id
string | contents
string |
---|---|
100
|
[Title: """Abdulaziz al-Omari"""] Abdulaziz al-Omari (, , also transliterated as Alomari or al-Umari; 28 May 1979 – 11 September 2001) was a Saudi imam and terrorist who was one of five hijackers of American Airlines Flight 11 as part of the September 11 attacks in 2001. Prior to the attacks, al-Omari was an imam at his mosque in Saudi Arabia's al-Qassim province. He arrived in the United States in June 2001 on a tourist visa, obtained through the Visa Express program. On September 11, 2001, al-Omari boarded American Airlines Flight 11 and assisted in the hijacking of the plane, which was crashed into the North Tower of the World Trade Center, as part of the coordinated attacks. Early life and career. Abdulaziz al-Omari (or Alomari) was born on 28 May 1979 in a poor Arab family. He was born in Aseer, Saudi Arabia and was a fellow countryman of brothers Wail al-Shehri and Waleed al-Shehri, fellow hijackers in the September 11 attacks. It is alleged he graduated with honors from high school. He attained a degree from Imam Muhammad ibn Saud Islamic University, got married, and had a daughter briefly before the attacks. He taught as an imam at his mosque in al-Qassim province, which was the "heartland" of Wahhabism, a strict form of Islam. At the mosque, which experts refer to as a "terrorist factory", he was possibly taught by the radical cleric Sulayman al Alwan. According to Walid bin Attash, al-Omari was one of a group of future hijackers who provided security at Kandahar airport after their basic training at an al-Qaeda camp. During the 2000 Al Qaeda Summit in Kuala Lumpur, American authorities state that immigration records show that a person named Abdulaziz al-Omari was visiting the country, although they say they are not sure that this was the same person. September 11 attacks. Planning. Early 2001. al-Omari eventually became involved in the planning for the September 11 attacks on the United States, an idea formulated by Osama bin Laden.
|
101
|
[Title: """Abdulaziz al-Omari"""] The attacks involved hijacking commercial airplanes and crashing them into buildings; al-Omari would hijack American Airlines Flight 11, which would crash into the World Trade Center in New York City. At the time of the hijacking, al-Omari was 22. In the autumn of 2001, after the attacks, al Jazeera television broadcast a tape they claim was made by him. The speaker made a farewell suicide video. In it he read, "I am writing this with my full conscience and I am writing this in expectation of the end, which is near... God praise everybody who trained and helped me, namely the leader Sheikh Osama bin Laden." A person with al-Omari's name visited the Philippines twice in February 2001. al-Omari and hijacker Salem al-Hazmi entered the United States through a Dubai flight on June 29, 2001, landing in New York City. al-Omari had used the controversial Visa Express program to gain entry. The two were probably picked up by Salem's brother, Nawaf al-Hazmi, on the 30th; this is assumed because of a recorded traffic accident by Nawaf on George Washington Bridge that day. al-Omari likely stayed with several other hijackers in Paterson, New Jersey (where he rented a mailbox), before moving to his own place in Vero Beach, Florida with his wife and three children. On his rental agreement form for that house, al-Omari gave two license-plates authorized to park in his space, one of which was registered to Mohamed Atta, the attacks' mastermind. al-Omari attended the FlightSafety academy in Vero Beach with fellow hijackers Mohand al-Shehri and Saeed al-Ghamdi. He also obtained a fake United States ID card from All Services Plus in Passaic County, New Jersey, which was in the business of selling fake documents; another was given to Khalid al-Mihdhar. The employee who gave them the IDs claimed he had no idea they were "anything more [than ordinary] customers". Atta bought tickets for Flight 11 for himself and al-Omari on August 28. On September 6, al-Omari and fellow hijacker Satam al-Suqami flew from Florida to Boston to stay at the Park Inn Hotel. September 10.
|
102
|
[Title: """Abdulaziz al-Omari"""] On September 10, 2001, Atta picked up al-Omari from the Park Inn Hotel, and the two drove to South Portland, Maine, in a rented Nissan Altima. Some sources state there is no evidence as to why they went to Portland, whereas ABC News says it was a last-minute decision by Atta to stagger the Flight 11 hijackers' entrances into Logan International Airport on the 11th. Multiple people have claimed to see Atta and other hijackers in Portland that summer, but the FBI has found no evidence of this. On the 10th, Atta and al-Omari purchased a room (233) at the town's Comfort Inn. They did not ask for a wake-up call. Their luggage included a folding knife, "a videocassette [about] a Boeing 757 flight simulator, pepper spray, Atta’s will, [and Atta's] handwritten instructions to his 18 fellow hijackers"; American Airlines Flight 11 was a Boeing 767. They stayed in their hotel room for two hours, until 8 p.m., when al-Omari made a four-minute phone call from a nearby Pizza Hut's pay phone to a phone belonging to Marwan al-Shehhi, who would hijack United Airlines Flight 175. Five minutes later, at a restaurant named Pizzeria Uno, the two withdrew $80 from an ATM. They then drove back to the Pizza Hut, where a second pay phone call was placed at 8:50. They decided to go to Walmart, but got lost and went to a gas station to ask for directions. In a video recorded at the gas station, Atta has a piece of paper in his hand and shows it to al-Omari, and then they leave. At the Walmart, the two purchased a six-volt battery converter for an unknown reason. Staff of the Walmart said that weeks earlier, Atta had bought a box cutter there, but this is uncorroborated. The two then returned to the Comfort Inn, where they stayed for hours. Day of the attacks. At 5:33 a.m. on September 11, al-Omari and Atta checked out of the hotel. al-Omari made another cash withdrawal at the Pizzeria Uno ATM, and then the two went to Portland International Jetport.
|
103
|
[Title: """Abdulaziz al-Omari"""] At around 5:40, the two spoke with a ticket agent, who raised no suspicions about them. Both men boarded their flight, which landed in Logan International Airport at 6:45. Eight other hijackers were waiting at the airport. It is unknown why this connecting flight through Portland happened, especially because the two almost missed their flight at Logan. Their flight, American 11, was supposed to fly to Los Angeles. Atta and al-Omari then boarded Flight 11 with fellow hijackers Satam al-Suqami, Wail al-Shehri, and Waleed al-Shehri. The other hijackers at the airport went on United Airlines Flight 175. al-Omari's passport, which would identify him as a hijacker to investigators later, was in the two men's aforementioned luggage; this luggage was accidentally left at Portland International Airport, failing to make it onto the connecting flight to Logan. The two men probably decided they did not need the luggage's folding knife and pepper spray in their attacks. Atta and al-Omari had seats next to each other in first class, row 8, on Flight 11. The flight left the Logan runway at 7:59. The hijackers took over the plane starting at 8:14, when multiple passengers were maced and stabbed. Atta then commanded the plane's controls, and at 8:37, the plane began a rapid descent. At 8:46, it was crashed into the World Trade Center's North Tower, and everyone onboard was killed. Floors 93 to 99 were impacted, and many inside died. Aftermath. Controversy over the identity of al-Omari erupted shortly after the attacks. At first, the FBI had named Abdul Rahman al-Omari, a pilot for Saudi Arabian Airlines, as the pilot of Flight 11. It was quickly shown that this person was still alive, and the FBI issued an apology. It was also quickly determined that Mohamed Atta was the pilot among the hijackers. The FBI then named Abdulaziz al-Omari as a hijacker. A man with the same name as those given by the FBI turned up alive in Saudi Arabia, saying that he had studied at the University of Denver and his passport was stolen there in 1995.
|
104
|
[Title: """Abdulaziz al-Omari"""] The name, origin, birth date, and occupation were released by the FBI, but the picture was not of him. "I couldn't believe it when the FBI put me on their list", he said. "They gave my name and my date of birth, but I am not a suicide bomber. I am here. I am alive. I have no idea how to fly a plane. I had nothing to do with this." The FBI gave a press conference on October 5, 2001, where they gave details regarding Atta and the real al-Omari's movements on September 10 and 11.
|
105
|
[Title: """Alfred Jarry"""] Alfred Jarry (; ; 8 September 1873 – 1 November 1907) was a French symbolist writer who is best known for his play "Ubu Roi" (1896)"," often cited as a forerunner of the Dada, Surrealist, and Futurist movements of the 1920s and 1930s and later the theatre of the absurd In the 1950s and 1960s. He also coined the term and philosophical concept of 'pataphysics. Jarry was born in Laval, Mayenne, France, and his mother was from Brittany. He wrote in a variety of hybrid genres and styles, prefiguring the postmodern, including novels, poems, short plays and opéras bouffes, absurdist essays and speculative journalism. His texts are considered examples of absurdist literature and postmodern philosophy. Biography and works. His father Anselme Jarry (1837–1895) was a salesman who descended into alcoholism; his mother Caroline, née Quernest (1842–1893), was interested in music and literature, but her family had a streak of insanity, and her mother and brother were institutionalized. The couple had two surviving children, a daughter Caroline-Marie, called Charlotte (1865–1925), and Alfred. In 1879 Caroline left Anselme and took the children to Saint-Brieuc in Brittany. In 1888 the family moved to Rennes, where Jarry entered the at 15. There he led a group of boys who enjoyed poking fun at their well-meaning, but obese and incompetent physics teacher, a man named Hébert. Jarry and his classmate, Henri Morin, wrote a play they called "Les Polonais" and performed it with marionettes in the home of one of their friends. The main character, "Père Heb", was a blunderer with a huge belly, three teeth (one of stone, one of iron and one of wood), a single, retractable ear and a misshapen body. In Jarry's later work "Ubu Roi", Père Heb would develop into Ubu, one of the most monstrous and astonishing characters in French literature. At 17 Jarry passed his and moved to Paris to prepare for admission to the École Normale Supérieure.
|
106
|
[Title: """Alfred Jarry"""] Though he was not admitted, he soon gained attention for his original poems and prose-poems. A collection of his work, "Les minutes de sable mémorial", was published in 1893. That same year, Jarry contracted influenza. His mother and sister tended him, but once he recovered his mother fell ill of the disease and died; two years later his father perished from influenza as well, leaving Jarry a small inheritance which he quickly spent. Jarry had meantime discovered the pleasures of alcohol, which he called "my sacred herb" or, when referring to absinthe, the "green goddess". A story is told that he once painted his face green and rode through town on his bicycle in its honour (and possibly under its influence). When he was drafted into the army in 1894, his gift for turning notions upside down defeated attempts to instill military discipline. The sight of the diminutive Jarry in a uniform much too large for his less than 5-foot frame – the army did not issue uniforms small enough – was so disruptively funny that he was excused from parades and marching drills. Eventually the army discharged him for medical reasons. His military experience eventually inspired his novel "Days and Nights". In his youth, Jarry was homosexually inclined, although like many bohemians he disavowed sexual categorization. A brief but passionate relationship with future poet Léon-Paul Fargue inspired his semi-autobiographical play "Haldernablou" (1894). Jarry returned to Paris and applied himself to writing, drinking and the company of friends who appreciated his witty, sweet-tempered and unpredictable conversation. This period is marked by his intense involvement with Remy de Gourmont in the publication of "L'Ymagier", a luxuriously produced "art" magazine devoted to the symbolic analysis of medieval and popular prints. Symbolism as an art movement was in full swing at this time, and "L'Ymagier" provided a nexus for many of its key contributors. Jarry's play "Caesar Antichrist" (1895) drew on this movement for material. This is a work that bridges the gap between serious symbolic meaning and the type of critical absurdity with which Jarry would soon become associated.
|
107
|
[Title: """Alfred Jarry"""] Using the biblical Book of Revelation as a point of departure, "Caesar Antichrist" presents a parallel world of extreme formal symbolism in which Christ is resurrected not as an agent of spirituality but as an agent of the Roman Empire that seeks to dominate spirituality. It is a unique narrative that effectively links the domination of the soul to contemporaneous advances in the field of Egyptology such as the 1894 excavation of the Narmer Palette, an ancient artifact used for situating the rebus within hermeneutics. The character Ubu Roi first appears in this play. The spring of 1896 saw the publication, in Paul Fort's review "Le Livre d'art", of Jarry's 5-act play "Ubu Roi", the rewritten and expanded "Les Polonais" of his school days. "Ubu Roi"s savage humour and monstrous absurdity, unlike anything thus far performed in French theatre, seemed unlikely to ever actually be performed on stage. However, impetuous theatre director Aurélien-Marie Lugné-Poe took the risk, producing the play at his Théâtre de l'Œuvre. On opening night (10 December 1896), with traditionalists and the avant-garde in the audience, King Ubu (played by Firmin Gémier) stepped forward and intoned the opening word, "Merdre!" (often translated as "Pshit" or "Shittr!" in English). A quarter of an hour of pandemonium ensued: outraged cries, booing, and whistling by the offended parties, countered by cheers and applause by the more bohemian contingent. Such interruptions continued through the evening. At the time, only the dress rehearsal and opening night performance were held, and the play was not revived until after Jarry's death. The play brought fame to the 23-year-old Jarry, and he immersed himself in the fiction he had created. Gémier had modelled his portrayal of Ubu on Jarry's own staccato, nasal vocal delivery, which emphasized each syllable (even the silent ones). From then on, Jarry would always speak in this style. He adopted Ubu's ridiculous and pedantic figures of speech; for example, he referred to himself using the royal "we", and called the wind "that which blows" and the bicycle he rode everywhere "that which rolls".
|
108
|
[Title: """Alfred Jarry"""] Jarry moved into a flat which the landlord had created through the unusual expedient of subdividing a larger flat by means of a horizontal rather than a vertical partition. The diminutive Jarry could just manage to stand up in the place, but guests had to bend or crouch. Jarry also took to carrying a loaded revolver. In response to a neighbour's complaint that his target shooting endangered her children, he replied, "If that should ever happen, ma-da-me, we should ourselves be happy to get new ones with you." With Franc-Nohain and Claude Terrasse he co-founded the Théâtre des Pantins, which in 1898 was the site of marionette performances of "Ubu Roi". Living in worsening poverty, neglecting his health and drinking excessively, Jarry went on to write the novel "Le Surmâle" ("The Supermale"), which is partly a satire on the Symbolist ideal of self-transcendence. Unpublished until after his death, his fiction "Exploits and Opinions of Dr. Faustroll, Pataphysician" ("Gestes et opinions du docteur Faustroll, pataphysicien") describes the exploits and teachings of a sort of antiphilosopher who, born at age 63, travels through a hallucinatory Paris in a sieve and subscribes to the tenets of "'pataphysics". 'Pataphysics deals with "the laws which govern exceptions and will explain the universe supplementary to this one." In 'pataphysics, every event in the universe is accepted as an extraordinary event. Jarry once wrote, expressing some of the bizarre logic of 'pataphysics, "If you let a coin fall and it falls, the next time it is just by an infinite coincidence that it will fall again the same way; hundreds of other coins on other hands will follow this pattern in an infinitely unimaginable fashion." In his final years, he was a legendary and heroic figure to some of the young writers and artists in Paris. Guillaume Apollinaire, André Salmon and Max Jacob sought him out in his truncated apartment. Pablo Picasso was fascinated with Jarry. After Jarry's death Picasso acquired his revolver and wore it on his nocturnal expeditions in Paris. He later bought many of his manuscripts as well as executing a fine drawing of him.
|
109
|
[Title: """Alfred Jarry"""] Jarry died in Paris on 1 November 1907 of tuberculosis, aggravated by drug and alcohol misuse. When he could not afford alcohol, he drank ether. It is recorded that his last request was for a toothpick. He was interred in the Cimetière de Bagneux, near Paris. The complete works of Alfred Jarry are published in three volumes by Gallimard in the collection "Bibliothèque de la Pléiade".
