError, 'missing initiator_nonce' unless @initiator_nonce raise RLPxSessionError, 'missing auth_init' unless @auth_init raise RLPxSessionError, 'missing auth_ack' unless @auth_ack raise RLPxSessionError, 'missing remote ephemeral pubkey' unless @remote_ephemeral_pubkey raise InvalidKeyError, 'invalid remote ephemeral pubkey' unless Crypto::ECCx.valid_key?(@remote_ephemeral_pubkey) # derive base secrets from ephemeral key agreement # ecdhe-shared-secret = ecdh.agree(ephemeral-privkey, remote-ephemeral-pubk) @ecdhe_shared_secret = @ephemeral_ecc.get_ecdh_key(@remote_ephemeral_pubkey) @shared_secret = Crypto.keccak256("#{@ecdhe_shared_secret}#{Crypto.keccak256(@responder_nonce + @initiator_nonce)}") @token = Crypto.keccak256 @shared_secret @aes_secret = Crypto.keccak256 "#{@ecdhe_shared_secret}#{@shared_secret}" @mac_secret = Crypto.keccak256 "#{@ecdhe_shared_secret}#{@aes_secret}" mac1 = keccak256 "#{Utils.sxor(@mac_secret, @responder_nonce)}#{@auth_init}" mac2 = keccak256 "#{Utils.sxor(@mac_secret, @initiator_nonce)}#{@auth_ack}" if initiator? @egress_mac, @ingress_mac = mac1, mac2 else @egress_mac, @ingress_mac = mac2, mac1 end iv = "\x00" * 16 @aes_enc = OpenSSL::Cipher.new(ENC_CIPHER).tap do |c| c.encrypt c.iv = iv c.key = @aes_secret end @aes_dec = OpenSSL::Cipher.new(ENC_CIPHER).tap do |c| c.decrypt c.iv = iv c.key = @aes_secret end @mac_enc = OpenSSL::Cipher.new(MAC_CIPHER).tap do |c| c.encrypt c.key = @mac_secret end @ready = true end ### Helpers def ready? @ready end def initiator? @is_initiator end def mac_enc(data) @mac_enc.update data end def aes_enc(data='') @aes_enc.update data end def aes_dec(data='') @aes_dec.update data end def egress_mac(data='') @egress_mac.update data return @egress_mac.digest end def ingress_mac(data='') @ingress_mac.update data return @ingress_mac.digest end private def keccak256(x) Digest::SHA3.new(256).tap {|d| d.update x } end ## # decode legacy pre-EIP-8 auth message format # def decode_auth_plain(ciphertext) message = begin @ecc.ecies_decrypt ciphertext[0,307] rescue raise AuthenticationError, $! end raise RLPxSessionError, 'invalid message length' unless message.size == 194 sig = message[0,65] pubkey = message[65+32,64] raise InvalidKeyError, 'invalid initiator pubkey' unless Crypto::ECCx.valid_key?(pubkey) nonce = message[65+32+64,32] flag = message[(65+32+64+32)..-1].ord raise RLPxSessionError, 'invalid flag' unless flag == 0 [307, sig, pubkey, nonce, 4] end ## # decode EIP-8 auth message format # def decode_auth_eip8(ciphertext) size = ciphertext[0,2].unpack('S>').first + 2 raise RLPxSessionError, 'invalid ciphertext size' unless ciphertext.size >= size message = begin @ecc.ecies_decrypt ciphertext[2...size], ciphertext[0,2] rescue raise AuthenticationError, $! end values = RLP.decode message, sedes: eip8_auth_sedes, strict: false raise RLPxSessionError, 'invalid values size' unless values.size >= 4 [size] + values[0,4] end ## # decode legacy pre-EIP-8 ack message format # def decode_ack_plain(ciphertext) message = begin @ecc.ecies_decrypt ciphertext[0,210] rescue raise AuthenticationError, $! end raise RLPxSessionError, 'invalid message length' unless message.size == 64+32+1 ephemeral_pubkey = message[0,64] nonce = message[64,32] known = message[-1].ord raise RLPxSessionError, 'invalid known byte' unless known == 0 [210, ephemeral_pubkey, nonce, 4] end ## # decode EIP-8 ack message format # def decode_ack_eip8(ciphertext) size = ciphertext[0,2].unpack('S>').first + 2 raise RLPxSessionError, 'invalid ciphertext length' unless ciphertext.size == size message = begin @ecc.ecies_decrypt(ciphertext[2...size], ciphertext[0,2]) rescue raise AuthenticationError, $! end values = RLP.decode message, sedes: eip8_ack_sedes, strict: false raise RLPxSessionError, 'invalid values length' unless values.size >= 3 [size] + values[0,3] end end end
{ "redpajama_set_name": "RedPajamaGithub" }
4,265
Ritsem, among other things has a hydroelectric plant(320MW,160m) which is located where the lake Sitasjaure falls into Akkajaure by a constructed tunnel(16 km made by:"Swedish state powerboard"Vattenfall""). It is located within Gällivare Municipality in Norrbotten County, Sweden. The location also has a camp used by the Sami people, and there is even a mountain cabin and Caravan camp run by the Svenska Turistföreningen. The cabin is mostly used by tourists who are traveling to/from Northern Padjelanta and Northern Sarek and are using the ferry (run by Svenska Turistföreningen) across Akkajaure. Ritsem is located near the Stora Sjöfallet National Park. There is a regular bus line between Ritsem and Gällivare during both summer and winter. Climate Ritsem has a subarctic climate that is significantly moderated by the North Atlantic Current outside of the nearby Norwegian coastline. As a result, summers are chilly and winters cold, but not severely cold when compared to areas on such northerly latitudes elsewhere in the world. Given its very high latitude, Ritsem sees a long midnight sun period in summer, whereas a shorter polar night period with significant twilight hours occurs in winter. Due to the low sun however, summers can see frost well inside the midnight sun period. Ritsem's all-time June cold record is lower than any other of the 100 stations featured in the national weather service's monthly reports. It does have to be taken into account that these records only date back to 1981. By the time Atlantic depressions set in during late autumn, temperatures are far milder in Ritsem than further east and even further south in Lapland. Days above freezing are common throughout November. The ensuing winters very seldom see temperatures fall below , unlike in the aforementioned areas. Even though the maritime air is strong during winter, precipitation in form of snow is normally not extreme in raw content, although large snowpacks form due to the lack of thaws. References External links Svenska Turistföreningen Populated places in Gällivare Municipality Lapland (Sweden)
{ "redpajama_set_name": "RedPajamaWikipedia" }
5,259
require 'spreadsheet' module StreetNames class Parser attr_reader :streets def initialize locale=LOCALE @locale = locale end def load_cities @streets ||= CITIES.each_value.map do |city| spreadsheet.worksheets[city].map {|parameters| Street.new parameters } end.inject(:+) end def save! db = StreetNames::Database.new @locale db.save! :streets => @streets.map(&:to_hash) end private def spreadsheet @spreadsheet ||= Spreadsheet.open("./data/cyprus_postcode_dir_#{@locale}.xls") end end end
{ "redpajama_set_name": "RedPajamaGithub" }
8,710
Q: Extracting values from arrays in custom fields I'm trying to come up with a single array of all values in specific custom fields. The values themselves are also arrays. I've tried all sorts of array functions but haven't come across the right one or the right combination. Here is my code thus far: $args = array( 'post_type' => 'match_report', 'post_status' => 'publish', 'meta_query' => array( 'relation' => 'OR', array( 'key' => 'report_home-scorers' ), array( 'key' => 'report_away-scorers' ) ) ); $reportscore = new WP_Query($args); $scorersResults = array(); if ( $reportscore->have_posts() ) { while ( $reportscore->have_posts() ) { $reportscore->the_post(); $homescorers = get_post_meta($post->ID,'report_home-scorers',false); $awayscorers = get_post_meta($post->ID,'report_away-scorers',false); foreach ($homescorers as $homescorer){ array_push($scorersResults, $homescorer); } foreach ($awayscorers as $awayscorer){ array_push($scorersResults, $awayscorer); } ?> <?php } wp_reset_postdata(); //endif }//endwhile $scorerResults = remove_empty($scorersResults); function remove_empty($array) { return array_filter($array, '_remove_empty_internal'); } function _remove_empty_internal($value) { return !empty($value) || $value === 0; } Here what I get if I print_r($scorerResults); : Array ( [1] => Array ( [0] => 1 [1] => 63 ) [2] => Array ( [0] => 263 [1] => 195 ) [3] => Array ( [0] => ) [4] => Array ( [0] => ) ) I just want the values in the internal arrays in an array. A: Assuming you want the $scoreResults array to end up as array(1,63,263,195) you could use the array_reduce function like this: function gatherScores($lhs, $rhs) { foreach ($rhs as $key => $value) if ($value) $lhs[] = $value; return $lhs; } $scorerResults = array_reduce($scorerResults, "gatherScores", array()); I'm not sure what the blank values are in your third and fourth arrays and how they should be handled, so you may need to change the if ($value) condition to check for something different. As it stands it'll obviously also filter out zero scores.
{ "redpajama_set_name": "RedPajamaStackExchange" }
1,432
Goals To Promote The Relations Between Semantics And Other Disciplines. To Teach The Basic Concepts Of Semantics. To Teach Stagnant And Dynamic Semantics Topics. To Teach The Characteristics Of Turkish In Terms Of Semantics. Contents After evaluating tenors, giving informations about the tenors of Turkish. Generallly in the context of static and progressive tenors, the features of Turkish tenors and tenor changings will be taught with the examples. 2 To Know How Language And Literature Are Used As A Material in Education And Training And To Make Effort To Protect And Develop This Base. 1 Semantics-Definition,History, Content read the course material to be processed. 2 Language System,Static Semantics Word Semantics, Conceptualization read the course material to be processed. 3 Semiotic and The Studies In This Field. read the course material to be processed. 4 Concept Field, Meaning Decisive And Analyzer read the course material to be processed. 5 Semantic text analysis read the course material to be processed. 6 Basic Meaning, Designs, Emotional Values read the course material to be processed. 7 Connotation, Meaning transference read the course material to be processed. 8 Idiom Transference Noun Transference read the course material to be processed. 10 Polysemy , Homonym, Context read the course material to be processed. 11 Reconcilement, Lexical And Apparent In The Semantics read the course material to be processed. 12 Dynamic Semantics, Extension, Restriction,change of Semantics, Euphemism read the course material to be processed. 13 Characteristics Of Turkish In Terms Of Sentence Semantics read the course material to be processed. 14 Characteristics Of Turkish In Terms Of Sentence Semantics read the course material to be processed. Additional Resources Doğan AKSAN, Anlambilim Konuları ve Türkçenin Anlambilim Konuları, Engin Yayınları, Ankara 1999. Doğan AKSAN, Her Yönüyle Dil Ana Çizgileriyle Dilbilim, TDK, Ankara 2003 Mehmet RİFAT, Dilbilim ve Göstergebilimin Çağdaş Kuramları, Düzlem Yayınları, İstanbul 1990.
{ "redpajama_set_name": "RedPajamaC4" }
513
With the sad news this week about the death of Alphonza Watson in Baltimore which brought the number of transgender women of color in the US killed in the first three months up to 8 now, the story of CeCe McDonald takes on an even greater significance. A compelling new documentary from Jacqueline Gares doesn't just tell what brought CeCe to national attention, but it also focuses on the plight and dangers that trans-women face on a daily basis. In 2011, Cece and three of her friends were attacked in the street by 4 people who had started off making racist and transphobic taunts and then one of the women attacked CeCe in the face with a broken glass causing a large bleeding gash. After this one of the men came after CeCe and tried to attack her, and so she took a pair of scissors out of her purse and turned around to face him, and he was stabbed in the chest and died from the wound. From the word go, the Minneapolis authorities refused to accept either that CeCe had been defending herself, or that she was in fact the victim of a hate crime. They charged her with murder, but after an enormous public outcry that spread globally, CeCe was offered a plea bargain to second-class manslaughter which she was coerced to accept and for which she was jailed for 41 months. Made to serve out her time in a mens prison, and for a large part of the sentence, CeCe was put in solitary confinement. Her supporters never eased up on their campaigning and by this time they included the transgender actress and LGBT advocate Laverne Cox (who also acted as an Executive Producer for this documentary) who was there to greet CeCe on her release and to help propel her to the next part of her life. The second part of the movie starts with the background story of CeCe's upbringing and family which would have been much useful for us to help understand her more if we have learnt all this earlier. The reunion with her mother and also her siblings was, like most of this story, was highly emotional but still odd that none of them had featured in the campaign to get justice for CeCe. Over the next few years we see an uneducated CeCe develop into an articulate spokesperson for trans women of color as the community looked up to her as an example that they wanted to aspire too. CeCe was the rare one of their number who hadn't been killed when she was attacked, but she stood up for herself and fought back and survived. As she finds herself in demand as activist and a motivational speaker, we get to learn of the real risks that trans-women, particular those of color, have to deal with on a daily basis. Even if we had an idea about these before hand, seeing and hearing about them first hand by members of the very community, is both a shocking and sobering experience. The second part of the movie lacks some clarity and direction, but it's hard to fault a documentary that covers such a highly emotional subject, and anyway it makes up for it in part with some excellent interviews like that with the iconic 1960's activist Angela Davis. You may need a box of tissues when you watch this one.
{ "redpajama_set_name": "RedPajamaC4" }
2,358
{"url":"https:\/\/web2.0calc.com\/questions\/geometry-question_94882","text":"+0\n\n# Geometry Question\n\n0\n54\n2\n\nThe tangent to the circumcircle of triangle WXY at X is drawn, and the line through W that is parallel to this tangent intersects XY at Z\u00a0If XY=14 and WX=6 find YZ.\n\nJun 16, 2022\n\n#1\n+9458\n+2\n\nLet P be the point on the tangent at the bottom of the image.\n\nNote that\u00a0\\(\\angle PXZ = \\angle XZW\\)\u00a0since they are alternate angles of the pair of parallel lines.\n\nAlso,\u00a0\\(\\angle PXZ = \\angle XWY\\)\u00a0since they are angles in alternate segments.\n\nTherefore\u00a0\\(\\angle XZW = \\angle XWY\\). Also,\u00a0\\(\\angle ZXW = \\angle WXY\\)\u00a0since they are the same angle.\n\nBy AA postulate,\u00a0\\(\\triangle XZW \\sim \\triangle XWY\\).\n\nLet YZ = t. Then by similar triangles,\u00a0\\(\\dfrac{XZ}{XW} = \\dfrac{XW}{XY}\\). i.e.,\u00a0\\(\\dfrac{14 - t}{6} = \\dfrac{6}{14}\\).\n\nCan you take it from here?\n\nJun 16, 2022\n#2\n+2\n\nThanks for the help!\n\nGuest\u00a0Jun 16, 2022","date":"2022-08-15 04:41:17","metadata":"{\"extraction_info\": {\"found_math\": false, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 0, \"mathjax_display_tex\": 0, \"mathjax_asciimath\": 0, \"img_math\": 0, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.9134083986282349, \"perplexity\": 3012.523106021675}, \"config\": {\"markdown_headings\": true, \"markdown_code\": true, \"boilerplate_config\": {\"ratio_threshold\": 0.18, \"absolute_threshold\": 10, \"end_threshold\": 15, \"enable\": true}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2022-33\/segments\/1659882572127.33\/warc\/CC-MAIN-20220815024523-20220815054523-00384.warc.gz\"}"}
null
null
Q: how to rotate .eps file I have a problem with rotation of .eps files for my dissertation. Initially, I thought it was a problem during conversion of .pdf to .eps. I tried the conversion in several ways: using Adobe Acrobat 9 Pro in Windows, in Linux the following commands: inkscape input.pdf --export-eps=output.eps and pdftops -eps file.pdf. All methods give good .eps files, but when I try to rotate (90 degree rotation) them in Latex, nothing works. I used \includegraphics[width=6.0 in,angle=90], also \special{ps: gsave -90 rotate}\......\special{ps: grestore }, and some other methods but with no luck. Any solutions (Windows, Linux, Mac) will be appreciated. A: From the Latex Wikibooks page: The package rotating gives you the possibility to rotate any object of an arbitrary angle. Once you have loaded it with the standard command in the preamble: \usepackage{rotating} you can use three new environments: \begin{sideways} %... \end{sideways} it will rotate the whole argument by 90 degrees counterclockwise. Moreover: \begin{turn}{30} %... \end{turn} it will turn the argument of 30 degrees. You can give any angle as an argument, whether it is positive or negative. It will leave the necessary space to avoid any overlapping of text. \begin{rotate}{30} %... \end{rotate} like turn, but it will not add any extra space. Also, note the warning: Many DVI viewers do not support rotating of text and tables. The text will be displayed normally. You must convert your DVI file to a PDF document and view it in a PDF viewer to see the rotation in effect. Take care however that printing from those PDF files may rotate the respective page again in the same direction under certain circumstances. This behaviour can be influenced by the settings of your dvi2pdf converter, look at your manual for further information. A: Make sure you have loaded the graphicx package not graphics then \includegraphics[width=6.0in,angle=90]{file} should work. Note if it is an EPS file then you need latex (and it may not show rotated in a dvi previewer) if you are using pdflatex you should convert the EPS to pdf first (or if I read your question correctly, just use the original pdf not the EPS).
{ "redpajama_set_name": "RedPajamaStackExchange" }
6,857
//--- // // License: MIT // Author: David Burken // Description: Interface for Kakadu compressor. // //--- // $Id$ #ifndef ossimKakaduCompressorInterface_HEADER #define ossimKakaduCompressorInterface_HEADER 1 #include <ossim/base/ossimConstants.h> #include <ossim/base/ossimIosFwd.h> #include <ossim/base/ossimRefPtr.h> class ossimImageData; class ossimIpt; class ossimIrect; class ossimNitfJ2klraTag; class ossimProperty; /** * @class GeoPackage writer interface. * * This interface is for using the ossimKakaduCompressor outside of the * kakadu plugin. */ class OSSIM_DLL ossimKakaduCompressorInterface { public: // Matches static "COMPRESSION_QUALITY" string array in .cpp. enum ossimKakaduCompressionQuality { // Prefixed with OKP for OSSIM Kakadu Plugin to avoid clashes. OKP_UNKNOWN = 0, OKP_USER_DEFINED = 1, OKP_NUMERICALLY_LOSSLESS = 2, OKP_VISUALLY_LOSSLESS = 3, OKP_LOSSY = 4, OKP_LOSSY2 = 5, OKP_LOSSY3 = 6, OKP_EPJE = 7, // Exploitation Preferred J2K Encoding }; /** * GP: I had to add this or windows would not link with the latest * compiler. Also had to put in dot.cpp for debug mode(again windows). * (drb) */ ossimKakaduCompressorInterface(); /** * @brief Create method. * @param os Stream to write to. * @param scalar Scalar type of source tiles to be fed to compressor. * @param bands Number of bands in source tiles to be fed to compressor. * @param imageRect The image rectangle. * @param tileSize The size of a tile. * @param tilesTileWrite The number of tiles to be written. * If zero, the tlm marker segment will not be used. * @param jp2 If true jp2 header and jp2 geotiff block will be written out. * @note Throws ossimException on error. */ virtual void create(ossim::ostream* os, ossimScalarType scalar, ossim_uint32 bands, const ossimIrect& imageRect, const ossimIpt& tileSize, ossim_uint32 tilesToWrite, bool jp2) = 0; /** * @brief Write tile method. * * Writes tiles stream provided to create method. Note that tiles should * be fed to compressor in left to right, top to bottom order. * * @param srcTile The source tile to write. * * @return true on success, false on error. */ virtual bool writeTile(ossimImageData& srcTile) = 0; /** * @brief Finish method. Every call to "create" should be matched by a * "finish". Note the destructor calls finish. */ virtual void finish() = 0; /** * Set the writer to add an alpha channel to the output. * * @param flag true to create an alpha channel. */ virtual void setAlphaChannelFlag( bool flag ) = 0; /** * @brief Sets the number of levels. * * This must be positive and at least 1. * Default = 5 ( r0 - r5 ) * * @param levels Levels to set. */ virtual void setLevels(ossim_int32 levels) = 0; /** * Will set the property whose name matches the argument * "property->getName()". * * @param property Object containing property to set. * * @return true if property was consumed, false if not. */ virtual bool setProperty(ossimRefPtr<ossimProperty> property) = 0; /** * @brief Sets the quality type. * * Type enumerations: * OKP_UNKNOWN = 0, * OKP_USER_DEFINED = 1, * OKP_NUMERICALLY_LOSSLESS = 2, * OKP_VISUALLY_LOSSLESS = 3, * OKP_EPJE = 4 * * @param type See enumeration for types. */ virtual void setQualityType(ossimKakaduCompressionQuality type) = 0; }; #endif /* End of "#ifndef ossimKakaduCompressorInterface_HEADER" */
{ "redpajama_set_name": "RedPajamaGithub" }
1,175
Q: How to rate limit ajax requests? My user interface is currently wide open. Particularly, there are some elements, each of which can be deleted separately by the user. If the user hits the delete button repeatedly, an ajax request will be fired repeatedly. Is rate limiting a standard practice that I should implement or is it OK to give the user wide open access to this? A: You could group user requests in a queue. Then, check that queue from time to time for new requests to send. So, the user interface will append actions to execute and you would be able to control how often you send them. You could prevent an action from being appended if it already is in the queue. Also, this way you could modify your code to accept a list of actions to execute. This is a general description that could be implemented in JavaScript using functions such as setTimeout. A: First of all, this is part client issue, part server issue. Some standard solution is to: * *adjust the interface to not allow the user to submit specific action too often (do it in JS eg. to disable abili to submit request to delete one thing twice), *rate limiting on the server is usually not necessary, but could be useful, Take StackOverflow as an example: when you downvote an answer, you are not able to downvote it again, and when you are eg. submitting comments, you need to wait couple seconds between submissions. As far as errors are concerned... You may be hitting one of several categories of problems. For example: * *connectivity issues (lack of connection, wonky connection, or very slow connection), *internal client limitation (like number of concurrent requests has reached maximum allowed), *other, server-side limitations (rate limiting, requests blocking each other etc.),
{ "redpajama_set_name": "RedPajamaStackExchange" }
3,045
{"url":"https:\/\/ltwork.net\/i-m-sorry-but-i-can-t-changewe-ain-t-aimin-for-your-body--13450554","text":"# I'm sorry, but I can't changeWe ain't aimin' for your body, shots hits your brainWe come from poverty, man, we ain't have\n\n###### Question:\n\nI'm sorry, but I can't change We ain't aimin' for your body, shots hits your brain\nWe come from poverty, man, we ain't have a thing\nIt's a lot of animosity, but they won't say my name\nThem killers rock with me, lil' n*gga, don't get banged\n'Cause they'll do the job for me while I hop on a plane\n\n### You are going to a dinner whith three (3) friends, one who likes steak, another wine, and the third is a vegetarian (which is\n\nYou are going to a dinner whith three (3) friends, one who likes steak, another wine, and the third is a vegetarian (which is assumed to be the least expensive). Which is true? a. How the bill is shared has no effect on what and how much people choose to eat b. The vegetarian will be better off with...\n\n### Mein a forest, lynx prey on rodents and birds in the summer. but because of rising temperatures, the\n\nMein a forest, lynx prey on rodents and birds in the summer. but because of rising temperatures, the birds in the forest have migrated to a cooler place. what effect will this migration have on the population of the rodents? because there are fewer birds, the lynx will prey on rodents, leading to ...\n\n### What is introduction???\u200b\n\nWhat is introduction???\u200b...\n\n### A number with three digits will open up this lock. These clues will help you find it before the turkey burnshard as a rock.Drawing\n\nA number with three digits will open up this lock. These clues will help you find it before the turkey burns hard as a rock. Drawing a number line might help you too, Enter the number below when you are through My number has ones, tenths, and hundredths Rounding to the nearest whole number, you g...\n\n### The following table shows the probability distribution for a discrete random variable. | X P(X 12 0.07 15 0.21 17 0.17 20 0.25\n\nThe following table shows the probability distribution for a discrete random variable. | X P(X 12 0.07 15 0.21 17 0.17 20 0.25 22 0.05 24 | 25 | 30 0.04 0.13 0.08 an The mean of the discrete random variable X is 19.59. What is the variarice of X? Round your answer to the nearest hundredth....\n\n### Which is an example of volume?\n\nWhich is an example of volume?...\n\n### The temporal lobe is largely responsible for , whereas the frontal lobe is largely responsible for . a. vision; socially appropriate\n\nThe temporal lobe is largely responsible for , whereas the frontal lobe is largely responsible for . a. vision; socially appropriate behavior b. socially appropriate behavior; vision c. hearing; breathing and heartrate d. hearing; planning abilities...\n\n### Anais bought 2 1\/2 yards of ribbon. she had 1 foot 6 inches of ribbon left after trimming some curtains.\n\nAnais bought 2 1\/2 yards of ribbon. she had 1 foot 6 inches of ribbon left after trimming some curtains. how many inches of ribbon did anais use to trim the curtains?...\n\n### Why might you see more monarch butterflies in California in the winter\u200b\n\nWhy might you see more monarch butterflies in California in the winter\u200b $Why might you see more monarch butterflies in California in the winter\u200b$...\n\n### Where did Claude Monet paint many of his pictures?o in Poland and Englando in a studioo in the gardens\n\nWhere did Claude Monet paint many of his pictures? o in Poland and England o in a studio o in the gardens at Giverny...\n\n### In \u201cThe Treasure of Lemon Brown\u201d by Walter Dean Myers, Lemon Brown is a homeless man who used to be a blues singer. Which\n\nIn \u201cThe Treasure of Lemon Brown\u201d by Walter Dean Myers, Lemon Brown is a homeless man who used to be a blues singer. Which dialogue from the story best develops his character? \u201cLemon Brown,\u201d the old man said, pulling back his shoulders as he did so, \u201cthey used to call me Sweet Lemon Brow...\n\n### Anita helps kepil into passive voice\u200b\n\nAnita helps kepil into passive voice\u200b...\n\n### Phenols are characterized a) their behavior as gases b) ether linkages c) an \u2014oh group on a benzene\n\nPhenols are characterized a) their behavior as gases b) ether linkages c) an \u2014oh group on a benzene ring d) their use of flavoring agents...\n\n### During combustion reactions, explain why the energy of the reactants must exceed the total energy of the products.\n\nDuring combustion reactions, explain why the energy of the reactants must exceed the total energy of the products....\n\n### What is the area of triangle DEF? Triangle D E F has a base of 42 centimeters and a height of 28 centimeters. The other sides\n\nWhat is the area of triangle DEF? Triangle D E F has a base of 42 centimeters and a height of 28 centimeters. The other sides have lengths of 35 centimeters. 294 square centimeters 490 square centimeters 588 square centimeters 735 square centimeters...\n\n### Which resources does the national park service manage? check all that apply. -seashores -monuments -memorials -wildlife\n\nWhich resources does the national park service manage? check all that apply. -seashores -monuments -memorials -wildlife refuges -ecosystems -endangered species...\n\n### Your response will include\u20262 parts that answer the following:Why do cells divide?How do surface area and volume factor\n\nYour response will include\u2026 2 parts that answer the following: Why do cells divide? How do surface area and volume factor into the cell\u2019s need to divide? Proper grammar with accurate punctuation, spelling, and complete sentences. At least 3-5 sentences. I need a short answer...","date":"2023-03-31 00:05:42","metadata":"{\"extraction_info\": {\"found_math\": true, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 2, \"mathjax_display_tex\": 0, \"mathjax_asciimath\": 0, \"img_math\": 0, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.27740615606307983, \"perplexity\": 4205.795682035434}, \"config\": {\"markdown_headings\": true, \"markdown_code\": true, \"boilerplate_config\": {\"ratio_threshold\": 0.18, \"absolute_threshold\": 10, \"end_threshold\": 15, \"enable\": true}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2023-14\/segments\/1679296949506.62\/warc\/CC-MAIN-20230330225648-20230331015648-00158.warc.gz\"}"}
null
null
Q: findDOMNode is deprecated in StrictMode how to use refs instead Hi all Im just trying to get my head around using Refs to target elements in my components during router transitions. currently The onEnter, onExit and addEndListener events from React Transition Group already give you access to the DOM node you're animating. Which was fine for a while but now as you may already know you get the error. index.js:1 Warning: findDOMNode is deprecated in StrictMode. findDOMNode was passed an instance of Transition which is inside StrictMode. Instead, add a ref directly to the element you want to reference. Learn more about using refs safely [1] here is my code for App.js import React from 'react'; import { BrowserRouter as Router, Route } from 'react-router-dom'; import { CSSTransition } from 'react-transition-group'; import { gsap } from 'gsap'; import Header from './tools/header'; import About from './pages/about'; import Home from './pages/home'; const routes = [ { path: '/', name: 'Home', Component: Home }, { path: '/about', name: 'About', Component: About }, ] function Routeapp() { const nodeRef = React.useRef(null); const onEnter = (node) => { console.log(node) gsap.from( [node.children[0].firstElementChild, node.children[0].lastElementChild], { duration: 0.6, y: 30, delay: 0.6, ease: 'power3.inOut', opacity: 0, stagger: { amount: 0.3, }, } ); }; const onExit = node => { gsap.to( [node.children[0].firstElementChild, node.children[0].lastElementChild], { duration: 0.6, y: -30, ease: 'power3.inOut', opacity: 0, stagger: { amount: 0.15, }, } ); }; return ( <Router> <Header /> <div className="container"> {routes.map(({ path, Component }) => ( <Route key={path} exact path={path}> {({ match }) => ( <CSSTransition in={match != null} key={path} timeout={1200} classNames="page" onEnter={onEnter} onExit={onExit} unmountOnExit={true} > <div className="page" ref={nodeRef} > <Component /> </div> </CSSTransition> )} </Route> ))} </div> </Router> ); } export default Routeapp; Home.js import React from 'react'; import Title from '../tools/title'; const Home = () => { return ( <div className="inner"> <Title lineContent="this is the" lineContent2="Home page" /> <div className={'infoBox'}> <p className="info">hello mel and welcome</p> </div> </div> ); }; export default Home; about.js import React from 'react'; import Title from '../tools/title'; const About = () => { return ( <div className="inner"> <Title lineContent={'this is the'} lineContent2={'About page'} /> <div className={'infoBox'}> <p className="info pink"> Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum. </p> </div> </div> ); }; export default About; My issue is that I am trying to find a way to 'Ref' my 'Home' and 'About' components so that I can not only animate them but possible add different tweens to the 'onExit' and 'onEnter props if possible. I have tried to 'Ref' the components directly by trying this in app.js: return ( <Router> <Header /> <div className="container"> {routes.map(({ path, Component }) => ( <Route key={path} exact path={path}> {({ match }) => ( <CSSTransition in={match != null} key={path} nodeRef={nodeRef} timeout={1200} classNames="page" onEnter={onEnter} onExit={onExit} unmountOnExit={true} > <div className="page" ref={nodeRef} > <Component /> </div> </CSSTransition> )} </Route> ))} </div> </Router> ); as expected this causes my application to stop working since 'nodeRef' returns false and When nodeRef prop is used, node is not passed to callback functions (e.g. onEnter) because user already has direct access to the node. So I just need a new way of doing this now for future reference, any insights or ideas will be most welcomed. thanks A: So I just want to give a shout out to @Slbox who inspired me to dig deeper and relook at the problem. Disclaimer I am not an expert or professional Programmer in javascript and I by no means suggest that this is the only way of doing this, my presentation should be taken in an abstract fashion. My thoughts only explain the theoretical premises for which the solution is based on and implementation of this will depend upon your own architecture. Finding the node 'findDOMNode' So in React Strict mode 'FindDomNode is being depreciated and a 'Ref' friendly approached is now being favoured when you are wanting to refer to an element on your page. Like so many I was getting that pesky error message that pops up an tells you that 'findDOMNode has been depreciated in Strict Mode'. Use Case (why where you having problems) In React Router I had created a simple page transition using the combination of 'CSSTransition from 'react-transition-group and the Javascript based animation platform 'GSAP'. the issue that I was having was I having used a DOM node approach in referencing elements to the preferred way in react. 1. Restructure the app component // So the App now has the routes contained inside each component in order for it // to work and add additional functions and flexibility. import React from 'react'; import { BrowserRouter as Router } from 'react-router-dom'; import './route.scss'; import Header from './tools/header'; import About from './pages/about'; import Home from './pages/home'; function Routeapp() { return ( <Router> <Header /> <div className="container"> <Home /> <!-- routes and funcs --> <About /> <!-- routes and funcs --> </div> </Router> ); } export default Routeapp; 2. The home / about components import React, {useRef} from 'react'; import Title from './title'; import { CSSTransition } from 'react-transition-group'; import { Route} from 'react-router-dom'; import {gsap} from "gsap"; const Home = () => { // These two Refs are needed to refer to elements that we will be animating const title = useRef(null) const info = useRef(null) // This Ref will be used to make reference to the page of each component. // My understanding is that this Ref will be used to distinguish between each // component that is using 'CSSTransition' component and also removes the // 'findDOMNode' warning const nodeRef = useRef(null) // This function is called immediately after the 'enter' // or 'appear' class is applied from CSSTransition component. const onEnter = () => { gsap.from( [title.current,info.current], { duration: 0.6, y: 30, delay: 0.6, ease: 'power3.inOut', opacity: 0, stagger: { amount: 0.3, }, } ); }; // This function is called immediately after the 'exit' // class is applied from CSSTransition component. const onExit = () => { gsap.to( [title.current,info.current], { duration: 0.6, y: -30, ease: 'power3.inOut', opacity: 0, stagger: { amount: 0.15, }, } ); }; return ( <Route exact path={'/'} children={({ match }) => ( <CSSTransition in={match != null} // time should not really be longer than the time it takes the animation // to leave the scene. timeout={1200} classNames={'page'} nodeRef={nodeRef} onEnter={onEnter} onExit={onExit} unmountOnExit > <div className={'page'} ref={nodeRef}> <div className="inner"> <Title forwardRef={title} lineContent="this is the" lineContent2="Home page" /> <div ref={info} className={'infoBox'}> <p className="info">hello stackOverflow and welcome</p> </div> </div> </div> </CSSTransition> )} /> ); }; export default Home; GSAP and React-Router EXAMPLE Conclusion This is my method of achieving this effect, but if there are better or alternative ways then please add to the discussion and share. A: the quick solution is : ./src/index.js file and change it from this: ReactDOM.render( <React.StrictMode> <App /> </React.StrictMode>, document.getElementById('root') ); to this: ReactDOM.render( <App /> document.getElementById('root') ); A: The answer by @W9914420 guided me to find a workaround to this issue. I would just add that from all the lines of code, the most relevant is: * *Declare an instance to a reference: const nodeRef = useRef(null) * *Inject that reference as a property into the component: <CSSTransition `` in={match != null} // time should not really be longer than the time it takes the animation // to leave the scene. timeout={1200} classNames={'page'} nodeRef={nodeRef} onEnter={onEnter} onExit={onExit} unmountOnExit > Thanks @W9914420 for the tip!