|
110
|
[Title: """Amalric"""] Amalric or Amalaric (also Americ, Almerich, Emeric, Emerick and other variations) is a personal name derived from the tribal name "Amal" (referring to the Gothic Amali) and "ric" (Gothic "reiks") meaning "ruler, prince". Equivalents in different languages include:
|
111
|
[Title: """Crandall University"""] Crandall University is a Baptist Christian liberal arts university located in Moncton, New Brunswick, Canada. It is affiliated with the Canadian Baptists of Atlantic Canada (Canadian Baptist Ministries). History. Crandall University was founded in 1949 under the name United Baptist Bible Training School (UBBTS), and served as both a secondary school and a Bible school by the Canadian Baptists of Atlantic Canada. Over two decades, the focus of the school gradually shifted toward post-secondary programs. In 1968, UBBTS became a Bible and junior Christian liberal arts college, and in 1970 the name was changed to Atlantic Baptist College (ABC). A sustained campaign to expand the school's faculty and improve the level of education resulted in ABC being able to grant full Bachelor of Arts degrees in 1983. Its campus at this time was located along the Salisbury Road, west of Moncton's central business district. The institution moved to a new campus built on the Gorge Road, north of the central business district, in 1996. The name was changed to Atlantic Baptist University (ABU), a reflection of expanded student enrolment and academic accreditation. In 2003, the ABU sports teams adopted the name "The Blue Tide". The institution was the first, and thus far only, English-language university in Moncton. The "Atlantic Baptist University Act" was passed by the Legislative Assembly of New Brunswick in 2008. On August 21, 2009, it was announced that the institution had changed its name to Crandall University in honour of Rev. Joseph Crandall, a pioneering Baptist minister in the maritime region. In conjunction with the university name change, Crandall Athletics took on a new identity as "The Crandall Chargers." Academics. , Crandall offers 16 undergraduate programs, 3 graduate programs, and a variety of certificate programs. Through its partnership with Acadia Divinity College, students can also enrol in the Bachelor of Theology program concurrent with a Crandall degree. Controversy. In 2012, Crandall University came under public scrutiny for receiving municipal funds while refusing to hire non-celibate LGBTQ people. That policy, although regarded as scriptural and consistent with its denominational tradition, was characterized by the press as anti-gay.
|
112
|
[Title: """Crandall University"""] That same year, the Crandall Student Association publicly broke with the university's administration over the policy, with the student president at the time telling the CBC, "The Christian faith does say do not judge others. And the Christian faith is all about love. So I feel that this policy – to me – doesn't seem like it's following those specific guidelines." In 2013, a year after the controversy erupted, the university opted to not apply for $150,000 in public funding that it had received annually. The university president also issued an apology, stating: "We wish to apologize for anything that Crandall University might possibly have communicated in the past that may have seemed unloving or disrespectful in any way toward any individual or groups." Affiliations. Crandall is an affiliate member of the Association of the Registrars of the Universities and Colleges of Canada (ARUCC); a full member of the ARUCC regional association, the Atlantic Association of Registrars and Admissions Officers (AARAO); an active member of Christian Higher Education Canada (CHEC); and an active member of the New Brunswick Association of Private Colleges and Universities. However, Crandall faculty are not members of the Canadian Association of University Teachers (CAUT). In their report, the CAUT found that "while the university has a statement on academic freedom, it is significantly inconsistent with that of the CAUT and the majority of universities across the western world, and assurances that free enquiry is still possible within its constraints are unconvincing." They therefore recommended that Crandall University "be placed on the list of institutions 'found to have imposed a requirement of a commitment to a particular ideology or statement of faith as a condition of employment.'" The university is affiliated with the Canadian Baptists of Atlantic Canada (Canadian Baptist Ministries). It is a member of the Council for Christian Colleges and Universities. Library and archives. Crandall University houses the Baptist Heritage Center whose 300 artifacts preserve the material history of Atlantic Baptists, the Convention of Atlantic Baptist Churches, and its predecessor organizations. The collection and archives includes objects used in worship services, furniture, musical instruments, church building architecture pictures and printed material. Athletics. Crandall University is represented in the Atlantic Collegiate Athletic Association (ACAA) by 8 varsity teams. The Chargers teams include men's and women's soccer, basketball, volleyball, and cross country. The Chargers also offer a boxing club program that competes internationally.
|
113
|
[Title: """Crandall University"""] The Chargers have won seven ACAA championship banners:
|
114
|
[Title: """Rise and Fall of the City of Mahagonny"""] Rise and Fall of the City of Mahagonny () is a political-satirical opera composed by Kurt Weill to a German libretto by Bertolt Brecht. It was first performed on 9 March 1930 at the in Leipzig. Some interpreters have viewed the play as a critique of American society. Others have perceived it as a critique of the chaotic and immoral Weimar Republic, particularly Berlin of the 1920s with its rampant prostitution, unstable government, political corruption, and economic crises. Composition history. Weill was asked by the 1927 Baden-Baden music festival committee to write a one-act chamber opera for the festival. He ended up writing "Mahagonny-Songspiel", sometimes known as "Das kleine Mahagonny", a concert work commissioned for voices and a small orchestra. The work was written in May 1927, and performed in June. It consisted of eleven numbers, including "Alabama Song" and "Benares Song". Weill then continued to rework the material into a full opera while Brecht worked on the libretto. The opera had its premiere in Leipzig on 9 March 1930 and played in Berlin in December of the following year. The opera was banned by the Nazis in 1933 and did not have a significant production until the 1960s. Weill's score uses a number of styles, including ragtime, jazz and formal counterpoint. The "Alabama Song" has been interpreted by a range of artists, notably Ute Lemper, The Doors and David Bowie. Language. The lyrics for the "Alabama Song" and another song, the "Benares Song", are in English (albeit specifically idiosyncratic English) and are performed in that language even when the opera is performed in its original (German) language. A few lines of the briefly interpolated song, "Asleep in the Deep" (1897), lyrics by Arthur J. Lamb, music by H. W. Petrie, referred to in the opera by its opening words, "Stürmisch die Nacht " or "Stormy the Deep", are sung in the German version of the song, composed on verses of Martell, under the title "Des Seemanns Los" (The Sailor's Fate), when the opera is sung in the original German.
|
115
|
[Title: """Rise and Fall of the City of Mahagonny"""] Although the name of the city itself sounds like the English word "mahogany" and its German-language equivalent, "Mahagoni", the character Leokadja Begbick states that it means "City of Nets" while Brecht stated that it was a made-up word. Performance history. The opera has played in opera houses around the world. Never achieving the popularity of Weill and Brecht's "The Threepenny Opera," "Mahagonny" is still considered a work of stature with a haunting score. Herbert Lindenberger in his book "Opera in History", for example, views "Mahagonny" alongside Schoenberg's "Moses und Aron" as indicative of the two poles of modernist opera. Following the Leipzig premiere, the opera was presented in Berlin in December 1931 at the Theater am Schiffbauerdamm conducted by Alexander von Zemlinsky with Lotte Lenya as Jenny, Trude Hesterberg as Begbick, and Harald Paulsen as Jimmy. Another production was presented in January 1934 in Copenhagen at the Det Ny Teater. Other productions within Europe waited until the end of the Second World War, some notable ones being in January 1963 in London at Sadler's Wells Opera conducted by Colin Davis and in Berlin in September 1977 by the Komische Oper. It was not presented in the United States until 1970, when a short-lived April production at the Phyllis Anderson Theatre off Broadway starred Barbara Harris as Jenny, Frank Porretta as Jimmy, and Estelle Parsons as Begbick. It was then presented in Boston in 1973 under the direction of Sarah Caldwell. The first university production in the US was in 1973 at UC Berkeley, directed by Jean-Bernard Bucky and Michael Senturia. A full version was presented at the Yale Repertory Theatre in New Haven, Connecticut, in 1974, with Gilbert Price as Jimmy and Stephanie Cotsirilos as Jenny. Kurt Kasznar played Moses. The libretto was performed in an original translation by Michael Feingold; the production was directed by Alvin Epstein. In October 1978, Yale presented a "chamber version" adapted and directed by Keith Hack, with John Glover as Jimmy and June Gable as Begbick. Mark Linn-Baker played Fatty; Michael Gross was Trinity Moses.
|
116
|
[Title: """Rise and Fall of the City of Mahagonny"""] In November 1979, "Mahagonny" debuted at the Metropolitan Opera in a John Dexter production conducted by James Levine. The cast included Teresa Stratas as Jenny, Astrid Varnay as Begbick, Richard Cassilly as Jimmy, Cornell MacNeil as Moses, Ragnar Ulfung as Fatty and Paul Plishka as Joe. The production was televised in 1979 and was released on DVD in 2010. This production was streamed through the Met Opera on Demand platform on 12 December 2020 and 3-4 July 2021. The Los Angeles Opera presented the opera in September 1989 under conductor Kent Nagano and with a Jonathan Miller production. Other notable productions in Europe from the 1980s included the March 1986 presentation by the Scottish Opera in Glasgow; a June 1990 production in Florence by the Maggio Musicale Fiorentino. In October 1995 and 1997, the Paris Opera staged by Graham Vick, under the baton of Jeffrey Tate starring Marie McLaughlin as Jenny, Felicity Palmer (1995) and Kathryn Harries (1997) as Begbick, and Kim Begley (1995)/Peter Straka (1997) as Jimmy. The July 1998 Salzburg Festival production featured Catherine Malfitano as Jenny, Gwyneth Jones as Begbick, and Jerry Hadley as Jimmy. The Vienna State Opera added it to its repertoire in January 2012 in a production by Jérôme Deschamps conducted by Ingo Metzmacher starring Christopher Ventris as Jimmy and Angelika Kirchschlager as Jenny, notably casting young mezzo-soprano Elisabeth Kulman as Begbick, breaking the tradition of having a veteran soprano (like Varnay or Jones) or musical theater singer (like Patti LuPone) perform the role. Productions within the US have included those in November 1998 by the Lyric Opera of Chicago directed by David Alden. Catherine Malfitano repeated her role as Jenny, while Felicity Palmer sang Begbick, and Kim Begley sang the role of Jimmy. The Los Angeles Opera's February 2007 production directed by John Doyle and conducted by James Conlon included Audra McDonald as Jenny, Patti LuPone as Begbick, and Anthony Dean Griffey as Jimmy.
|
117
|
[Title: """Rise and Fall of the City of Mahagonny"""] This production was recorded on DVD, and subsequently won the 2009 Grammy Awards for "Best Classical Album" and "Best Opera Recording." In 2014 it was performed using an alternate libretto as a "wrestling opera" at the Oakland Metro by the performers of Hoodslam. A major new production had its world premiere in July 2019 at the Aix-en-Provence Festival in France conducted by Esa-Pekka Salonen with stage direction by Ivo van Hove. It is a co-production of Dutch National Opera, Metropolitan Opera, Opera Ballet Vlaanderen, and Les Theatres De La Ville De Luxembourg. Synopsis. Act 1. "Scene 1: A desolate no-man's land" A truck breaks down. Three fugitives from justice get out and find themselves in the city of Mahagonny: Fatty the Bookkeeper, Trinity Moses, and Leocadia Begbick. Because the federal agents pursuing them will not search this far north, and they are in a good location to attract ships coming south from the Alaskan gold fields, Begbick decides that they can profit by staying where they are and founding a pleasure city, where men can have fun, because there is nothing else in the world to rely on. "Scene 2" The news of Mahagonny spreads quickly, and sharks from all over flock to the bait, including the whore Jenny Smith, who is seen, with six other girls, singing the "Alabama Song", in which she waves goodbye to her home and sets out in pursuit of whiskey, dollars and pretty boys. "Scene 3" In the big cities, where men lead boring, purposeless lives, Fatty and Moses spread the gospel of Mahagonny, city of gold, among the disillusioned. "Scene 4" Four Alaskan Lumberjacks who have shared hard times together in the timberlands and made their fortunes set off together for Mahagonny. Jimmy Mahoney and his three friends – Jacob Schmidt, Bank Account Billy, and Alaska Wolf Joe – sing of the pleasures awaiting them in "Off to Mahagonny", and look forward to the peace and pleasure they will find there. "Scene 5" The four friends arrive in Mahagonny, only to find other disappointed travelers already leaving. Begbick, well-informed about their personal tastes, marks down her prices, but for the penurious Billy, they still seem too high.
|
118
|
[Title: """Rise and Fall of the City of Mahagonny"""] Jimmy impatiently calls for the girls of Mahagonny to show themselves, so he can make a choice. Begbick suggests Jenny as the right girl for Jack, who finds her rates too high. She pleads with Jack to reconsider ("Havana Song"), which arouses Jim's interest, and he chooses her. Jenny and the girls sing a tribute to "the Jimmys from Alaska." "Scene 6" Jimmy and Jenny get to know one another as she asks him to define the terms of their contact: Does he wish her to wear her hair up or down, to wear fancy underwear or none at all? "What is your wish?" asks Jim, but Jenny evades answering. "Scene 7" Begbick, Fatty, and Moses meet to discuss the pleasure city's financial crisis: People are leaving in droves, and the price of whiskey is sinking rapidly. Begbick suggests going back to civilization, but Fatty reminds her that the federal agents have been inquiring for her in nearby Pensacola. Money would solve everything, declares Begbick, and she decides to soak the four new arrivals for all they've got. "Scene 8" Jimmy, restless, attempts to leave Mahagonny because he misses the wife he left in Alaska. "Scene 9" In front of the Rich Man's Hotel, Jimmy and the others sit lazily as a pianist plays Tekla Bądarzewska's "A Maiden's Prayer". With growing anger, Jimmy sings of how his hard work and suffering in Alaska have led only to this. Drawing a knife, he shouts for Begbick, while his friends try to disarm him and the other men call to have him thrown out. Calm again, he tells Begbick that Mahagonny can never make people happy: it has too much peace and quiet. "Scene 10" As if in answer to Jimmy's complaint, the city is threatened by a hurricane. Everyone sings in horror of the destruction awaiting them. "Scene 11" Tensely, people watch for the hurricane's arrival. The men sing a hymn-like admonition not to be afraid. Jim meditatively compares Nature's savagery to the far greater destructiveness of Man. Why do we build, he asks, if not for the pleasure of destroying? Since Man can outdo any hurricane, fear makes no sense.
|
119
|
[Title: """Rise and Fall of the City of Mahagonny"""] For the sake of human satisfaction, nothing should be forbidden: If you want another man's money, his house or his wife, knock him down and take it; do what you please. As Begbick and the men ponder Jimmy's philosophy, Fatty and Moses rush in with news: The hurricane has unexpectedly struck Pensacola, destroying Begbick's enemies, the federal agents. Begbick and her cohorts take it as a sign that Jimmy is right; they join him, Jenny, and his three friends in singing a new, defiant song: If someone walks over someone else, then it's me, and if someone gets walked on, then it's you. In the background, the men continue to chant their hymn as the hurricane draws nearer. Act 2. "Scene 12" Magically, the hurricane bypasses Mahagonny, and the people sing in awe of their miraculous rescue. This confirms Begbick's belief in the philosophy of "Do what you want," and she proceeds to put it into effect. "Scene 13 at the renovated "Do It" tavern." The men sing of the four pleasures of life: Eating, Lovemaking, Fighting, and Drinking. First comes eating: To kitschy cafe music, Jimmy's friend Jacob gorges until he keels over and dies. The men sing a chorale over his body, saluting "a man without fear". "Scene 14: Loving." While Begbick collects money and issues tips on behavior, Moses placates the impatient men queuing to make love to Jenny and the other whores. The men sing the "Mandalay Song", warning that love does not last forever, and urging those ahead of them to make it snappy. "Scene 15: Fighting." The men flock to see a boxing match between Trinity Moses and Jim's friend Alaska Wolf Joe. While most of the men, including the ever-cautious Billy, bet on the burly Moses, Jim, out of friendship, bets heavily on Joe. The match is manifestly unfair; Moses not only wins but kills Joe in knocking him out. "Scene 16: Drinking." In an effort to shake off the gloom of Joe's death, Jimmy invites everyone to have a drink on him. The men sing "Life in Mahagonny", describing how one could live in the city for only five dollars a day, but those who wanted to have fun always needed more.
|
120
|
[Title: """Rise and Fall of the City of Mahagonny"""] Jim, increasingly drunk, dreams of sailing back to Alaska. He takes down a curtain rod for a mast and climbs on the pool table, pretending it is a ship; Jenny and Billy play along. Jimmy is abruptly sobered up when Begbick demands payment for the whiskey as well as for the damage to her property. Totally broke, he turns in a panic to Jenny, who explains her refusal to help him out in the song "Make your own bed" – an adaptation of the ideas he proclaimed at the end of act 1. Jim is led off in chains as the chorus, singing another stanza of "Life in Mahagonny", returns to its pastimes. Trinity Moses assures the crowd that Jimmy will pay for his crimes with his life. "Scene 17" At night, Jim alone and chained to a lamppost sings a plea for the sun not to rise on the day of his impending trial. Act 3. "Scene 18: In the courtroom" Moses, like a carnival barker, sells tickets to the trials. He serves as prosecutor, Fatty as defense attorney, Begbick as judge. First comes the case of Toby Higgins, accused of premeditated murder for the purpose of testing an old revolver. Fatty invites the injured party to rise, but no one does so, since the dead do not speak. Toby bribes all three, and as a result, Begbick dismisses the case. Next Jimmy's case is called. Chained, he is led in by Billy, from whom he tries to borrow money; Billy of course refuses, despite Jim's plea to remember their time together in Alaska. In virtually the same speech he used to attack Higgins, Moses excoriates him for not paying his bills, for seducing Jenny (who presents herself as a plaintiff) to commit a "carnal act" with him for money, and for inciting the crowd with "an illegal joyous song" on the night of the typhoon. Billy, with the chorus's support, counters that, in committing the latter act, Jimmy discovered the laws by which Mahagonny lives. Moses argues that Jim hastened his friend Joe's death in a prizefight by betting on him, and Billy counters by asking who actually killed Joe. Moses does not reply. But there is no answer for the main count against him.
|
121
|
[Title: """Rise and Fall of the City of Mahagonny"""] Jim gets short sentences for his lesser crimes, but for having no money, he is sentenced to death. Begbick, Fatty, and Moses, rising to identify themselves as the injured parties, proclaim "in the whole human race / there is no greater criminal / than a man without money". As Jim is led off to await execution, everyone sings the "Benares Song", in which they long for that exotic city "where the sun is shining." But Benares has been destroyed by an earthquake. "Where shall we go?" they ask. "Scene 19: At the gallows" Jim says a tender goodbye to Jenny, who, dressed in white, declares herself his widow. He surrenders her to Billy, his last remaining companion from Alaska. When he tries to delay the execution by reminding the people of Mahagonny that God exists, they play out for him, under Moses' direction, the story of "God in Mahagonny", in which the Almighty condemns the town and is overthrown by its citizens, who declare that they can not be sent to Hell because they are already in Hell. Jim, chastened, asks only for a glass of water, but is refused even this as Moses gives the signal for the trap to be sprung. "Scene 20" A caption advises that, after Jim's death, increasing hostility among the city's various factions has caused the destruction of Mahagonny. To a potpourri of themes from earlier in the opera, groups of protesters are seen on the march, in conflict with one another, while the city burns in the background. Jenny and the whores carry Jim's clothing and accessories like sacred relics; Billy and several men carry his coffin. In a new theme, they and the others declare, "Nothing you can do will help a dead man". Begbick, Fatty, and Moses appear with placards of their own, joining the entire company in its march and declaring "Nothing will help him or us or you now," as the opera ends in chaos. In other media. The opera influenced Harry Everett Smith in his 1970-1980 film "Mahagonny," which features Allen Ginsberg and Patti Smith. The 2005 movie "Manderlay", directed by Lars von Trier, contains several references to the plot of "Mahagonny".
|
122
|
[Title: """Rise and Fall of the City of Mahagonny"""] The most notable of these is the threat of a hurricane approaching the city during the first act. Von Trier's earlier movie "Dogville", to which Manderlay is a sequel, was in large part based on a song from Brecht's "Threepenny Opera" ("Pirate Jenny"). In the brothel scene in act 2 of "Mahagonny", the choir sings a "Song von Mandelay". The play "Happy End" (1929) by Elisabeth Hauptmann, Brecht and Weill, also contains a song called "Der Song von Mandelay", which uses the same refrain as in the brothel scene of "Mahagonny". Brecht's use of the name Mandelay/Mandalay was inspired by Rudyard Kipling's poem "Mandalay". Cover versions of songs. "Alabama Song" has been covered by many artists, notably Ute Lemper, The Doors and David Bowie. References. Informational notes Citations
|
123
|
[Title: """Avery Hopwood"""] James Avery Hopwood (May 28, 1882 – July 1, 1928) was an American playwright of the Jazz Age. He had four plays running simultaneously on Broadway in 1920, namely "The Gold Diggers," "The Bat" and "Spanish Love" and "Ladies' Night (In a Turkish Bath)". Early life. Hopwood was born to James and Jule Pendergast Hopwood on May 28, 1882, in Cleveland, Ohio. He graduated from Cleveland's West High School in 1900. In 1901, he began attending the University of Michigan in Ann Arbor. However, his family experienced financial difficulties, so for his second year he transferred to Adelbert College. He returned to the University of Michigan in the fall of 1903, and graduated Phi Beta Kappa in 1905. Career. Hopwood started out as a journalist for the "Cleveland Leader" as its New York correspondent, but within a year had his first play, "Clothes" (1906), produced on Broadway, with the aid of playwright Channing Pollock. Hopwood eventually became known as "The Playboy Playwright" and specialized in comedies and farces, some of them with material considered risqué at the time. One play, "The Demi-Virgin" in 1921, prompted a court case because of its suggestive subject matter, including a risque game of cards, "Stripping Cupid". The case was dismissed.
|
124
|
[Title: """Avery Hopwood"""] His many plays included "Nobody's Widow" (1910), starring Blanche Bates; "Fair and Warmer" (1915), starring Madge Kennedy (filmed in 1919); "The Gold Diggers" (1919), starring Ina Claire in New York and Tallulah Bankhead in London; (filmed in 1923 as "The Gold Diggers", in 1928 as "Gold Diggers of Broadway" and also as "Gold Diggers of 1933"); "Ladies' Night", 1920, starring Charlie Ruggles (filmed in 1928); the famous mystery play "The Bat" (with Mary Roberts Rinehart), 1920 (filmed in 1926 as "The Bat", in 1930 as "The Bat Whispers," and in 1959 as "The Bat"); "Getting Gertie's Garter" (with Wilson Collison), 1921, starring Hazel Dawn (filmed in 1927 and 1945); "The Demi-Virgin", 1921, also starring Dawn; "The Alarm Clock", 1923, translated from the French; "The Best People" (with David Gray), 1924 (filmed in 1925 and as "Fast and Loose" in 1930 with Clara Bow); the song-farce "Naughty Cinderella", 1925, starring Irène Bordoni and "The Garden of Eden" in 1927, with Tallulah Bankhead in London and Miriam Hopkins in New York; (filmed in 1928 as "The Garden of Eden"). Personal life. In 1906, Hopwood was introduced to writer and photographer Carl Van Vechten. The two became close friends and were sometimes sexual partners. In the 1920s Hopwood had a tumultuous and abusive romantic relationship with fellow Cleveland-born playwright John Floyd. Although Hopwood announced to the press in 1924 that he was engaged to vaudeville dancer and choreographer Rosa Rolanda, Van Vechten confirmed in later years that it was a publicity stunt. Rolanda would later marry caricaturist Miguel Covarrubias. On the evening of July 1, 1928, at Juan-les-Pins on the French Riviera, Hopwood suffered a fatal heart attack while swimming. He was buried in Riverside Cemetery, Cleveland.
|
125
|
[Title: """Avery Hopwood"""] His mother, Jule Hopwood, inherited a large trust from him, but he had not made arrangements for the disposition of other items, including literary rights. While she was working through the legal issues with his estate, Jule Hopwood fell ill and died on March 1, 1929. She was buried next to her son. Legacy. Hopwood's plays were very successful commercially, but they did not have the lasting literary significance he hoped to achieve. Hopwood Award. The terms of Hopwood's will left a substantial portion of his estate to his alma mater, the University of Michigan, for the establishment of the Avery Hopwood and Jule Hopwood Creative Writing Awards. The bequest stipulated: "It is especially desired that students competing for prizes shall be allowed the widest possible latitude, and that the new, the unusual, and the radical shall be especially encouraged." Famous Hopwood award winners include Robert Hayden, Marge Piercy, Arthur Miller, Betty Smith, Lawrence Kasdan, John Ciardi, Mary Gaitskill, Edmund White, Nancy Willard, Frank O'Hara, and Steve Hamilton. "The Great Bordello". Throughout his life, Hopwood worked on a novel that he hoped would "expose" the strictures the commercial theater machine imposed on playwrights, but the manuscript was never published. Jack Sharrar recovered the manuscript for this novel in 1982 during his research for "Avery Hopwood, His Life and Plays". The novel was published in July 2011 by Mondial Books (New York) as "The Great Bordello, a Story of the Theatre", edited and with an Afterword by Sharrar.
|
126
|
[Title: """Algorithms for calculating variance"""] Algorithms for calculating variance play a major role in computational statistics. A key difficulty in the design of good algorithms for this problem is that formulas for the variance may involve sums of squares, which can lead to numerical instability as well as to arithmetic overflow when dealing with large values. Naïve algorithm. A formula for calculating the variance of an entire population of size "N" is: Using Bessel's correction to calculate an unbiased estimate of the population variance from a finite sample of "n" observations, the formula is: Therefore, a naïve algorithm to calculate the estimated variance is given by the following: This algorithm can easily be adapted to compute the variance of a finite population: simply divide by "n" instead of "n" − 1 on the last line. Because and can be very similar numbers, cancellation can lead to the precision of the result to be much less than the inherent precision of the floating-point arithmetic used to perform the computation. Thus this algorithm should not be used in practice, and several alternate, numerically stable, algorithms have been proposed. This is particularly bad if the standard deviation is small relative to the mean. Computing shifted data. The variance is invariant with respect to changes in a location parameter, a property which can be used to avoid the catastrophic cancellation in this formula. with formula_4 any constant, which leads to the new formula the closer formula_4 is to the mean value the more accurate the result will be, but just choosing a value inside the samples range will guarantee the desired stability. If the values formula_7 are small then there are no problems with the sum of its squares, on the contrary, if they are large it necessarily means that the variance is large as well. In any case the second term in the formula is always smaller than the first one therefore no cancellation may occur.
|
127
|
[Title: """Algorithms for calculating variance"""] If just the first sample is taken as formula_4 the algorithm can be written in Python programming language as def shifted_data_variance(data): if len(data) < 2: return 0.0 K = data[0] n = Ex = Ex2 = 0.0 for x in data: n += 1 Ex += x - K Ex2 += (x - K) ** 2 variance = (Ex2 - Ex**2 / n) / (n - 1) # use n instead of (n-1) if want to compute the exact variance of the given data # use (n-1) if data are samples of a larger population return variance This formula also facilitates the incremental computation that can be expressed as K = Ex = Ex2 = 0.0 n = 0 def add_variable(x): global K, n, Ex, Ex2 if n == 0: K = x n += 1 Ex += x - K Ex2 += (x - K) ** 2 def remove_variable(x): global K, n, Ex, Ex2 n -= 1 Ex -= x - K Ex2 -= (x - K) ** 2 def get_mean(): global K, n, Ex return K + Ex / n def get_variance(): global n, Ex, Ex2 return (Ex2 - Ex**2 / n) / (n - 1) Two-pass algorithm. An alternative approach, using a different formula for the variance, first computes the sample mean, and then computes the sum of the squares of the differences from the mean, where "s" is the standard deviation. This is given by the following code: def two_pass_variance(data): n = len(data) mean = sum(data) / n variance = sum((x - mean) ** 2 for x in data) / (n - 1) return variance This algorithm is numerically stable if "n" is small. However, the results of both of these simple algorithms ("naïve" and "two-pass") can depend inordinately on the ordering of the data and can give poor results for very large data sets due to repeated roundoff error in the accumulation of the sums. Techniques such as compensated summation can be used to combat this error to a degree.
|
128
|
[Title: """Algorithms for calculating variance"""] Welford's online algorithm. It is often useful to be able to compute the variance in a single pass, inspecting each value formula_11 only once; for example, when the data is being collected without enough storage to keep all the values, or when costs of memory access dominate those of computation. For such an online algorithm, a recurrence relation is required between quantities from which the required statistics can be calculated in a numerically stable fashion. The following formulas can be used to update the mean and (estimated) variance of the sequence, for an additional element "x""n". Here, formula_12 denotes the sample mean of the first "n" samples formula_13, formula_14 their biased sample variance, and formula_15 their unbiased sample variance. These formulas suffer from numerical instability , as they repeatedly subtract a small number from a big number which scales with "n". A better quantity for updating is the sum of squares of differences from the current mean, formula_19, here denoted formula_20: This algorithm was found by Welford, and it has been thoroughly analyzed. It is also common to denote formula_22 and formula_23. An example Python implementation for Welford's algorithm is given below. def update(existing_aggregate, new_value): (count, mean, M2) = existing_aggregate count += 1 delta = new_value - mean mean += delta / count delta2 = new_value - mean M2 += delta * delta2 return (count, mean, M2) def finalize(existing_aggregate): (count, mean, M2) = existing_aggregate if count < 2: return float("nan") else: (mean, variance, sample_variance) = (mean, M2 / count, M2 / (count - 1)) return (mean, variance, sample_variance) This algorithm is much less prone to loss of precision due to catastrophic cancellation, but might not be as efficient because of the division operation inside the loop. For a particularly robust two-pass algorithm for computing the variance, one can first compute and subtract an estimate of the mean, and then use this algorithm on the residuals. The parallel algorithm below illustrates how to merge multiple sets of statistics calculated online. Weighted incremental algorithm.
|
129
|
[Title: """Algorithms for calculating variance"""] The algorithm can be extended to handle unequal sample weights, replacing the simple counter "n" with the sum of weights seen so far. West (1979) suggests this incremental algorithm: def weighted_incremental_variance(data_weight_pairs): w_sum = w_sum2 = mean = S = 0 for x, w in data_weight_pairs: w_sum = w_sum + w w_sum2 = w_sum2 + w**2 mean_old = mean mean = mean_old + (w / w_sum) * (x - mean_old) S = S + w * (x - mean_old) * (x - mean) population_variance = S / w_sum # Bessel's correction for weighted samples # Frequency weights sample_frequency_variance = S / (w_sum - 1) # Reliability weights sample_reliability_variance = S / (1 - w_sum2 / (w_sum**2)) Parallel algorithm. Chan et al. note that Welford's online algorithm detailed above is a special case of an algorithm that works for combining arbitrary sets formula_24 and formula_25: This may be useful when, for example, multiple processing units may be assigned to discrete parts of the input. Chan's method for estimating the mean is numerically unstable when formula_27 and both are large, because the numerical error in formula_28 is not scaled down in the way that it is in the formula_29 case. In such cases, prefer formula_30. def parallel_variance(n_a, avg_a, M2_a, n_b, avg_b, M2_b): n = n_a + n_b delta = avg_b - avg_a M2 = M2_a + M2_b + delta**2 * n_a * n_b / n var_ab = M2 / (n - 1) return var_ab This can be generalized to allow parallelization with AVX, with GPUs, and computer clusters, and to covariance. Example. Assume that all floating point operations use standard IEEE 754 double-precision arithmetic. Consider the sample (4, 7, 13, 16) from an infinite population. Based on this sample, the estimated population mean is 10, and the unbiased estimate of population variance is 30. Both the naïve algorithm and two-pass algorithm compute these values correctly.
|
130
|
[Title: """Algorithms for calculating variance"""] Next consider the sample (, , , ), which gives rise to the same estimated variance as the first sample. The two-pass algorithm computes this variance estimate correctly, but the naïve algorithm returns 29.333333333333332 instead of 30. While this loss of precision may be tolerable and viewed as a minor flaw of the naïve algorithm, further increasing the offset makes the error catastrophic. Consider the sample (, , , ). Again the estimated population variance of 30 is computed correctly by the two-pass algorithm, but the naïve algorithm now computes it as −170.66666666666666. This is a serious problem with naïve algorithm and is due to catastrophic cancellation in the subtraction of two similar numbers at the final stage of the algorithm. Higher-order statistics. Terriberry extends Chan's formulae to calculating the third and fourth central moments, needed for example when estimating skewness and kurtosis: Here the formula_32 are again the sums of powers of differences from the mean formula_33, giving For the incremental case (i.e., formula_35), this simplifies to: By preserving the value formula_37, only one division operation is needed and the higher-order statistics can thus be calculated for little incremental cost. An example of the online algorithm for kurtosis implemented as described is: def online_kurtosis(data): n = mean = M2 = M3 = M4 = 0 for x in data: n1 = n n = n + 1 delta = x - mean delta_n = delta / n delta_n2 = delta_n**2 term1 = delta * delta_n * n1 mean = mean + delta_n M4 = M4 + term1 * delta_n2 * (n**2 - 3*n + 3) + 6 * delta_n2 * M2 - 4 * delta_n * M3 M3 = M3 + term1 * delta_n * (n - 2) - 3 * delta_n * M2 M2 = M2 + term1 # Note, you may also calculate variance using M2, and skewness using M3 # Caution: If all the inputs are the same, M2 will be 0, resulting in a division by 0.