{ "redpajama_set_name": "RedPajamaStackExchange" }
1,180
package edu.ucsc.dbtune.metadata; import java.sql.SQLException; import java.util.ArrayList; import java.util.HashSet; import java.util.Iterator; import java.util.List; import java.util.Set; import edu.ucsc.dbtune.util.Objects; /** * Abstraction of the highest level entry in the metadata hierarchy. A catalog is a container of * Schema objects. * * @author Ivo Jimenez */ public class Catalog extends DatabaseObject implements Iterable<Schema> { /** * Creates a new catalog with the given name. * * @param name * name of the catalog */ public Catalog(String name) { super(name); } /** * Copy constructor. * * @param other * other catalog object */ public Catalog(Catalog other) { super(other); } /** * Convenience method that casts the object returned by {@link #findByQualifiedName}. * * @param pathToObject * fully qualified name of the new database object. * @return * object corresponding to the given fully qualified name; {@code null} if not found. * @throws SQLException * for the same reasons that {@link #findByQualifiedName} throws one * @throws java.lang.ClassCastException * if the {@link #findByQualifiedName} method returns an object whose type doesn't * correspond to the type given as parameter of the generic expression. * @see #findByQualifiedName * @param <T> * the object that is expected to be retrieved, i.e. the object type corresponding to the * given fully qualified name */ public final <T extends DatabaseObject> T findByName(String pathToObject) throws SQLException { return Objects.<T>as(findByQualifiedName(pathToObject)); } /** * Creates a database object identified by the given fully qualified name. Only leaf objects are * created. For example, if {@code 'schema_one.table_1.column_2'} is given and {@code 'table_1'} * doesn't exist, an exception will be thrown. * <p> * Client code is in charge of casting appropriately. The type of the object created is * determined by the implementation of the {@link #newContainee} method. * * @param pathToObject * fully qualified name of the new database object. * @return * the new database object * @throws SQLException * if the path (up to the object's parent) doesn't exist; if the container already has an * element with that name contained in it * @see #findByQualifiedName * @see #newContainee */ public final DatabaseObject createObject(String pathToObject) throws SQLException { DatabaseObject container; String[] pathElements; if (pathToObject.contains(".")) container = findByQualifiedName(pathToObject.substring(0, pathToObject.lastIndexOf("."))); else container = this; if (container == null) throw new SQLException("Can't find parent of new object in " + pathToObject); pathElements = pathToObject.split("\\."); return container.newContainee(pathElements[pathElements.length - 1]); } /** * Finds the schema whose name matches the given argument. Convenience method that accomplishes * what {@link #find} does but without requiring the user to cast. In other words, the following * is true {@code findSchema("name") == (Schema)find("name")}. * * @param name * name of the schema that is searched for in {@code this} catalog. * @return * the schema that has the given name; {@code null} if not found */ public Schema findSchema(String name) { return (Schema) find(name); } /** * Finds the index whose name matches the given argument, across all the schemas contained in * the catalog. If more than one index with the same name exists, this method makes no * guarantees on which gets returned, that is, this method returns the "first" to be found, * where "first" is ambiguous. * * @param name * name of the index that is searched for in {@code this} catalog. * @return * the index that has the given name; {@code null} if not found * @throws SQLException * when {@code name} is a fully qualified path, and there's an error searching by it * @see #findByQualifiedName */ public Index findIndex(String name) throws SQLException { if (name != null && name.contains("\\.")) return this.<Index>findByName(name); DatabaseObject dbo = null; for (Schema s : this) { dbo = s.find(name); if (dbo != null) break; } if (dbo instanceof Index) return (Index) dbo; return null; } /** * removes every index on every schema contained in the catalog. <b>important:</b> this DOESN'T * drop an index from an underlaying DBMS, since these objects reside in memory (as Index) * objects. In order to do so, refer to the {@link DatabaseSystem#dropIndex} method. * * @throws SQLException * if {@link Index#isMaterialized} is true for any index in the catalog. */ public void dropIndexes() throws SQLException { for (Schema sch : schemas()) for (Index idx : sch.indexes()) if (idx.isMaterialized()) throw new SQLException( "Can't drop materialized indexes; see DatabaseSystem#dropIndex"); else sch.remove(idx); Index.IN_MEMORY_ID.getAndSet(0); } /** * returns set of indexes defined across the whole database. * * @return * all the indexes contained in the catalog */ public Set<Index> indexes() { Set<Index> allIndexes = new HashSet<Index>(); for (Schema sch : schemas()) allIndexes.addAll(sch.indexes()); return allIndexes; } /** * returns the list of schemas that the catalog contains. * * @return * list of Schema objects */ @Override public Iterator<Schema> iterator() { return Objects.<Iterator<Schema>>as(containees.iterator()); } /** * returns the list of schemas that the catalog contains. * * @return * the schemas contained in the catalog */ public List<Schema> schemas() { return new ArrayList<Schema>(Objects.<List<Schema>>as(containees)); } /** * {@inheritDoc} */ @Override public DatabaseObject newContainee(String name) throws SQLException { return new Schema(this, name); } /** * {@inheritDoc} */ @Override public boolean isValid(DatabaseObject dbo) { return dbo instanceof Schema; } /** * {@inheritDoc} */ @Override public boolean equalsContent(Object other) { throw new RuntimeException("not implemented yet"); } }
{ "redpajama_set_name": "RedPajamaGithub" }
1,408
{"url":"https:\/\/www.ime.usp.br\/~egbirgin\/abstracts.html","text":"Mixed Integer Linear Programming and Constraint Programming Models for the Online Printing Shop Scheduling Problem\n\nW. T. Lunardi, E. G. Birgin, P. Laborie, D. P. Ronconi, and H. Voos\n\nSubmitted.\n\nAbstract: In this work, the online printing shop scheduling problem is considered. The problem, that appears in the nowadays printing industry, can be seen as an extended flexible job shop scheduling problem with several particularities such as operations' release times, operations' precedence constraints given by an arbitrary acyclic graph, partial overlapping among operations with precedence constraints, sequence-dependent setup times, fixed operations, and machines' unavailability periods. In the present work, mixed integer programming and constraint programming models for the minimization of the makespan are presented. Modeling the problem is twofold. On the one hand, the problem is precisely defined. On the other hand, small- and medium-sized instances are optimally solved. Extensive numerical experiments show the capabilities and limitations of a commercial software for solving the models.\n\nKeywords: Flexible job shop scheduling, Mixed integer linear programming, Constraint programming.\n\nFull text: [pdf]\n\nOn the solution of linearly constrained optimization problems by means of barrier algorithms\n\nE. G. Birgin, J. L. Gardenghi, J. M. Mart\u00ednez, and S. A. Santos\n\nSubmitted.\n\nAbstract: Many practical problems require the solution of large-scale constrained optimization problems for which preserving feasibility is a key issue and the evaluation of the objective function is very expensive. In these cases it is mandatory to start with a feasible approximation of the solution, the obtention of which should not require objective function evaluations. The necessity of solving this type of problems motivated us to revisit the classical barrier approach for nonlinear optimization, providing a careful implementation of a modern version of this method. This is the main objective of the present paper. For completeness, we provide global convergence results and comparative numerical experiments with one of the state-of-the-art interior-point solvers for continuous optimization.\n\nKeywords: Linearly constrained optimization, feasible barrier methods, convergence, numerical experiments.\n\nFull text: [pdf]\n\nOn constrained optimization with nonconvex regularization\n\nE. G. Birgin, J. M. Mart\u00ednez, and A. Ramos\n\nSubmitted.\n\nAbstract: In many engineering applications it is necessary to minimize smooth functions plus penalty (or regularization) terms that violate smoothness and convexity. Specific algorithms for this type of problems are available in recent literature. Here a smooth reformulation is proposed and equivalence with the original problem is proved both from the point of view of global and local optimization. Moreover, for the cases in which the objective function is much more expensive than the constraints, model-intensive algorithms, accompanied by their convergence and complexity theories, are introduced. Finally, numerical experiments are presented.\n\nKeywords: Constrained non-Lipschitz nonsmooth optimization, complexity analysis, optimality conditions.\n\nFull text: [pdf]\n\nComplexity and performance of an Augmented Lagrangian algorithm\n\nE. G. Birgin and J. M. Mart\u00ednez\n\nSubmitted.\n\nAbstract: Algencan is a well established safeguarded Augmented Lagrangian algorithm introduced in [R. Andreani, E. G. Birgin, J. M. Mart\u00ednez and M. L. Schuverdt, On Augmented Lagrangian methods with general lower-level constraints, SIAM Journal on Optimization 18, pp. 1286-1309, 2008]. Complexity results that report its worst-case behavior in terms of iterations and evaluations of functions and derivatives that are necessary to obtain suitable stopping criteria are presented in this work. In addition, the computational performance of a new version of the method is presented, which shows that the updated software is a useful tool for solving large-scale constrained optimization problems.\n\nKeywords: Nonlinear programming, Augmented Lagrangian methods, complexity, numerical experiments.\n\nFull text: [pdf]\n\nOn the complexity of solving feasibility problems with quadratically regularized models\n\nE. G. Birgin, L. F. Bueno, and J. M. Mart\u00ednez\n\nSubmitted.\n\nAbstract: The complexity of solving feasibility problems is considered in this work. It is assumed that the constraints that define the problem can be divided into two sets, namely, expensive and cheap constraints. It is also assumed that the set of solutions of the cheap constraints is non-empty and bounded and that minimizing a quadratic function subject to the cheap constraints is an affordable task. At each iteration, the introduced method minimizes a two-norm regularized quadratic approximation of the sum of squares of the expensive constraints subject to the cheap constraints. Under a H\\\"older continuity property with constant $\\beta \\in (0,1]$ on the gradients of the expensive constraints, it is shown that finding a feasible point with precision~$\\varepsilon > 0$ or an infeasible point that is stationary with tolerance~$\\gamma > 0$ of minimizing the Euclidean norm of the expensive constraints residual subject to the cheap constraints has iterations complexity~$O\\left(|\\log(\\varepsilon)| \\; \\gamma^{-(1+\\beta)\/\\beta} \\; \\varepsilon^{(\\beta-1)\/(2\\beta)}\\right)$ and evaluations complexity (of the expensive constraints) $O\\left(|\\log(\\varepsilon)|\\left[ \\gamma^{-(1+\\beta)\/\\beta} \\varepsilon^{(\\beta-1)\/(2\\beta)}+ ((1-\\beta)\/\\beta) | \\log(\\gamma \\sqrt{\\varepsilon})| \\right] \\right)$. When the gradients of the expensive constraints satisfy a Lipschitz condition, both complexities reduce to $O(|\\log(\\varepsilon)| \\gamma^{-2})$. Still under the H\\\"older continuity property on the gradients of the expensive constraints, and under a stronger regularity assumption with constant~$\\kappa$, that avoids KKT points of minimizing the sum of squares of the expensive constraints subject to the cheap constraints of being infeasible, the iterations complexity is shown to be $O\\left(|\\log(\\varepsilon)| \\; \\kappa^{-(1+\\beta)\/\\beta} \\; \\varepsilon^{(\\beta-1)\/(2\\beta)}\\right)$ while the evaluation complexity is given by $O\\left(|\\log(\\varepsilon)|\\left[ \\kappa^{-(1+\\beta)\/\\beta} \\varepsilon^{(\\beta-1)\/(2\\beta)}+ ((1-\\beta)\/\\beta) |\\log(\\kappa \\sqrt{\\varepsilon})| \\right] \\right)$. When the gradients of the expensive constraints satisfy a Lipschitz condition, both complexities reduce to $O(|\\log(\\varepsilon)| \\kappa^{-2})$. The results introduced in the present work complement, by analyzing the case $p=1$, the results obtained for $p$ even in [C. Cartis, N. I. M. Gould, and Ph. L. Toint, Improved worst-case evaluation complexity for potentially rank-deficient nonlinear least-Euclidean-norm problems using higher-order regularized models, Technical Report NA 15-17, University of Oxford, 2015], where~$p$ is the order of the underlying $(p+1)$-regularized Taylor's model of the sum of squares of the expensive constraints.\n\nKeywords: Complexity, feasibility problem, first order methods.\n\nFull text: [pdf]\n\nAn Augmented Lagrangian algorithm for nonlinear semidefinite programming applied to the covering problem\n\nE. G. Birgin, W. G\u00f3mez, G. Haeser, L. M. Mito, and D. S. Viana\n\nComputational and Applied Mathematics, to appear.\n\nAbstract: In this work we present an Augmented Lagrangian algorithm for nonlinear semidefinite problems (NLSDPs), which is a natural extension of its consolidated counterpart in nonlinear programming. This method works with two levels of constraints; one that is penalized and other that is kept within the subproblems. This is done in order to allow exploiting the subproblem structure while solving it. The global convergence theory is based on recent results regarding approximate Karush-Kuhn-Tucker optimality conditions for NLSDPs, which are stronger than the usually employed Fritz John optimality conditions. Additionally, we approach the problem of covering a given object with a fixed number of balls with a minimum radius, where we exploit some convex algebraic geometry tools, such as Stengle's Positivstellensatz and its variations, which allows for a much more general model. Preliminary numerical experiments are presented.\n\nKeywords: Augmented Lagrangian, Nonlinear Semidefinite Programming, Covering Problem, Convex Algebraic Geometry.\n\nFull text: [pdf]\n\nA filtered beam search method for the m-machine permutation flowshop scheduling problem minimizing the earliness and tardiness penalties and the waiting time of the jobs\n\nE. G. Birgin, J. E. Ferreira, and D. P. Ronconi\n\nComputers & Operations Research, to appear.\n\nAbstract: This paper addresses the minimization of the absolute deviation of job completion times from a common due date in a flowshop scheduling problem. Besides this main objective, the minimization of the waiting time of the jobs in the production environment is also considered. Initially, a mixed integer programming model for this problem is proposed and, due to its complexity, heuristic approaches are developed. A list-scheduling algorithm for the approached problem is introduced. Moreover, a filtered beam search method that explores specific characteristics of the considered environment is proposed. Numerical experiments show that the presented methods can be successfully applied to this problem.\n\nKeywords: Scheduling, flowshop, earliness and tardiness, common due date, waiting time, heuristics, beam search.\n\nFull text: [pdf]\n\nThe multiperiod two-dimensional non-guillotine cutting stock problem with usable leftovers\n\nE. G. Birgin, O. C. Rom\u00e3o, and D. P. Ronconi\n\nInternational Transactions in Operational Research, to appear.\n\nAbstract: A mixed integer linear programming model for the two-dimensional non-guillotine cutting problem with usable leftovers was recently introduced in Andrade et al. [Journal of the Operational Research Society 65, pp. 1649-1663, 2014]. The problem consists in cutting a set of ordered items using a set of objects of minimum cost and, within the set of solutions of minimum cost, maximizing the value of the usable leftovers. Since the concept of usable leftovers assumes they can potentially be used to attend new arriving orders, the problem is extended to the multiperiod framework in this work. In this way, the decision at each instant does not minimize in a myopic way the cost of the objects required to attend the orders of the current instant; but it aims to minimize the overall cost of the objects up to the considered time horizon. Some variants of the proposed model are analyzed and numerical results are presented.\n\nKeywords: Two-dimensional cutting with usable leftovers, MIP models, non-guillotine cutting and packing, multiperiod scenario.\n\nFull text: [pdf]\n\nOn the use of third-order models with fourth-order regularization for unconstrained optimization\n\nE. G. Birgin, J. L. Gardenghi, J. M. Mart\u00ednez, and S. A. Santos\n\nOptimization Letters, to appear.\n\nAbstract: In a recent paper [E. G. Birgin, J. L. Gardenghi, J. M. Mart\u00ednez, S. A. Santos, and Ph. L. Toint, Worst-case evaluation complexity for unconstrained nonlinear optimization using high-order regularized models, Mathematical Programming 163(1), 359-368, 2017], it was shown that, for the smooth unconstrained optimization problem, worst-case evaluation complexity $O(\\epsilon^{-(p+1)\/p})$ may be obtained by means of algorithms that employ sequential approximate minimizations of $p$-th order Taylor models plus $(p+1)$-th order regularization terms. The aforementioned result, which assumes Lipschitz continuity of the $p$-th partial derivatives, generalizes the case $p=2$, known since 2006, which has already motivated efficient implementations. The present paper addresses the issue of defining a reliable algorithm for the case $p=3$. With that purpose, we propose a specific algorithm and we show numerical experiments.\n\nKeywords: Unconstrained minimization, third-order models, regularization, complexity.\n\nFull text: [pdf]\n\nModels for the two-dimensional rectangular single large placement problem with guillotine cuts and constrained pattern\n\nM. P. Martins, E. G. Birgin, R. D. Lobato, R. Morabito, and P. Munari\n\nInternational Transactions in Operational Research Vol. 27 No. 2 (March 2020), pages 767-793.\n\nAbstract: In this paper, we address the Constrained Two-dimensional Rectangular Guillotine Single Large Placement Problem (2D R CG SLOPP). This problem involves cutting a rectangular object to produce smaller rectangular items from orthogonal guillotine cuts.In addition, there is an upper limit on the number of copies that can be produced of each item type. To model this problem, we propose a new compact integer non-linear programming (INLP) formulation and obtain an equivalent integer linear programming (ILP) formulation from it. Additionally, we developed a procedure to reduce the numbers of variables and constraints of the ILP formulation, without loss of optimality. From the ILP formulation, we derive two new compact models for particular cases of the 2D R CG SLOPP, which consider only 2-staged or 1-group patterns. Finally, as a specific solution method for the 2D R CG SLOPP, we apply Benders decomposition to the proposed ILP formulation and develop a branch-and-Benders-cut algorithm. All proposed approaches are evaluated through computational experiments using benchmark instances and compared with other formulations available in the literature. The results show that the new formulations are appropriate in scenarios characterized by few item types that are large with respect to the objecti's dimensions.\n\nKeywords: Cutting and packing problems, Constrained two-dimensional guillotine cuts, Integer programming models, branch-and-Benders-cut algorithm.\n\nFull text: [pdf]\n\nIteration and evaluation complexity for the minimization of functions whose computation is intrinsically inexact\n\nE. G. Birgin, N. Krejic, and J. M. Mart\u00ednez\n\nMathematics of Computations Vol. 89 No. 321 (January 2020), pages 253-278.\n\nAbstract: In many cases in which one wishes to minimize a complicated or expensive function, it is convenient to employ cheap approximations, at least when the current approximation to the solution is far from the solution. Adequate strategies for deciding the accuracy desired at each stage of optimization are crucial for the global convergence and overall efficiency of the process. A recently introduced procedure [E. G. Birgin, N. Kreji\u0107, and J. M. Mart\u00ednez, On the employment of Inexact Restoration for the minimization of functions whose evaluation is subject to errors, Mathematics of Computation 87, pp. 1307-1326, 2018] based on Inexact Restoration is revisited, modified, and analyzed from the point of view of worst-case evaluation complexity in this work.\n\nKeywords: Inexact Restoration, global convergence, worst-case evaluation complexity.\n\nFull text: [pdf]\n\nA Newton-like method with mixed factorizations and cubic regularization for unconstrained minimization\n\nE. G. Birgin and J. M. Mart\u00ednez\n\nComputational Optimization and Applications Vol. 73 No. 3 (July 2019), pages 707-753.\n\nAbstract: A Newton-like method for unconstrained minimization is introduced in the present work. While the computer work per iteration of the best-known implementations may need several factorizations per iteration or may use rather expensive matrix decompositions, the proposed method uses a single cheap factorization per iteration. Convergence and complexity and results, even in the case in which the subproblems' Hessians are far from being Hessians of the objective function, are presented. Moreover, when the Hessian is Lipschitz-continuous, the proposed method enjoys $O(\\varepsilon^{-3\/2})$ evaluation complexity for first-order optimality and $O(\\varepsilon^{-3})$ for second-order optimality as other recently introduced Newton method for unconstrained optimization based on cubic regularization or special trust-region procedures. Fairly successful and fully reproducible numerical experiments are presented and the developed corresponding software is freely available.\n\nKeywords: Smooth unconstrained minimization, Bunch-Parlett-Kaufman factorizations, regularization, Newton-type methods.\n\nFull text: [pdf]\n\nA matheuristic approach with nonlinear subproblems for large-scale packing of ellipsoids\n\nE. G. Birgin and R. D. Lobato\n\nEuropean Journal of Operational Research Vol 272 No. 2 (January 2019), pages 447-464.\n\nAbstract: The problem of packing ellipsoids in the three-dimensional space is considered in the present work. The proposed approach combines heuristic techniques with the resolution of recently introduced nonlinear programming models in order to construct solutions with a large number of ellipsoids. The introduced approach is able to pack identical and non-identical ellipsoids within a variety of containers. Moreover, it allows the inclusion of additional positioning constraints. This fact makes the proposed approach suitable for constructing large-scale solutions with specific positioning constraints in which density may not be the main issue. Numerical experiments illustrate that the introduced approach delivers good quality solutions with a computational cost that scales linearly with the number of ellipsoids; and solutions with more than a million ellipsoids are exhibited.\n\nKeywords: Packing, ellipsoids, nonlinear programming, algorithms, matheuristic.\n\nFull text: [pdf]\n\nOn regularization and active-set methods with complexity for constrained optimization\n\nE. G. Birgin and J. M. Mart\u00ednez\n\nSIAM Journal on Optimization Vol 28 No. 2 (May 2018), pages 1367-1395.\n\nAbstract: The main objective of this research is to introduce a practical method for smooth bound-constrained optimization that possesses worst-case evaluation complexity $O(\\varepsilon^{-3\/2})$ for finding an $\\varepsilon$-approximate first-order stationary point when the Hessian of the objective function is Lipschitz-continuous. As other well established algorithms for optimization with box constraints, the algorithm proceeds visiting the different faces of the domain aiming to reduce the norm of an internal projected gradient and abandoning active constraints when no additional progress is expected in the current face. The introduced method emerges as a particular case of a method for minimization with linear constraints. Moreover, the linearly-constrained minimization algorithm is an instance of a minimization algorithm with general constraints whose implementation may be unaffordable when the constraints are complicated. As a procedure for leaving faces, it is employed a different method that may be regarded as an independent device for constrained optimization. Such independent algorithm may be employed to solve linearly-constrained optimization problem on its own, without relying on the active-set strategy. A careful implementation and numerical experiments shows that the algorithm that combines active sets with leaving-face iterations is more effective than the independent algorithm on which leaving-face iterations are based, although both exhibits similar complexities $O(\\varepsilon^{-3\/2})$.\n\nKeywords: Nonlinear programming, bound-constrained minimization, active-set strategies, regularization, complexity.\n\nFull text: [pdf]\n\nOn the employment of Inexact Restoration for the minimization of functions whose evaluation is subject to errors\n\nE. G. Birgin, N. Krejic, and J. M. Mart\u00ednez\n\nMathematics of Computation Vol. 87 No. 311 (May 2018), pages 1307-1326.\n\nAbstract: Inexact Restoration is a well established technique for continuous minimization problems with constraints. Recently, it has been used by Krejic and Mart\u00ednez for optimization of functions whose evaluation is necessarily inexact and comes from an iterative process. This technique will be generalized in the present paper and it will be applied to stochastic optimization and related problems. New convergence results will be given and numerical results will be presented.\n\nKeywords: Inexact Restoration, stochastic programming, global convergence, numerical experiments.\n\nFull text: [pdf]\n\nAugmented Lagrangians with constrained subproblems and convergence to second-order stationary points\n\nE. G. Birgin, G. Haeser, and A. Ramos\n\nComputational Optimization and Applications Vol. 69 No. 1 (January 2018), pages 51-75.\n\nAbstract: Augmented Lagrangian methods with convergence to second-order stationary points in which any constraint can be penalized or carried out to the subproblems are considered in this work. The resolution of each subproblem can be done by any numerical algorithm able to return approximate second-order stationary points. The developed global convergence theory is stronger than the ones known for current algorithms with convergence to second-order points in the sense that, besides the flexibility introduced by the general lower-level approach, it includes a loose requirement for the resolution of subproblems. The proposed approach relies on a weak constraint qualification, that allows Lagrange multipliers to be unbounded at the solution. It is also shown that second-order resolution of subproblems increases the chances of finding a feasible point, in the sense that limit points are second-order stationary for the problem of minimizing the squared infeasibility. The applicability of the proposed method is illustrated in numerical examples with ball-constrained subproblems.\n\nKeywords: Augmented Lagrangian methods, nonlinear programming, second-order stationary points, algorithms.\n\nFull text: [pdf]\n\nOn the minimization of possibly discontinuous functions by means of pointwise approximations\n\nE. G. Birgin, N. Krejic, and J. M. Mart\u00ednez\n\nOptimization Letters Vol. 11 No. 8 (December 2017), pages 1623-1637.\n\nAbstract: A general approach for the solution of possibly discontinuous optimization problems by means of pointwise (perhaps smooth) approximations will be proposed. It will be proved that sequences generated by pointwise approximation techniques eventually satisfy well justified stopping criteria. Numerical examples will be given.\n\nKeywords:Discontinuous functions, pointwise approximations, smoothing, minimization.\n\nFull text: [pdf]\n\nA nonlinear programming model with implicit variables for packing ellipsoids\n\nE. G. Birgin, R. D. Lobato, and J. M. Mart\u00ednez\n\nJournal of Global Optimization Vol. 68 No. 3 (July 2017), pages 467-499.\n\nAbstract: The problem of packing ellipsoids is considered in the present work. Usually, the computational effort associated with numerical optimization methods devoted to packing ellipsoids grows quadratically with respect to the number of ellipsoids being packed. The reason is that the number of variables and constraints of ellipsoids' packing models is associated with the requirement that every pair of ellipsoids must not overlap. As a consequence, it is hard to solve the problem when the number of ellipsoids is large. In this paper, we present a nonlinear programming model for packing ellipsoids that contains a linear number of variables and constraints. The proposed model finds its basis in a transformation-based non-overlapping model recently introduced by Birgin, Lobato, and Mart\u00ednez [Journal of Global Optimization (2015), DOI: 10.1007\/s10898-015-0395-z]. Numerical experiments show the efficiency and effectiveness of the proposed model.\n\nKeywords: Cutting and packing ellipsoids, optimization, nonlinear programming, models, numerical experiments.\n\nFull text: [pdf]\n\nThe use of quadratic regularization with a cubic descent condition for unconstrained optimization\n\nE. G. Birgin and J. M. Mart\u00ednez\n\nSIAM Journal on Optimization Vol. 27 No. 2 (June 2017), pages 1049-1074.\n\nAbstract: Cubic-regularization and trust-region methods with worst-case first-order complexity $O(\\varepsilon^{-3\/2})$ and worst-case second-order complexity $O(\\varepsilon^{-3})$ have been developed in the last few years. In this paper it is proved that the same complexities are achieved by means of a quadratic-regularization method with a cubic sufficient-descent condition instead of the more usual predicted-reduction based descent. Asymptotic convergence and order of convergence results are also presented. Finally, some numerical experiments comparing the new algorithm with a well-established quadratic regularization method are shown.\n\nKeywords: Nonlinear programming, unconstrained minimization, quadratic regularization, cubic descent, complexity.\n\nFull text: [pdf]\n\nWorst-case evaluation complexity for unconstrained nonlinear optimization using high-order regularized models\n\nE. G. Birgin, J. L. Gardenghi, J. M. Mart\u00ednez, S. A. Santos, and Ph. L. Toint\n\nMathematical Programming Vol. 163 No. 1 (May 2017), pages 359-368.\n\nAbstract: The worst-case evaluation complexity for smooth (possibly nonconvex) unconstrained optimization is considered. It is shown that, if one is willing to use derivatives of the objective function up to order $p$ (for $p \\geq 1$) and to assume Lipschitz continuity of the $p$-th derivative, then an $\\epsilon$-approximate first-order critical point can be computed in at most $O(\\epsilon^{-(p+1)\/p})$ evaluations of the problem's objective function and its derivatives. This generalizes and subsumes results known for $p = 1$ and $p = 2$.\n\nKeywords: Unconstrained minimization, worst-case complexity.\n\nFull text: [pdf]\n\nSequential equality-constrained optimization for nonlinear programming\n\nE. G. Birgin, L. F. Bueno, and J. M. Mart\u00ednez\n\nComputational Optimization and Applications Vol. 65 No. 3 (December 2016), pages 699-721.\n\nAbstract: A new method is proposed for solving optimization problems with equality constraints and bounds on the variables. In the spirit of Sequential Quadratic Programming and Sequential Linearly-Constrained Programming, the new method approximately solves, at each iteration, an equality-constrained optimization problem. The bound constraints are handled in outer iterations by means of an Augmented Lagrangian scheme. Global convergence of the method follows from well-established non-linear programming theories. Numerical experiments are presented.\n\nKeywords:Nonlinear programming, Sequential Equality-Constrained Optimization, Augmented Lagrangian, numerical experiments.\n\nFull text: [pdf]\n\nConstrained optimization with integer and continuous variables using inexact restoration and projected gradients\n\nE. G. Birgin, R. D. Lobato, and J. M. Mart\u00ednez\n\nBulletin of Computational Applied Mathematics Vol. 4 No. 2 (2016), pages 55-70.\n\nAbstract: Inexact restoration (IR) is a well established technique for continuous minimization prob- lems with constraints that can be applied to constrained optimization problems with specific structures. When some variables are restricted to be integer, an IR strategy seems to be appropriate. The IR strategy employs a restoration procedure in which one solves a standard nonlinear programming problem and an optimization procedure in which the constraints are linearized and techniques for mixed-integer (linear or quadratic) programming can be em- ployed.\n\nKeywords: Inexact restoration, mixed-integer nonlinear programming (MINLP), projected gradients.\n\nFull text: [pdf]\n\nPacking ellipsoids by nonlinear optimization\n\nE. G. Birgin, R. D. Lobato, and J. M. Mart\u00ednez\n\nJournal of Global Optimization Vol. 65 No. 4 (August 2016), pages 709-743.\n\nAbstract: In this paper, continuous and dierentiable nonlinear programming models and algorithms for packing ellipsoids in the n-dimensional space are introduced. Two dierent models for the non-overlapping and models for the inclusion of ellipsoids within half-spaces and ellipsoids are presented. By applying a simple multi-start strategy combined with a clever choice of starting guesses and a nonlinear programming local solver, illustrative numerical experiments are presented.\n\nKeywords: Cutting and packing ellipsoids, nonlinear programming, models, numerical experiments.\n\nFull text: [pdf]\n\nEvaluation complexity for nonlinear constrained optimization using unscaled KKT conditions and high-order models\n\nE. G. Birgin, J. L. Gardenghi, J. M. Mart\u00ednez, S. A. Santos, and Ph. L. Toint\n\nSIAM Journal on Optimization Vol. 26 No. 2 (April, 2016), pages 951-967.\n\nAbstract: The evaluation complexity of general nonlinear, possibly nonconvex, constrained optimization is analyzed. It is shown that, under suitable smoothness conditions, an $\\epsilon$-approximate first-order critical point of the problem can be computed in order $O(\\epsilon^{1-2(p+1)\/p})$ evaluations of the problem's function and their first p derivatives. This is achieved by using a two-phases algorithm inspired by Cartis, Gould, and Toint [8, 11]. It is also shown that strong guarantees (in terms of handling degeneracies) on the possible limit points of the sequence of iterates generated by this algorithm can be obtained at the cost of increased complexity. At variance with previous results, the -approximate first-order criticality is defined by satisfying a version of the KKT conditions with an accuracy that does not depend on the size of the Lagrange multipliers.\n\nKeywords: Nonlinear programming, complexity, approximate KKT point.\n\nFull text: [pdf]\n\nOn the application of an Augmented Lagrangian algorithm to some portfolio problems\n\nE. G. Birgin and J. M. Mart\u00ednez\n\nEURO Journal on Computational Optimization Vol. 4 No. 1 (February 2016), pages 79-92.\n\nAbstract: Algencan is a freely available piece of software that aims to solve smooth large-scale constrained optimization problems. When applied to specific problems, obtaining a good performance in terms of efficacy and efficiency may depend on careful choices of options and parameters. In the present paper the application of Algencan to four portfolio optimization problems is discussed and numerical results are presented and evaluated.\n\nKeywords: Constrained optimization, Augmented Lagrangian, Portfolios, Generalized Order-Value Optimization, Conditional Value-at-Risk.\n\nFull text: [pdf]\n\nApplications of nonlinear programming to packing problems\n\nE. G. Birgin\n\nin Applications + Practical Conceptualization + Mathematics = fruitful Innovation, Proceedings of the Forum of Mathematics for Industry 2014, R. S. Anderssen, P. Broadbridge, Y. Fukumoto, K. Kajiwara, T. Takagi, E. Verbitskiy, and M. Wakayama (Eds.), Springer Series Mathematics for Industry 11, pp. 31-39, 2016.\n\nAbstract: The problem of packing items within bounded regions in the Euclidean space has multiple applications in a variety of areas, such as, Physics, Chemistry, and Engineering. Problems of this type exhibit various levels of complexity. Nonlinear programming formulations and methods had been successfully applied to a wide range of packing problems. In this review paper, a brief description of the state-of-the-art and an illustrated overview of packing nonlinear programming techniques and applications will be presented.\n\nFull text: [pdf]\n\nTwo-stage two-dimensional guillotine cutting stock problems with usable leftovers\n\nR. Andrade, E. G. Birgin, and R. Morabito\n\nInternational Transactions in Operational Research Vol. 23 No. 1-2 (January-March, 2016), pages 121-145.\n\nAbstract: In this study we are concerned with the non-exact two-stage two-dimensional guillotine cutting problem considering usable leftovers, in which stock plates remainders of the cutting patterns (non-used material or trim loss) can be used in the future, if they are large enough to fulfill future demands of items (ordered smaller plates). This cutting problem can be characterized as a residual bin-packing problem because of the possibility of creating new residual pieces, as the trim loss of each cutting\/packing pattern does not necessarily represent waste of material and, depending on its size, it can be put back into stock. Two bilevel mathematical programming models to represent this non-exact two-stage two-dimensional residual bin-packing problem are presented. The models basically consist on cutting\/packing the ordered items using a set of plates of minimum cost and, among all possible solutions of minimum cost, choosing one that maximizes the value of the generated usable leftovers. Because of special characteristics of these bilevel models, they can be reformulated as one-level mixed integer programming models. Results of some numerical experiments are presented to show that the models represent appropriately the problem and to illustrate their performances.\n\nKeywords: Two-stage two-dimensional guillotine cutting, residual bin-packing problem, bilevel programming, MIP models, leftovers.\n\nFull text: [pdf]\n\nAn inner-outer nonlinear programming approach for constrained quadratic matrix model updating\n\nM. Andretta, E. G. Birgin, and M. Raydan\n\nMechanical Systems and Signal Processing Vol. 66-67 (January, 2016), pages 78-88.\n\nAbstract: The Quadratic Finite Element Model Updating Problem (QFEMUP) concerns with updating a symmetric second-order finite element model so that it remains symmetric and the updated model reproduces a given set of desired eigenvalues and eigenvectors by replacing the corresponding ones from the original model. Taking advantage of the special structure of the constraint set, it is first shown that the QFEMUP can be formulated as a suitable constrained nonlinear programming problem. Using this formulation, a method based on successive optimizations is then proposed and analyzed. To avoid that spurious modes (eigenvectors) appear in the frequency range of interest (eigenvalues) after the model has been updated, additional constraints based on a quadratic Rayleigh quotient are dynamically included in the constraint set. A distinct practical feature of the proposed method is that it is implementable computing only a few eigenvalues and eigenvectors of the associated quadratic matrix pencil. The results of our numerical experiments on illustrative problems show that the algorithm works well in practice.\n\nFull text: [pdf]\n\nList scheduling and beam search methods for an extended version of the flexible job shop scheduling problem\n\nE. G. Birgin, J. E. Ferreira, and D. P. Ronconi\n\nEuropean Journal of Operational Research, Vol. 247 No. 2 (December, 2015), pages 421-440.\n\nAbstract: An extended version of the flexible job shop problem is tackled in this work. The considered extension to the classical flexible job shop problem allows the precedences between the operations to be given by an arbitrary directed acyclic graph instead of a linear order. Therefore, the problem consists of allocating the operations to the machines and sequencing them in compliance with the given precedences. The goal in the present work is the minimization of the makespan. A list scheduling algorithm is introduced and its natural extension to a beam search method is proposed. Numerical experiments assess the efficiency of the proposed approaches.\n\nKeywords: Scheduling, flexible job shop, makespan, list scheduling, beam search.\n\nFull text: [pdf]\n\nOptimality properties of an Augmented Lagrangian method on infeasible problems\n\nE. G. Birgin, J. M. Mart\u00ednez, and L. F. Prudente\n\nComputational Optimization and Applications, Vol. 60 No. 3 (August, 2015), pages 609-631.\n\nAbstract: Sometimes, the feasible set of an optimization problem that one aims to solve using a Nonlinear Programming algorithm is empty. In this case, two characteristics of the algorithm are desirable. On the one hand, the algorithm should converge to a minimizer of some infeasibility measure. On the other hand, one may wish to find a point with minimal infeasibility for which some optimality condition, with respect to the objective function, holds. Ideally, the algorithm should converge to a minimizer of the objective function subject to minimal infeasibility. In this paper the behavior of an Augmented Lagrangian algorithm with respect to those properties will be studied.\n\nKeywords:Nonlinear Programming, infeasible domains, Augmented Lagrangians, algorithms, numerical experiments.\n\nFull text: [pdf]\n\nAssessing the reliability of general-purpose Inexact Restoration methods\n\nE. G. Birgin, L. F. Bueno, and J. M. Mart\u00ednez\n\nJournal of Computational and Applied Mathematics, Vol. 282 (July 2015), pages 1-16.\n\nAbstract: Inexact Restoration methods have been proved to be effective to solve constrained optimization problems in which some structure of the feasible set induces a natural way of recovering feasibility from arbitrary infeasible points. Sometimes natural ways of dealing with minimization over tangent approximations of the feasible set are also employed. A recent paper [N. Banihashemi and C. Y. Kaya, Inexact Restoration for Euler discretization of box-constrained optimal control problems, Journal of Optimization Theory and Applications 156, pp. 726--760, 2013] suggests that the Inexact Restoration approach can be competitive with well-established nonlinear programming solvers when applied to certain control problems without any problem-oriented procedure for restoring feasibility. This result motivated us to revisit the idea of designing general-purpose Inexact Restoration methods, especially for large-scale problems. In this paper we introduce an affordable algorithm of Inexact Restoration type for solving arbitrary nonlinear programming problems and we perform the first experiments that aim to assess its reliability.\n\nKeywords:Nonlinear programming, Inexact Restoration, numerical experiments.\n\nFull text: [pdf]\n\nMetaheuristics for large-scale instances of the linear ordering problem\n\nC. S. Sakuraba, D. P. Ronconi, E. G. Birgin, and M. Yagiura\n\nExpert Systems with Applications, Vol. 42 No. 9 (June, 2015), pages 4432-4442.\n\nAbstract: This paper presents iterated local search and great deluge trajectory metaheuristics for the linear ordering problem (LOP). Both metaheuristics are based on the TREE local search method introduced in Sakuraba and Yagiura, 2010 (Efficient local search algorithms for the linear ordering problem, International Transactions in Operational Research 17, pp. 711-737) that is the only method ever applied to a set of large-sized instances that are in line with the scale of nowadays real applications. By providing diversification and intensification features, the introduced methods improve all best known solutions of the large-sized instances set. Extensive numerical experiments show that the introduced methods are capable of tackling sparse and dense large-scale instances with up to 8,000 vertices and 31,996,000 edges in a reasonable amount of time; while they also performs well in practice when compared with other state-of-the-art methods in a benchmark with small and medium-scale instances.\n\nKeywords:Metaheuristics, iterated local search, great deluge, linear ordering problem, large-scale instances.\n\nFull text: [pdf]\n\nMIP models for two-dimensional non-guillotine cutting problems with usable leftovers\n\nR. Andrade, E. G. Birgin, R. Morabito, and D. P. Ronconi\n\nJournal of the Operational Research Society, Vol. 65 No. 11 (November , 2014), pages 1649-1663.\n\nAbstract: In this study we deal with the two-dimensional non-guillotine cutting problem of how to cut a set of rectangular objects with known sizes and quantities to exactly produce a set of rectangular items with specified sizes and demands to be fulfilled. We are concerned with the special case of the problem in which the non-used material of the cutting patterns (objects leftovers) may be used in the future, if it is large enough to fulfill future items demands. Therefore, the problem is seen as a two-dimensional non-guillotine cutting\/packing problem with usable leftovers, also known in the literature as a two-dimensional residual bin-packing problem. We use multilevel mathematical programming models to represent appropriately the problem, which basically consists on cutting the ordered items using a set of objects of minimum cost, among all possible solutions of minimum cost, choosing one that maximizes the value of the usable leftovers, and, among them, selecting one that minimizes the number of usable leftovers. Because of special characteristics of these multilevel models, they can be reformulated as one-level mixed integer programming (MIP) models. Illustrative numerical examples are presented and analysed.\n\nKeywords: Two-dimensional cutting with usable leftovers, MIP models, non-guillotine cutting and packing, multilevel mathematical programming, residual bin-packing problem.\n\nFull text: [pdf]\n\nSpectral Projected Gradient methods: Review and Perspectives\n\nE. G. Birgin, J. M. Mart\u00ednez, and M. Raydan\n\nJournal of Statistical Software, Vol. 60 No. 3 (September, 2014), http:\/\/www.jstatsoft.org\/v60\/i03.\n\nAbstract: Over the last two decades, it has been observed that using the gradient vector as a search direction in large-scale optimization may lead to efficient algorithms. The effectiveness relies on choosing the step lengths according to novel ideas that are related to the spectrum of the underlying local Hessian rather than related to the standard decrease in the objective function. A review of these so-called spectral projected gradient methods for convex constrained optimization is presented. To illustrate the performance of these low-cost schemes, an optimization problem on the set of positive definite matrices is described.\n\nKeywords: Spectral Projected Gradient methods, nonmonotone line search, large scale problems, convex constrained problems.\n\nFull text: [pdf]\n\nA MILP model for an extended version of the Flexible Job Shop Problem\n\nE. G. Birgin, P. Feofiloff, C. G. Fernandes, E. L. de Melo, M. T. I. Oshiro, and D. P. Ronconi\n\nOptimization Letters, Vol. 8 No. 4 (April, 2014), pages 1417-1431.\n\nAbstract: A MILP model for an extended version of the Flexible Job Shop Scheduling problem is proposed. The extension allows the precedences between operations of a job to be given by an arbitrary directed acyclic graph rather than a linear order. The goal is the minimization of the makespan. Theoretical and practical advantages of the proposed model are discussed. Numerical experiments show the performance of a commercial exact solver when applied to the proposed model. The new model is also compared with a simple extension of the model described by Ozguven, Ozbakir, and Yavuz (Mathematical models for job-shop scheduling problems with routing and process plan flexibility, Applied Mathematical Modelling, 34:1539--1548, 2010), using instances from the literature and instances inspired by real data from the printing industry.\n\nKeywords: Scheduling, Flexible Job Shop, MIP models.\n\nFull text: [pdf]\n\nAugmented Lagrangians with possible infeasibility and finite termination for global nonlinear programming\n\nE. G. Birgin, J. M. Mart\u00ednez, and L. F. Prudente\n\nJournal of Global Optimization, Vol. 58 No. 2 (February, 2014), pages 207-242.\n\nAbstract: In a recent paper, Birgin, Floudas and Mart\u00ednez introduced an augmented Lagrangian method for global optimization. In their approach, augmented Lagrangian subproblems are solved using the alphaBB method and convergence to global minimizers was obtained assuming feasibility of the original problem. In the present research, the algorithm mentioned above will be improved in several crucial aspects. On the one hand, feasibility of the problem will not be required. Possible infeasibility will be detected in finite time by the new algorithms and optimal infeasibility results will be proved. On the other hand, finite termination results that guarantee optimality and\/or feasibility up to any required precision will be provided. An adaptive modification in which subproblem tolerances depend on current feasibility and complementarity will also be given. The adaptive algorithm allows the augmented Lagrangian subproblems to be solved without requiring unnecessary potentially high precisions in the intermediate steps of the method, which improves the overall efficiency. Experiments showing how the new algorithms and results are related to practical computations will be given.\n\nKeywords: Deterministic global optimization, augmented Lagrangians, nonlinear programming, algorithms, numerical experiments.\n\nFull text: [pdf]\n\nPacking circles within ellipses\n\nE. G. Birgin, L. H. Bustamante, H. F. Callisaya, and J. M. Mart\u00ednez\n\nInternational Transactions in Operational Research, Vol. 20 No. 3 (May, 2013), pages 365-389.\n\nAbstract: The problem of packing circles within ellipses is considered in the present paper. A new ellipse-based system of coordinates is introduced by means of which a closed formula to compute the distance of an arbitrary point to the boundary of an ellipse exists. Nonlinear programming models for some variants of 2D and 3D packing problems involving circular items and elliptical objects are given. The resulting models are medium-sized highly nonlinear challenging nonlinear programming problems for which a global solution is sought. For this purpose, multistart strategies are carefully and thoroughly explored. Numerical experiments are exhibited.\n\nKeywords: Packing, ellipses, circles, global optimization.\n\nFull text: [pdf]\n\nSparse projected-gradient method as a linear-scaling low-memory alternative to diagonalization in self-consistent field electronic structure calculations\n\nE. G. Birgin, J. M. Mart\u00ednez, L. Mart\u00ednez, and G. B. Rocha\n\nJournal of Chemical Theory and Computation, Vol. 9 No. 2 (February, 2013), pages 1043-1051.\n\nAbstract: Large-scale electronic structure calculations usually involve huge nonlinear eigenvalue problems. A method for solving these problems without employing expensive eigenvalue decompositions of the Fock matrix is presented in this work. The sparsity of the input and output matrices is preserved at every iteration and the memory required by the algorithm scales linearly with the number of atoms of the system. The algorithm is based on a projected gradient iteration applied to the constraint fulfillment problem. The computer time required by the algorithm also scales approximately linearly with the number of atoms (or non-null elements of the matrices), and the algorithm is faster than standard implementations of modern eigenvalue decomposition methods for sparse matrices containing more than 50,000 non-null elements. The new method reproduces the sequence of semiempirical SCF iterations obtained by standard eigenvalue decomposition algorithms to good precision.\n\nKeywords: Electronic Structure Calculations, Semiempirical methods, Projected Gradient, linear scaling, sparsity.\n\nFull text: [pdf]\n\nSymmetry-breaking constraints for packing identical orthogonal rectangles within polyhedra\n\nR. Andrade and E. G. Birgin\n\nOptimization Letters, Vol. 7 No. 2 (February 2013), pages 375-405.\n\nAbstract: Two problems related to packing identical orthogonal rectangles within a polyhedron are tackled in the present work. The first problem consists in packing as many identical rectangles as possible within a given polyhedron, while the second problem consists in finding the smallest polyhedron of a given type that accommodates a fixed number of identical rectangles. Both problems are modeled as mixed integer programming problems. Symmetry-breaking constraints that facilitate the solution of the MIP models are introduced. Numerical results are presented.\n\nKeywords: Packing of rectangles, MIP models, symmetry-breaking constraints, algorithms.\n\nFull text: [pdf]\n\nDeterministic and stochastic global optimization techniques for planar covering with ellipses problems\n\nM. Andretta and E. G. Birgin\n\nEuropean Journal of Operational Research, Vol. 224 No. 1 (January 2013), pages 23-40.\n\nAbstract: Problems of planar covering with ellipses are tackled in this work. Ellipses can have a fixed angle or each of them can be freely rotated. Deterministic global optimization methods are developed for both cases, while a stochastic version of the method is also proposed for large instances of the latter case. Numerical results show the effectiveness and efficiency of the proposed methods.\n\nKeywords: Planar covering with ellipses, deterministic global optimization, algorithms.\n\nFull text: [pdf]\n\nEvaluating bound-constrained minimization software\n\nE. G. Birgin and J. M. Gentil\n\nComputational Optimization and Applications, Vol. 53 No. 2 (October 2012), pages 347-373.\n\nAbstract: Bound-constrained minimization is a subject of active research. To assess the performance of existent solvers, numerical evaluations and comparisons are carried on. Arbitrary decisions that may have a crucial effect on the conclusions of numerical experiments are highlighted in the present work. As a result, a detailed evaluation based on performance profiles is applied to the comparison of bound-constrained minimization solvers. Extensive numerical results are presented and analyzed.\n\nKeywords: Bound-constrained minimization, benchmarking, numerical evaluation, performance profiles.\n\nFull text: [pdf]\n\nHeuristic methods for the single machine scheduling problem with different ready times and a common due date\n\nE. G. Birgin and D. P. Ronconi\n\nEngineering Optimization, Vol. 44 No. 10 (October 2012), pages 1197-1208.\n\nAbstract: The single machine scheduling problem with a common due date and non-identical ready times for the jobs is examined in this work. Performance is measured by the minimization of the weighted sum of earliness and tardiness penalties of the jobs. Since this problem is NP-hard, we investigate the application of constructive heuristics that exploit specific characteristics of the problem to improve their performance. The proposed approaches are examined through a computational comparative study on a set of 280 benchmark test problems with up to 1000 jobs.\n\nKeywords: Scheduling, single machine, earliness and tardiness, heuristic methods.\n\nFull text: [pdf]\n\nOn the boundedness of penalty parameters in an Augmented Lagrangian method with lower level constraints\n\nE. G. Birgin, D. Fernandez and J. M. Mart\u00ednez\n\nOptimization Methods and Software, Vol. 27 No. 6 (December 2012), pages 1001-1024.\n\nAbstract: Augmented Lagrangian methods are effective tools for solving large-scale nonlinear programming problems. At each outer iteration a minimization subproblem with simple constraints, whose objective function depends on updated Lagrange multipliers and penalty parameters, is approximately solved. When the penalty parameter becomes very large the subproblem is difficult, therefore the effectiveness of this approach is associated with boundedness of penalty parameters. In this paper it is proved that, under more natural assumptions than the ones up to now employed, penalty parameters are bounded. For proving the new boundedness result, the original algorithm has been slightly modified. Numerical consequences of the modifications are discussed and computational experiments are presented.\n\nKeywords: Nonlinear Programming, Augmented Lagrangian methods, Penalty parameters, Numerical experiments.\n\nFull text: [pdf]\n\nAugmented Lagrangian method with nonmonotone penalty parameters for constrained optimization\n\nE. G. Birgin and J. M. Mart\u00ednez\n\nComputational Optimization and Applications, Vol. 51 No. 3 (April 2012), Pages 941-965.