|
131
|
[Title: """Algorithms for calculating variance"""] kurtosis = (n * M4) / (M2**2) - 3 return kurtosis Pébaÿ further extends these results to arbitrary-order central moments, for the incremental and the pairwise cases, and subsequently Pébaÿ et al. for weighted and compound moments. One can also find there similar formulas for covariance. Choi and Sweetman offer two alternative methods to compute the skewness and kurtosis, each of which can save substantial computer memory requirements and CPU time in certain applications. The first approach is to compute the statistical moments by separating the data into bins and then computing the moments from the geometry of the resulting histogram, which effectively becomes a one-pass algorithm for higher moments. One benefit is that the statistical moment calculations can be carried out to arbitrary accuracy such that the computations can be tuned to the precision of, e.g., the data storage format or the original measurement hardware. A relative histogram of a random variable can be constructed in the conventional way: the range of potential values is divided into bins and the number of occurrences within each bin are counted and plotted such that the area of each rectangle equals the portion of the sample values within that bin: where formula_39 and formula_40 represent the frequency and the relative frequency at bin formula_41 and formula_42 is the total area of the histogram. After this normalization, the formula_43 raw moments and central moments of formula_44 can be calculated from the relative histogram: where the superscript formula_47 indicates the moments are calculated from the histogram. For constant bin width formula_48 these two expressions can be simplified using formula_49: The second approach from Choi and Sweetman is an analytical methodology to combine statistical moments from individual segments of a time-history such that the resulting overall moments are those of the complete time-history. This methodology could be used for parallel computation of statistical moments with subsequent combination of those moments, or for combination of statistical moments computed at sequential times. If formula_52 sets of statistical moments are known: formula_53 for formula_54, then each formula_55 can be expressed in terms of the equivalent formula_43 raw moments: where formula_58 is generally taken to be the duration of the formula_59 time-history, or the number of points if formula_60 is constant.
|
132
|
[Title: """Algorithms for calculating variance"""] The benefit of expressing the statistical moments in terms of formula_61 is that the formula_52 sets can be combined by addition, and there is no upper limit on the value of formula_52. where the subscript formula_65 represents the concatenated time-history or combined formula_61. These combined values of formula_61 can then be inversely transformed into raw moments representing the complete concatenated time-history Known relationships between the raw moments (formula_69) and the central moments (formula_70) are then used to compute the central moments of the concatenated time-history. Finally, the statistical moments of the concatenated history are computed from the central moments: Covariance. Very similar algorithms can be used to compute the covariance. Naïve algorithm. The naïve algorithm is For the algorithm above, one could use the following Python code: def naive_covariance(data1, data2): n = len(data1) sum1 = sum(data1) sum2 = sum(data2) sum12 = sum([i1 * i2 for i1, i2 in zip(data1, data2)]) covariance = (sum12 - sum1 * sum2 / n) / n return covariance With estimate of the mean. As for the variance, the covariance of two random variables is also shift-invariant, so given any two constant values formula_73 and formula_74 it can be written: and again choosing a value inside the range of values will stabilize the formula against catastrophic cancellation as well as make it more robust against big sums. Taking the first value of each data set, the algorithm can be written as: def shifted_data_covariance(data_x, data_y): n = len(data_x) if n < 2: return 0 kx = data_x[0] ky = data_y[0] Ex = Ey = Exy = 0 for ix, iy in zip(data_x, data_y): Ex += ix - kx Ey += iy - ky Exy += (ix - kx) * (iy - ky) return (Exy - Ex * Ey / n) / n Two-pass.
|
133
|
[Title: """Algorithms for calculating variance"""] The two-pass algorithm first computes the sample means, and then the covariance: The two-pass algorithm may be written as: def two_pass_covariance(data1, data2): n = len(data1) mean1 = sum(data1) / n mean2 = sum(data2) / n covariance = 0 for i1, i2 in zip(data1, data2): a = i1 - mean1 b = i2 - mean2 covariance += a * b / n return covariance A slightly more accurate compensated version performs the full naive algorithm on the residuals. The final sums formula_79 and formula_80 "should" be zero, but the second pass compensates for any small error. Online. A stable one-pass algorithm exists, similar to the online algorithm for computing the variance, that computes co-moment formula_81: The apparent asymmetry in that last equation is due to the fact that formula_83, so both update terms are equal to formula_84. Even greater accuracy can be achieved by first computing the means, then using the stable one-pass algorithm on the residuals.
|
134
|
[Title: """Algorithms for calculating variance"""] Thus the covariance can be computed as def online_covariance(data1, data2): meanx = meany = C = n = 0 for x, y in zip(data1, data2): n += 1 dx = x - meanx meanx += dx / n meany += (y - meany) / n C += dx * (y - meany) population_covar = C / n # Bessel's correction for sample variance sample_covar = C / (n - 1) A small modification can also be made to compute the weighted covariance: def online_weighted_covariance(data1, data2, data3): meanx = meany = 0 wsum = wsum2 = 0 C = 0 for x, y, w in zip(data1, data2, data3): wsum += w wsum2 += w * w dx = x - meanx meanx += (w / wsum) * dx meany += (w / wsum) * (y - meany) C += w * dx * (y - meany) population_covar = C / wsum # Bessel's correction for sample variance # Frequency weights sample_frequency_covar = C / (wsum - 1) # Reliability weights sample_reliability_covar = C / (wsum - wsum2 / wsum) Likewise, there is a formula for combining the covariances of two sets that can be used to parallelize the computation: Weighted batched version. A version of the weighted online algorithm that does batched updated also exists: let formula_87 denote the weights, and write The covariance can then be computed as
|
135
|
[Title: """A. A. Milne"""] Alan Alexander Milne (; 18 January 1882 – 31 January 1956) was an English writer best known for his books about the teddy bear Winnie-the-Pooh, as well as children's poetry. Milne was primarily a playwright before the huge success of Winnie-the-Pooh overshadowed his previous work. He served as a lieutenant in the Royal Warwickshire Regiment in the First World War and as a captain in the Home Guard in the Second World War. Milne was the father of bookseller Christopher Robin Milne, upon whom the character Christopher Robin is based. It was during a visit to London Zoo, where Christopher became enamoured with the tame and amiable bear Winnipeg, that Milne was inspired to write the story of Winnie-the-Pooh for his son. Milne bequeathed the original manuscripts of the Winnie-the-Pooh stories to the Wren Library at Trinity College, Cambridge, his alma mater. Early life and military career. Alan Alexander Milne was born in Kilburn, London, to John Vine Milne, who was born in Jamaica, and Sarah Marie Milne (née Heginbotham), on 18 January 1882. He grew up at Henley House School, 6/7 Mortimer Road (now Crescent), Kilburn, a small independent school run by his father. He taught himself to read at the age of two. One of his teachers was H. G. Wells, who taught there in 1889–90. Milne attended Westminster School and Trinity College, Cambridge, where he studied on a mathematics scholarship, graduating with a B.A. in Mathematics in 1903, though he was always interested in writing. He edited and wrote for "Granta", a student magazine. He collaborated with his brother Kenneth and their articles appeared over the initials AKM. Milne's work came to the attention of the leading British humour magazine "Punch", where Milne was to become a contributor and later an assistant editor. Considered a talented cricket fielder, Milne played for two amateur teams that were largely composed of British writers: the Allahakbarries and the Authors XI. His teammates included fellow writers J. M. Barrie, Arthur Conan Doyle and P. G. Wodehouse. Milne joined the British Army during World War I and served as an officer in the Royal Warwickshire Regiment.
|
136
|
[Title: """A. A. Milne"""] He was commissioned into the 4th Battalion, Royal Warwickshire Regiment, on 1 February 1915 as a second lieutenant (on probation). His commission was confirmed on 20 December 1915. He served on the Somme as a signals officer from July–November 1916, but caught trench fever and was invalided back to England. Having recuperated, he worked as a signals instructor, before being recruited into military intelligence to write propaganda articles for MI7 (b) between 1917 and 1918. He was discharged on 14 February 1919, and settled in Mallord Street, Chelsea. He relinquished his commission on 19 February 1920, retaining the rank of lieutenant. After the war, he wrote a denunciation of war titled "Peace with Honour" (1934), which he retracted somewhat with 1940's "War with Honour". During World War II, Milne was one of the most prominent critics of fellow English writer (and Authors XI cricket teammate) P. G. Wodehouse, who was captured at his country home in France by the Nazis and imprisoned for a year. Wodehouse made radio broadcasts about his internment, which were broadcast from Berlin. Although the light-hearted broadcasts made fun of the Germans, Milne accused Wodehouse of committing an act of near treason by cooperating with his country's enemy. Wodehouse got some revenge on his former friend (e.g. in "The Mating Season") by creating fatuous parodies of the Christopher Robin poems in some of his later stories, and claiming that Milne "was probably jealous of all other writers... But I loved his stuff." Milne married Dorothy "Daphne" de Sélincourt (1890–1971) in 1913 and their son Christopher Robin Milne was born in 1920. In 1925, Milne bought a country home, Cotchford Farm, in Hartfield, East Sussex. During World War II, Milne was a captain in the British Home Guard in Hartfield & Forest Row, insisting on being plain "Mr. Milne" to the members of his platoon.
|
137
|
[Title: """A. A. Milne"""] He retired to the farm after a stroke and brain surgery in 1952 left him an invalid; and by August 1953, "he seemed very old and disenchanted." Milne died in January 1956, aged 74. Literary career. 1903 to 1925. After graduating from Cambridge University in 1903, A. A. Milne contributed humorous verse and whimsical essays to "Punch", joining the staff in 1906 and becoming an assistant editor. During this period he published 18 plays and three novels, including the murder mystery "The Red House Mystery" (1922). His son was born in August 1920 and in 1924 Milne produced a collection of children's poems, "When We Were Very Young", which were illustrated by "Punch" staff cartoonist E. H. Shepard. A collection of short stories for children "A Gallery of Children", and other stories that became part of the Winnie-the-Pooh books, were first published in 1925. Milne was an early screenwriter for the nascent British film industry, writing four stories filmed in 1920 for the company Minerva Films (founded in 1920 by the actor Leslie Howard and his friend and story editor Adrian Brunel). These were "The Bump", starring Aubrey Smith; "Twice Two"; "Five Pound Reward"; and "Bookworms". Some of these films survive in the archives of the British Film Institute. Milne had met Howard when the actor starred in Milne's play "Mr Pim Passes By" in London. Looking back on this period (in 1926), Milne observed that when he told his agent that he was going to write a detective story, he was told that what the country wanted from a ""Punch" humorist" was a humorous story; when two years later he said he was writing nursery rhymes, his agent and publisher were convinced he should write another detective story; and after another two years, he was being told that writing a detective story would be in the worst of taste given the demand for children's books.
|
138
|
[Title: """A. A. Milne"""] He concluded that "the only excuse which I have yet discovered for writing anything is that I want to write it; and I should be as proud to be delivered of a Telephone Directory "con amore" as I should be ashamed to create a Blank Verse Tragedy at the bidding of others." 1926 to 1928. Milne is most famous for his two "Pooh" books about a boy named Christopher Robin after his son, Christopher Robin Milne (1920–1996), and various characters inspired by his son's stuffed animals, most notably the bear named Winnie-the-Pooh. Christopher Robin Milne's stuffed bear, originally named Edward, was renamed Winnie after a Canadian black bear named Winnie (after Winnipeg), which was used as a military mascot in World War I, and left to London Zoo during the war. "The Pooh" comes from a swan the young Milne named "Pooh". E. H. Shepard illustrated the original Pooh books, using his own son's teddy Growler ("a magnificent bear") as the model. The rest of Christopher Robin Milne's toys, Piglet, Eeyore, Kanga, Roo and Tigger, were incorporated into A. A. Milne's stories, and two more characters – Rabbit and Owl – were created by Milne's imagination. Christopher Robin Milne's own toys are now on display in New York where 750,000 people visit them every year. The fictional Hundred Acre Wood of the Pooh stories derives from Five Hundred Acre Wood in Ashdown Forest in East Sussex, South East England, where the Pooh stories were set. Milne lived on the northern edge of the forest at Cotchford Farm, , and took his son on walking trips there. E. H. Shepard drew on the landscapes of Ashdown Forest as inspiration for many of the illustrations he provided for the Pooh books. The adult Christopher Robin commented: "Pooh's Forest and Ashdown Forest are identical." Popular tourist locations at Ashdown Forest include: "Galleon's Lap", "The Enchanted Place", the "Heffalump Trap" and "Lone Pine", "Eeyore's Sad and Gloomy Place", and the wooden "Pooh Bridge" where Pooh and Piglet invented Poohsticks.
|
139
|
[Title: """A. A. Milne"""] Not yet known as Pooh, he made his first appearance in a poem, "Teddy Bear", published in "Punch" magazine in February 1924 and republished that year in "When We Were Very Young". Pooh first appeared in the "London Evening News" on Christmas Eve, 1925, in a story called "The Wrong Sort of Bees". "Winnie-the-Pooh" was published in 1926, followed by "The House at Pooh Corner" in 1928. A second collection of nursery rhymes, "Now We Are Six", was published in 1927. All four books were illustrated by E. H. Shepard. Milne also published four plays in this period. He also "gallantly stepped forward" to contribute a quarter of the costs of dramatising P. G. Wodehouse's "A Damsel in Distress". "The World of Pooh" won the Lewis Carroll Shelf Award in 1958. 1929 onward. The success of his children's books was to become a source of considerable annoyance to Milne, whose self-avowed aim was to write whatever he pleased and who had, until then, found a ready audience for each change of direction: he had freed pre-war "Punch" from its ponderous facetiousness; he had made a considerable reputation as a playwright (like his idol J. M. Barrie) on both sides of the Atlantic; he had produced a witty piece of detective writing in "The Red House Mystery" (although this was severely criticised by Raymond Chandler for the implausibility of its plot in his essay "The Simple Art of Murder" in the eponymous collection that appeared in 1950). But once Milne had, in his own words, "said goodbye to all that in 70,000 words" (the approximate length of his four principal children's books), he had no intention of producing any reworkings lacking in originality, given that one of the sources of inspiration, his son, was growing older. Another reason Milne stopped writing children's books, and especially about Winnie-the-Pooh, was that he felt "amazement and disgust" over the immense fame his son was exposed to, and said that "I feel that the legal Christopher Robin has already had more publicity than I want for him.
|
140
|
[Title: """A. A. Milne"""] I do not want CR Milne to ever wish that his name were Charles Robert." In his literary home, "Punch", where the "When We Were Very Young" verses had first appeared, Methuen continued to publish whatever Milne wrote, including the long poem "The Norman Church" and an assembly of articles entitled "Year In, Year Out" (which Milne likened to a benefit night for the author). In 1929, Milne adapted Kenneth Grahame's novel "The Wind in the Willows" for the stage as "Toad of Toad Hall". The title was an implicit admission that such chapters as Chapter 7, "The Piper at the Gates of Dawn," could not survive translation to the theatre. A special introduction written by Milne is included in some editions of Grahame's novel. It was first performed at the Playhouse Theatre, Liverpool, on 21 December 1929 before it made its West End debut the following year at the Lyric Theatre on 17 December 1930. The play was revived in the West End from 1931 to 1935, and since the 1960s there have been West End revivals during the Christmas season; actors who have performed in the play include Judi Dench and Ian McKellen. Milne and his wife became estranged from their son, who came to resent what he saw as his father's exploitation of his childhood and came to hate the books that had thrust him into the public eye. Christopher's marriage to his first cousin, Lesley de Sélincourt, distanced him still further from his parents – Lesley's father and Christopher's mother had not spoken to each other for 30 years. Death and legacy. Commemoration. A. A. Milne died at his home in Hartfield, Sussex, on 31 January 1956, 13 days after his 74th birthday. A memorial service took place on 10 February at All Hallows-by-the-Tower church in London. The rights to A. A. Milne's Pooh books were left to four beneficiaries: his family, the Royal Literary Fund, Westminster School and the Garrick Club.