\n\nAbstract: At each outer iteration of standard Augmented Lagrangian methods one tries to solve a box-constrained optimization problem with some prescribed tolerance. In the continuous world, using exact arithmetic, this subproblem is always solvable. Therefore, the possibility of finishing the subproblem resolution without satisfying the theoretical stopping conditions is not contemplated in usual convergence theories. However, in practice, one might not be able to solve the subproblem up to the required precision. This may be due to different reasons. One of them is that the presence of an excessively large penalty parameter could impair the performance of the box-constraint optimization solver. In this paper a practical strategy for decreasing the penalty parameter in situations like the one mentioned above is proposed. More generally, the different decisions that may be taken when, in practice, one is not able to solve the Augmented Lagrangian subproblem will be discussed. As a result, an improved Augmented Lagrangian method is presented, which takes into account numerical difficulties in a satisfactory way, preserving suitable convergence theory. Numerical experiments are presented involving all the CUTEr collection test problems.\n\nKeywords: Nonlinear Programming, Augmented Lagrangian methods, Penalty parameters, Numerical experiments.\n\nFull text: [pdf]\n\nGenerating unconstrained two-dimensional non-guillotine cutting patterns by a recursive partitioning algorithm\n\nE. G. Birgin, R. D. Lobato and R. Morabito\n\nJournal of the Operational Research Society, Vol. 63 No. 2 (February 2012), Pages 183-200.\n\nAbstract: In this study, a dynamic programming approach to deal with the unconstrained two-dimensional non-guillotine cutting problem is presented. The method extends the recently introduced recursive partitioning approach for the manufacturer's pallet loading problem. The approach involves two phases and uses bounds based on unconstrained two-staged and non-staged guillotine cutting. The method is able to find the optimal cutting pattern of a large number of problem instances of moderate sizes known in the literature and a counterexample for which the approach fails to find known optimal solutions was not found. For the instances that the required computer runtime is excessive, the approach is combined with simple heuristics to reduce its running time. Detailed numerical experiments show the reliability of the method.\n\nKeywords: Cutting and packing, two-dimensional non-guillotine cutting pattern, dynamic programming, recursive approach, distributor's pallet loading problem.\n\nFull text: [pdf]\n\nMixed-integer programming models for flowshop scheduling problems minimizing the total earliness and tardiness\n\nD. P. Ronconi and E. G. Birgin\n\nin Just-in-Time Systems, R. Z. R\u00edos-Mercado and Y. A. R\u00edos-Sol\u00eds (Eds.), Springer Series on Optimization and its Applications 60 (2012), Pages 91-105.\n\nAbstract: Scheduling problems involving both earliness and tardiness costs have received significant attention in recent years. This type of problem became important with the advent of the just-in-time (JIT) concept, where early or tardy deliveries are highly discouraged. In this work we examine the flowshop scheduling problem with no storage constraints and with blocking in-process. In this latter environment, there are no buffers between successive machines; therefore intermediate queues of jobs waiting in the system for their next operations are not allowed. Performance is measured by the minimization of the sum of earliness and tardiness of the jobs. Mixed-integer models that represent these scheduling flowshop problems are presented. The models are evaluated and compared in several problems using commercial known software.\n\nKeywords: Flowshop scheduling, earliness and tardiness, blocking in-process, mixed-integer programming formulations.\n\nFull text: [pdf]\n\nLow Order-Value approach for solving VaR-constrained optimization problems\n\nE. G. Birgin, L. F. Bueno, N. Krejic and J. M. Mart\u00ednez\n\nJournal of Global Optimization Vol. 51 No. 4 (December 2011), Pages 715-742.\n\nAbstract: In Low Order-Value Optimization (LOVO) problems the sum of the r smallest values of a finite sequence of q functions is involved as the objective to be minimized or as a constraint. The latter case is considered in the present paper. Portfolio optimization problems with a constraint on the admissible Value at Risk (VaR) can be modeled in terms of a LOVO problem with constraints given by Low Order-Value functions. Different algorithms for practical solution of this problem will be presented. Using these techniques, portfolio optimization problems with transaction costs will be solved.\n\nKeywords: Optimization, Augmented Lagrangian, Order-Value Optimization, Low Order-Value Optimization, Value at Risk, Numerical algorithms.\n\nFull text: [pdf]\n\nOuter Trust-Region method for Constrained Optimization\n\nE. G. Birgin, E. V. Castelani, A. L. M. Martinez and J. M. Mart\u00ednez\n\nJournal of Optimization Theory and Applications Vol. 150 No. 1 (July 2011), Pages 142-155.\n\nAbstract: Given an algorithm A for solving some mathematical problem based on the iterative solution of simpler subproblems, an Outer Trust-Region (OTR) modification of A is the result of adding a trust-region constraint to each subproblem. The trust-region size is adaptively updated according to the behavior of crucial variables. The new subproblems should not be more complex than the original ones and the convergence properties of the OTR algorithm should be the same as those of Algorithm A. In the present work, the OTR approach is exploited in connection with the \"greediness phenomenon\" of Nonlinear Programming. Convergence results for an OTR version of an Augmented Lagrangian method for nonconvex constrained optimization are proved and numerical experiments are presented.\n\nKeywords: Nonlinear programming, Augmented Lagrangian method, trust regions.\n\nFull text: [pdf]\n\nOrthogonal packing of identical rectangles within isotropic convex regions\n\nE. G. Birgin and R. D. Lobato\n\nComputers & Industrial Engineering Vol. 59 No. 4 (November 2010), Pages 595-602.\n\nAbstract: A mixed integer continuous nonlinear model and a solution method for the problem of orthogonally packing identical rectangles within an arbitrary convex region are introduced in the present work. The convex region is assumed to be made of an isotropic material in such a way that arbitrary rotations of the items, preserving the orthogonality constraint, are allowed. The solution method is based on a combination of branch and bound and active-set strategies for bound-constrained minimization of smooth functions. Numerical results show the reliability of the presented approach.\n\nKeywords: Packing and cutting of rectangles, orthogonal packing, isotropic convex regions, feasibility problems, nonlinear programming, models.\n\nFull text: [pdf]\n\nContinuous GRASP with a local active-set method for bound-constrained global optimization\n\nE. G. Birgin, E. M. Gozzi, M.G.C. Resende and R.M.A. Silva\n\nJournal of Global Optimization Vol. 48 No. 2 (October 2010), Pages 289-310.\n\nAbstract: Global optimization seeks a minimum or maximum of a multimodal function over a discrete or continuous domain. In this paper, we propose a hybrid heuristic -- based on the CGRASP and GENCAN methods -- for finding approximate solutions for continuous global optimization problems subject to box constraints. Experimental results illustrate the relative effectiveness of CGRASP-GENCAN on a set of benchmark multimodal test functions.\n\nKeywords: Global optimization, stochastic methods, active-set methods, heuristic, CGRASP, GENCAN.\n\nFull text: [pdf]\n\nGlobal minimization using an Augmented Lagrangian method\nwith variable lower-level constraints\n\nE. G. Birgin, C. A. Floudas and J. M. Mart\u00ednez\n\nMathematical Programming Vol. 125 No. 1 (September 2010), Pages 139-162.\n\nAbstract: A novel global optimization method based on an Augmented Lagrangian framework is introduced for continuous constrained nonlinear optimization problems. At each outer iteration the method requires the $\\varepsilon$-global minimization of the Augmented Lagrangian with simple constraints. Global convergence to an $\\varepsilon$-global minimizer of the original problem is proved. The subproblems are solved using the $\\alpha$BB method. Numerical experiments are presented.\n\nKeywords: Deterministic global optimization, Augmented Lagrangians, nonlinear programming, algorithms, numerical experiments.\n\nFull text: [pdf] [ps]\n\nUsing sentinels to detect intersections of convex and nonconvex polygons\n\nW. F. Mascarenhas and E. G. Birgin\n\nComputational & Applied Mathematics Vol. 29 No. 2 (June 2010), Pages 247-267.\n\nAbstract: We describe finite sets of points, called sentinels, which allow us to decide if isometric copies of polygons, convex or not, intersect. As an example of the applicability of the concept of sentinel, we explain how they can be used to formulate an algorithm based on the optimization of differentiable models to pack polygons in convex sets.\n\nKeywords: Sentinels, polygons, intersection, packing, nonlinear programming.\n\nFull text: [pdf]\n\nSecond-order negative-curvature methods for box-constrained and general constrained optimization\n\nR. Andreani, E. G. Birgin, J. M. Mart\u00ednez and M. L. Schuverdt\n\nComputational Optimization and Applications Vol. 45 No. 2 (March 2010), Pages 209-236.\n\nAbstract: A Nonlinear Programming algorithm that converges to second-order stationary points is introduced in this paper. The main tool is a second-order negative-curvature method for box-constrained minimization of a certain class of functions that do not possess continuous second derivatives. This method is used to define an Augmented Lagrangian algorithm of PHR (Powell-Hestenes-Rockafellar) type. Convergence proofs under weak constraint qualifications are given. Numerical examples showing that the new method converge to second-order stationary points in situations in which first-order methods fail are exhibited.\n\nKeywords: Nonlinear programming, Augmented Lagrangians, global convergence, optimality conditions, second-order conditions, constraint qualifications.\n\nFull text: [pdf]\n\nAn effective recursive partitioning approach for the packing of identical rectangles in a rectangle\n\nE. G. Birgin, R. D. Lobato and R. Morabito\n\nJournal of the Operational Research Society Vol. 61 No. 2 (February 2010), Pages 306-320.\n\nAbstract: In this work, we deal with the problem of packing (orthogonally and without overlapping) identical rectangles in a rectangle. This problem appears in different logistics settings, such as the loading of boxes on pallets, the arrangements of pallets in trucks and the stowing of cargo in ships. We present a recursive partitioning approach combining improved versions of a recursive five-block heuristic and an $L$-approach for packing rectangles into larger rectangles and $L$-shaped pieces. The combined approach is able to rapidly find the optimal solutions of all instances of the pallet loading problem sets Cover I and II (more than 50 thousand instances). It is also effective for solving the instances of problem set Cover III (almost 100 thousand instances) and practical examples of a woodpulp stowage problem, if compared to other methods from the literature. Some theoretical results are also discussed and, based on them, efficient computer implementations are introduced. The computer implementation and the data sets are available for benchmark purposes at http:\/\/www.ime.usp.br\/~egbirgin\/packing\/.\n\nKeywords: Cutting and packing, manufacturer's pallet loading problem, woodpulp stowage problem, non-guillotine cutting pattern, recursive algorithms.\n\nFull text: [pdf] [ps]\n\nNew and improved results for packing identical unitary radius circles within triangles, rectangles and strips\n\nE. G. Birgin and J. M. Gentil\n\nComputers & Operations Research Vol. 37 No. 7 (July 2010), Pages 1318-1327.\n\nAbstract: The focus of study in this paper is the class of packing problems. More specifically, it deals with the placement of a set of N circular items of unitary radius inside an object with the aim of minimizing its dimensions. Differently shaped containers are considered, namely circles, squares, rectangles, strips and triangles. By means of the resolution of nonlinear equations systems through the Newton-Raphson method, the herein presented algorithm succeeds in improving the accuracy of previous results attained by continuous optimization approaches up to numerical machine precision. The computer implementation and the data sets are available at http:\/\/www.ime.usp.br\/~egbirgin\/packing\/.\n\nKeywords: Packing, nonlinear equations system, Newton's method, nonlinear programming.\n\nFull text: [pdf]\n\nPartial Spectral Projected Gradient Method with Active-Set Strategy for Linearly Constrained Optimization\n\nM. Andretta, E. G. Birgin and J. M. Mart\u00ednez\n\nNumerical Algorithms, Vol. 53 No. 1 (January 2010), Pages 23-52.\n\nAbstract: A method for linearly constrained optimization which modifies and generalizes recent box-constraint optimization algorithms is introduced. The new algorithm is based on a relaxed form of Spectral Projected Gradient iterations. Intercalated with these projected steps, internal iterations restricted to faces of the polytope are performed, which enhance the efficiency of the algorithms. Convergence proofs are given and numerical experiments are included and commented. Software supporting this paper is available through the TANGO Project web page.\n\nKeywords: Linearly constrained optimization, spectral projected gradient method, active set methods.\n\nFull text: [pdf]\n\nPACKMOL: A package for building initial configurations for molecular dynamics simulations\n\nL. Mart\u00ednez, R. Andrade, E. G. Birgin and J. M. Mart\u00ednez\n\nJournal of Computational Chemistry, Vol. 30 No. 13 (October 2009), Pages 2157-2164.\n\nAbstract: Adequate initial configurations for molecular dynamics simulations consist of arrangements of molecules distributed in space in such a way to approximately represent the system's overall structure. In order that the simulations are not disrupted by large Van der Waals repulsive interactions, atoms from different molecules must keep safe pairwise distances. Obtaining such a molecular arrangement can be considered a packing problem: Each type molecule must satisfy spatial constraints related to the geometry of the system, and the distance between atoms of different molecules must be greater than some specified tolerance. We have developed a code able to pack millions of atoms, grouped in arbitrarily complex molecules, inside a variety of three-dimensional regions. The regions may be intersections of spheres, ellipses, cylinders, planes or boxes. The user must provide only the structure of one molecule of each type and the geometrical constraints that each type of molecule must satisfy. Building complex mixtures, interfaces, solvating biomolecules in water or other solvents, or mixtures of solvents is straightforward. In addition, different atoms belonging to the same molecule may also be restricted to different spacial regions, in such a way that more ordered molecular arrangements can be built, as micelles, lipid double-layers, etc. The packing time for state-of-the-art molecular dynamics systems varies from a few seconds to a few minutes in a personal computer. The input files are simple and currently compatible with PDB, Tinker, Molden or Moldy coordinate files. The package is distributed as free software and can be downloaded from http:\/\/www.ime.unicamp.br\/~martinez\/packmol\/.\n\nKeywords: Initial configuration, molecular dynamics, packing, large-scale optimization, PACKMOL.\n\nFull text: [pdf]\n\nEstimation of the thickness and the optical parameters of several superimposed thin films using optimization\n\nR. Andrade, E. G. Birgin, I. Chambouleyron, J. M. Mart\u00ednez and S. D. Ventura\n\nApplied Optics, Vol. 47 No. 28 (October 2008), Pages 5208-5220.\n\nAbstract: The Reverse Engineering problem addressed in the present research consists in estimating the thicknesses and the optical parameters of two thin films deposited on a transparent substrate using only transmittance data through the whole stack. To the present author's knowledge this is the first report on the retrieval of the optical constants and the thickness of multiple film structures using transmittance data only. The same methodology may be used if the available data correspond to normal reflectance. The software used in this work is freely available through the PUMA Project web page (http:\/\/www.ime.usp.br\/~egbirgin\/puma\/).\n\nKeywords: Optical constants, thin films, optimization, numerical algorithms, Reverse Engineering.\n\nFull text: [pdf] [ps]\n\nImproving ultimate convergence of an Augmented Lagrangian method\n\nE. G. Birgin and J. M. Mart\u00ednez\n\nOptimization Methods and Software, Vol. 23 No. 2 (April 2008), Pages 177-195.\n\nAbstract: Optimization methods that employ the classical Powell-Hestenes-Rockafellar Augmented Lagrangian are useful tools for solving Nonlinear Programming problems. Their reputation decreased in the last ten years due to the comparative success of Interior-Point Newtonian algorithms, which are asymptotically faster. In the present research a combination of both approaches is evaluated. The idea is to produce a competitive method, being more robust and efficient than its \"pure\" counterparts for critical problems. Moreover, an additional hybrid algorithm is defined, in which the Interior Point method is replaced by the Newtonian resolution of a KKT system identified by the Augmented Lagrangian algorithm. The software used in this work is freely available through the TANGO Project web page.\n\nKeywords: Nonlinear programming, Augmented Lagrangian methods, Interior-Point methods, Newton's method, experiments.\n\nFull text: [pdf] [ps]\n\nStructured minimal-memory inexact quasi-Newton method and secant preconditioners for Augmented Lagrangian Optimization\n\nE. G. Birgin and J. M. Mart\u00ednez\n\nComputational Optimization and Applications, Vol. 39 No. 1 (January 2008), Pages 1-16.\n\nAbstract: Augmented Lagrangian methods for large-scale optimization usually require efficient algorithms for minimization with box constraints. On the other hand, active-set box-constraint methods employ unconstrained optimization algorithms for minimization inside the faces of the box. Several approaches may be employed for computing internal search directions in the large-scale case. In this paper a minimal-memory quasi-Newton approach with secant preconditioners is proposed, taking into account the structure of Augmented Lagrangians that come from the popular Powell-Hestenes-Rockafellar scheme. A combined algorithm, that uses the quasi-Newton formula or a truncated-Newton procedure, depending of the presence of active constraints in the penalty-Lagrangian function, is also suggested. Numerical experiments using the CUTE collection are presented.\n\nKeywords: Nonlinear programming, Augmented Lagrangian methods, box constraints, quasi-Newton, truncated-Newton.\n\nFull text: [pdf] [ps]\n\nMinimizing the object dimensions in circle and sphere packing problems\n\nE. G. Birgin and F. N. C. Sobral\n\nComputers & Operations Research, Vol. 35 No. 7 (July 2008), Pages 2357-2375.\n\nAbstract: Given a fixed set of identical or different-sized circular items, the problem we deal with consists on finding the smallest object within which the items can be packed. Circular, triangular, squared, rectangular and also strip objects are considered. Moreover, 2D and 3D problems are treated. Twice-differentiable models for all these problems are presented. A strategy to reduce the complexity of evaluating the models is employed and, as a consequence, instances with a large number of items can be considered. Numerical experiments show the flexibility and reliability of the new unified approach.\n\nKeywords: Packing of circles and spheres, models, algorithms, nonlinear programming.\n\nFull text: [pdf] [ps]\n\nAugmented Lagrangian methods under the Constant Positive Linear Dependence constraint qualification\n\nR. Andreani, E. G. Birgin, J. M. Mart\u00ednez and M. L. Schuverdt\n\nMathematical Programming, Vol. 111 No. 1-2 (January 2008), Pages 5-32.\n\nAbstract: Two Augmented Lagrangian algorithms for solving KKT systems are introduced. The algorithms differ in the way in which penalty parameters are updated. Possibly infeasible accumulation points are characterized. It is proved that feasible limit points that satisfy the Constant Positive Linear Dependence constraint qualification are KKT solutions. Boundedness of the penalty parameters is proved under suitable assumptions. Numerical experiments are presented.\n\nKeywords: Nonlinear programming, Augmented Lagrangian methods, KKT systems, numerical experiments.\n\nFull text: [pdf] [ps]\n\nOn Augmented Lagrangian methods with general lower-level constraints\n\nR. Andreani, E. G. Birgin, J. M. Mart\u00ednez and M. L. Schuverdt\n\nSIAM Journal on Optimization, Vol. 18 No. 4 (2008), Pages 1286-1309.\n\nAbstract: Augmented Lagrangian methods with general lower-level constraints are considered in the present research. These methods are useful when efficient algorithms exist for solving subproblems where the constraints are only of the lower-level type. Two methods of this class are introduced and analyzed. Inexact resolution of the lower-level constrained subproblems is considered. Global convergence is proved using the Constant Positive Linear Dependence constraint qualification. Conditions for boundedness of the penalty parameters are discussed. The reliability of the approach is tested by means of an exhaustive comparison against Lancelot. All the problems of the Cute collection are used in this comparison. Moreover, the resolution of location problems in which many constraints of the lower-level set are nonlinear is addressed, employing the Spectral Projected Gradient method for solving the subproblems. Problems of this type with more than $3 \\times 10^6$ variables and $14 \\times 10^6$ constraints are solved in this way, using moderate computer time.\n\nKeywords: Nonlinear programming, Augmented Lagrangian methods, global convergence, constraint qualifications, numerical experiments.\n\nFull text: [pdf] [ps]\n\nMethod of Sentinels for Packing Items within Arbitrary Convex Regions\n\nE. G. Birgin, J. M. Mart\u00ednez, W. F. Mascarenhas and D. P. Ronconi\n\nJournal of the Operational Research Society, Vol. 57 No. 6 (June 2006), Pages 735-746.\n\nAbstract: A new method is introduced for packing objects in convex regions of the Euclidian n-dimensional space. By means of this approach the packing problem becomes a global finite-dimensional continuous optimization problem. The strategy is based on the new concept of sentinels sets. Sentinels sets are finite subsets of the objects to be packed such that when two objects are superposed at least one sentinel of one object is in the interior of the other. Minimal sets of sentinels are found in simple 2-dimensional cases. Numerical experiments and pictures showing the potentiality of the new technique are presented.\n\nKeywords: Sentinels, packing problems, cutting problems, models, nonlinear programming.\n\nFull text: [pdf] [ps]\n\nOrthogonal packing of rectangular items within arbitrary convex regions by nonlinear optimization\n\nE. G. Birgin, J. M. Mart\u00ednez, F. H. Nishihara and D. P. Ronconi\n\nComputers & Operations Research, Vol. 33 No. 12 (December 2006), Pages 3535-3548.\n\nAbstract: The orthogonal packing of rectangular items in an arbitrary convex region is considered in this work. The packing problem is modeled as the problem of deciding for the feasibility or infeasibility of a set of nonlinear equality and inequality constraints. A procedure based on nonlinear programming is introduced and numerical experiments which show that the new procedure is reliable are exhibited.\n\nKeywords: Packing of rectangles, orthogonal packing, feasibility problems, models, nonlinear programming.\n\nFull text: [pdf] [ps]\n\nLocal Convergence of an Inexact-Restoration method and Numerical Experiments\n\nE. G. Birgin and J. M. Mart\u00ednez\n\nJournal of Optimization Theory and Applications, Vol. 127 No. 2 (November 2005), Pages 229-247.\n\nAbstract: Local convergence of an inexact-restoration method for nonlinear programming is proved. Numerical experiments are performed with the objective of evaluating the behavior of the purely local method against a globally convergent nonlinear-programming algorithm.\n\nKeywords: Inexact-restoration method, nonlinear programming, local convergence, numerical experiments.\n\nFull text: [pdf] [ps]\n\nSee also the Technical Report (extended version of the published article) [pdf] [ps]\n\nA note on an L-approach for solving the manufacturer's pallet loading problem\n\nE. G. Birgin, R. Morabito and F. H. Nishihara\n\nJournal of the Operational Research Society, Vol. 56 No. 12 (December 2005), Pages 1448-1451.\n\nAbstract: An L-approach for packing (l,w)-rectangles into an (L,W)-rectangle was introduced in [L. Lins, S. Lins and R. Morabito, An L-approach for packing (l,w)-rectangles into rectangular and L-shaped pieces, Journal of the Operational Research Society 54, pp. 777-789, 2003]. The authors of that paper conjecture that the L-approach is exact and point out its runtime requirements as the main drawback. In this note it is shown that, by simply using a different data structure, the runtime is considerably reduced in spite of larger (but affordable) memory requirements. This reduction is important for practical purposes since it makes the algorithm much more acceptable for supporting actual decisions in pallet loading. Intensive numerical experiments showing the efficiency and effectiveness of the algorithm are presented.\n\nFull text: [pdf] [ps]\n\nOptimization techniques for the estimation of the thickness and the optical parameters of thin films using reflectance data\n\nS. Ventura, E. G. Birgin, J. M. Mart\u00ednez and I. Chambouleyron\n\nJournal of Applied Physics, Vol. 97 043512 (February 2005).\n\nAbstract: The present work considers the problem of estimating the thickness and the optical constants (extinction coefficient and refractive index) of thin films from the spectrum of normal reflectance R. This is an ill-conditioned highly underdetermined inverse problem. The estimation is done in the spectral range where the film is not opaque. The idea behind the choice of this particular spectral range is to compare the film characteristics retrieved from transmittance T and from reflectance data. In the first part of the paper a compact formula for R is deduced. The approach to deconvolute the R data is to use well known information on the dependence of the optical constants on photon energy of semiconductors and dielectrics and to formulate the estimation as a nonlinear optimization problem. Previous publications of the group on the subject provide guidelines for designing the new procedures. The consistency of the approach is tested with computer generated thin films and also with measured R and T spectral data of an a-Si:H film deposited onto glass. The results on gedanken films and onto a-Si:H indicate a very good agreement between expected and retrieved values.\n\nKeywords: Optical constants, thin films, reflectance, optimization, numerical algorithms.\n\nFull text: [pdf] [ps]\n\nPractical active-set Euclidian trust-region method with spectral projected gradients for bound-constrained minimization\n\nM. Andretta, E. G. Birgin and J. M. Mart\u00ednez\n\nOptimization, Vol. 54 No. 3 (June 2005), Pages 305-325.\n\nAbstract: A practical active-set method for bound-constrained minimization is introduced. Within the current face the classical Euclidian trust-region method is employed. Spectral projected gradient directions are used to abandon faces. Numerical results are presented.\n\nFull text: [pdf] [ps]\n\nNumerical comparison of Augmented Lagrangian algorithms for nonconvex problems\n\nE. G. Birgin, R. Castillo and J. M. Mart\u00ednez\n\nComputational Optimization and Applications, Vol. 31 No. 1 (May 2005), Pages 31-55.\n\nAbstract: Augmented Lagrangian algorithms are very popular tools for solving nonlinear programming problems. At each outer iteration of these methods a simpler optimization problem is solved, for which efficient algorithms can be used, especially when the problems are large. The most famous Augmented Lagrangian algorithm for minimization with inequality constraints is known as Powell-Hestenes-Rockafellar (PHR) method. The main drawback of PHR is that the objective function of the subproblems is not twice continuously differentiable. This is the main motivation for the introduction of many alternative Augmented Lagrangian methods. Most of them have interesting interpretations as proximal point methods for solving the dual problem, when the original nonlinear programming problem is convex. In this paper a numerical comparison between many of these methods is performed using all the suitable problems of the CUTE collection.\n\nKeywords: Nonlinear programming, Augmented Lagrangian methods, inequality constraints, benchmarking, algorithms.\n\nFull text: [pdf] [ps]\n\nRobust stopping criteria for Dykstra's algorithm\n\nE. G. Birgin and M. Raydan\n\nSIAM Journal on Scientific Computing, Vol. 26 No. 4 (March 2005), Pages 1405-1414.\n\nAbstract: Dykstra's algorithm is a suitable alternating projection scheme for solving the optimization problem of finding the closest point to a given one onto the intersection of a finite number of closed and convex sets. It has been recently used in a wide variety of applications. However, in practice, the commonly used stopping criteria are not robust and could stop the iterative process prematurely at a point that does not solve the optimization problem. In this work we present a counter example to illustrate the weakness of the commonly used criteria, and then we develop full-proof stopping rules. Additional experiments are shown to illustrate the advantages of this new stopping criteria, including their associated computational cost.\n\nKeywords: Convex optimization, alternating projection methods, Dykstra's algorithm, stopping criteria.\n\nFull text: [pdf] [ps]\n\nSpectral projected gradient and variable metric methods for optimization with linear inequalities\n\nR. Andreani, E. G. Birgin, J. M. Mart\u00ednez and J. Yuan\n\nIMA Journal of Numerical Analysis, Vol. 25 No. 2 (April 2005), Pages 221-252.\n\nAbstract: A family of variable metric methods for convex constrained optimization was introduced recently by Birgin, Mart\u00ednez and Raydan. One of the members of this family is the Inexact Spectral Projected Gradient (ISPG) method for minimization with convex constraints. At each iteration of these methods a strictly convex quadratic function with convex constraints must be (inexactly) minimized. In the case of ISPG it was shown that, in some important applications, iterative projection methods can be used for this minimization. In this paper the particular case in which the convex domain is a polytope described by a finite set of linear inequalities is considered. For solving the linearly constrained convex quadratic subproblem a dual approach is adopted, by means of which subproblems become (not necessarily strictly) convex quadratic minimization problems with box constraints. For solving this problem, we use an active-set box-constraint quadratic optimizer with a proximal-point type unconstrained algorithm for minimization within the current faces. Convergence results and numerical experiments are presented.\n\nFull text: [pdf] [ps]\n\nOptimizing the Packing of Cylinders into a Rectangular Container: A Nonlinear Approach\n\nE. G. Birgin, J. M. Mart\u00ednez and D. P. Ronconi\n\nEuropean Journal of Operational Research, Vol. 160 No 1 (January 2005), Pages 19-33.\n\nAbstract: The container loading problem has important industrial and commercial applications. An increase in the number of items in a container leads to a decrease in cost. For this reason the related optimization problem is of economic importance. In this work, a procedure based on a nonlinear decision problem to solve the cylinder packing problem with identical diameters is presented. This formulation is based on the fact that the centers of the cylinders have to be inside the rectangular box defined by the base of the container (a radius far from the frontier) and far from each other at least one diameter. With this basic premise the procedure tries to find the maximum number of cylinder centers that satisfy these restrictions. The continuous nature of the problem is one of the reasons that motivated this study. A comparative study with other methods of the literature is presented and better results are achieved.\n\nKeywords: Cylinder packing, rectangular container, circular container, nonlinear programming, bound-constrained minimization, convex-constrained minimization.\n\nFull text: [pdf] [ps]\n\nInexact Spectral Projected Gradient Methods on Convex Sets\n\nE. G. Birgin, J. M. Mart\u00ednez and M. Raydan\n\nIMA Journal of Numerical Analysis, Vol. 23 No 4 (October 2003), Pages 539-559.\n\nAbstract: A new method is introduced for large scale convex constrained optimization. The general model algorithm involves, at each iteration, the approximate minimization of a convex quadratic on the feasible set of the original problem and global convergence is obtained by means of nonmonotone line searches. A specific algorithm, the Inexact Spectral Projected Gradient method (ISPG), is implemented using inexact projections computed by Dykstra's alternating projection method and generates interior iterates. The ISPG method is a generalization of the Spectral Projected Gradient method (SPG), but can be used when projections are difficult to compute. Numerical results for constrained least-squares rectangular matrix problems are presented.\n\nKeywords: Convex constrained optimization, Projected gradient, nonmonotone line search, spectral gradient, Dykstra's algorithm.\n\nFull text: [pdf] [ps]\n\nEstimation of optical parameters of very thin films\n\nE. G. Birgin, I. Chambouleyron, J. M. Mart\u00ednez and S. D. Ventura\n\nApplied Numerical Mathematics, Vol. 47 No 2 (November 2003), Pages 109-119.\n\nAbstract: In recent papers, the problem of estimating the thickness and the optical constants (refractive index and absorption coefficient) of thin films using only transmittance data has been addressed by means of optimization techniques. Models were proposed for solving this problem using linearly constrained optimization and unconstrained optimization. However, the optical parameters of very thin'' films could not be recovered with methods that are successful in other situations. Here we introduce an optimization technique that seems to be efficient for recovering the parameters of very thin films.\n\nKeywords: Optical constants, thin films, optimization, numerical algorithms.\n\nFull text: [pdf] [ps]\n\nGlobally convergent inexact quasi-Newton methods for solving nonlinear systems\n\nE. G. Birgin, N. Krejic and J. M. Mart\u00ednez\n\nNumerical Algorithms, Vol. 32 No 2-4 (April 2003), Pages 249-260.\n\nAbstract: Large scale nonlinear systems of equations can be solved by means of inexact quasi-Newton methods. A global convergence theory is introduced that guarantees that, under reasonable assumptions, the algorithmic sequence converges to a solution of the problem. Under additional standard assumptions, superlinear convergence is preserved.\n\nKeywords: Nonlinear systems, inexact Newton methods, global convergence, superlinear convergence, quasi-Newton methods.\n\nFull text: [pdf] [ps]\n\nOptimization problems in the estimation or parameters of thin films and the elimination of the influence of the substrate\n\nE. G. Birgin, I. Chambouleyron and J. M. Mart\u00ednez\n\nJournal of Computational and Applied Mathematics, Vol. 152 No. 1 (March 2003), Pages 35-50.\n\nAbstract: In a recent paper, the authors introduced a method to estimate optical parameters of thin films using transmission data. The associated model assumes that the film is deposited on a completely transparent substrate. It has been observed, however, that small absorption of substrates affect in a nonnegligible way the transmitted energy. The question arises of the reliability of the estimation method to retrieve optical parameters in the presence of substrates of different thicknesses and absorption degrees. In this paper, transmission spectra of thin films deposited on non-transparent substrates are generated and, as a first approximation, the method based on transparent substrates is used to estimate the optical parameters. As expected, the method is good when the absorption of the substrate is very small, but fails when one deals with less transparent substrates. To overcome this drawback, an iterative procedure is introduced, that allows one to approximate the transmittance with transparent substrate, given the transmittance with absorbent substrate. The updated method turns out to be almost as efficient in the case of absorbent substrates as it was in the case of transparent ones.\n\nKeywords: Optimization, estimation of parameters, unconstrained minimization, constrained optimization, thin films, optical constants, transmittance.\n\nFull text: [pdf] [ps]\n\nSolution of bounded nonlinear systems of equations using homotopies with inexact restoration\n\nE. G. Birgin, N. Krejic and J. M. Mart\u00ednez\n\nInternational Journal of Computer Mathematics, Vol. 80 No. 2 (February 2003), Pages 211-222.\n\nAbstract: Nonlinear systems of equations often represent mathematical models of chemical production processes and other engineering problems. Homotopic techniques (in particular, the bounded homotopies introduced by Paloschi) are used for enhancing convergence to solutions, especially when a good initial estimate is not available. In this paper, the homotopy curve is considered as the feasible set of a mathematical programming problem, where the objective is to find the optimal value of the homotopic parameter. Inexact restoration techniques can then be used to generate approximations in a neighborhood of the homotopy, the size of which is theoretically justified. Numerical examples are given.\n\nKeywords: Nonlinear programming, nonlinear systems, homotopies, bounded homotopies, homotopy methods, inexact restoration.\n\nFull text: [pdf] [ps]\n\nMinimization subproblems and heuristics for an applied clustering problem\n\nE. G. Birgin, J.M. Mart\u00ednez and D. P. Ronconi\n\nEuropean Journal of Operational Research, Vol. 146 No. 1 (April 1, 2003), Pages 19-34.\n\nAbstract: A practical problem that requires the classification of a set of points of Rn using a criterion not sensitive to bounded outliers is studied in this paper. A fixed-point (k-means) algorithm is defined that uses an arbitrary distance function. Finite convergence is proved. A robust distance defined by Boente, Fraiman and Yohai is selected for applications. Smooth approximations of this distance are defined and suitable heuristics are introduced to enhance the probability of finding global optimizers. A real-life example is presented and commented.\n\nKeywords: Nonlinear programming, heuristics, clustering, classification, fixed points.\n\nFull text: [pdf] [ps]\n\nOptical constants and thickness determination of very thin amorphous semiconductor films\n\nI. Chambouleyron, S. D. Ventura, E. G. Birgin and J. M. Mart\u00ednez,\n\nJournal of Applied Physics, Vol. 92 No. 6 (September 15, 2002), Pages 3093-3102.\n\nAbstract: This contribution addresses the relevant question of retrieving, from transmittance data, the optical constants and thickness of very thin semiconductor and dielectric films. The retrieval process looks for a thickness that, subject to the physical input of the problem, minimizes the difference between the measured and the theoretical spectra. This is a highly underdetermined problem but, the use of approximate - though simple - functional dependences of the index of refraction and of the absorption coefficient on photon energy, used as an a priori information, allows surmounting the ill-posedness of the problem. The method is illustrated with the analysis of transmittance data of very thin amorphous silicon films. The method allows retrieving physically meaningful solutions for films as thin as 300 A. The estimated parameters agree well with known data or with optical parameters measured by independent methods. The limitations of the adopted model and the shortcomings of the optimization algorithm are presented and discussed.\n\nKeywords: Optical constants, thin films, optimization, numerical algorithms.\n\nFull text: [pdf] [ps]\n\nLarge-scale active-set box-constrained optimization method with spectral projected gradients\n\nE. G. Birgin and J. M. Mart\u00ednez\n\nComputational Optimization and Applications, Vol. 23 No. 1 (October 2002), Pages 101-125.\n\nAbstract: A new active-set method for smooth box-constrained minimization is introduced. The algorithm combines an unconstrained method, including a new line-search which aims to add many constraints to the working set at a single iteration, with a recently introduced technique (spectral projected gradient) for dropping constraints from the working set. Global convergence is proved. A computer implementation is fully described and a numerical comparison assesses the reliability of the new algorithm.\n\nKeywords: Box-constrained minimization, numerical methods, active-set strategies, Spectral Projected Gradient.\n\nFull text: [pdf] [ps]\n\nAlgorithm 813: SPG - software for convex-constrained optimization\n\nE. G. Birgin, J. M. Mart\u00ednez and M. Raydan\n\nACM Transactions on Mathematical Software, Vol. 27 No. 3 (September 2001), Pages 340-349.\n\nAbstract: A Fortran 77 software which implements the SPG method is introduced. SPG is a nonmonotone projected gradient algorithm for solving large-scale convex-constrained optimization problems. It combines the classical projected gradient method with the spectral gradient choice of steplength and a nonmonotone line search strategy. Implementation details are presented and the usage of the software is described. Some new numerical tests that have been recently performed are reported. The main conclusion is that SPG compares favorably with existing software.\n\nKeywords: Projected gradients, nonmonotone line search, large-scale problems, bound constrained problems, spectral gradient method.\n\nFull text: [pdf] [ps]\n\nA box-constrained optimization algorithm with negative curvature directions and spectral projected gradients\n\nE. G. Birgin and J. M. Mart\u00ednez\n\nComputing [Suppl], Vol. 15 (2001), Pages 49-60.\n\nAbstract: A practical algorithm for box-constrained optimization is introduced. The algorithm combines an active-set strategy with spectral projected gradient iterations. In the interior of each face a strategy that deals efficiently with negative curvature is employed. Global convergence results are given. Numerical results are presented.\n\nKeywords: Box constrained minimization, active set methods, spectral projected gradients, dogleg path methods.\n\nFull text: [pdf] [ps]\n\nA Spectral Conjugate Gradient method for unconstrained optimization\n\nE. G. Birgin and J. M. Mart\u00ednez\n\nApplied Mathematics and Optimization, Vol. 43 No. 2 (2001), Pages 117-118.\n\nAbstract: A family of scaled conjugate-gradient algorithms for large-scale unconstrained minimization is defined. The Perry, the Polak-Ribi\u00e8ere and the Fletcher-Reeves formulae are compared using a spectral scaling derived from Raydan's spectral gradient optimization method. The best combination of formula, scaling and initial choice of step-length is compared against well known algorithms using a classical set of problems. An additional comparison involving an ill-conditioned estimation problem in Optics is presented.\n\nFull text: [pdf] [ps]\n\nDetermination of thickness and optical constants of a-Si:H films from transmittance data\n\nM. Mulato, I. Chambouleyron, E. G. Birgin and J. M. Mart\u00ednez\n\nApplied Physics Letters, Vol. 77 No. 14 (2000), Pages 2133-2135.\n\nAbstract: This work presents the first application of a recently developed numerical method to determine the thickness and the optical constants of thin films using experimental transmittance data only. The new method may be applied to films not displaying a fringe pattern and is shown to work for a-Si:H layers as thin as 100 nm. The performance and limitations of the method are discussed on the basis of experiments performed on a series of six a-Si:H samples grown under identical conditions, but with thickness varying from 98 nm to 1.2 mu m.\n\nKeywords: Thin films, optical constants, a-Si:H films, unconstrained minimization.\n\nFull text: [pdf] [ps]\n\nNonmonotone Spectral Projected Gradient Methods on Convex Sets\n\nE. G. Birgin, J. M. Mart\u00ednez and M. Raydan\n\nSIAM Journal on Optimization, Vol. 10 No. 4 (2000), Pages 1196-1211.\n\nAbstract: Nonmonotone projected gradient techniques are considered for the minimization of differentiable functions on closed convex sets.\u00a0 The classical projected gradient schemes are extended to include a nonmonotone steplength strategy that is based on the Grippo-Lampariello-Lucidi nonmonotone line search. In particular, the nonmonotone strategy is combined with the spectral gradient choice of steplength to accelerate the convergence process. In addition to the classical projected gradient nonlinear path, the feasible spectral projected gradient is used as a search direction to avoid additional trial projections during the one-dimensional search process. Convergence properties and extensive numerical results are presented.\n\nKeywords: Projected gradients, nonmonotone line search, large scale problems, bound constrained problems, spectral gradient method.\n\nFull text: [pdf] [ps]\n\nRestricted optimization: a clue to a fast and accurate implementation of the Common Reflection Surface Stack method\n\nE. G. Birgin, R. Biloti, M. Tygel and L. T. Santos\n\nJournal of Applied Geophysics, Vol. 42 No. 3-4 (December 1999), Pages 143-155.\n\nAbstract: For a fixed, central ray in an isotropic elastic or acoustic media, traveltime moveouts of rays in its vicinity can be described in terms of a certain number of parameters that refer to the central ray only. The determination of these parameters out of multi-coverage data leads to very powerful algorithms that can be used for several imaging and inversion processes. Assuming two-dimensional propagation, the traveltime expressions depend on three parameters directly related to the geometry of the unknown model in the vicinity of the central ray. We present a new method to extract these parameters out of coherency analysis applied directly to the data. It uses (a) fast one-parameter searches on different sections extracted from the multi-coverage data to derive initial values of the sections parameters, and (b) the application of a recently introduced Spectral Projected Gradient optimization algorithm for the final parameter estimation. Application of the method on a synthetic example shows an excellent performance of the algorithm both in accuracy and efficiency. The results obtained so far indicate that the algorithm may be a feasible option to solve the corresponding, harder, full three-dimensional problem, in which eight parameters, instead of three, are required.\n\nKeywords: Multi-coverage data, Common Reflection Surface method, hyperbolic traveltime, coherency function, optimization, Spectral Projected Gradient method.\n\nFull text: [pdf] [ps]\n\nEstimation of the optical constants and the thickness of thin films using unconstrained optimization\n\nE. G. Birgin, I. Chambouleyron and J. M. Mart\u00ednez\n\nJournal of Computational Physics, Vol. 151, No. 2 (May 1999), Pages 862-880.\n\nAbstract: The problem of estimating the thickness and the optical constants of thin films using transmission data only is very challenging from the mathematical point of view, and has a technological and an economic importance. In many cases it represents a very ill-conditioned inverse problem with many local-nonglobal solutions. In a recent publication we proposed nonlinear programming models for solving this problem.Well-known software for linearly constrained optimization was used with success for this purpose. In this paper we introduce an unconstrained formulation of the nonlinear programming model and we solve the estimation problem using a method based on repeated calls to a recently introduced unconstrained minimization algorithm. Numerical experiments on computer-generated films show that the new procedure is reliable.\n\nKeywords: Unconstrained minimization, spectral gradient method, optical constants, thin films.\n\nFull text: [pdf] [ps]\n\nAutomatic differentiation for optimal control problems\n\nE. G. Birgin and Y. G. Evtushenko\n\nin Dynamics of Non-homogeneous System, edited by Y. S. Popkov, Proceedings of ISA RAS, Institute of System Analysis of the Russian Academy of Science, Moscow, Vol. 2 (1999), Pages 53-62.\n\nAbstract: Automatic differentiation is used for the solution of optimal control problems. The original problem is reduced to a nonlinear programming problem using general Runge-Kutta integration formulas. Canonical formulas which use a fast automatic differentiation strategy are given to compute derivatives of the goal function.\n\nKeywords: Automatic differentiation, optimal control problem, Runge-Kutta integration methods.\n\nFull text: [pdf] [ps]\n\nAutomatic differentiation and Spectral Projected Gradient methods for optimal control problems\n\nE. G. Birgin and Y. G. Evtushenko\n\nOptimization Methods & Software, Vol. 10 No. 2 (December 1998), Pages 125-146.\n\nAbstract: Automatic differentiation and nonmonotone spectral projected gradient techniques are used for solving optimal control problems. The original problem is reduced to a nonlinear programming one using general Runge-Kutta integration formulas. Canonical formulas which use a fast automatic differentiation strategy are given to compute derivatives of the objective function. On the basis of this approach, codes for solving optimal control problems are developed and some numerical results are presented.\n\nKeywords: Automatic differentiation, Spectral Projected Gradient, nonmonotone line search, optimal control problem, software for optimal control problems, Runge-Kutta integration methods.\n\nFull text: [pdf] [ps]","date":"2019-12-08 07:25:57","metadata":"{\"extraction_info\": {\"found_math\": true, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 1, \"mathjax_display_tex\": 0, \"mathjax_asciimath\": 1, \"img_math\": 0, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.47805914282798767, \"perplexity\": 1123.676907334947}, \"config\": {\"markdown_headings\": true, \"markdown_code\": true, \"boilerplate_config\": {\"ratio_threshold\": 0.18, \"absolute_threshold\": 10, \"end_threshold\": 15, \"enable\": true}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2019-51\/segments\/1575540507109.28\/warc\/CC-MAIN-20191208072107-20191208100107-00101.warc.gz\"}"}
null
null
Die fünfte Frau (Originaltitel: Den 5:e kvinnan) ist ein in schwedisch-norwegisch-dänischer Koproduktion entstandener TV-Krimi aus dem Jahr 2002, der auf dem gleichnamigen Roman von Henning Mankell basiert. Die Hauptrolle übernahm Rolf Lassgård, Regie führte Birger Larsen. Handlung Algerien 1994: Vier französische Nonnen und eine schwedische Touristin werden von Fundamentalisten ermordet. Ein Jahr später ereignet sich im Süden Schwedens eine Mordserie; die Opfer sind ausschließlich Männer: Ein älterer Herr mit einer Vorliebe für Vogelgedichte, ein Orchideenliebhaber sowie ein Forscher, der mit Steinen im See ertränkt wurde. In allen Fällen mussten die Opfer lang und qualvoll sterben. Kommissar Wallander steht vor einem Rätsel: Warum tötet der Serienmörder scheinbar harmlose Bürger auf derart brutale Weise? Bei seinen Ermittlungen stößt er darauf, dass zu den Morden in Algerien eine Verbindung besteht und dass es sich bei dem Täter offenbar um eine Frau handelt. Die Krankenschwester Yvonne Ander ist dringend tatverdächtig, aber nicht aussagebereit. Hintergrund Die deutsche Fassung wurde 2002 vom ZDF synchronisiert und im Dezember desselben Jahres als Zweiteiler ausgestrahlt. Der Film ist die fünfte Wallander-Verfilmung, da die neueren Verfilmungen von der Chronologie der Bücher abweichen, und erschien am 17. Februar 2003 als DVD-Version inklusive der Dokumentation Die Welten des Henning Mankell. Neben den zum zweiten Mal eingesetzten neuen Schauspielern von Wallanders Kollegen tritt auch zum ersten Mal Maya Thysell in den Filmen auf, eine Kollegin Wallanders, mit der er eine Affäre eingeht, die aber in der literarischen Vorlage nicht existiert. Kritik Die Fernsehzeitschrift prisma urteilte, die Romanverfilmung sei "ein packender Thriller, der gleichzeitig auch ein vielschichtiges Porträt Schwedens abliefert". Dass "die Vorlage in einigen Punkten geändert wurde" würde die Spannung fördern. TV Spielfilm gab dem Film die bestmögliche Bewertung (Daumen nach oben) und bezeichnete ihn als "düsteres Drama um brutale Selbstjustiz". Auszeichnungen Der Zweiteiler wurde beim Filmfestival in Venedig als beste Miniserie ausgezeichnet. Bei der Cologne Conference 2002 erhielt Birger Larsen zudem den Preis in der Kategorie "Best Fiction Program". Weblinks Einzelnachweise Filmtitel 2002 Kriminalfilm Schwedischer Film Dänischer Film Norwegischer Film Henning-Mankell-Verfilmung Fernsehfilm
{ "redpajama_set_name": "RedPajamaWikipedia" }
5,288
Q: Getting Null from Ajax Post I am trying to get my model from inside my web app, into a post Action. the only issue is that I get a model object which has 1 null variables inside :(. The action is: [HttpPost] [ValidateAntiForgeryHeader] public async Task<JsonResult> StartRound(RoundModel model) the models are as follow: Edit: thanks to Nick Bailey, I started to find heaps of issues edits to the following: * *removed Round as it wasn't needed *changed Matches to List as not sure if model constructor defaults Interfaces *changed OldId to int as that is the only type it will ever be and Json object had it as an int coming up to the action *changed SystemId and AdminAprovedWinnerId to nullable as both are expected to be able to be null *un-redacted all of constructors, I found out that I had no default constructor so therefore there was no way for it to be constructed *added default constructor as mentioned above public class RoundModel { public List<ClientMatch> Matches { get; set; } // null in action } public class ClientMatch { public int OldId { get; set; } public string RoundName { get; set; } public string ServerName { get; set; } public string ServerPassword { get; set; } public string ServerMessage { get; set; } public Guid? SystemId { get; set; } public Guid? AdminAprovedWinnerId { get; set; } public Guid TeamAId { get; set; } public Guid TeamBId { get; set; } public int TeamAVote { get; set; } public int TeamBVote { get; set; } public ClientMatch() { } public ClientMatch(MatchWithTmpId noGuid) { ... } } As you will notice, the Round object is a Code First model with Virtual attributes. I have removed it from RoundModel just prior to uploading this question to test it, and removing it doesn't resolve the issue. and my Ajax post Edit: thanks to Nick Bailey, I started to find heaps of issues edits to the following: * *SystemId now passes null as 0 cannot parse into GUID *TeamAVote, TeamBVote both passing through 1 (which coresponds to an enum) *Currently I have them nested inside of RoundModel as it was what I was last trying to get it working POST http://localhost:52690/Admin/StartRound HTTP/1.1 Host: localhost:52690 Connection: keep-alive Content-Length: 752 Accept: */* Origin: http://localhost:52690 X-Requested-With: XMLHttpRequest __RequestVerificationToken: TU5lBruq0K0FBxviWOS1GVjtRFw0edbCvE57bzh3wikqlXTw384jgxGBic61nMgUNwAXRgbf50cpk0naKADQgwnR9aNq1R55SSHj6UvszBRdfJ8nt362OFBQLC7eWLTwAwPJUVkRrFQkCOnZwtL6SQ2 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.101 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Referer: http://localhost:52690/Admin/MatchScheduler Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.8 Cookie: redacted { "RoundModel":{ "Matches":[ { "SystemId":null, "OldId":0, "RoundName":"awd", "ServerName":"Apogawd0", "ServerPassword":"apog", "ServerMessage":"Can Team \"Lovin it\" please create server \"Apogawd0\" hosted in Oceania Servers, random map", "AdminAprovedWinnerId":null, "TeamAId":"74206e93-33aa-48d4-bac2-5f9acac0be90", "TeamBId":"35d4be62-4e3e-4575-8ce9-6c819382b50c", "TeamAVote":1, "TeamBVote":1 } ] } } Any and all help appreciated, Cheers, Michael. edit cont: I have made allot of changes thanks to Nick remdining me of the basics, haha I have spent too much time in JS land. Still getting null on Matches A: You're passing an empty object for your round parameter, so naturally it comes in null. TeamAVote and TeamBVote are non nullable fields on your client match model, so the Jason serialized can't parse the null values you posted. I'd make those fields nullable. Also, it's usually a really good idea to use different models for your API models and data models. The usually differ enough that shared code becomes a problem. A: The final piece of the puzzle was a frustrating one. I stopped using JSON as form data and went back to my raw js object and all a sudden, success! So I looked again at the headers and sure enough: Content-Type: application/x-www-form-urlencoded; charset=UTF-8 so I went into my Ajax method and added: contentType: "application/json" Finally :) Success, thanks Nick Bailey, it was you who got me on the right track so I will be awarding you the answer. Please edit your Question to indicate that the full answer is in my answer, or just update yours to include the solution. Thanks again!