|
141
|
[Title: """A. A. Milne"""] After Milne's death in 1956, his widow sold her rights to the Pooh characters to Stephen Slesinger, whose widow sold the rights after Slesinger's death to Walt Disney Productions, which has made many Pooh cartoon movies, a Disney Channel television show, as well as Pooh-related merchandise. In 2001, the other beneficiaries sold their interest in the estate to the Disney Corporation for $350m. Previously Disney had been paying twice-yearly royalties to these beneficiaries. The estate of E. H. Shepard also received a sum in the deal. The UK copyright on the text of the original Winnie the Pooh books expires on 1 January 2027; at the beginning of the year after the 70th anniversary of the author's death (PMA-70), and has already expired in those countries with a PMA-50 rule. This applies to all of Milne's works except those first published posthumously. The illustrations in the Pooh books will remain under copyright until the same amount of time after the illustrator's death has passed; in the UK, this will be 1 January 2047. In the US, copyright on the four children's books (including the illustrations) expired 95 years after publication of each of the books. Specifically: copyright on the book "When We Were Very Young" expired in 2020; copyright on the book "Winnie-the-Pooh" expired in 2022; copyright on the book "Now We Are Six" expired in 2023; and copyright on the book "The House at Pooh Corner" expired in 2024. In 2008, a collection of original illustrations featuring Winnie-the-Pooh and his animal friends sold for more than £1.2 million at auction at Sotheby's, London. "Forbes" magazine ranked Winnie the Pooh the most valuable fictional character in 2002; Winnie the Pooh merchandising products alone had annual sales of more than $5.9 billion. In 2005, Winnie the Pooh generated $6 billion, a figure surpassed only by Mickey Mouse. A memorial plaque in Ashdown Forest, unveiled by Christopher Robin in 1979, commemorates the work of A. A. Milne and Shepard in creating the world of Pooh. The inscription states they "captured the magic of Ashdown Forest, and gave it to the world".
|
142
|
[Title: """A. A. Milne"""] Milne once wrote of Ashdown Forest: "In that enchanted place on the top of the forest a little boy and his bear will always be playing." In 2003, "Winnie-the-Pooh" was ranked number 7 on the BBC's The Big Read poll which determined the UK's "best-loved novels". In 2006, Winnie-the-Pooh received a star on the Hollywood Walk of Fame, marking the 80th birthday of Milne's creation. Marking the 90th anniversary of Milne's creation of the character, and the 90th birthday of Queen Elizabeth II, "Winnie-the-Pooh Meets the Queen" (2016) sees Pooh meet the Queen at Buckingham Palace. The illustrated and audio adventure is narrated by the actor Jim Broadbent. Also in 2016, a new character, a Penguin, was unveiled in "The Best Bear in All the World", which was inspired by a long-lost photograph of Milne and his son Christopher with a toy penguin. An exhibition entitled "" appeared at the Victoria and Albert Museum in London from 9 December 2017 to 8 April 2018. The composer Harold Fraser-Simson, a near neighbour, produced six books of Milne songs between 1924 and 1932. The poems have been parodied many times, including in the books "When We Were Rather Older" and "Now We Are Sixty". The 1963 film "The King's Breakfast" was based on Milne's poem of the same name. Milne has been portrayed in television and film. Domhnall Gleeson plays him in "Goodbye Christopher Robin", a 2017 biographical drama film. In the 2018 fantasy film "Christopher Robin", an extension of the Disney Winnie the Pooh franchise, Tristan Sturrock plays Milne, and filming took place at Ashdown Forest. An elementary school in Houston, Texas, operated by the Houston Independent School District (HISD), is named after Milne. The school, A. A. Milne Elementary School in Brays Oaks, opened in 1991. Archive. The original manuscripts for "Winnie-the-Pooh" and "The House at Pooh Corner" are archived at Trinity College Library, Cambridge. The bulk of A. A. Milne's papers are housed at the Harry Ransom Center at the University of Texas at Austin.
|
143
|
[Title: """A. A. Milne"""] The collection, established at the centre in 1964, consists of manuscript drafts and fragments for over 150 of Milne's works, as well as correspondence, legal documents, genealogical records, and some personal effects. The library division holds several books formerly belonging to Milne and his wife Dorothy. The center also has small collections of correspondence from Christopher Robin Milne and Milne's frequent illustrator E. H. Shepard. Religious views. Milne did not speak out much on the subject of religion, although he used religious terms to explain his decision, while remaining a pacifist, to join the British Home Guard. He wrote: "In fighting Hitler we are truly fighting the Devil, the Anti-Christ ... Hitler was a crusader against God." His best known comment on the subject was recalled on his death: He wrote in the poem "Explained": He also wrote in the poem "Vespers":
|
144
|
[Title: """Asociación Alumni"""] Asociación Alumni, usually just Alumni, is an Argentine rugby union club located in Tortuguitas, Greater Buenos Aires. The senior squad currently competes at Top 12, the first division of the Unión de Rugby de Buenos Aires league system. The club has ties with former football club Alumni because both were established by Buenos Aires English High School students. History. Background. The first club with the name "Alumni" played association football, having been found in 1898 by students of Buenos Aires English High School (BAEHS) along with director Alexander Watson Hutton. Originally under the name "English High School A.C.", the team would be later obliged by the Association to change its name, therefore "Alumni" was chosen, following a proposal by Carlos Bowers, a former student of the school. Alumni was the most successful team during the first years of Argentine football, winning 10 of 14 league championships contested. Alumni is still considered the first great football team in the country. Alumni was reorganised in 1908, "in order to encourage people to practise all kinds of sports, specially football". This was the last try to develop itself as a sports club rather than just as a football team, as Lomas, Belgrano and Quilmes had successfully done in the past, but the efforts were not enough. Alumni played its last game in 1911 and was definitely dissolved on April 24, 1913. Rebirth through rugby. In 1951, two guards of the BAEHS, Daniel Ginhson (also a former player of Buenos Aires F.C.) and Guillermo Cubelli, supported by the school's alumni and fathers of the students, decided to establish a club focused on rugby union exclusively. Former players of Alumni football club and descendants of other players already dead gave their permission to use the name "Alumni". On December 13, in a meeting presided by Carlos Bowers himself (who had proposed the name "Alumni" to the original football team 50 years before), the club was officially established under the name "Asociación Juvenil Alumni", also adopting the same colors as its predecessor. The team achieved good results and in 1960 the club presented a team that won the third division of the Buenos Aires league, reaching the second division.
|
145
|
[Title: """Asociación Alumni"""] Since then, Alumni has played at the highest level of Argentine rugby and its rivalry with Belgrano Athletic Club is one of the fiercest local derbies in Buenos Aires. Alumni would later climb up to the first division winning 5 titles: 4 consecutive between 1989 and 1992, and the other in 2001. In 2002, Alumni won its first Nacional de Clubes title, defeating Jockey Club de Rosario 23–21 in the final. Players. Current roster. As of January 2018:
|
146
|
[Title: """Adobe Inc."""] Adobe Inc. ( ), formerly Adobe Systems Incorporated, is an American computer software company based in San Jose, California. It offers a wide range of programs from web design tools, photo manipulation and vector creation, through to video/audio editing, mobile app development, print layout and animation software. It has historically specialized in software for the creation and publication of a wide range of content, including graphics, photography, illustration, animation, multimedia/video, motion pictures, and print. Its flagship products include Adobe Photoshop image editing software; Adobe Illustrator vector-based illustration software; Adobe Acrobat Reader and the Portable Document Format (PDF); and a host of tools primarily for audio-visual content creation, editing and publishing. Adobe offered a bundled solution of its products named Adobe Creative Suite, which evolved into a subscription-based offering named Adobe Creative Cloud. The company also expanded into digital marketing software and in 2021 was considered one of the top global leaders in Customer Experience Management (CXM). Adobe was founded in December 1982 by John Warnock and Charles Geschke, who established the company after leaving Xerox PARC to develop and sell the PostScript page description language. In 1985, Apple Computer licensed PostScript for use in its LaserWriter printers, which helped spark the desktop publishing revolution. Adobe later developed animation and multimedia through its acquisition of Macromedia, from which it acquired Macromedia Flash; video editing and compositing software with Adobe Premiere, later known as Adobe Premiere Pro; low-code web development with Adobe Muse; and a suite of software for digital marketing management. Adobe had more than 26,000 employees worldwide. Adobe also has major development operations in the United States in Newton, New York City, Arden Hills, Lehi, Seattle, Austin and San Francisco. It also has major development operations in Noida and Bangalore in India. The company has long been the dominant tech firm in design and creative software, despite attracting criticism for its policies and practices particularly around Adobe Creative Cloud's switch to subscription only pricing and its early termination fees for its most promoted Creative Cloud plan, the latter of which attracted a joint civil lawsuit from the US Federal Trade Commission and the U.S. Department of Justice in 2024. History. PostScript (1982–1986). The company was started in John Warnock's garage. The name of the company, Adobe, comes from Adobe Creek in Los Altos, California, a stream which ran behind Warnock's house.
|
147
|
[Title: """Adobe Inc."""] The creek is named because of the type of clay found there (Adobe being a Spanish word for "Mudbrick"). Adobe's corporate logo features a stylized "A" and was designed by graphic designer Marva Warnock, John Warnock's wife. Steve Jobs attempted to buy the company for $5 million in 1982, but Warnock and Geschke refused. Their investors urged them to work something out with Jobs, so they agreed to sell him shares worth 19 percent of the company. Jobs paid a five-times multiple of their company's valuation at the time, plus a five-year license fee for PostScript, in advance. The purchase and advance made Adobe the first company in the history of Silicon Valley to become profitable in its first year. Warnock and Geschke considered various business options including a copy-service business and a turnkey system for office printing. Then they chose to focus on developing specialized printing software and created the Adobe PostScript page description language. PostScript was the first international standard for computer printing as it included algorithms describing the letter-forms of many languages. Adobe added kanji printer products in 1988. Warnock and Geschke were also able to bolster the credibility of PostScript by connecting with a typesetting manufacturer. They weren't able to work with Compugraphic, but then worked with Linotype to license the Helvetica and Times Roman fonts (through the Linotron 100). By 1987, PostScript had become the industry-standard printer language with more than 400 third-party software programs and licensing agreements with 19 printer companies. Adobe's first products after PostScript were digital fonts which they released in a proprietary format called Type 1, worked on by Bill Paxton after he left Stanford. Apple subsequently developed a competing standard, TrueType, which provided full scalability and precise control of the pixel pattern created by the font's outlines, and licensed it to Microsoft. Introduction of creative software (1986–1996). Starting in the mid-1980s, Adobe entered the consumer software market, starting with Adobe Illustrator, a vector-based drawing program for the Apple Macintosh. Illustrator, which grew out of the firm's in-house font-development software, helped popularize PostScript-enabled laser printers.
|
148
|
[Title: """Adobe Inc."""] By the mid-1990s, Adobe would either develop or acquire Photoshop from John and Thomas Knoll, FrameMaker from Frame Technology Corporation, and After Effects and PageMaker from Aldus, as well as develop Adobe Premiere, later known as Premiere Pro, in-house, initially releasing it in 1991. Around the same time as the development of Illustrator, Adobe entered the NASDAQ Composite index in August 1986. PDFs and file formats (1993–1999). In 1993, Adobe introduced the Portable Document Format, commonly shortened to the initialism PDF, and its Adobe Acrobat and Reader software. Warnock originally developed the PDF under a code name, "The Camelot Project", using PostScript technology to create a widely available digital document format, able to display text, raster graphics, vector graphics, and fonts. Adobe kept the PDF as a proprietary file format from its introduction until 2008, when the PDF became an ISO international standard under ISO number ISO 32000-1:2008, though the PDF file format was free for viewers since its introduction. With its acquisition of Aldus, in addition to gaining PageMaker and After Effects, Adobe gained control over the TIFF file format for images. Creative Suite and the Macromedia acquisition (2000–2009). The 2000s saw various developments for the company. Its first notable acquisition in the decade was in 2002, when Adobe acquired Canadian company Accelio, also known as JetForm. In May 2003, Adobe purchased audio editing and multitrack recording software Cool Edit Pro from Syntrillium Software for $16.5 million, as well as a large loop library called "Loopology". Adobe then renamed Cool Edit Pro to Adobe Audition. It was in 2003 that the company introduced the first version of Adobe Creative Suite, bundling its creative software into a single package. The first version of Creative Suite introduced InDesign (the successor to PageMaker), Illustrator, Photoshop, ImageReady and InCopy, with the 2005 second edition of Creative Suite including an updated version of Adobe Acrobat, Premiere Pro, GoLive, the file manager Adobe Bridge, and Adobe Dreamweaver, the latter of which was acquired from a $3.4 billion acquisition of Macromedia, most notably.
|
149
|
[Title: """Adobe Inc."""] In addition to bringing in Dreamweaver, the $3.4 billion Macromedia acquisition, completed as a stock swap, added ColdFusion, Contribute, Captivate, Breeze (rebranded as Adobe Connect), Director, Fireworks, Flash, FlashPaper, Flex, FreeHand, HomeSite, JRun, Presenter, and Authorware to Adobe's product line. By April 2008, Adobe released Adobe Media Player. On April 27, Adobe discontinued the development and sales of its older HTML/web development software, GoLive, in favor of Dreamweaver. Adobe offered a discount on Dreamweaver for GoLive users and supports those who still use GoLive with online tutorials and migration assistance. On June 1, Adobe launched Acrobat.com, a series of web applications geared for collaborative work. Creative Suite 4, which includes Design, Web, Production Premium, and Master Collection came out in October 2008 in six configurations at prices from about US$1,700 to $2,500 or by individual application. The Windows version of Photoshop includes 64-bit processing. On December 3, 2008, Adobe laid off 600 of its employees (8% of the worldwide staff) citing the weak economic environment. On September 15, 2009, Adobe Systems announced that it would acquire online marketing and web analytics company Omniture for $1.8 billion. The deal was completed on October 23, 2009. Former Omniture products were integrated into the Adobe Marketing Cloud. On November 10, 2009, the company laid off a further 680 employees. End of Flash, security breach, and employee compensation class action (2010–2014). Adobe's 2010 was marked by continuing arguments with Apple over the latter's non-support for Adobe Flash on its iPhone, iPad and other products. Former Apple CEO Steve Jobs claimed that Flash was not reliable or secure enough, while Adobe executives have argued that Apple wishes to maintain control over the iOS platform. In April 2010, Steve Jobs published a post titled "Thoughts on Flash" where he outlined his thoughts on Flash and the rise of HTML5. In July 2010, Adobe bought Day Software integrating their line of CQ Products: WCM, DAM, SOCO, and Mobile In January 2011, Adobe acquired DemDex, Inc.
|
150
|
[Title: """Adobe Inc."""] with the intent of adding DemDex's audience-optimization software to its online marketing suite. At Photoshop World 2011, Adobe unveiled a new mobile photo service. Carousel was a new application for iPhone, iPad, and Mac that used Photoshop Lightroom technology to allow users to adjust and fine-tune images on all platforms. Carousel also allowed users to automatically sync, share and browse photos. The service was later renamed "Adobe Revel". Later that same year in October, Adobe acquired Nitobi Software, the maker of the mobile application development framework "PhoneGap". As part of the acquisition, the source code of PhoneGap was submitted to the Apache Foundation, where it became Apache Cordova. In November 2011, Adobe announced that they would cease development of Flash for mobile devices following version 11.1. Instead, it would focus on HTML5 for mobile devices. In December 2011, Adobe announced that it had entered into a definitive agreement to acquire privately held Efficient Frontier. In December 2012, Adobe opened a new corporate campus in Lehi, Utah. In 2013, Adobe endured a major security breach. Vast portions of the source code for the company's software were stolen and posted online and over 150 million records of Adobe's customers were made readily available for download. In 2012, about 40 million sets of payment card information were compromised by a hack at Adobe. A class-action lawsuit alleging that the company suppressed employee compensation was filed against Adobe, and three other Silicon Valley–based companies in a California federal district court in 2013. In May 2014, it was revealed the four companies, Adobe, Apple, Google, and Intel had reached an agreement with the plaintiffs, 64,000 employees of the four companies, to pay a sum of $324.5 million to settle the suit. Adobe Creative Cloud (Since 2011). 2011 saw the company first introduce Adobe Creative Cloud, a $600/year subscription plan to its creative software as opposed to a one-time perpetual license payment which could often top $2000 for creative professionals.