{ "redpajama_set_name": "RedPajamaStackExchange" }
5,914
You might need to share the link from the share button rather then the url from the browser. Or if you're trying to nest a VML button inside a VML background that will break. Don't think anyone has nailed that yet. Hi Mark, thanks for responding. We are nesting a CTA button within a background image and it is working within all major clients with the exception of Outlook 2013. And only then, the issue is that it ignores the left padding around the CTA . We did try adding the <center> tag but that created a host of other rendering issues. That is a bit of a strange one, not too sure why that's happening. Instead of using the padding-left:50px you could add a spacer cell next to the button. <table border="0" cellpadding="0" cellspacing="0" width="100%" bgcolor="#ffffff" width="187" height="50" alt="Salesforce Analytics Cloud" style="display: block; font-family:'SalesforceSansRegular', Helvetica, Arial, sans-serif;font-size:12px;line-height:50px;color:#009ddc;border-style:none;text-decoration:none;" <table border="0" align="left" cellpadding="0" cellspacing="0" bgcolor="#ffffff" <a href="http://www.salesforce.com" title="See the Infographic" target="_blank" <table border="0" align="center" cellpadding="0" cellspacing="0" bgcolor="#ffffff" <img class="mobile-image" alt="Your document security blanket. Protect your documents the easy way. See how" <td align="left" valign="top" style="font-family:'SalesforceSansRegular', Helvetica, Arial, sans-serif;font-size:16px;line-height:22px;color:#555555;padding-top:30px;padding-right:30px;padding-bottom:15px;padding-left:30px;" <td align="left" valign="top" style="font-family:'SalesforceSansRegular', Helvetica, Arial, sans-serif;font-size:16px;line-height:22px;color:#555555;padding-right:30px;padding-bottom:15px;padding-left:30px;" <td align="left" valign="top" style="font-family:'SalesforceSansRegular', Helvetica, Arial, sans-serif;font-size:16px;line-height:22px;color:#555555;padding-right:30px;padding-bottom:20px;padding-left:30px;" <td align="left" valign="top" style="font-family:'SalesforceSansRegular', Helvetica, Arial, sans-serif;font-size:14px;line-height:22px;color:#0077BB;padding-right:30px;padding-bottom:30px;padding-left:30px;font-weight:bold" <a href="http://www.salesforce.com" title="Test-drive Wave" style="color:#02b2a8;font-weight:bold;text-decoration:none"
{ "redpajama_set_name": "RedPajamaC4" }
1,746
Ben Harrington (born 13 October 2001) is a New Zealand freestyle skier who specialises in halfpipe. He is representing New Zealand at the 2022 Winter Olympics in Beijing. Biography Harrington was born in Dunedin on 13 October 2001, the son of Greg Harrington and Nancy Stout. He is the older brother of Luca Harrington, who won a bronze medal in the boy's halfpipe at the 2020 Winter Youth Olympics. Ben Harrington began skiing when he was 18 months old, and rode his first halfpipe at the age of six. He was educated at Mount Aspiring College in Wānaka, and is now a business student at Massey University. Harrington made his FIS Freestyle Ski World Cup debut in the 2016–2017 season, with a 36th placing at Copper Mountain in December 2016. In the 2017–2018 season, he was 51st in the World Cup halfpipe rankings. At the FIS Freestyle Junior World Ski Championships at Cardrona Alpine Resort in September 2018, he finished fourth in the halfpipe, before tearing his anterior cruciate ligament and medial collateral ligament. He returned to competition in late 2019, and competed in the freeski halfpipe at the 2021 World Championships, placing 15th. References 2001 births Living people Sportspeople from Dunedin People educated at Mount Aspiring College Massey University alumni Freestyle skiers at the 2022 Winter Olympics Olympic freestyle skiers of New Zealand New Zealand male freestyle skiers
{ "redpajama_set_name": "RedPajamaWikipedia" }
9,574
At Essex Stage we aim to keep you up-to-date with what's going on in Essex, including Essex cinema and Essex theatre listings. We also have cinema listings for many surrounding areas including Kent, Middlesex, Northants, Buckinghamshire, Suffolk, Norfolk, Cambridgeshire, Bedfordshire, Herts and North and East London. We've now also added cinemas in Surrey. We have guides to what's going on around Essex at the cinema , as well as listings for cinemas in Southend, Chelmsford, Romford, Harlow, Clacton and Colchester plus the rest of Essex. We've now also added many more cinemas in surrounding areas in Kent, Suffolk, Cambridgeshire, Hertfordshire, Middlesex, Buckinghamshire, Northamptonshire, Norfolk and London including popular venues such as Bishops Stortford, Ipswich, Stevenage, Bury St Edmunds, Ashford and Cambridge. We've now also added cinemas in Surrey. Check out our much expanded and up-to-date What's on at your local cinema page for further details. We've now also added a dedicated theatres page for theatre listings for all the areas and counties mentioned above. We have listings for theatres such as the Cliffs Pavilion, Westcliff-on-Sea, the New Empire Theatre, Southend-on-Sea, the Harlow Playhouse, the Kenneth More Theatre, Ilford, the Mercury Theatre, Colchester and the Thameside Theatre, Grays as well as many others. The Palace Theatre, Westcliff-on-Sea has now re-opened - click here for listings at the Palace Theatre. We have also begun to add theatre listings for all the areas that we currently cover on our What's on theatres page. If you would like to submit a listing or theatre or cinema then please contact us. Also, check out our new movie news, latest film reviews and entertainment news as well as the latest showbiz gossip, TV news and UK tabloid news and stories. With so much to keep track of, we hope that you'll let us know if you have an Essex event that's soon to take place that you want to publicise. We'll advertise it for you for free on our clubs page. All you have to do is agree to link back to Essex Stage in return. Check out also our directory pages of Essex stage and dance schools covering many areas in Essex including Southend, Chelmsford, Basildon, Clacton, Harlow, Romford, Ilford, Clacton and Colchester. If you would like to exchange links with Essex Stage please contact us. If you would like to advertise on Essex Stage please contact us. Plus, don't forget to visit the Essex Stage Amazon Shop where you can purchase iPods, MP3 players and many other electrical items plus DVD players, CDs and much, much more. Check out our new section for London and West End theatre tickets - see top London shows at discounted prices with tickets direct from top ticket agents. Essex Stage also has fantastic web hosting packages available. Packages include 500Mb of webspace, 20Gb of monthly bandwidth, 200 POP3 emails and much more - all for just £90 per annum. All packages come with their own dedicated control panel. For further details contact us. Add Essex Stage to your favourites or bookmarks now by clicking on the 'bookmark' icon on the top navigation bar or press 'control D' if you are using firefox. Or contact us now! We also offer great value dancewear from Dancewear4u.
{ "redpajama_set_name": "RedPajamaC4" }
4,350
The Sound Transit Board of Directors has selected the alignment for extending light rail to Federal Way. The route, with stations at Kent/Des Moines near Highline College, South 272nd Street, and the Federal Way Transit Center, will travel along the west side of Interstate 5 between stations and maximize future transit oriented development around the stations. "Identifying a route gives us a clear path forward for bringing light rail to Federal Way by 2024," said Sound Transit Boardmember and King County Councilmember Peter von Reichbauer. "In just a few years' time, the people of South King County will enjoy the convenience of light rail that thousands of other regional commuters already enjoy." "South King County desperately needs more public transit to connect people to jobs and schools, said Sound Transit Boardmember and King County Councilmember Dave Upthegrove. "This is an exciting step forward." The selected 7.8-mile route will extend south from the Angle Lake Station in the City of SeaTac, cross State Route 99, continue along the south edge of the future SR 509 highway to Interstate 5, and travel south along the west side of the I-5 freeway. In the Kent/Des Moines station area, the route will transition west near Highline College with a station along the west side of 30th Avenue South. The alignment will then continue south along the west side of I-5 to the Star Lake Park and Ride at South 272nd Street in the City of Kent. South of South 272nd, the alignment will continue along the west side of I-5 before curving west at South 317th Street and terminating at the Federal Way Transit Center at the west side of 23rd Avenue South and north of South 320th Street. A map of the selected alignment is available at www.soundtransit.org/Projects-and-Plans/Federal-Way-Link-Extension/Location-FWLE. The Board selected the alignment and stations after receiving public feedback on a Final Environmental Impact Statement published in November. Following yesterday's action by the Board, Sound Transit will request a Record of Decision from the Federal Transit Administration. Following the Record of Decision, procurement for a design-build contractor would begin, with construction scheduled to start in 2019. In addition to yesterday's action selecting the alignment, Sound Transit, King County Metro and the Federal Way School District signed a Memorandum of Agreement to work diligently toward a transaction with King County Metro that could enable the school district to acquire the nearby Redondo Park-and-Ride property. The current Mark Twain Elementary School property, which is in close proximity to the new light rail station at S. 272nd, could potentially be transferred to King County Metro or Sound Transit to be used for transit oriented development. "This is a potential win/win/win for all parties involved. Mark Twain Elementary School will gain a better location for expansion; Sound Transit will avoid $30 million in additional cost to the taxpayer; and Federal Way residents will benefit from enhanced transit oriented development," said Sound Transit CEO Peter Rogoff. "Extraordinary creativity and collaboration between the Federal Way Public School District, King County Metro and Sound Transit led to this very positive solution." By the time light rail begins serving Federal Way in 2024, Sound Transit will be operating Link across more than 60 miles of light rail service to Northgate and Lynnwood; Mercer Island, Bellevue and downtown Redmond; and Tacoma Link to Hilltop. Link is expected to carry more than 80 million riders annually by 2030.
{ "redpajama_set_name": "RedPajamaC4" }
8,493
A De Montfort University Leicester (DMU) team has trialled a pioneering new system with the support of Scottish Water to clean toxic industrial wastewaters -- a process that could benefit our health, the environment and industry. Conducted at Scottish Water's wastewater development centre, the trial removed toxic pollutants to a level that would enable the waste to be treated locally. This means the water is cleared of a large number of 'nasties' -- such as oils and pesticides - so that it can be disposed of in a way that meets strict regulations. DMU's Wastewater Research Group, including PhD students, carried out initial scientific testing ahead of the three-month field trial, focused on the removal (advanced oxidation process) of priority substances. The university's reactor, housed in a shipping container, was transported to Bo'ness to the wastewater development centre run by Scottish Water Horizons -- a commercial subsidiary of the utility.
{ "redpajama_set_name": "RedPajamaC4" }
2,698
{"url":"http:\/\/cran.uni-muenster.de\/web\/packages\/pbkrtest\/vignettes\/a02-coercion.html","text":"# 02 - Coercion between model objects and restriction matrices in \u2018pbkrtest\u2019\n\nPackage version: 0.5.2\n\nConsider two linear models; the smaller is a submodel of the large:\n\nN <- 4\ndat <- data.frame(int=rep(1, N), x=1:N, y=rnorm(N))\nlg <- lm(y ~ x + I(x^2), data=dat)\nsm <- lm(y ~ x, data=dat)\nlg\n##\n## Call:\n## lm(formula = y ~ x + I(x^2), data = dat)\n##\n## Coefficients:\n## (Intercept) x I(x^2)\n## 3.3611 -1.3818 0.1324\nsm\n##\n## Call:\n## lm(formula = y ~ x, data = dat)\n##\n## Coefficients:\n## (Intercept) x\n## 2.6990 -0.7197\n\nThe corresponding model matrices are\n\nXlg <- model.matrix(lg)\nXsm <- model.matrix(sm)\nXlg\n## (Intercept) x I(x^2)\n## 1 1 1 1\n## 2 1 2 4\n## 3 1 3 9\n## 4 1 4 16\n## attr(,\"assign\")\n## [1] 0 1 2\nXsm\n## (Intercept) x\n## 1 1 1\n## 2 1 2\n## 3 1 3\n## 4 1 4\n## attr(,\"assign\")\n## [1] 0 1\n\nGiven the two model matrices, the restriction matrix which describes the restrictions that should be made to the model matrix of the large model to produce the model matrix of the small model:\n\nL <- make_restriction_matrix(Xlg, Xsm)\nL \n## [,1] [,2] [,3]\n## [1,] 0 0 -1\n\nGiven the model matrix of the large model and the restriction matrix, the model matrix of the small model can be constructed as:\n\nXsm_2 <- make_model_matrix(Xlg, L)\nXsm_2\n## [,1] [,2]\n## 1 1 1\n## 2 2 1\n## 3 3 1\n## 4 4 1\n\nThe same operation can be made directly on model objects:\n\nL <- model2restriction_matrix(lg, sm)\nL\n## [,1] [,2] [,3]\n## [1,] 0 0 -1\n\nLikewise, given the large model and the restriction matrix, the small model can be constructed:\n\nsm_2 <- restriction_matrix2model(lg, L)\nsm_2\n##\n## Call:\n## lm(formula = y ~ .X1 + .X2 - 1, data = structure(list(.X1 = c(1,\n## 2, 3, 4), .X2 = c(1, 1, 1, 1), y = c(2.35880696402226, 0.385927588718172,\n## 1.14883382329707, -0.29436026637611), x = 1:4, I(x^2) = structure(c(1,\n## 4, 9, 16), class = \"AsIs\")), class = \"data.frame\", row.names = c(NA,\n## 4L)))\n##\n## Coefficients:\n## .X1 .X2\n## -0.7197 2.6990\nsm_2 |> model.matrix()\n## .X1 .X2\n## 1 1 1\n## 2 2 1\n## 3 3 1\n## 4 4 1\n## attr(,\"assign\")\n## [1] 1 2\n\nLastly, model matrices can be compared\n\n## The first column space contains the second\ncompare_column_space(Xlg, Xsm)\n## [1] 1\n## The second column space contains the first\ncompare_column_space(Xsm, Xlg)\n## [1] 0\n## The two column spaces are identical\ncompare_column_space(Xlg, Xlg) \n## [1] -1","date":"2023-03-21 17:54:29","metadata":"{\"extraction_info\": {\"found_math\": true, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 0, \"mathjax_display_tex\": 0, \"mathjax_asciimath\": 1, \"img_math\": 0, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.5818171501159668, \"perplexity\": 12418.412131588932}, \"config\": {\"markdown_headings\": true, \"markdown_code\": true, \"boilerplate_config\": {\"ratio_threshold\": 0.3, \"absolute_threshold\": 10, \"end_threshold\": 15, \"enable\": true}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2023-14\/segments\/1679296943704.21\/warc\/CC-MAIN-20230321162614-20230321192614-00321.warc.gz\"}"}
null
null
Q: AS3 passing a function as a parameter creates memory leaks I have a function that takes another function as a parameter. Something like this : public function onHits(target : Shape, callback : Function) : void I use it by passing a member function as a parameter that should be called whenever the passed target hits something. The function is called many times a frame. So it is used by doing : //code... CollisionManager.onHits(myShape, onHitCB); //code... The on hit function : public function onHitCB(hitObject : *) : void { //removed all code to test this problem } When I do this, I have a memory leak. I've isolated the problem to that onHits method and have commented out everything else. onHits is an empty method with no code inside it, onHitCB is also empty. If I comment out the call to onHits, there is no memory leak and if I pass null instead of onHitCB there is no memory leak. So it's clearly when I pass onHitCB as a parameter that's the problem. So I thought it might be because Flash allocates some memory to create the Function pointer and doesn't release it but I call System.gc() every frame in debug mode and the leak is still there. Which would mean that this is either a bug in the SDK or I'm not doing something right. I have found a weird workaround by keeping a variable that points to the function which I assign in the constructor of my object : private var func : Function; public function MyObject() { func = onHitCB; } and this will clear the memory leak even if I still pass onHitCB as the parameter. So that would mean that it's not the "getter" function to obtain the onHitCB but something else causing the memory leak? I'm very confused. How can this cause a memory leak : public function MyObject() { } public function update() : void { CollisionManager.onHits(myShape, onHitCB);//empty function } public function onHitCB(hitObject : *) : void { //removed all code to test this problem } but not this? : private var func : Function; public function MyObject() { func = onHitCB; } public function update() : void { CollisionManager.onHits(myShape, onHitCB);//empty function } public function onHitCB(hitObject : *) : void { //removed all code to test this problem } and is there a way to not have to do this workaround? A: [...] bound methods are automatically created when you pass a method as a parameter. Bound methods ensure that the this keyword always references the object or class in which a method is defined. Source That sounds like creating a reference to a method isn't using a simple getter. A new method closure object is generated. So your assumption is right. I wonder why the references aren't cached for each instance and why they aren't garbage collected though. Better avoid creating multiple references. Referencing a method only once is exactly what I would do when I would have to use that method in multiple places, so most of the time I wouldn't call it a workaround but a good DRY practice. In your example it makes sense of course, assuming a method reference would be using a simple getter. A: For more information on exactly what does and does not cause memory leaks when you use functional techniques, check out http://www.developria.com/2010/12/functional-actionscript-part-1.html . Also, be aware that using static methods like this is really bad practice (http://misko.hevery.com/code-reviewers-guide/flaw-brittle-global-state-singletons/), and you're just beginning to encounter the many problems that are caused by using this technique. It sounds like you're early enough in your project that you're not completely committed to this path, so you might want to look at other ways to program this. A: I'm not sure what your code is about in the onHits function, but if it not requiring additional time to finish in another cycle. then i recomend you to do like this: static public function onHits(target : Shape) : * { // do what you need // return the hitObject; return hitObject; } and public function update() : void { // parse the object direc to to the function. onHitCB ( CollisionManager.onHits(myShape) ); } public function onHitCB(hitObject : *) : void { if ( hitObject == null ) return; // if it not null then do all your calculations. //removed all code to test this problem } A: And this is why we don't do this kind of thing in OOP style programing. Your best bet is to do it properly and add the callback to the CollisionManager class. The reason it can be GCed when you keep a local reference is because the function never loses scope because that var is there holding the reference. Once something looses scope it becomes nearly impossible to GC it. Try this and watch how you lose scope. private var somevar:String = 'somevar with a string'; public function MyObject() { } public function update() : void { CollisionManager.onHits(myShape, onHitCB);//empty function } public function onHitCB(hitObject : *) : void { trace(this.somevar) // scope should be lost at this point and somevar should be null or toss an error. }
{ "redpajama_set_name": "RedPajamaStackExchange" }
3,392
{"url":"http:\/\/lara.epfl.ch\/w\/sav08:hoare_logic?rev=1429630213&do=diff","text":"\u2022 English only\n\n# Differences\n\nThis shows you the differences between two versions of the page.\n\nsav08:hoare_logic [2009\/03\/04 11:03]\nvkuncak\nsav08:hoare_logic [2015\/04\/21 17:30] (current)\nLine 28: Line 28:\nWhen $P, Q \\subseteq S$ (sets of states) and $r \\subseteq S\\times S$ (relation on states, command semantics) then\u00a0When $P, Q \\subseteq S$ (sets of states) and $r \\subseteq S\\times S$ (relation on states, command semantics) then\nHoare triple\u00a0Hoare triple\n-$+\\begin{equation*} \\{P \\}\\ r\\ \\{ Q \\} \\{P \\}\\ r\\ \\{ Q \\} -$+\\end{equation*}\nmeans\u00a0means\n-$+\\begin{equation*} \\forall s,s' \\in S. s \\in P \\land (s,s') \\in r \\rightarrow s' \\in Q \\forall s,s' \\in S. s \\in P \\land (s,s') \\in r \\rightarrow s' \\in Q -$+\\end{equation*}\nWe call $P$ precondition and $Q$ postcondition.\u00a0We call $P$ precondition and $Q$ postcondition.\n\nNote: weakest conditions (predicates) correspond to largest sets; strongest conditions (predicates) correspond to smallest sets that satisfy a given property (Graphically,\u200b a stronger condition $x > 0 \\land y > 0$ denotes one quadrant in plane, whereas a weaker condition $x > 0$ denotes the entire half-plane.)\u00a0Note: weakest conditions (predicates) correspond to largest sets; strongest conditions (predicates) correspond to smallest sets that satisfy a given property (Graphically,\u200b a stronger condition $x > 0 \\land y > 0$ denotes one quadrant in plane, whereas a weaker condition $x > 0$ denotes the entire half-plane.)\n+\n\nLine 46: Line 47:\n\nDefinition: for $P \\subseteq S$, $r \\subseteq S\\times S$,\u00a0Definition: for $P \\subseteq S$, $r \\subseteq S\\times S$,\n-$+\\begin{equation*} \u200bsp(P,\u200br) = \\{ s' \\mid \\exists s. s \\in P \\land (s,s') \\in r \\} \u200bsp(P,\u200br) = \\{ s' \\mid \\exists s. s \\in P \\land (s,s') \\in r \\} -$+\\end{equation*}\n\n-This is simply\u00a0\u200brelation image of a set. (See\u00a0[[Sets and relations#\u200bRelation Image]].)+This is simply [[Sets and relations#\u200bRelation Image]]\u00a0\u200bof a set.\n\n{{sav08:\u200bsp.png?\u200b400x250|}}\u00a0{{sav08:\u200bsp.png?\u200b400x250|}}\nLine 65: Line 66:\n\nDefinition: for $Q \\subseteq S$, $r \\subseteq S \\times S$,\u00a0Definition: for $Q \\subseteq S$, $r \\subseteq S \\times S$,\n-$+\\begin{equation*} \u200bwp(r,\u200bQ) = \\{ s \\mid \\forall s'. (s,s') \\in r \\rightarrow s' \\in Q \\} \u200bwp(r,\u200bQ) = \\{ s \\mid \\forall s'. (s,s') \\in r \\rightarrow s' \\in Q \\} -$+\\end{equation*}\n\nNote that this is in general not the same as $sp(Q,\u200br^{-1})$ when relation is non-deterministic.\u00a0Note that this is in general not the same as $sp(Q,\u200br^{-1})$ when relation is non-deterministic.\nLine 86: Line 87:\n\nIf instead of good states we look at the completement set of \"error states\",\u200b then $wp$ corresponds to doing $sp$ backwards.\u00a0\u200b In other words, we have the following:\u00a0If instead of good states we look at the completement set of \"error states\",\u200b then $wp$ corresponds to doing $sp$ backwards.\u00a0\u200b In other words, we have the following:\n-$+\\begin{equation*} S \\setminus wp(r,Q) = sp(S \\setminus Q,r^{-1}) S \\setminus wp(r,Q) = sp(S \\setminus Q,r^{-1}) -$+\\end{equation*}\n\n==== Disjunctivity of sp ====\u00a0==== Disjunctivity of sp ====\n\n-$+\\begin{equation*} \u200bsp(P_1 \\cup P_2,r) = sp(P_1,r) \\cup sp(P_2,r) \u200bsp(P_1 \\cup P_2,r) = sp(P_1,r) \\cup sp(P_2,r) -$\u00a0+\\end{equation*}\n-$+\\begin{equation*} \u200bsp(P,\u200br_1 \\cup r_2) = sp(P,r_1) \\cup sp(P,r_2) \u200bsp(P,\u200br_1 \\cup r_2) = sp(P,r_1) \\cup sp(P,r_2) -$+\\end{equation*}\n\n==== Conjunctivity of wp ====\u00a0==== Conjunctivity of wp ====\n\n-$+\\begin{equation*} wp(r,Q_1 \\cap Q_2) = wp(r,Q_1) \\cap wp(r,Q_2) wp(r,Q_1 \\cap Q_2) = wp(r,Q_1) \\cap wp(r,Q_2) -$+\\end{equation*}\n\n-$+\\begin{equation*} wp(r_1 \\cup r_2,Q) = wp(r_1,Q) \\cap wp(r_2,Q) wp(r_1 \\cup r_2,Q) = wp(r_1,Q) \\cap wp(r_2,Q) -$+\\end{equation*}\n\n==== Pointwise wp =====\u00a0==== Pointwise wp =====\n\n-$+\\begin{equation*} wp(r,Q) = \\{ s \\mid s \\in S \\land sp(\\{s\\},r) \\subseteq Q \\} wp(r,Q) = \\{ s \\mid s \\in S \\land sp(\\{s\\},r) \\subseteq Q \\} -$+\\end{equation*}\n\n==== Pointwise sp =====\u00a0==== Pointwise sp =====\n\n-$+\\begin{equation*} \u200bsp(P,\u200br) = \\bigcup_{s \\in P} sp(\\{s\\},\u200br) \u200b \u200bsp(P,\u200br) = \\bigcup_{s \\in P} sp(\\{s\\},\u200br) \u200b -$+\\end{equation*}\n\n==== Three Forms of Hoare Triple ====\u00a0==== Three Forms of Hoare Triple ====\nLine 134: Line 135:\n\nLet $P$ and $Q$ be formulas in our language $F$ (see [[simple programming language]]). We define Hoare triples on these syntactic entities by taking their interpretation as sets and relations:\u00a0Let $P$ and $Q$ be formulas in our language $F$ (see [[simple programming language]]). We define Hoare triples on these syntactic entities by taking their interpretation as sets and relations:\n-$+\\begin{equation*} \\{ P \\} c \\{ Q \\} \u200b \\{ P \\} c \\{ Q \\} \u200b -$+\\end{equation*}\nmeans\u00a0means\n-$+\\begin{equation*} \\forall s_1, s_2.\\ f_T(P)(s_1) \\land (s_1,s_2) \\in r_c(c) \\rightarrow f_T(Q)(s_1) \\forall s_1, s_2.\\ f_T(P)(s_1) \\land (s_1,s_2) \\in r_c(c) \\rightarrow f_T(Q)(s_1) -$+\\end{equation*}\nIn words: if we start in a state satisfying $P$ and execute $c$, we obtain a state satisfying $Q$.\u00a0\u00a0\u200b\u00a0In words: if we start in a state satisfying $P$ and execute $c$, we obtain a state satisfying $Q$.\u00a0\u00a0\u200b\n\nLine 149: Line 150:\n===== Composing Hoare Triples =====\u00a0===== Composing Hoare Triples =====\n\n-$+\\begin{equation*} \\frac{ \\{P\\} c_1 \\{Q\\}, \\ \\ \\{Q\\} c_2 \\{R\\} } \\frac{ \\{P\\} c_1 \\{Q\\}, \\ \\ \\{Q\\} c_2 \\{R\\} } { \\{P\\} c_1 ; c_2 \\{ R \\} } { \\{P\\} c_1 ; c_2 \\{ R \\} } -$+\\end{equation*}\n\nWe can prove this from\u00a0\u00a0We can prove this from","date":"2019-06-17 05:56:04","metadata":"{\"extraction_info\": {\"found_math\": true, \"script_math_tex\": 0, \"script_math_asciimath\": 0, \"math_annotations\": 0, \"math_alttext\": 0, \"mathml\": 0, \"mathjax_tag\": 0, \"mathjax_inline_tex\": 2, \"mathjax_display_tex\": 0, \"mathjax_asciimath\": 0, \"img_math\": 0, \"codecogs_latex\": 0, \"wp_latex\": 0, \"mimetex.cgi\": 0, \"\/images\/math\/codecogs\": 0, \"mathtex.cgi\": 0, \"katex\": 0, \"math-container\": 0, \"wp-katex-eq\": 0, \"align\": 0, \"equation\": 0, \"x-ck12\": 0, \"texerror\": 0, \"math_score\": 0.9397291541099548, \"perplexity\": 3114.354649253709}, \"config\": {\"markdown_headings\": true, \"markdown_code\": true, \"boilerplate_config\": {\"ratio_threshold\": 0.18, \"absolute_threshold\": 10, \"end_threshold\": 15, \"enable\": true}, \"remove_buttons\": true, \"remove_image_figures\": true, \"remove_link_clusters\": true, \"table_config\": {\"min_rows\": 2, \"min_cols\": 3, \"format\": \"plain\"}, \"remove_chinese\": true, \"remove_edit_buttons\": true, \"extract_latex\": true}, \"warc_path\": \"s3:\/\/commoncrawl\/crawl-data\/CC-MAIN-2019-26\/segments\/1560627998376.42\/warc\/CC-MAIN-20190617043021-20190617065021-00465.warc.gz\"}"}
null
null
BMW will make three additional car models in China Home » BMW will make three additional car models in China July 16, 2014 / 1 minutes read BMW says three additional car models will be built in China, including a new compact. BMW confirmed plans to expand the capacity of its two manufacturing plants in China. "We are strengthening our focus on meeting the needs and aspirations of our Chinese customers," said Friedrich Eichiner, BMW's chief finance officer, according to the text of a speech he delivered in Beijing. "We are going to double our range of locally produced models in the future—from three to six." The company's plants in Dadong and Tiexi can produce up to 300,000 vehicles combined a year. BMW plans to expand that capacity to a combined 400,000 cars over the next two years. The plants now produce the 5 Series sedans, the 3 Series sedan, and the X1. The new compact car to be built in China is rumored to be a new luxury compact to compete with rivals from Nissan and Mercedes-Benz. READ ALSO: BMW sees China as biggest electric vehicles market BMW also will roll out a variant of its X3 SUV, made especially for China, and an as yet unidentified model targeting Chinese families that Mr. Eichiner described as "a high functionality car that combines usability and typical BMW dynamics." [Source: NYTimes] BMW China BMW M3 CS Costs Nearly $200,000 USD in Some Countries
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
7,981
2. Materials and Methods BRCA1 May Modulate Neuronal Cell Cycle Re-Entry in Alzheimer Disease Teresa A. Evans1, Arun K. Raina1, André Delacourte2, Olga Aprelikova3, Hyoung-gon Lee1, Xiongwei Zhu1, George Perry1,4, Mark A. Smith1 1. Department of Pathology, Case Western Reserve University, Cleveland, Ohio 44106, USA 2. Inserm U837, JPARC, Bat. G. Biserte, 1 place de Verdun, 59045 Lille cedex, France 3. Laboratory of Biosystems and Cancer, National Cancer Institute, NIH, Bethesda, Maryland 20892, USA 4. College of Sciences, University of Texas at San Antonio, San Antonio, Texas 78249, USA Evans TA, Raina AK, Delacourte A, Aprelikova O, Lee Hg, Zhu X, Perry G, Smith MA. BRCA1 May Modulate Neuronal Cell Cycle Re-Entry in Alzheimer Disease. Int J Med Sci 2007; 4(3):140-145. doi:10.7150/ijms.4.140. Available from https://www.medsci.org/v04p0140.htm In Alzheimer disease, neuronal degeneration and the presence of neurofibrillary tangles correlate with the severity of cognitive decline. Neurofibrillary tangles contain the antigenic profile of many cell cycle markers, reflecting a re-entry into the cell cycle by affected neurons. However, while such a cell cycle re-entry phenotype is an early and consistent feature of Alzheimer disease, the mechanisms responsible for neuronal cell cycle are unclear. In this regard, given that a dysregulated cell cycle is a characteristic of cancer, we speculated that alterations in oncogenic proteins may play a role in neurodegeneration. To this end, in this study, we examined brain tissue from cases of Alzheimer disease for the presence of BRCA1, a known regulator of cell cycle, and found intense and specific localization of BRCA1 to neurofibrillary tangles, a hallmark lesion of the disease. Analysis of clinically normal aged brain tissue revealed systematically less BRCA1, and surprisingly in many cases with apparent phosphorylated tau-positive neurofibrillary tangles, BRCA1 was absent, yet BRCA1 was present in all cases of Alzheimer disease. These findings not only further define the cell cycle reentry phenotype in Alzheimer disease but also indicate that the neurofibrillary tangles which define Alzheimer disease may have a different genesis from the neurofibrillary tangles of normal aging. Keywords: Alzheimer disease, BRCA1, cell cycle, oncogenesis Neurofibrillary tangles (NFT) are the cardinal intracellular lesion of Alzheimer disease (AD), and are also found in normal aging, albeit to a lesser extent. Highly phosphorylated tau protein is considered the predominant proteinaceous component of NFT [1], however, numerous other proteins have also been localized to these lesions including neurofilaments [2], ubiquitin [3, 4], amyloid-β [5], and cell cycle markers [6-11]. Notably, NFT associated with normal aging are viewed as being quantitatively different, but qualitatively identical [12]. Whether the mechanisms responsible for the genesis of NFT in AD are similar or different from the genesis of NFT in normal aging is unknown. BRCA1 is expressed in dividing neuronal cells during development, and is present in smaller amounts in fully differentiated cells [13]. BRCA1 is known to regulate transcription, regulate cell cycle progression, and may even have a role in maintaining telomere function and as such the presence of BRCA1 is indicative of cell cycle changes and DNA damage, both of which are pathogenic changes in AD. Nucleic acid damage is well-documented in AD, specifically within the pyramidal neurons, the population susceptible to neurodegeneration and death [14-18]. Consequently, tumor suppressor proteins such as p21, p27, p53 are activated by BRCA1, are indicative of DNA damage [19], and are activated in AD [6, 20]. Such tumor suppressors play a role in suppression of the cell cycle and cell survival instead of apoptosis and their presence may be a neuroprotective factor to prolong the life of the cell after re-entry into the cell cycle, protecting neurons from completion of apoptosis [21]. These proteins have come to the forefront as molecular candidates to be used in discrimination between normal aging and pathological diseases. Neuroprotective factors have also been suggested as a possible target for drug design efforts with the goal of halting the progression of the cell cycle and delaying apoptosis. [22-24]. BRCA1 is also associated with a spectrum of functions related to the preservation of genomic stability [25]. For example, BRCA1 is involved in transcriptional activation and growth inhibition [26-28], transcription coupled repair (TCR) of oxidative damage to DNA and other DNA repair [29, 30], and association with γ-tubulin, a central component of the microtubule organizing center and centrosomes, thus implying a regulatory role in G2/M progression [31]. There are also a host of putative functions assigned to BRCA1 based on its structure and associations. Among these include association with BARD1, cyclin A and cyclin D kinases which phosphorylate BRCA1 [32]. Many of these known functions of BRCA have also been associated with AD. Oxidative DNA damage, as well as RNA damage [15, 16], has been well documented in the aging brain, contributing to the development of AD [18]. Further, even cases of mild cognitive impairment display the same abnormalities, prompting the search for increased DNA repair mechanism in cases of neurodegeneration [33]. Evidence of cell cycle dysfunction and the oxidative DNA damage profile in AD caused speculation that BRCA1 may play a role in disease pathogenesis. There are clearly a number of striking parallels between AD and cancer, including age, and likely multiple etiologies and risk factors [34]. As for cancer, the notion of a "two-hit" hypothesis has also been proposed [35, 36]. The latter may separate AD from normal aging. Indeed, while cells, in this case neurons, have the capacity to maintain homeostatic balance and function under condition of stress, several "hits" may disrupt the cells' regeneration capacity leading to neurodegeneration and death. This stress may be oxidative insult or metabolic inefficiency. Possibilities for other "hits" include genetic mutations in apolipoprotein E, presenilins, or amyloid-β protein precursor, hormonal dysregulation, environmental or education status, inflammatory responses, or perhaps even the induction of oncogenic-like pathways [37]. To this end, we found that the BRCA1 protein is strongly associated with NFT in AD yet a feature of only about half of the cases of normal aging containing tau-positive NFT. Elevations in BRCA1 in neurons in AD may represent an attempt towards homeostasis by the cell, working with other factors to halt the cell cycle and mediate DNA repair. Interestingly, a much higher proportion of NFT were labeled in AD cases than in control cases. These findings hint at differential mechanisms of NFT genesis in AD and in normal aging and/or distinct cellular responses to these changes. Hippocampal and cortical specimens were obtained postmortem from patients with histopathologically confirmed AD (n = 33, age 65-93, mean 82.3) and control (n = 28, age = 47-89, mean 73.5). Tissue was fixed either in 10% buffered formalin or in methacarn (methanol:chloroform:acetic acid, 6:3:1), and embedded in paraffin. 6μm sections were deparaffinized in xylene and rehydrated in graded alcohol, the endogenous peroxidase activity eliminated by incubation in 3% hydrogen peroxide in methanol for 30 min, and finally to Tris buffered saline (TBS, 50 mM Tris, 150 mM NaCl, pH=7.6). Sections were blocked in 10% normal goat serum (NGS) for 30 min followed by overnight incubation with primary antibody in 1% NGS at 4°C in a humidified chamber. Staining was completed using the peroxidase-anti-peroxidase procedure with 3,3-diaminobenzidine (DAB) as chromagen, and sections were dehydrated and mounted with permount. Antibodies used included monoclonals recognizing BRCA1 amino acids 1-304 (Clone MS110, Oncogene Research Products), rabbit polyclonal against phosphorylated BRCA1 amino acids 1489-1500 (Upstate Cell Signaling Solutions), and phosphorylated tau (AT8, Endogen) to label NFT. Antibody specificity for BRCA11-304 was confirmed by performing an adsorption experiment with its corresponding antigen. Diluted antibody was incubated overnight with 20μg of BRCA1 peptide and applied to an adjacent section with antibody alone. Additionally, cross-adsorption with purified tau protein was performed as well as omission of primary antibody. To further analyze the presence of BRCA1 in cases of control, mild cognitive impairment, as well as AD, formalin fixed blinded sections were analyzed for BRCA1 and phosphorylated tau. Using images obtained with a Zeiss Axiocam and associated image analysis software, the number of NFT immunostained in 3 fields (1mm2) encompassing the CA1 and CA2 areas of the hippocampus were determined. BRCA1 is found to be specifically and intensely localized with intracellular NFT in hippocampal neurons in AD (Figure 1A). In young control cases and those without any tau pathology, no cellular staining was seen (Figure 1B). The specificity of our findings was demonstrated in adjacent sections where BRCA1 immunoreactivity in NFT (Figure 1C) was completely abolished following adsorption with the specific BRCA1 peptide (Figure 1D). On the other hand, cross-adsorption with tau protein did not diminish the immunoreaction (data not shown). BRCA1 localization to NFT was detected in all cases of AD, independent of fixation methods. Hippocampal sections from 17 clinically normal cases containing pathological accumulations consistent with normal aging were specifically chosen and immunostained for BRCA1 and AT8. It was noted that in many of the control cases containing phosphorylated tau-positive NFT, BRCA1 was absent. Analysis of this series of cases shows that while all cases with AD exhibited BRCA1-positive NFT, BRCA1 was present to a lesser extent and in smaller and more variable numbers in control cases with pathology across all age ranges (Figure 2). To further assess the relationship between BRCA1 and AD, blinded sections were stained for BRCA1 and AT8 in well characterized cases classified as control (no neurological diagnosis), mild cognitive impairment (MCI) and AD. The numbers of NFT stained for each marker in three fields were quantified using a computer assisted image analysis (Figure 3) and expressed as the percentage of BRCA1 positive compared to AT8 positive NFT. In control cases (n = 4, age range 83-93), an average of only 9% of NFT contained BRCA1. In cases with MCI (n = 3, age range 78-96), 18% of NFT were BRCA1 were positive, and in cases of AD (n = 3, age range 69-91), the number increased to 28%. The percentage of NFT stained in MCI cases is essentially midway between AD and control cases consistent with clinical findings that MCI is a transition. Nonetheless, as expected, by looking only at tau, there was a wide variety of pathology in each category. In the control cases, the number of tau-positive NFT ranged from 5 to 260, and in AD cases, from 39 to 321 NFT. Monoclonal antibody to BRCA1 recognizes intracellular NFT in all cases of AD (A), yet in many control cases, no structures are stained (B). On adjacent serial sections, the specific localization of BRCA1 to NFT (C) is completely abolished following adsorption with antigen (D). * marks landmark vessel. Scale bar= 50 μm. All AD cases and all clinically normal cases showing AT8-positive NFT consistent with normal aging were also analyzed for the presence of BRCA1-positive NFT. All AD cases (100%) at all age ranges exhibited BRCA1 positive NFT. Yet only about half of the control cases with NFT displayed BRCA1 positivity. The colocalization of AT8 and BRCA1 representative of the different disease states is shown in Figure 4. Adjacent serial sections of AD showed that large numbers of NFT are positive for BRCA1 (Figure 4A) with significant overlap with AT8 (Figure 4B). In a case of MCI, while fewer AT8-positive NFT are present (Figure 4D), again there is significant overlap with BRCA1 (Figure 4C). As was seen in about half of the clinically normal cases with tau pathology, while even moderate numbers of AT8-positive NFT are present (Figure 4F), BRCA1 (Figure 4E) is not present. Qualitative analysis for the presence of phosphorylated BRCA1 (pBRCA1) was also performed. In some cases of AD, pBRCA1 stained neuronal nuclei as well as a smaller population of NFT (Figure 5B) compared to non-phosphorylated BRCA1 (Figure 5A). The number of NFT stained for BRCA1 and AT8 were counted in the CA1/CA2 regions of hippocampus in well characterized cases of AD (n = 3), MCI (n = 3), and control (n = 4). In AD, an average 28% of AT8-positive NFT contained BRCA1. That number was only 18% for cases of MCI and 9% for the control cases. While all four control cases contained AT8-positive NFT, only two cases displayed BRCA1, a finding similar to that observed with the aged controls examined in Figure 2. The localization patterns of AT8 and BRCA1 in the different disease states varies greatly. AD cases show high numbers of AT8-positive NFT (B), with many overlapping with BRCA1 localization (A). In cases of MCI, while there are fewer AT8-positive NFT (D), many overlap with BRCA1 (C). Yet in about half of the aged control cases, while there are moderate numbers of AT8-positive NFT (F), BRCA1 is absent (E). * denotes landmark vessels on adjacent serial sections. Arrow mark NFT labeled for both BRCA1 and AT8. Phosphorylated BRCA1 is localized in some cases of AD to both nuclei as well as some NFT (B). In adjacent serial sections stained for BRCA1 (A), many of the cells containing NFT (arrows) also contain pBRCA1 (B). * denotes landmark vessel. In this study, we show that, controlled for age, there is a progression in the percentage of NFT containing BRCA1 from cases with no dementia to MCI to AD. MCI cases, by their definition, are in the early stages of AD. The differences in BRCA1 and tau co-localization in control versus MCI or AD cases may point to different etiologies and/or different cellular responses. Indeed, mechanisms involved in the formation of NFT in AD may be very different to the process during normal aging, i.e., that the development of AD requires two or more "hits". Neurons can maintain normal function and combat assault from oxidative damage throughout aging, unless there is another "hit", whether it be a genetic mutation or metabolic dysfunction, from which the cell cannot overcome and maintain balance, resulting in neuronal death. As AD is a disease that can last ten years or more, rather than succumbing to apoptosis immediately, neurons may attempt to survive by initiating cell cycle progression, and attempting to control the deregulated cell cycle and concurrent apoptotic signaling. BRCA1 is a tumor suppressor protein, involved in DNA repair, suspension of the cell cycle and probable temporary delay of apoptosis when problems are suspected. Since the prevalence of BRCA1 increases as the disease progresses, transcription of BRCA1 may be activated early in the progression of AD. This is consistent with the hypothesis that cell cycle changes take place very early in the progression of the disease, long before the presence of other pathology. Over time, DNA and cell cycle changes may compound, and BRCA1 and other protein expression increases, eventually resulting in cell death. These findings raise the possibility that BRCA1 accumulates in neurons early in the disease and only in those cases in the early stages of AD and may or may not be independent of tau formation and the expression of other cell cycle markers. The association of BRCA1 with neurodegenerative pathology in AD implicates genomic instability and possibly a neuroprotective element in neurons in AD. The emerging evidence of genomic instability as a proximal feature in the pathogenesis of neurodegeneration in AD may possibly be a feature of cell cycle instability in neurons [38]. Taken together with the association of BRCA1, this phenotype bears many resemblances to a mitotic lesion or, at minimum, the presence of oncogenic signaling in AD, providing another driving force, or "hit" specific for lesion development in AD [36]. The presence of BRCA1 and other tumor suppressor proteins is also indicative of protective mechanisms against the formation of a cancer or unnecessary apoptosis. The presence of phosphorylated BRCA1 has been characterized under conditions of DNA damage. Phosphorylation and changes in subcellular localization follow DNA damage in cell models. For instance, phosphorylation of specific residues dictate both localization and function [39], which could be related to the varying nuclear accumulations seen in the brain in the present study. pBRCA1 has also been implicated to play a role in maintaining genomic integrity in mitochondria and in the nucleus [40]. Recent work has related these functions specifically to telomere maintenance. In BRCA1 -/- cells, telomere dysfunction evidenced by a loss of telomere repeats was found [41], a distinctive feature of degenerating neurons in the AD brain [42]. While the mechanisms responsible for the localization of BRCA1 to NFT remain to be determined, one intriguing hypothesis is that the presence of BRCA1 signifies a neurogenic/oncogenic stimulus that is found in AD and other neuropathology. In this regard, there are several examples showing cognitive improvements in dementia patients undergoing chemotherapy [43]. It would be interesting to investigate the therapeutic efficacy of combination or simply agent antimitotic therapy with vincristine, carmustine, melphalan, cyclophosphamide, or prednisone for AD [44]. Work in the authors' laboratory is support by the National Institutes of Health, the Alzheimer's Association, and by Philip Morris USA Inc. and Philip Morris International. OA was supported by the Intramural Research Program of the NIH, National Cancer Institute, Center for Cancer Research. 1. Grundke-Iqbal I, Iqbal K, Tung YC. et al. Abnormal phosphorylation of the microtubule-associated protein tau (tau) in Alzheimer cytoskeletal pathology. Proc Natl Acad Sci U S A. 1986;83:4913-7 2. Perry G, Rizzuto N, Autilio-Gambetti L. et al. Paired helical filaments from Alzheimer disease patients contain cytoskeletal components. Proc Natl Acad Sci U S A. 1985;82:3916-20 3. Mori H, Kondo J, Ihara Y. Ubiquitin is a component of paired helical filaments in Alzheimer's disease. Science. 1987;235:1641-4 4. Perry G, Friedman R, Shaw G. et al. Ubiquitin is detected in neurofibrillary tangles and senile plaque neurites of Alzheimer disease brains. Proc Natl Acad Sci U S A. 1987;84:3033-6 5. Perry G, Cras P, Siedlak SL. et al. Beta protein immunoreactivity is found in the majority of neurofibrillary tangles of Alzheimer's disease. Am J Pathol. 1992;140:283-90 6. Ogawa O, Lee HG, Zhu X. et al. Increased p27, an essential component of cell cycle control, in Alzheimer's disease. Aging Cell. 2003;2:105-10 7. Ogawa O, Zhu X, Lee HG. et al. Ectopic localization of phosphorylated histone H3 in Alzheimer's disease: a mitotic catastrophe?. Acta Neuropathol (Berl). 2003;105:524-8 8. McShea A, Harris PL, Webster KR. et al. Abnormal expression of the cell cycle regulators P16 and CDK4 in Alzheimer's disease. Am J Pathol. 1997;150:1933-9 9. Nagy Z, Esiri MM, Cato AM. et al. Cell cycle markers in the hippocampus in Alzheimer's disease. Acta Neuropathol (Berl). 1997;94:6-15 10. Nagy Z, Esiri MM, Smith AD. Expression of cell division markers in the hippocampus in Alzheimer's disease and other neurodegenerative conditions. Acta Neuropathol (Berl). 1997;93:294-300 11. Vincent I, Rosado M, Davies P. Mitotic mechanisms in Alzheimer's disease?. J Cell Biol. 1996;132:413-25 12. Castellani RJ, Lee HG, Zhu X. et al. Neuropathology of Alzheimer disease: pathognomonic but not pathogenic. Acta Neuropathol (Berl). 2006;111:503-9 13. Korhonen L, Brannvall K, Skoglosa Y. et al. Tumor suppressor gene BRCA-1 is expressed by embryonic and adult neural stem cells and involved in cell proliferation. J Neurosci Res. 2003;71:769-76 14. Gabbita SP, Lovell MA, Markesbery WR. Increased nuclear DNA oxidation in the brain in Alzheimer's disease. J Neurochem. 1998;71:2034-40 15. Nunomura A, Perry G, Pappolla MA. et al. RNA oxidation is a prominent feature of vulnerable neurons in Alzheimer's disease. J Neurosci. 1999;19:1959-64 16. Nunomura A, Perry G, Aliev G. et al. Oxidative damage is the earliest event in Alzheimer disease. J Neuropathol Exp Neurol. 2001;60:759-67 17. Su JH, Deng G, Cotman CW. Neuronal DNA damage precedes tangle formation and is associated with up-regulation of nitrotyrosine in Alzheimer's disease brain. Brain Res. 1997;774:193-9 18. Mecocci P, MacGarvey U, Beal MF. Oxidative damage to mitochondrial DNA is increased in Alzheimer's disease. Ann Neurol. 1994;36:747-51 19. Somasundaram K. Breast cancer gene 1 (BRCA1): role in cell cycle regulation and DNA repair--perhaps through transcription. J Cell Biochem. 2003;88:1084-91 20. Gartner U, Holzer M, Arendt T. Elevated expression of p21ras is an early event in Alzheimer's disease and precedes neurofibrillary degeneration. Neuroscience. 1999;91:1-5 21. Raina AK, Hochman A, Zhu X. et al. Abortive apoptosis in Alzheimer's disease. Acta Neuropathol (Berl). 2001;101:305-10 22. Suzuki A, Tsutomi Y, Akahane K. et al. Resistance to Fas-mediated apoptosis: activation of caspase 3 is regulated by cell cycle regulator p21WAF1 and IAP gene family ILP. Oncogene. 1998;17:931-9 23. Eymin B, Sordet O, Droin N. et al. Caspase-induced proteolysis of the cyclin-dependent kinase inhibitor p27Kip1 mediates its anti-apoptotic activity. Oncogene. 1999;18:4839-47 24. Blagosklonny MV. Are p27 and p21 cytoplasmic oncoproteins?. Cell Cycle. 2002;1:391-3 25. Rahman N, Stratton MR. The genetics of breast cancer susceptibility. Annu Rev Genet. 1998;32:95-121 26. Chapman MS, Verma IM. Transcriptional activation by BRCA1. Nature. 1996;382:678-9 27. Holt JT, Thompson ME, Szabo C. et al. Growth retardation and tumour inhibition by BRCA1. Nat Genet. 1996;12:298-302 28. Monteiro AN, August A, Hanafusa H. Evidence for a transcriptional activation function of BRCA1 C-terminal region. Proc Natl Acad Sci U S A. 1996;93:13595-9 29. Gowen LC, Avrutskaya AV, Latour AM. et al. BRCA1 required for transcription-coupled repair of oxidative DNA damage. Science. 1998;281:1009-12 30. Scully R, Chen J, Ochs RL. et al. Dynamic changes of BRCA1 subnuclear location and phosphorylation state are initiated by DNA damage. Cell. 1997;90:425-35 31. Hsu LC, White RL. BRCA1 is associated with the centrosome during mitosis. Proc Natl Acad Sci U S A. 1998;95:12983-8 32. Chen Y, Chen CF, Riley DJ. et al. Aberrant subcellular localization of BRCA1 in breast cancer. Science. 1995;270:789-91 33. Mecocci P. Oxidative stress in mild cognitive impairment and Alzheimer disease: a continuum. J Alzheimers Dis. 2004;6:159-63 34. Raina AK, Garrett MR, Previll LA. et al. Oncogenic parallels in Alzheimer disease. Int J Neuroprotec Neuroregen. 2006;2:80-5 35. Zhu X, Castellani RJ, Takeda A. et al. Differential activation of neuronal ERK, JNK/SAPK and p38 in Alzheimer disease: the 'two hit' hypothesis. Mech Ageing Dev. 2001;123:39-46 36. Zhu X, Raina AK, Perry G. et al. Alzheimer's disease: the two-hit hypothesis. Lancet Neurol. 2004;3:219-26 37. Zhu X, Lee HG, Perry G. et al. Alzheimer disease, the two-hit hypothesis: An update. Biochim Biophys Acta. 2007;1772:494-502 38. Webber KM, Raina AK, Marlatt MW. et al. The cell cycle in Alzheimer disease: a unique target for neuropharmacology. Mech Ageing Dev. 2005;126:1019-25 39. Okada S, Ouchi T. Cell cycle differences in DNA damage-induced BRCA1 phosphorylation affect its subcellular localization. J Biol Chem. 2003;278:2015-20 40. Coene ED, Hollinshead MS, Waeytens AA. et al. Phosphorylated BRCA1 is predominantly located in the nucleus and mitochondria. Mol Biol Cell. 2005;16:997-1010 41. McPherson JP, Hande MP, Poonepalli A. et al. A role for Brca1 in chromosome end maintenance. Hum Mol Genet. 2006;15:831-8 42. Franco S, Blasco MA, Siedlak SL. et al. Telomeres and telomerase in Alzheimer's disease: epiphenomena or a new focus for therapeutic strategy?. Alzheimers Dementia. 2006;2:164-8 43. Keimowitz RM. Dementia improvement with cytotoxic chemotherapy. A case of Alzheimer disease and multiple myeloma. Arch Neurol. 1997;54:485-8 44. Woods J, Snape M, Smith MA. The cell cycle hypothesis of Alzheimer's disease: Suggestions for drug development. Biochim Biophys Acta. 2007;1772:503-8 Correspondence to: Mark A. Smith, Ph.D., Department of Pathology, Case Western Reserve University, 2103 Cornell Road, Cleveland, Ohio 44106 USA. Tel: 216-368-3670, Fax: 216-368-8964, mark.smithedu Accepted 2007-5-9 Published 2007-5-12
{ "redpajama_set_name": "RedPajamaCommonCrawl" }
4,271
The following Terms & Conditions relate to the web site known as 'Turn Your Own Handwriting into a True Type Font' (also referred to as 'the web site' in these terms and conditions) - provided by Quantum Enterprises. Click here for our general terms and conditions of service. Quantum Enterprises accepts no responsibility for loss or damage, either direct or indirect, as a result of installing or using fonts, or software, supplied as part of the handwriting font service. We also draw your attention to our specific Software License Agreement for using the Scriptalizer™ software and the note on fonts supplied for Macintosh (below). Quantum Enterprises does not accept responsibility for loss or damage of font forms sent in the post, nor for any problems arising from the sending and receiving of font forms and font files via the Internet. Premium and Premium 'Ultra' Service fonts will normally processed within 14 days. However, these lead times cannot be guaranteed during times of very high demand (e.g. during advertising campaigns) or from circumstances that occur beyond our control. We will only retain handwriting fonts and associated submission forms for a maximum of 30 days. It is your responsibility to make backups of fonts. If you lose a font after the 30 day period you will be required to make another purchase. The fonts that we produce are handwriting fonts, designed to be used and viewed at the same size as the handwriting they reproduce. At handwriting size, they achieve their purpose: to look like handwriting! Whilst the Premium and Premium 'Ultra' services produce a higher quality reproduction of each letter, all of the services will show the limitations of each glyph when enlarged to sizes greater that standard handwriting. When we feel that the quality of a handwriting sample or scanned image is unacceptable, we will request another submission. We will always attempt to make the best quality font from the samples provided, but cannot accept responsibility if the font is sub-standard due to a poor quality sample that we originally did not detect. By using our handwriting font service you must accept that this is a handwriting font, and not a 'design' font. If you require a custom font that can be used at large point sizes we recommend you source an alternative service. Handwriting characters may not look as clear on screen as 'standard fonts'. (This is dependent on the thickness of letters used). Only one character can be assigned per letter on the keyboard. Particularly distinctive characters will therefore be obvious as they are repeated. (To avoid this, write reasonably neatly). The different ways that letters interact when they are joined cannot be reproduced. (If you use our Premium Service we will try and produce the best results based on the most common ways that letters join). We can only reproduce the letters that you supply. If you are unhappy with the results because you have failed to follow the instructions, you will be requested to make another purchase to rectify the problem. However, we will do an unlimited number of small 'tweaks' on created characters. We will replace up to 5 characters free of charge. Additional characters are chargeable and may be purchased on the Miscellaneous Payments page. The Premium 'Ultra' handwriting font service, although extremely realistic, still uses a font to reproduce the handwritten effect. Careful examination by someone will reveal that it is a font, although this is more difficult to detect than for the other services we provide. The realism of the font is also reliant on the quality of paper and printer used to reproduce the font. This service is primarily designed for producing printed handwritten documents. If you are sending an electronic version of the Scriptalized font to someone else (e.g. by e-mail), you must be sure that they have your Premium 'Ultra' handwriting font installed, otherwise they will not be able to read the text. The Premium 'Ultra' fonts have been tested and work satisfactorily in Microsoft Word. However, some software does not correctly render the extended characters used by the Premium 'Ultra' font specification. If you wish to use this service for specialised graphics applications please contact us. OSX - The OSX operating system recognises and can use True Type Fonts as they are supplied. However, later versions of the Macintosh OSX operating system may report errors on some True Type fonts. Customers who have had this problem, and who have installed the fonts anyway, have found the fonts to function with no problem. We once again remind you that Quantum Enterprises accepts no responsibility for loss or damage, either direct or indirect, as a result of installing or using fonts, supplied as part of the handwriting font service. Mac OS 9 - Your font will be supplied as a converted mtt.bin file, in addition to the True Type Version. The Stuffit Expander is required to decompress the font for installation. Some Macintosh customers occasionally find that the mapping on fonts is affected by the conversion process, and some characters (generally punctuation) do not correctly show. This is beyond our control, but will try and work around the problem if possible. If you have any doubts or concerns about the compatibility of our fonts with your Apple Macintosh, we recommend you try downloading, installing and testing one of our free fonts from The Font Vault before making a decision to purchase, or purchasing full access to one of our example Premium 'Ultra' fonts for a nominal fee. This is particularly important if you are considering using a font for a non-standard (non-word processing application). During your purchase of a Premium service font you will be given option to allow your font to be used in the 'Font Vault'. The 'Font Vault' is a collection of freely available handwriting fonts available for download from our web pages. Your signature will be removed from the version published on the web. By allowing us to use your font in the 'Font Vault' you are also permitting Quantum Enterprises to freely monetise your font without any further recompense to you. During the purchase of a Premium 'Ultra' font you will be given the option to allow your fonts to be made available in the Scriptalizer™ software as an 'Example' font. This will allow users to access your font within the Scriptalizer™, and also give them the option to purchase a copy. - Free upgrades to the font when the Scriptalizer™ / Premium 'Ultra' specification is updated. Your name and signature(s) will be removed from the example version of the font. By allowing us to use your font as an 'Example' Premium 'Ultra' font you are also permitting Quantum Enterprises to freely monetise your font without any further recompense to you. Our contact information can be found at the main Quantum Enterprises website contact us page. Clicking the link above will open a new window and take you to the main Quantum Enterprises website.