|
151
|
[Title: """Adobe Inc."""] The initial launch of Creative Cloud alongside Creative Suite 5 users came at the same time that Adobe ran into controversy from users of Adobe's creative software, with users of Adobe software stating that the original perpetual and subscription pricing plans for CS5 would be unaffordable for not only individuals but also businesses, as well as refusing to extend a Creative Suite 6 discount to non-CS5 users. The original announcement of Adobe Creative Cloud was met with a positive reception from CNET journalists as a much more enticing plan, and Creative Cloud was first released in 2012, though a later CNET survey evidenced that more users had a negative perception about subscription creative software than a positive view. The original pricing plan for Creative Cloud was $75 per month for the entire suite of software, though Adobe discounted the monthly cost to $50 for users willing to commit to at least one year of continuous subscription for Creative Cloud, and down to $30 per month for former CS users with the one year commitment. By 2013, Adobe decided that CS6 would be the last version of Creative Suite software that would be sold through perpetual licensing option, and in May announced that a Creative Cloud subscription would be the only way to get the newest versions of Photoshop, Illustrator, and other Adobe creative software. Reception to the mandatory subscriptions for future Adobe software was mostly negative, despite some positive testimonies on the move from customers and Adobe's attraction of 500,000 Creative Cloud subscribers by the service's first year. The switch to subscription only also did not deter software piracy of Creative Cloud services; within the first day of the first version of Photoshop exclusively made for Creative Cloud being released, cracked versions of Adobe Photoshop CC 2013 were found on The Pirate Bay, an online website used for distributing pirated software. Further acquisitions and failed buyout of Figma (2018–2023). In March 2018, at Adobe Summit, the company and Nvidia announced their association to upgrade their AI and profound learning innovations. They planned to streamline Adobe Sensei AI and machine learning structure for Nvidia GPUs. Adobe and Nvidia had cooperated for 10 years on GPU quickening. This incorporates Sensei-powered features, e.g. auto lip-sync in Adobe Character Animator CC and face-aware editing in Photoshop CC, and also cloud-based AI/ML items and features, for example, picture investigation for Adobe Stock and Lightroom CC and auto-labeling in Adobe Experience Supervisor.
|
152
|
[Title: """Adobe Inc."""] Adobe further spent its time from 2018 to 2023 acquiring more companies to boost both Creative Cloud and the Adobe Experience Cloud, a software suite which increased business. These included e-commerce services provider Magento Commerce from private equity firm Permira for $1.68 billion in June 2018, Marketo for $4.75 billion in 2018, Allegorithmic in 2019 for just under $160 million, and Workfront in December 2020 for $1.5 billion. 2021 additionally saw Adobe add payment services to its e-commerce platforms in an attempt to compete with Shopify, accepting both credit cards and PayPal. In July 2020, as the United States presidential elections approached, the software giant imposed a ban on the political ads features on its digital advertising sales platform. On November 9, 2020, Adobe announced it would spend US$1.5 billion to acquire Workfront, a provider of marketing collaboration software. The acquisition was completed in early December 2020. On August 19, 2021, Adobe announced it had entered into a definitive agreement to acquire Frame.io, a leading cloud-based video collaboration platform. The transaction is valued at $1.275 billion and closed during the fourth quarter of Adobe's 2021 fiscal year. Adobe announced a $20 billion acquisition of Figma, an Adobe XD competitor, in September 2022, its largest to date. Regulatory scrutiny from the US and European Union began shortly after due to concerns that Adobe, already a major player in the design software market with XD, would have too much control if it also owned Figma. At the time of the announcement to acquire Figma, Adobe's share over the creative software market and design-software market was almost a monopoly. In December 2023, the two companies called off their merger, citing the regulatory challenges as a sign to both that the deal was not likely to be approved. Adobe paid Figma a $1 billion termination fee per their merger agreement. FTC lawsuit and terms of service update (2024–present). On June 17, 2024, the US Federal Trade Commission together with the US Department of Justice filed a lawsuit against Adobe for its subscription business model practice, citing hidden termination fees and the company pushing customers towards more expensive plans.
|
153
|
[Title: """Adobe Inc."""] In June 2024, after facing backlash for its changes to the terms of service, Adobe updated them to explicitly pledge it will not use customer data to train its AI models. Products. Adobe's currently supported roster of software, online services and file formats comprises the following (): Formats. Portable Document Format (PDF), PDF's predecessor PostScript, ActionScript, Shockwave Flash (SWF), Flash Video (FLV), and "Filmstrip" (.flm) Web-hosted services. Adobe Color, Photoshop Express, Acrobat.com, Behance and Adobe Express. Adobe Renderer. Adobe Media Encoder Adobe Stock. A microstock agency that presently provides over 57 million high-resolution, royalty-free images and videos available to license (via subscription or credit purchase methods). In 2015, Adobe acquired Fotolia, a stock content marketplace founded in 2005 by Thibaud Elziere, Oleg Tscheltzoff, and Patrick Chassany which operated in 23 countries. It was run as a stand-alone website until 2019, but has since been integrated into Adobe Stock. Adobe Experience Platform. A family of content, development, and customer relationship management products, with what Adobe calls the "next generation" of its Sensei artificial intelligence and machine learning framework, introduced in March 2019. Criticisms. Pricing. Adobe has been criticized for its pricing practices, with retail prices being up to twice as much in non-US countries. After Adobe revealed the pricing for the Creative Suite 3 Master Collection, which was £1,000 higher for European customers, a petition to protest over "unfair pricing" was published and signed by 10,000 users. In June 2009, Adobe further increased its prices in the UK by 10% in spite of weakening of the pound against the dollar, and UK users were not allowed to buy from the US store. Adobe's Reader and Flash programs were listed on "The 10 most hated programs of all time" article by "TechRadar". Security. Hackers have exploited vulnerabilities in Adobe programs, such as Adobe Reader, to gain unauthorized access to computers. Adobe's Flash Player has also been criticized for, among other things, suffering from performance, memory usage and security problems. A report by security researchers from Kaspersky Lab criticized Adobe for producing the products having top 10 security vulnerabilities.
|
154
|
[Title: """Adobe Inc."""] Observers noted that Adobe was spying on its customers by including spyware in the Creative Suite 3 software and quietly sending user data to a firm named Omniture. When users became aware, Adobe explained what the suspicious software did and admitted that they: "could and should do a better job taking security concerns into account". When a security flaw was later discovered in Photoshop CS5, Adobe sparked outrage by saying it would leave the flaw unpatched, so anyone who wanted to use the software securely would have to pay for an upgrade. Following a fierce backlash Adobe decided to provide the software patch. Adobe has been criticized for pushing unwanted software including third-party browser toolbars and free virus scanners, usually as part of the Flash update process, and for pushing a third-party scareware program designed to scare users into paying for unneeded system repairs. Customer data breach. On October 3, 2013, the company initially revealed that 2.9 million customers' sensitive and personal data was stolen in a security breach which included encrypted credit card information. Adobe later admitted that 38 million active users have been affected and the attackers obtained access to their IDs and encrypted passwords, as well as to many inactive Adobe accounts. The company did not make it clear if all the personal information was encrypted, such as email addresses and physical addresses, though data privacy laws in 44 states require this information to be encrypted. In late 2013 a 3.8 GB file stolen from Adobe and containing 152 million usernames, reversibly encrypted passwords and unencrypted password hints was posted on AnonNews.org. LastPass, a password security firm, said that Adobe failed to use best practices for securing the passwords and has not salted them. Another security firm, Sophos, showed that Adobe used a weak encryption method permitting the recovery of a lot of information with very little effort. According to IT expert Simon Bain, Adobe has failed its customers and 'should hang their heads in shame'. Many of the credit cards were tied to the Creative Cloud software-by-subscription service. Adobe offered its affected US customers a free membership in a credit monitoring service, but no similar arrangements have been made for non-US customers. When a data breach occurs in the US, penalties depend on the state where the victim resides, not where the company is based. After stealing the customers' data, cyber-thieves also accessed Adobe's source code repository, likely in mid-August 2013.
|
155
|
[Title: """Adobe Inc."""] Because hackers acquired copies of the source code of Adobe proprietary products, they could find and exploit any potential weaknesses in its security, computer experts warned. Security researcher Alex Holden, chief information security officer of Hold Security, characterized this Adobe breach, which affected Acrobat, ColdFusion and numerous other applications, as "one of the worst in US history". Adobe also announced that hackers stole parts of the source code of Photoshop, which according to commentators could allow programmers to copy its engineering techniques and would make it easier to pirate Adobe's expensive products. Published on a server of a Russian-speaking hacker group, the "disclosure of encryption algorithms, other security schemes, and software vulnerabilities can be used to bypass protections for individual and corporate data" and may have opened the gateway to new generation zero-day attacks. Hackers already used ColdFusion exploits to make off with usernames and encrypted passwords of PR Newswire's customers, which has been tied to the Adobe security breach. They also used a ColdFusion exploit to breach Washington state court and expose up to 200,000 Social Security numbers. Anti-competitive practices. In 1994, Adobe acquired Aldus Corp., a software vendor that sold FreeHand, a competing product. FreeHand was direct competition to Adobe Illustrator, Adobe's flagship vector-graphics editor. The Federal Trade Commission (FTC) intervened and forced Adobe to sell FreeHand back to Altsys, and also banned Adobe from buying back FreeHand or any similar program for the next 10 years (1994–2004). Altsys was then bought by Macromedia, which released versions 5 to 11. When Adobe acquired Macromedia in December 2005, it stalled development of FreeHand in 2007, effectively rendering it obsolete. With FreeHand and Illustrator, Adobe controlled the only two products that compete in the professional illustration program market for Macintosh operating systems. In 2011, a group of 5,000 FreeHand graphic designers convened under the banner "Free FreeHand", and filed a civil antitrust complaint in the US District Court for the Northern District of California against Adobe.
|
156
|
[Title: """Adobe Inc."""] The suit alleged that: "Adobe has violated federal and state antitrust laws by abusing its dominant position in the professional vector graphic illustration software market [...] Adobe has engaged in a series of exclusionary and anti-competitive acts and strategies designed to kill FreeHand, the dominant competitor to Adobe's Illustrator software product, instead of competing on the basis of product merit according to the principals of free market capitalism." Adobe had no response to the claims and the lawsuit was eventually settled. The FreeHand community believes Adobe should release the product to an open-source community if it cannot update it internally. , on its FreeHand product page, Adobe stated, "While we recognize FreeHand has a loyal customer base, we encourage users to migrate to the new Adobe Illustrator CS4 software which supports both PowerPC and Intel–based Macs and Microsoft Windows XP and Windows Vista." , the FreeHand page no longer exists; instead, it simply redirects to the Illustrator page. Adobe's software FTP server still contains a directory for FreeHand, but it is empty. Cancellation fees. In April 2021, Adobe received criticism from Twitter users for the company's cancellation fees after a customer shared a tweet showing they had been charged a $291.45 cancellation fee for their Adobe Creative Cloud subscription. Many also showed their cancellation fees for Adobe Creative Cloud, with this leading to many encouraging piracy of Adobe products and/or purchase of alternatives with lower prices or using free and open-source software instead. Furthermore, there have been reports that with changing subscriptions it is possible to avoid paying this fee. The U.S. Department of Justice and the FTC filed a lawsuit against Adobe and two of its executives in June 2024, alleging that the company's deceptive subscription practices and cancellation policies violated the Restore Online Shoppers' Confidence Act. According to the lawsuit, the company purportedly used small text disclosures, optional input fields, and complex web of links to obscure a concealed early termination fee. This fee reportedly amounted to fifty percent of the remaining value of annual contracts for users who chose to cancel early in the first year, resulting in significant penalties. Customers who tried to cancel services by contacting customer service faced obstacles, including dropped calls and multiple transfers between representatives; others continued to be billed by Adobe, under the mistaken belief that they had successfully ended their subscriptions. 2024 terms of service update.
|
157
|
[Title: """Adobe Inc."""] On June 5, 2024, Adobe updated their terms of service (TOS) for Photoshop stating "we may access your content through both manual and automated methods, such as for content review." This sparked outrage with Adobe users, as the new terms implied that the users' work would be used to train Adobe's generative AI, even if the work was under a non-disclosure agreement (NDA). Adobe responded the following day clarifying that they will not use user data to train generative AI or take users work as their own; however, they neglected to respond to the part in the TOS that gives Adobe the ability to view or use work that is contracted under an NDA.
|
158
|
[Title: """Apple III"""] The Apple III (styled as apple ///) is a business-oriented personal computer produced by Apple Computer and released in 1980. Running the Apple SOS operating system, it was intended as the successor to the Apple II; however, it was largely considered a failure in the market. It was designed to provide features business users wanted: a true typewriter-style keyboard with upper and lowercase letters (the Apple II only supported uppercase at the time) and an 80-column display. It had the internal code name of "Sara", named after Wendell Sander's daughter. The system was announced on May 19, 1980, and released in late November that year. Serious stability issues required a design overhaul and a recall of the first 14,000 machines produced. The Apple III was formally reintroduced on November 9, 1981. Damage to the computer's reputation had already been done, however, and it failed to do well commercially. Development stopped, and the Apple III was discontinued on April 24, 1984. Its last successor, the III Plus, was dropped from the Apple product line in September 1985. An estimated 65,000 to 75,000 Apple III computers were sold. The Apple III Plus brought this up to approximately 120,000. Apple co-founder Steve Wozniak stated that the primary reason for the Apple III's failure was that the system was designed by Apple's marketing department, unlike Apple's previous engineering-driven projects. The Apple III's failure led Apple to reevaluate its plan to phase out the Apple II, prompting the eventual continuation of development of the older machine. As a result, later Apple II models incorporated some hardware and software technologies of the Apple III. Overview. Design. Steve Wozniak and Steve Jobs expected hobbyists to purchase the Apple II; however, because of VisiCalc and Disk II, small businesses purchased 90% of the computers. The Apple III was designed to be a business computer and successor. Though the Apple II contributed to the inspirations of several important business products, such as VisiCalc, Multiplan, and Apple Writer, the computer's hardware architecture, operating system, and developer environment are limited. Apple management intended to clearly establish market segmentation by designing the Apple III to appeal to the 90% business market, leaving the Apple II to home and education users.
|
159
|
[Title: """Apple III"""] Management believed that "once the Apple III was out, the Apple II would stop selling in six months", Wozniak said. The Apple III is powered by a 2 megahertz Synertek 6502A or 6502B 8-bit CPU (operating effectively between 1.4 and 1.8 MHz due to video or memory refresh cycles) and, like some of the later machines in the Apple II family, uses bank switching techniques to address memory beyond the 6502's traditional 64 KB limit, up to 256 KB in the III's case. Third-party vendors produced memory upgrade kits that allow the Apple III to reach up to 512 KB of random-access memory (RAM). Other Apple III built-in features include an 80-column, 24-line display with upper and lowercase characters, a numeric keypad, dual-speed (pressure-sensitive) cursor control keys, 6-bit (DAC) audio, and a built-in 140-kilobyte 5.25-inch floppy disk drive. Graphics modes include 560x192 in black and white, and 280x192 with 16 colors or shades of gray. Unlike the Apple II, the Disk III controller is part of the logic board. The Apple III is the first Apple product to allow the user to choose both a screen font and a keyboard layout: either QWERTY or Dvorak. These choices cannot be changed while programs were running. This was unlike the Apple IIc, which has a keyboard switch directly above the keyboard, allowing the user to switch on the fly. Software. The Apple III introduced an advanced operating system called Apple SOS, pronounced "apple sauce". Its ability to address resources by name allows the Apple III to be more scalable than the Apple II's addressing by physical location such as codice_1 and codice_2. Apple SOS allows the full capacity of a storage device to be used as a single volume, such as the Apple ProFile hard disk drive, and it supports a hierarchical file system. Some of the features and code base of Apple SOS were later adopted into the Apple II's ProDOS and GS/OS operating systems, as well as Lisa 7/7 and Mac OS.