{ "redpajama_set_name": "RedPajamaC4" }
6,689
Euclid Stefanou Tsakalotos (, ; born 1960) is a Greek economist and politician who was Minister of Finance of Greece from 2015 to 2019. He is also a member of the Central Committee of Syriza and has represented Athens B in the Hellenic Parliament since May 2012. Tsakalotos was born in Rotterdam, the Netherlands, but moved to the United Kingdom at a young age. He went to St Paul's School in London before studying Philosophy, Politics and Economics at The Queen's College, University of Oxford. He went on to complete a master's degree at the Institute of Development Studies, which is attached to the University of Sussex, and returned to Oxford to complete a doctorate in economics under the supervision of Włodzimierz Brus, which he did in 1989. From 1989 to 1993, Tsakalotos worked at the University of Kent, where he met his partner, Heather D. Gibson. He moved to Greece, and taught at the Athens University of Economics and Business from 1994 to 2010, becoming a professor of economics. Since 2010, he has been a professor of economics at the National and Kapodistrian University of Athens. He has written a number of books in both Greek and English and has been published in a range of different academic journals. Due to his upbringing in the UK, he speaks English with a British accent. A student member of the Communist Party of Greece, Tsakalotos joined Synaspismos in the early 1990s and was elected to the Central Committee of Syriza in 2004 shortly after their formation. He was first elected as a Member of the Hellenic Parliament for Athens B in the May 2012 legislative election and has been re-elected in every election since. In opposition from 2012 to 2015, he was Syriza's shadow finance minister. When Syriza entered government in January 2015, Tsakalotos was appointed as an Alternate Minister within the Ministry of Foreign Affairs. In April, he took over as head of Greece's negotiating team on the third bailout package. On 6 July 2015, following Yanis Varoufakis's resignation, Tsakalotos was appointed as Minister of Finance. He was re-appointed in September 2015 following the snap legislative election. Early life and education Tsakalotos was born in Rotterdam, the Netherlands, in 1960. He is the son of Stefanos Tsakalotos, a civil engineer who worked in the shipping industry, and the family relocated to the United Kingdom in 1965 when the younger Tsakolotos was five years old. He attended St Paul's School, London from 1973 to 1978. In St Paul's School's alumni magazine, he praised his former schoolmaster Keith Perry, saying that the teacher did "much to bolster [his] self-confidence". During his time at the school, he co-founded its Economics and Politics Society (known as Polecon) with his close friend Owen Tudor, who now works for the Trades Union Congress. Tsakalotos went on to read Philosophy, Politics and Economics at The Queen's College, Oxford. Whilst at the Queen's College, Tsakalotos was an admirer of both G. A. Cohen and Andrew Glyn, a Marxist political philosopher and Marxian economist respectively, who both taught at the university. He also took part in student protests against Margaret Thatcher's Conservative government. During his time at university, he became a supporter of Irish republicanism, a view he expressed in his visit to the Sinn Féin ardfheis in March 2015. One of his university friends at this time, Yannis Stournaras, later became a Greek finance minister and served as Governor of the Bank of Greece. Following graduation, he completed a master's degree (MPhil) at the Institute of Development Studies, attached to the University of Sussex. He then returned to Oxford to complete a doctorate (DPhil) in economics, studying at Mansfield College. He completed this doctorate in 1989 under the supervision of Włodzimierz Brus, with his thesis, Alternative Economic Strategies: The Case of Greece, later being published as a book. Academic career After the completion of his doctorate, Tsakalotos entered into an academic career. His first role was as a research associate at the University of Kent, from 1989 to 1990. From October 1990 to June 1993, he taught at the university as a lecturer. In 1993, Tsakalotos and his wife moved to Greece, and in October 1994 he began teaching at the Athens University of Economics and Business. In September 2010, he became a full professor of economics at the National and Kapodistrian University of Athens, more commonly referred to simply as the University of Athens. In his capacity as an academic, Tsakalotos served as a member of the executive committee of the Hellenic Federation of University Teachers' Associations (POSDEP). In the mid-2000s, Tsakalotos led his students in a several months-long protest against proposed reforms to the Greek education system. Thanos Tsouknidas, an accountant that knew Tsakalotos at the time, said: "He was there, involved in the struggle. We were fighting together." His active role in the teachers' union brought him popularity, and according to a former student, his classes were often packed. Tsakalotos has written a number of books and articles on Greek and international economic policies, alone and in cooperation with other academics and writers. He has co-authored a number of works with his wife, who has also served as editor for some of the works that he has written alone. Early political career As a student at the University of Oxford, Tsakalotos joined the Communist Party of Greece (Interior), a eurocommunist party that had split from the main Communist Party of Greece, a Marxist–Leninist party, in 1968. In the early 1990s, shortly after moving to Greece, Tsakalotos became a member of Synaspismos, a radical left-wing political party, which was to become the largest constituent party of Syriza. Syriza itself was formed in 2004, ahead of that year's legislative election, as a coalition of 13 left-wing political parties in Greece. Tsakalotos was elected to their Central Committee in December 2004. However, he also remained a prominent member of Synaspismos and served on both their Central Political Committee and their Political Secretariat until a July 2013 party congress, during which Syriza voted to become an independent political party and for all component parties to disband, including Synaspismos. Shortly after Syriza was formed, Tsakalotos stood as their candidate for the prefecture of Preveza in the 2004 legislative election. The Greek government-debt crisis effectively began in 2009 and was a backdrop for Tsakalotos' involvement in the creation of Syriza's economic policy. Tsakalotos has been credited as the "brains behind" the policy, and as a member of Syriza's "economics quartet", alongside John Milios, Giorgos Stathakis and Yannis Dragasakis. He has also been credited as one author of Syriza's Thessaloniki Programme, a manifesto which proposed a set of policies oriented towards reversing austerity measures while maintaining a balanced budget. In opposition (2012–2015) In the May 2012 legislative election, Tsakalotos was elected as a Member of the Hellenic Parliament (MP) representing Athens B, the largest electoral district in Greece. The election saw Syriza win 16.8% of the vote, placing second behind New Democracy, who won 18.8% of the vote, and ahead of PASOK, with 13%. Alexis Tsipras, the party leader, was unable to form a coalition, but also refused to enter into one with PASOK, forcing the country to new elections in June 2012, where Tsakalotos won re-election as an MP. Tsakalotos said that Syriza had a focus on the European Union, and told The New York Times that a Europe imposing austerity on its citizens for the actions of banks "isn't the Europe that the original inspirators of Europe imagined". New Democracy won a plurality of seats in June 2012 and formed a coalition government with PASOK and Democratic Left, making Syriza the largest opposition party with 78 seats. Tsakalotos' role in opposition was as the spokesperson for economic affairs in Tsipras' shadow cabinet. In opposition from 2012 to 2015, Tsakalotos was a key proponent of Syriza's economic policy. He argued that Greece needed something similar to the Marshall Plan, with a payment scheme that took into account the strength of the economy. He told Bloomberg News that "People say that we are responsible for the situation we find ourselves in. OK, sure. But I think that Germany will find it hard to argue that in 1953 [at the time of the London Agreement on German External Debts] they were completely blameless." He appeared in various international media as a spokesperson for Syriza and making the case for their policies: among others, he was interviewed on Lateline, an Australian news programme on ABC, by SBS, another Australian news channel, was quoted by the BBC and Bloomberg, and also appeared in an Intelligence Squared debate arguing for the motion 'Angela Merkel is Destroying Europe'. September 2013 saw his book, co-authored with Christos Laskos, published by Pluto Press. Crucible of Resistance was described as offering "badly needed correctives" to the prevalent ideas on the Greek situation. The book addressed why the European debt crisis began, with a particular focus on Greece. It argued that the idea Greece was exceptional was a myth and that the crisis had revealed the inadequacies of neoliberalism and social democracy. Tsakalotos was criticised by elements of the Greek media in 2013 when he was accused of living a wealthy lifestyle while criticising austerity in public. He was dubbed the 'aristocrat of the left', and one newspaper published front-page criticism arguing that Tsakalotos' own family wealth came from investments made by companies such as JPMorgan Chase and BlackRock. In December 2014, the Hellenic Parliament did not approve the new President with the supermajority required, and so a snap election was called for the end of January 2015. A few days before the 2015 election took place, Tsakalotos was quizzed on Syriza's economic policies by a number of economists, debt campaigners and investment analysts at the London School of Economics. Tsakalotos said there was a need for fiscal space, meaning 6–7 billion Euros a year to spend on an expansionary fiscal policy. He also said that they would cancel the austerity budgets already agreed with the European Union (EU) and International Monetary Fund (IMF), pay back the loans from the IMF and focus on rescheduling and writing off the loans from the EU. First term in government (2015) Alternate Minister and bailout negotiator In the legislative election on 25 January 2015, Syriza won a near-majority of seats, with 149 out of 300, and so formed a coalition with the right-wing anti-austerity party Independent Greeks. Tsipras became prime minister and formed his cabinet on 27 January, appointing Tsakalotos as Alternate Minister for International Economic Relations, subordinate to the Minister for Foreign Affairs, Nikos Kotzias. Tsakalotos described his role as follows: "[It] means coordinating our approach to promoting exports and attracting investment. It also means upgrading our economic diplomacy which needs to go beyond traditional sectors, for instance exporting olive oil and importing capital goods." Tsakalotos represented Syriza at the Sinn Féin ardfheis on 7 March 2015 and gave a speech on the conference floor, during which he said that both Sinn Féin and Syriza are "part of a great realignment in European politics" towards left-wing anti-austerity parties. The leader of Sinn Féin, Gerry Adams, embraced Tsakalotos on the stage following the speech. Tsakalotos then spent several hours afterwards in talks with senior members of Sinn Féin. The Financial Times later commented on this, saying it was a "moment of bonding" between Syriza and Sinn Féin. Tsakalotos began to gain a more prominent role in the renegotiations with Greece's creditors over a new bailout plan, which at the time were being led by Yanis Varoufakis, the Minister of Finance. On 27 April, Tsakalotos was the made the coordinator of the Greek team negotiating with the creditor's representatives over this new bailout plan. This move was largely seen as sidelining Yanis Varoufakis, the Minister of Finance, but the markets reacted positively. In June 2015, lenders warned that time was running out for a deal to be agreed on a new bailout plan. On 17 June, Tsakalotos warned that Greece would not be able to repay its €1.6bn loan from the IMF at the end of the month unless a new bailout plan was agreed. The deadline for the renewal of Greece's bailout package was also looming at the end of June. On 26 June, an emergency cabinet meeting led to the calling of a referendum on the bailout deal proposed by the creditors. Capital controls and a bank holiday were announced on 28 June, with the Eurozone refusing an extension of the bailout plan and Greece defaulting on its loan to the IMF on 30 June. Minister of Finance The bailout referendum on 5 July resulted in a 'No' vote to the adoption of the bailout package. The following day,when prime minister Alexis Tsipras rejected the package in deference to the vote, Varoufakis resigned as finance minister. As he left the finance ministry, he suggested that Tsakalotos was likely to succeed him, and Tsakalotos was subsequently sworn-in later that day. In the process of this, Tsakalotos relinquished his previous ministerial position of Alternate Minister for International Economic Relations. Tsakalotos was noted for his differences with Varoufakis, for example, the Financial Times noted that he "could hardly be more different from his flamboyant predecessor". At a press conference shortly following his appointment, Tsakalotos said: "I cannot hide from you that I am quite nervous. I am not taking on this job at the easiest point in Greek history." Tsakalotos' first official meeting as Minister of Finance was on 7 July and was an emergency meeting of the Eurogroup following the vote in the referendum. Tsakalotos brought a note with him that reminded him to display "no triumphalism" after the 'No' vote in the Greek bailout referendum. Following the talks, he was described as "Much better than Varoufakis" who was a much tougher and less compromising negotiator. Greece was given 48 hours to agree to a new bailout plan or it would face being forced to leave the eurozone on 8 July, leading to a plan being submitted by the Greek government on 10 July. In a nine-hour Eurogroup meetings on 11 July, Tsakalotos was noted for his calmness in the "tough, even violent" atmosphere of the talks by observers. The government backed the tenth austerity package which went before Parliament on 16 July. The package was the first in a series of prior actions necessary for negotiations to open up over bailout funding worth 86 billion euros. The package came in two parts, with the first being approved on 16 July, and the second on 23 July. The legislation included a rise in VAT across several goods and services, the abolition of the VAT discount for Greek islands, a corporation tax rise from 26% to 29%, a luxury tax on cars, boats and swimming pools, an end to early retirement by 2022, and an increase in the retirement age to 67. Tsakalotos said on 16 July debate, "I don't know if we did the right thing, however, I do know that we felt like we had no other choice but do what we did." The contentious vote was opposed by 109 out of 201 members of the Central Committee of Syriza, and 32 Syriza MPs voted against the proposals on 16 July. It also led to a cabinet reshuffle on 17 July, but Tsakalotos retained his role as Minister of Finance. The second set of measures were debated and voted on 23 July, with Tsakalotos beginning the debate, and urging a vote in favour of the measures. Tsakalotos was criticised for his speech, with Ovenden writing that "[his] argument made him sound little different from the kind of kindergarten exchanges which had characterised Pasok and New Democracy over the years." However, the proposals passed parliament, clearing the way for a new bailout deal to be negotiated with Greece's creditors. A new bailout deal, the Third Economic Adjustment Programme for Greece, was agreed in August 2015, and the first set of measures went to vote on 14 August, in the form of the eleventh austerity package. Tsakalotos opened the debate, calling the deal a "very tough agreement with many thorns." During the debate, he engaged heavily with the acting President of New Democracy, Vangelis Meimarakis, who criticised Tsakalotos for being "provocative". Towards the end of the debate, Zoi Konstantopoulou, the Speaker of the Hellenic Parliament, raised so many procedural questions and objections that Tsakalotos missed the 9:30 am vote to catch a flight to Brussels. More than 40 Syriza MPs voted against the plans, and it was suggested that Tsipras may resign, bringing the prospect of another snap election in September. In Brussels later that day, final negotiations were concluded for the Third Economic Adjustment Programme for Greece. On 20 August, Tsipras announced the resignation of the Syriza-ANEL government, and that a legislative election was scheduled for 20 September. Tsakalotos and the rest of the cabinet remained as lame duck ministers whilst opposition parties attempted to form their own government. However, the opposition parties failed to form a government and Vassiliki Thanou-Christophilou was appointed as an interim Prime Minister on 27 August. On 28 August, Thanou-Christophilou's caretaker cabinet was sworn in, with George Chouliarakis being sworn in as the interim Minister of Finance. Second term in government (2015–present) Reappointment as Minister of Finance Reuters reported that Tsakalotos was considering not running in the September 2015 legislative election, as he did not want to have to implement the bailout agreement. However, these fears were assuaged by Alexis Tsipras when he said there was no doubt that Tsakalotos would stand in the election. He also claimed that, during the election campaign, without Tsakalotos' involvement, there would have been no bailout package. In recognition of that, Tsakalotos was made to head the list for Syriza in Athens B. In an interview during the campaign, Tsakalotos admitted that the Greek government had suffered "defeat" during negotiations with creditors, implying that some responsibility for this lay with his predecessor, Varoufakis. Following the re-election of the Syriza-ANEL coalition, Tsakalotos was tipped to resume the role of Minister of Finance, however the state media reported that he was reluctant to do so. Nonetheless, he was reappointed as Minister of Finance on 23 September, as part of the Tsipras' second cabinet. Chouliarakis, the interim Minister of Finance, was retained in the finance ministry as an Alternate Minister of Finance. Later in September, in an interview with the Financial Times, Tsakalotos said that it was "absolutely critical that we get something on debt relief." He added: "By the second quarter of 2016, if we get a positive review, bank recapitalisation and debt relief, I don't see any reason why there shouldn't be a return to growth." He also said that the new government would make serious attempts to crack down on tax evasion: "It will be a central aspect of our policies, which will determine the success of the government, because it's the only way the Greek people will accept difficult measures that show we're all in the same boat." At the annual meetings of the IMF and the World Bank between 9 and 11 October 2015, Tsakalotos had a number of meetings with high-level attendees. On 8 January 2016, Tsakalotos began a tour of European cities, including Rome, Lisbon, Paris, Helsinki and Berlin, meeting with finance ministers, prior to a Eurogroup meeting on 14 January. In February 2016, Spyros Economides, Director of the Hellenic Observatory,in order to divert blame and relieve the pressure on Tsakalotos and following a relentless smear campaign against Varoufakis, commented on Tsakalotos' performance as Minister of Finance: "In some ways, he has done an extremely good job because the mess left by his predecessor both in substantive and presentational terms was horrific." Tsakalotos visited the European Parliament in March 2016 and told MEPs of the Committee on Economic and Monetary Affairs that he welcomed their role in monitoring the reforms. Bailout review and calls for IMF involvement The first review of the bailout programme carried out by Greece's lenders stalled in February 2016 over pension reforms. Speaking to Frankfurter Allgemeine Zeitung, Tsakalotos urged the lenders to complete the review by 1 May as "This question of time is important if we want to move from a vicious to a virtuous circle." He wrote to other members of the Eurogroup on 6 May to appeal for their support against extra demands for austerity that, he argued, were beyond the mandate of the Greek government. Speaking in October 2016, Tsakalotos said that he wanted the IMF to join the bailout programme and that Wolfgang Schäuble's position on debt relief for Greece was untenable. Schäuble said that the bailout programme "will work, the IMF will be on board and there won't be much debt relief." However, Tsakalotos said that "Something has to give there, and I think deep down in his heart he understands that. He's a wily politician. He's been around for a long time. I can't believe he doesn't understand you can't have all those three things." Political views Ideology Tsakalotos has been described as a "Marxist", and Ovenden has written that "While Keynes is the main economic reference point for Varoufakis, who opposed the Brussels deal, for Tsakalotos, who signed it, Marx is more that guide to economic and political analysis." Paul Mason described Tsakalotos as a "classic Marxist of the New Left," continuing that "Tsakalotos comes from that school of Marxism which learned from the 1970s onwards to make compromises with capitalist reality." In an interview with the Financial Times in September 2015 following his re-appointment, he said: "I'm one of the government's most left-wing ministers, politically speaking. However, I want to do things like the recapitalisation of the banks. I can do things that aren't particularly left-wing." Tsakalotos is also a leading member of the Group of 53, a prominent faction within Syriza. One report names him as the leader of the Group. The Group was founded in mid-2014 and stands ideologically between the Left Platform and Alexis Tsipras's core backers. After the Left Platform split from Syriza to Popular Unity, the Group of 53 became the most left-wing faction within Syriza. Europe Tsakalotos has been described as a "Revolutionary Europeanist", as he supports European Union integration but not its capitalist principles. In one article, he wrote: "[the] European Monetary Union has created a split between [the] core and periphery, and relations between the two are hierarchical and discriminatory." Tsakalotos has also advocated for a "change in [the] architecture" of the Eurozone. He has also suggested that the EU should have a focus on the development of member countries, which is what requires this change in architecture. In a May 2012 interview on Lateline, Tsakalotos said: "At the moment the Eurozone is at risk, not because of the Greek radical left – it's at risk because it has an architecture, a financial and economic architecture that is evidently unable to deal with the crisis in the Eurozone, and we think part of the solution is a change in that architecture." In 2011, he cited a move towards fiscal federalism as a potential solution to the EU's economic architecture. Personal life Tsakalotos is married to Heather D. Gibson, a Scottish economist currently serving as Director-Advisor to the Bank of Greece and his ofttimes research and writing partner. They met when Tsakalotos was teaching at the University of Kent and they later married in Canterbury. The couple has three children and maintains two homes in Kifisia, along with an office in Athens and a holiday home in Preveza, all courtesy of a large estate belonging to Tsakalotos' father. Through his father, Euclid Tsakalotos is a distant relative of Thrasyvoulos Tsakalotos, who served as Chief of the Hellenic Army General Staff from 1951 to 1952. Tsakalotos has been quoted as saying that his great-granduncle fought on the "other side, the wrong side" in the Greek Civil War, and was worried that his great-grandnephew would become a "liberal, [but] certainly not anything further to the left." Tsakalotos is a fan of PAOK FC and was given a shirt with Dimitar Berbatov's name on the back by Alexis Tsipras. When he lived in the UK, he was a supporter of Leeds United. Works Books Crucible of Resistance: Greece, the Eurozone and the World Economic Crisis (with Christos Laskos, Pluto Press, London, Chicago: 2013), 22 Πράγματα που μας λένε για την ελληνική κρίση και δεν είναι έτσι (22 Things they tell you about the Greek Crisis which are not so; with Christos Laskos, KPSM Publications: 2012), Χωρίς επιστροφή (No Return; with Christos Laskos, KPSM Publications: 2011), Corporatism and Economic Performance: A Comparative Analysis of Market Economies (with Andrew Henley, Edward Elgar Publishing: 1993) Alternative Economic Strategies: The Case of Greece (Avebury Publishers, Aldershot: 1991), Articles and papers Tsakalotos has published a number of articles and papers, including several co-authored with his wife, Heather Gibson, and others. He has been published in a range of Academic journals, such as the Cambridge Journal of Economics, the Oxford Bulletin of Economics and Statistics and the Oxford Review of Economic Policy. For a full list, see the link to his page on Academia.edu in the External links. See also First Cabinet of Alexis Tsipras Second Cabinet of Alexis Tsipras Greek government-debt crisis Notes References Citations Sources Ovenden, Kevin (2015). Syriza: Inside the Labyrinth. London: Pluto Press. . External links Euclid Tsakalotos' publications at Academia.edu |- 1960 births Academics of the University of Kent Alumni of The Queen's College, Oxford Alumni of the University of Sussex Coalition of Left, of Movements and Ecology politicians Finance ministers of Greece 21st-century Greek economists Greek expatriates in the United Kingdom Greek government-debt crisis Greek MPs 2012 (May) Greek MPs 2012–2014 Greek MPs 2015 (February–August) Greek MPs 2015–2019 Living people People educated at St Paul's School, London Syriza politicians Greek MPs 2019–2023 Politicians from London 20th-century Greek economists
{ "redpajama_set_name": "RedPajamaWikipedia" }
7,719