|
160
|
[Title: """Apple III"""] With a starting price of $4,340 (equivalent to $17,356 as of 2024) and a maximum price of $7,800 (equivalent to $31,194 as of 2024), the Apple III was more expensive than many of the CP/M-based business computers that were available at the time. Few software applications other than VisiCalc are available for the computer; according to a presentation at KansasFest 2012, fewer than 50 Apple III-specific software packages were ever published, most shipping when the III Plus was released. However this number is proven to be wildly incorrect, given the manual 'RESOURCE GUIDE: Of Apple /// and Apple /// Plus Software and Hardware' published and released by Apple Computer, Inc. in May 1984 lists in excess of 500+ software packages produced by many and varied publishers. Given software publishers and specialised hardware manufacturers such as On-Three, Inc. produced products for the Apple III well in to the late 90s, in excess of 500 products can also be seen as way too conservative. Because Apple did not view the Apple III as suitable for hobbyists, it did not provide much of the technical software information that accompanies the Apple II. Originally intended as a direct replacement to the Apple II, it was designed to be backward compatible with Apple II software. However, since Apple did not want to encourage continued development of the II platform, Apple II compatibility exists only in a special Apple II Mode which is limited in its capabilities to the emulation of a basic Apple II Plus configuration with of RAM. Special chips were intentionally added to prevent access from Apple II Mode to the III's advanced features such as its larger amount of memory. Peripherals. The Apple III has four expansion slots, a number that "inCider" in 1986 called "miserly"., also saying Apple II cards are compatible but risk violating government RFI regulations, and require Apple III-specific device drivers; "BYTE" stated that "Apple provides virtually no information on how to write them". As with software, Apple provided little hardware technical information with the computer but Apple III-specific products became available, such as one that made the computer compatible with the Apple IIe. Several new Apple-produced peripherals were developed for the Apple III. The original Apple III has a built-in real-time clock, which is recognized by Apple SOS.
|
161
|
[Title: """Apple III"""] The clock was later removed from the "revised" model, and was instead made available as an add-on. Along with the built-in floppy drive, the Apple III can also handle up to three additional external Disk III floppy disk drives. The Disk III is only officially compatible with the Apple III. The Apple III Plus requires an adaptor from Apple to use the Disk III with its DB-25 disk port. With the introduction of the revised Apple III a year after launch, Apple began offering the ProFile external hard disk system. Priced at $3,499 for 5 MB of storage, it also required a peripheral slot for its controller card. Backward compatibility. The Apple III has the built-in hardware capability to run Apple II software. In order to do so, an emulation boot disk is required that functionally turns the machine into a standard 48-kilobyte Apple II Plus, until it is powered off. The keyboard, internal floppy drive (and one external Disk III), display (color is provided through the 'B/W video' port) and speaker all act as Apple II peripherals. The paddle and serial ports can also function in Apple II mode, however with some limitations and compatibility issues. Apple engineers added specialized circuitry with the sole purpose of blocking access to its advanced features when running in Apple II emulation mode. This was done primarily to discourage further development and interest in the Apple II line, and to push the Apple III as its successor. For example, no more than of RAM can be accessed, even if the machine has of RAM or higher present. Many Apple II programs require a minimum of of RAM, making them impossible to run on the Apple III. Similarly, access to lowercase support, 80 columns text, or its more advanced graphics and sound are blocked by this hardware circuitry, making it impossible for even skilled software programmers to bypass Apple's lockout. A third-party company, Titan Technologies, sold an expansion board called the III Plus II that allows Apple II mode to access more memory, a standard game port, and with a later released companion card, even emulate the Apple IIe. Certain Apple II slot cards can be installed in the Apple III and used in native III-mode with custom written SOS device drivers, including Grappler Plus and Liron 3.5 Controller.
|
162
|
[Title: """Apple III"""] Revisions. After overheating issues were attributed to serious design flaws, a redesigned logic board was introduced in mid-December 1981 – which included a lower power supply requirement, wider circuit traces and better-designed chip sockets. The $3,495 revised model also includes 256 KB of RAM as the standard configuration. The 14,000 units of the original Apple III sold were returned and replaced with the entirely new revised model. Apple III Plus. Apple discontinued the III in October 1983 because it violated FCC regulations, and the FCC required the company to change the redesigned computer's name. It introduced the Apple III Plus in December 1983 at a price of US$2,995. This newer version includes a built-in clock, video interlacing, standardized rear port connectors, 55-watt power supply, 256 KB of RAM as standard, and a redesigned, Apple IIe-like keyboard. Owners of the Apple III could purchase individual III Plus upgrades, like the clock and interlacing feature, and obtain the newer logic board as a service replacement. A keyboard upgrade kit, dubbed "Apple III Plus upgrade kit" was also made available – which included the keyboard, cover, keyboard encoder ROM, and logo replacements. This upgrade had to be installed by an authorized service technician. Design flaws. According to Wozniak, the Apple III "had 100 percent hardware failures". Former Apple executive Taylor Pohlman stated that: Jobs insisted on the idea of having no fan or air vents, in order to make the computer run quietly. He would later push this same ideology onto almost all Apple models he had control of, from the Apple Lisa and Macintosh 128K to the iMac. To allow the computer to dissipate heat, the base of the Apple III was made of heavy cast aluminum, which supposedly acts as a heat sink. One advantage to the aluminum case was a reduction in RFI (Radio Frequency Interference), a problem which had plagued the Apple II series throughout its history. Unlike the Apple II, the power supply was mounted – without its own shell – in a compartment separate from the logic board. The decision to use an aluminum shell ultimately led to engineering issues which resulted in the Apple III's reliability problems. The lead time for manufacturing the shells was high, and this had to be done before the motherboard was finalized.
|
163
|
[Title: """Apple III"""] Later, it was realized that there was not enough room on the motherboard for all of the components unless narrow traces were used. Many Apple IIIs were thought to have failed due to their inability to properly dissipate heat. "inCider" stated in 1986 that "Heat has always been a formidable enemy of the Apple ///", and some users reported that their Apple IIIs became so hot that the chips started dislodging from the board, causing the screen to display garbled data or their disk to come out of the slot "melted". "BYTE" wrote, "the integrated circuits tended to wander out of their sockets". It has been rumored Apple advised customers to tilt the front of the Apple III six inches above the desk and then drop it to reseat the chips as a temporary solution. Other analyses blame a faulty automatic chip insertion process, not heat. Case designer Jerry Manock denied the design flaw charges, insisting that tests proved that the unit adequately dissipated the internal heat. The primary cause, he claimed, was a major logic board design problem. The logic board used "fineline" technology that was not fully mature at the time, with narrow, closely spaced traces. When chips were "stuffed" into the board and wave-soldered, solder bridges would form between traces that were not supposed to be connected. This caused numerous short circuits, which required hours of costly diagnosis and hand rework to fix. Apple designed a new circuit board with more layers and normal-width traces. The new logic board was laid out by one designer on a huge drafting board, rather than using the costly CAD-CAM system used for the previous board, and the new design worked. Earlier Apple III units came with a built-in real time clock. The hardware, however, would fail after prolonged use. Assuming that National Semiconductor would test all parts before shipping them, Apple did not perform this level of testing. Apple was soldering chips directly to boards and could not easily replace a bad chip if one was found. Eventually, Apple solved this problem by removing the real-time clock from the Apple III's specification rather than shipping the Apple III with the clock pre-installed, and then sold the peripheral as a level 1 technician add-on. BASIC. Microsoft and Apple each developed their own versions of BASIC for the Apple III. Apple III Microsoft BASIC was designed to run on the CP/M platform available for the Apple III.
|
164
|
[Title: """Apple III"""] Apple Business BASIC shipped with the Apple III. Donn Denman ported Applesoft BASIC to SOS and reworked it to take advantage of the extended memory of the Apple III. Both languages introduced a number of new or improved features over Applesoft BASIC. Both languages replaced Applesoft's single-precision floating-point variables using 5-byte storage with the somewhat-reduced-precision 4-byte variables, while also adding a larger numerical format. Apple III Microsoft BASIC provides double-precision floating-point variables, taking 8 bytes of storage, while Apple Business BASIC offers an extra-long integer type, also taking 8 bytes for storage. Both languages also retain 2-byte integers, and maximum 255-character strings. Other new features common to both languages include: Some features work differently in each language: Microsoft BASIC additional features. There is no support for graphics provided within the language, nor for reading analog controls or buttons; nor is there a means of defining the active window of the text screen. Business BASIC additional features. Apple Business BASIC eliminates all references to absolute memory addresses. Thus, the POKE command and PEEK() function were not included in the language, and new features replaced the CALL statement and USR() function. The functionality of certain features in Applesoft that had been achieved with various PEEK and POKE locations is now provided by: External binary subroutines and functions are loaded into memory by a single INVOKE disk-command that loads separately-assembled code modules. A PERFORM statement is then used to call an INVOKEd procedure by name, with an argument-list. INVOKEd functions would be referenced in expressions by EXFN. (floating-point) or EXFN%. (integer), with the function name appended, plus the argument-list for the function. Graphics are supported with an INVOKEd module, with features including displaying text within graphics in various fonts, within four different graphics modes available on the Apple III. Reception. "The Apple III is unlikely to approach the success of the Apple II", "InfoWorld" said in January 1981. Citing the III's high price, manufacturing delays, limited disk storage, and small software library, the magazine asked "why buy a $5000 computer with an emulator when most of the programs you need run directly on a $2500 computer".
|
165
|
[Title: """Apple III"""] Despite devoting the majority of its R&D to the Apple III and so ignoring the II that for a while dealers had difficulty in obtaining the latter, the III's technical problems made marketing the computer difficult. Ed Smith, who after designing the APF Imagination Machine worked as a distributor's representative, described the III as "a complete disaster". He recalled that he "was responsible for going to every dealership, setting up the Apple III in their showroom, and then explaining to them the functions of the Apple III, which in many cases didn't really work". Sales. "BYTE" reported in 1982 that Apple had sold only 10,000 of the original Apple III, compared to 350,000 Apple IIs sold by the end of 1981. Pohlman reported that Apple was only selling 500 units a month by late 1981, mostly as replacements. The company was able to eventually raise monthly sales to 5,000, but the IBM PC's successful launch had encouraged software companies to develop for it instead, prompting Apple to shift focus to the Lisa and Macintosh. The PC almost ended sales of the Apple III, the most closely comparable Apple computer model. By early 1984, sales were primarily to existing III owners, Apple itself—its 4,500 employees were equipped with some 3,000-4,500 units—and some small businesses. Apple finally discontinued the Apple III series on April 24, 1984, four months after introducing the III Plus, after selling only up to 75,000 units and replacing 14,000 defective units. Jobs said the company lost "incalculable amounts" of money on the Apple III. Wozniak estimated that Apple had spent $100 million on the III instead of improving the II and better competing against IBM. Pohlman claimed that there was a "stigma" at Apple associated with having contributed to the computer. Most employees who worked on the III reportedly left Apple. Legacy. The file system and some design ideas from Apple SOS, the Apple III's operating system, were part of Apple ProDOS and Apple GS/OS, the major operating systems for the Apple II following the demise of the Apple III, as well as the Apple Lisa, which was the de facto business-oriented successor to the Apple III.
|
166
|
[Title: """Apple III"""] The hierarchical file system influenced the evolution of the Macintosh: while the original Macintosh File System (MFS) was a flat file system designed for a floppy disk without subdirectories, subsequent file systems were hierarchical. By comparison, the IBM PC's first file system (again designed for floppy disks) was also flat and later versions (designed for hard disks) were hierarchical. In popular culture. At the start of the Walt Disney Pictures film "Tron", lead character Kevin Flynn (played by Jeff Bridges) is seen hacking into the ENCOM mainframe using an Apple III.
|
167
|
[Title: """AVL tree"""] In computer science, an AVL tree (named after inventors Adelson-Velsky and Landis) is a self-balancing binary search tree. In an AVL tree, the heights of the two child subtrees of any node differ by at most one; if at any time they differ by more than one, rebalancing is done to restore this property. Lookup, insertion, and deletion all take time in both the average and worst cases, where formula_1 is the number of nodes in the tree prior to the operation. Insertions and deletions may require the tree to be rebalanced by one or more tree rotations. The AVL tree is named after its two Soviet inventors, Georgy Adelson-Velsky and Evgenii Landis, who published it in their 1962 paper "An algorithm for the organization of information". It is the first self-balancing binary search tree data structure to be invented. AVL trees are often compared with red–black trees because both support the same set of operations and take formula_2 time for the basic operations. For lookup-intensive applications, AVL trees are faster than red–black trees because they are more strictly balanced. Similar to red–black trees, AVL trees are height-balanced. Both are, in general, neither weight-balanced nor formula_3-balanced for any formula_4; AVL trees are more rigidly balanced than RB trees with an asymptotic relation AVL/RB ≈0.720 of the maximal heights. For insertions and deletions, Ben Pfaff shows in 79 measurements a relation of AVL/RB between 0.677 and 1.077 with median ≈0.947 and geometric mean ≈0.910.
|
168
|
[Title: """Aliphatic compound"""] In organic chemistry, hydrocarbons (compounds composed solely of carbon and hydrogen) are divided into two classes: aromatic compounds and aliphatic compounds (; G. "aleiphar", fat, oil). Aliphatic compounds can be saturated (in which all the C-C bonds are single, requiring the structure to be completed, or 'saturated', by hydrogen) like hexane, or unsaturated, like hexene and hexyne. Open-chain compounds, whether straight or branched, and which contain no rings of any type, are always aliphatic. Cyclic compounds can be aliphatic if they are not aromatic. Structure. Aliphatics compounds can be saturated, joined by single bonds (alkanes), or unsaturated, with double bonds (alkenes) or triple bonds (alkynes). If other elements (heteroatoms) are bound to the carbon chain, the most common being oxygen, nitrogen, sulfur, and chlorine, it is no longer a hydrocarbon, and therefore no longer an aliphatic compound. However, such compounds may still be referred to as aliphatic if the hydrocarbon portion of the molecule is aliphatic, e.g. aliphatic amines, to differentiate them from aromatic amines. The least complex aliphatic compound is methane (CH4). Properties. Most aliphatic compounds are flammable, allowing the use of hydrocarbons as fuel, such as methane in natural gas for stoves or heating; butane in torches and lighters; various aliphatic (as well as aromatic) hydrocarbons in liquid transportation fuels like petrol/gasoline, diesel, and jet fuel; and other uses such as ethyne (acetylene) in welding. Examples of aliphatic compounds. The most important aliphatic compounds are: Important examples of low-molecular aliphatic compounds can be found in the list below (sorted by the number of carbon-atoms):
|
169
|
[Title: """Amber"""] Amber is fossilized tree resin. Examples of it have been appreciated for its color and natural beauty since the Neolithic times, and worked as a gemstone since antiquity. Amber is used in jewelry and as a healing agent in folk medicine. There are five classes of amber, defined on the basis of their chemical constituents. Because it originates as a soft, sticky tree resin, amber sometimes contains animal and plant material as inclusions. Amber occurring in coal seams is also called resinite, and the term "ambrite" is applied to that found specifically within New Zealand coal seams. Etymology. The English word "amber" derives from Arabic from Middle Persian 𐭠𐭭𐭡𐭫 ("ʾnbl" /ambar/, “ambergris”) via Middle Latin "ambar" and Middle French "ambre". The word referred to what is now known as "ambergris" ("ambre gris" or "gray amber"), a solid waxy substance derived from the sperm whale. The word, in its sense of "ambergris," was adopted in Middle English in the 14th century. In the Romance languages, the sense of the word was extended to Baltic amber (fossil resin) from as early as the late 13th century. At first called white or yellow amber ("ambre jaune"), this meaning was adopted in English by the early 15th century. As the use of ambergris waned, this became the main sense of the word. The two substances ("yellow amber" and "gray amber") conceivably became associated or confused because they both were found washed up on beaches. Ambergris is less dense than water and floats, whereas amber is denser and floats only in concentrated saline, or strong salty seawater though less dense than stone. The classical names for amber, Ancient Greek ("ēlektron") and one of its Latin names, "electrum," are connected to a term ἠλέκτωρ ("ēlektōr") meaning "beaming Sun". According to myth, when Phaëton, son of Helios (the Sun) was killed, his mourning sisters became poplar trees, and their tears became "elektron", amber. The word "elektron" gave rise to the words "electric, electricity", and their relatives because of amber's ability to bear a charge of static electricity.
|
170
|
[Title: """Amber"""] Varietal names. A number of regional and varietal names have been applied to ambers over the centuries, including allingite, beckerite, gedanite, kochenite, krantzite, and stantienite. History. Theophrastus discussed amber in the 4th century BCE, as did Pytheas (), whose work "On the Ocean" is lost, but was referenced by Pliny, according to whose "Natural History":Pytheas says that the Gutones, a people of Germany, inhabit the shores of an estuary of the Ocean called Mentonomon, their territory extending a distance of six thousand stadia; that, at one day's sail from this territory, is the Isle of Abalus, upon the shores of which, amber is thrown up by the waves in spring, it being an excretion of the sea in a concrete form; as, also, that the inhabitants use this amber by way of fuel, and sell it to their neighbors, the Teutones. Earlier Pliny says that Pytheas refers to a large island—three days' sail from the Scythian coast and called Balcia by Xenophon of Lampsacus (author of a fanciful travel book in Greek)—as "Basilia"—a name generally equated with "Abalus". Given the presence of amber, the island could have been Heligoland, Zealand, the shores of Gdańsk Bay, the Sambia Peninsula or the Curonian Lagoon, which were historically the richest sources of amber in northern Europe. There were well-established trade routes for amber connecting the Baltic with the Mediterranean (known as the "Amber Road"). Pliny states explicitly that the Germans exported amber to Pannonia, from where the Veneti distributed it onwards. The ancient Italic peoples of southern Italy used to work amber; the National Archaeological Museum of Siritide (Museo Archeologico Nazionale della Siritide) at Policoro in the province of Matera (Basilicata) displays important surviving examples. It has been suggested that amber used in antiquity, as at Mycenae and in the prehistory of the Mediterranean, came from deposits in Sicily.
|
171
|
[Title: """Amber"""] Pliny also cites the opinion of Nicias ( 470–413 BCE), according to whom amber Besides the fanciful explanations according to which amber is "produced by the Sun", Pliny cites opinions that are well aware of its origin in tree resin, citing the native Latin name of "succinum" ("sūcinum", from "sucus" "juice"). In Book 37, section XI of "Natural History", Pliny wrote: He also states that amber is also found in Egypt and India, and he even refers to the electrostatic properties of amber, by saying that "in Syria the women make the whorls of their spindles of this substance, and give it the name of "harpax" [from ἁρπάζω, "to drag"] from the circumstance that it attracts leaves towards it, chaff, and the light fringe of tissues". The Romans traded for amber from the shores of the southern Baltic at least as far back as the time of Nero. Amber has a long history of use in China, with the first written record from 200 BCE. Early in the 19th century, the first reports of amber found in North America came from discoveries in New Jersey along Crosswicks Creek near Trenton, at Camden, and near Woodbury. Composition. Amber is heterogeneous in composition, but consists of several resinous more or less soluble in alcohol, ether and chloroform, associated with an insoluble bituminous substance. Amber is a macromolecule formed by free radical polymerization of several precursors in the labdane family, for example, communic acid, communol, and biformene. These labdanes are diterpenes (C20H32) and trienes, equipping the organic skeleton with three alkene groups for polymerization. As amber matures over the years, more polymerization takes place as well as isomerization reactions, crosslinking and cyclization. Most amber has a hardness between 2.0 and 2.5 on the Mohs scale, a refractive index of 1.5–1.6, a specific gravity between 1.06 and 1.10, and a melting point of 250–300 °C.
|
172
|
[Title: """Amber"""] Heated above , amber decomposes, yielding an oil of amber, and leaves a black residue which is known as "amber colophony", or "amber pitch"; when dissolved in oil of turpentine or in linseed oil this forms "amber varnish" or "amber lac". Impurities are quite often present, especially when the resin has dropped onto the ground, so the material may be useless except for varnish-making. Such impure amber is called "firniss". Such inclusion of other substances can cause the amber to have an unexpected color. Pyrites may give a bluish color. "Bony amber" owes its cloudy opacity to numerous tiny bubbles inside the resin. However, so-called "black amber" is really a kind of jet. In darkly clouded and even opaque amber, inclusions can be imaged using high-energy, high-contrast, high-resolution X-rays. Formation. Molecular polymerization, resulting from high pressures and temperatures produced by overlying sediment, transforms the resin first into copal. Sustained heat and pressure drives off terpenes and results in the formation of amber. For this to happen, the resin must be resistant to decay. Many trees produce resin, but in the majority of cases this deposit is broken down by physical and biological processes. Exposure to sunlight, rain, microorganisms, and extreme temperatures tends to disintegrate the resin. For the resin to survive long enough to become amber, it must be resistant to such forces or be produced under conditions that exclude them. Fossil resins from Europe fall into two categories, the Baltic ambers and another that resembles the "Agathis" group. Fossil resins from the Americas and Africa are closely related to the modern genus "Hymenaea", while Baltic ambers are thought to be fossil resins from plants of the family Sciadopityaceae that once lived in north Europe. The abnormal development of resin in living trees ("succinosis") can result in the formation of amber. Extraction and processing. Distribution and mining. Amber is globally distributed in or around all continents, mainly in rocks of Cretaceous age or younger. Historically, the coast west of Königsberg in Prussia was the world's leading source of amber. The first mentions of amber deposits there date back to the 12th century.
|
173
|
[Title: """Amber"""] Juodkrantė in Lithuania was established in the mid-19th century as a mining town of amber. About 90% of the world's extractable amber is still located in that area, which was transferred to the Russian Soviet Federative Socialist Republic of the USSR in 1946, becoming the Kaliningrad Oblast. Pieces of amber torn from the seafloor are cast up by the waves and collected by hand, dredging, or diving. Elsewhere, amber is mined, both in open works and underground galleries. Then nodules of "blue earth" have to be removed and an opaque crust must be cleaned off, which can be done in revolving barrels containing sand and water. Erosion removes this crust from sea-worn amber. Dominican amber is mined through bell pitting, which is dangerous because of the risk of tunnel collapse. An important source of amber is Kachin State in northern Myanmar, which has been a major source of amber in China for at least 1,800 years. Contemporary mining of this deposit has attracted attention for unsafe working conditions and its role in funding internal conflict in the country. Amber from the Rivne Oblast of Ukraine, referred to as Rivne amber, is mined illegally by organised crime groups, who deforest the surrounding areas and pump water into the sediments to extract the amber, causing severe environmental deterioration. Treatment. The Vienna amber factories, which use pale amber to manufacture pipes and other smoking tools, turn it on a lathe and polish it with whitening and water or with rotten stone and oil. The final luster is given by polishing with flannel. When gradually heated in an oil bath, amber "becomes soft and flexible. Two pieces of amber may be united by smearing the surfaces with linseed oil, heating them, and then pressing them together while hot. Cloudy amber may be clarified in an oil bath, as the oil fills the numerous pores that cause the turbidity. Small fragments, formerly thrown away or used only for varnish are now used on a large scale in the formation of "ambroid" or "pressed amber". The pieces are carefully heated with exclusion of air and then compressed into a uniform mass by intense hydraulic pressure, the softened amber being forced through holes in a metal plate. The product is extensively used for the production of cheap jewelry and articles for smoking.
|
174
|
[Title: """Amber"""] This pressed amber yields brilliant interference colors in polarized light." Amber has often been imitated by other resins like copal and kauri gum, as well as by celluloid and even glass. Baltic amber is sometimes colored artificially but also called "true amber". Appearance. Amber occurs in a range of different colors. As well as the usual yellow-orange-brown that is associated with the color "amber", amber can range from a whitish color through a pale lemon yellow, to brown and almost black. Other uncommon colors include red amber (sometimes known as "cherry amber"), green amber, and even blue amber, which is rare and highly sought after. Yellow amber is a hard fossil resin from evergreen trees, and despite the name it can be translucent, yellow, orange, or brown colored. Known to the Iranians by the Pahlavi compound word kah-ruba (from "kah" "straw" plus "rubay" "attract, snatch", referring to its electrical properties), which entered Arabic as kahraba' or kahraba (which later became the Arabic word for electricity, كهرباء "kahrabā"), it too was called amber in Europe (Old French and Middle English ambre). Found along the southern shore of the Baltic Sea, yellow amber reached the Middle East and western Europe via trade. Its coastal acquisition may have been one reason yellow amber came to be designated by the same term as ambergris. Moreover, like ambergris, the resin could be burned as an incense. The resin's most popular use was, however, for ornamentation—easily cut and polished, it could be transformed into beautiful jewelry. Much of the most highly prized amber is transparent, in contrast to the very common cloudy amber and opaque amber. Opaque amber contains numerous minute bubbles. This kind of amber is known as "bony amber". Although all Dominican amber is fluorescent, the rarest Dominican amber is blue amber. It turns blue in natural sunlight and any other partially or wholly ultraviolet light source. In long-wave UV light it has a very strong reflection, almost white. Only about is found per year, which makes it valuable and expensive. Sometimes amber retains the form of drops and stalactites, just as it exuded from the ducts and receptacles of the injured trees.
|
175
|
[Title: """Amber"""] It is thought that, in addition to exuding onto the surface of the tree, amber resin also originally flowed into hollow cavities or cracks within trees, thereby leading to the development of large lumps of amber of irregular form. Classification. Amber can be classified into several forms. Most fundamentally, there are two types of plant resin with the potential for fossilization. Terpenoids, produced by conifers and angiosperms, consist of ring structures formed of isoprene (C5H8) units. Phenolic resins are today only produced by angiosperms, and tend to serve functional uses. The extinct medullosans produced a third type of resin, which is often found as amber within their veins. The composition of resins is highly variable; each species produces a unique blend of chemicals which can be identified by the use of pyrolysis–gas chromatography–mass spectrometry. The overall chemical and structural composition is used to divide ambers into five classes. There is also a separate classification of amber gemstones, according to the way of production. Class I. This class is by far the most abundant. It comprises labdatriene carboxylic acids such as communic or ozic acids. It is further split into three sub-classes. Classes Ia and Ib utilize regular labdanoid diterpenes (e.g. communic acid, communol, biformenes), while Ic uses "enantio" labdanoids (ozic acid, ozol, "enantio" biformenes). Class Ia includes "Succinite" (= 'normal' Baltic amber) and "Glessite". They have a communic acid base, and they also include much succinic acid. Baltic amber yields on dry distillation succinic acid, the proportion varying from about 3% to 8%, and being greatest in the pale opaque or "bony" varieties. The aromatic and irritating fumes emitted by burning amber are mainly from this acid. Baltic amber is distinguished by its yield of succinic acid, hence the name "succinite". Succinite has a hardness between 2 and 3, which is greater than many other fossil resins. Its specific gravity varies from 1.05 to 1.10. It can be distinguished from other ambers via infrared spectroscopy through a specific carbonyl absorption peak. Infrared spectroscopy can detect the relative age of an amber sample.
|
176
|
[Title: """Amber"""] Succinic acid may not be an original component of amber but rather a degradation product of abietic acid. Class Ib ambers are based on communic acid; however, they lack succinic acid. Class Ic is mainly based on "enantio"-labdatrienonic acids, such as ozic and zanzibaric acids. Its most familiar representative is Dominican amber. which is mostly transparent and often contains a higher number of fossil inclusions. This has enabled the detailed reconstruction of the ecosystem of a long-vanished tropical forest. Resin from the extinct species "Hymenaea protera" is the source of Dominican amber and probably of most amber found in the tropics. It is not "succinite" but "retinite". Class II. These ambers are formed from resins with a sesquiterpenoid base, such as cadinene. Class III. These ambers are polystyrenes. Class IV. Class IV is something of a catch-all: its ambers are not polymerized, but mainly consist of cedrene-based sesquiterpenoids. Class V. Class V resins are considered to be produced by a pine or pine relative. They comprise a mixture of diterpinoid resins and "n"-alkyl compounds. Their main variety is "Highgate copalite". Geological record. The oldest amber recovered dates to the late Carboniferous period (). Its chemical composition makes it difficult to match the amber to its producers – it is most similar to the resins produced by flowering plants; however, the first flowering plants appeared in the Early Cretaceous, about 200 million years after the oldest amber known to date, and they were not common until the Late Cretaceous. Amber becomes abundant long after the Carboniferous, in the Early Cretaceous, when it is found in association with insects. The oldest amber with arthropod inclusions comes from the Late Triassic (late Carnian 230 Ma) of Italy, where four microscopic (0.2–0.1 mm) mites, "Triasacarus," "Ampezzoa, Minyacarus" and "Cheirolepidoptus," and a poorly preserved nematoceran fly were found in millimetre-sized droplets of amber. The oldest amber with significant numbers of arthropod inclusions comes from Lebanon.
|
177
|
[Title: """Amber"""] This amber, referred to as Lebanese amber, is roughly 125–135 million years old, is considered of high scientific value, providing evidence of some of the oldest sampled ecosystems. In Lebanon, more than 450 outcrops of Lower Cretaceous amber were discovered by Dany Azar, a Lebanese paleontologist and entomologist. Among these outcrops, 20 have yielded biological inclusions comprising the oldest representatives of several recent families of terrestrial arthropods. Even older Jurassic amber has been found recently in Lebanon as well. Many remarkable insects and spiders were recently discovered in the amber of Jordan including the oldest zorapterans, clerid beetles, umenocoleid roaches, and achiliid planthoppers. Burmese amber from the Hukawng Valley in northern Myanmar is the only commercially exploited Cretaceous amber. Uranium–lead dating of zircon crystals associated with the deposit have given an estimated depositional age of approximately 99 million years ago. Over 1,300 species have been described from the amber, with over 300 in 2019 alone. Baltic amber is found as irregular nodules in marine glauconitic sand, known as "blue earth", occurring in Upper Eocene strata of Sambia in Prussia. It appears to have been partly derived from older Eocene deposits and it occurs also as a derivative phase in later formations, such as glacial drift. Relics of an abundant flora occur as inclusions trapped within the amber while the resin was yet fresh, suggesting relations with the flora of eastern Asia and the southern part of North America. Heinrich Göppert named the common amber-yielding pine of the Baltic forests "Pinites succiniter", but as the wood does not seem to differ from that of the existing genus it has been also called "Pinus succinifera". It is improbable that the production of amber was limited to a single species; and indeed a large number of conifers belonging to different genera are represented in the amber-flora. Paleontological significance. Amber is a unique preservational mode, preserving otherwise unfossilizable parts of organisms; as such it is helpful in the reconstruction of ecosystems as well as organisms; the chemical composition of the resin, however, is of limited utility in reconstructing the phylogenetic affinity of the resin producer.
|
178
|
[Title: """Amber"""] Amber sometimes contains animals or plant matter that became caught in the resin as it was secreted. Insects, spiders and even their webs, annelids, frogs, crustaceans, bacteria and amoebae, marine microfossils, wood, flowers and fruit, hair, feathers and other small organisms have been recovered in Cretaceous ambers (deposited c. ). There is even an ammonite "Puzosia (Bhimaites)" and marine gastropods found in Burmese amber. The preservation of prehistoric organisms in amber forms a key plot point in Michael Crichton's 1990 novel "Jurassic Park" and the 1993 movie adaptation by Steven Spielberg. In the story, scientists are able to extract the preserved blood of dinosaurs from prehistoric mosquitoes trapped in amber, from which they genetically clone living dinosaurs. Scientifically this is as yet impossible, since no amber with fossilized mosquitoes has ever yielded preserved blood. Amber is, however, conducive to preserving DNA, since it dehydrates and thus stabilizes organisms trapped inside. One projection in 1999 estimated that DNA trapped in amber could last up to 100 million years, far beyond most estimates of around 1 million years in the most ideal conditions, although a later 2013 study was unable to extract DNA from insects trapped in much more recent Holocene copal. In 1938, 12-year-old David Attenborough (brother of Richard who played John Hammond in "Jurassic Park") was given a piece of amber containing prehistoric creatures from his adoptive sister; it would be the focus of his 2004 BBC documentary "The Amber Time Machine." Use. Amber has been used since prehistory (Solutrean) in the manufacture of jewelry and ornaments, and also in folk medicine. Jewelry. Amber has been used as jewelry since the Stone Age, from 13,000 years ago. Amber ornaments have been found in Mycenaean tombs and elsewhere across Europe. To this day it is used in the manufacture of smoking and glassblowing mouthpieces. Amber's place in culture and tradition lends it a tourism value; Palanga Amber Museum is dedicated to the fossilized resin. Historical medicinal uses. Amber has long been used in folk medicine for its purported healing properties.
|
179
|
[Title: """Amber"""] Amber and extracts were used from the time of Hippocrates in ancient Greece for a wide variety of treatments through the Middle Ages and up until the early twentieth century. Amber necklaces are a traditional European remedy for colic or teething pain with purported analgesic properties of succinic acid, although there is no evidence that this is an effective remedy or delivery method. The American Academy of Pediatrics and the FDA have warned strongly against their use, as they present both a choking and a strangulation hazard. Scent of amber and amber perfumery. In ancient China, it was customary to burn amber during large festivities. If amber is heated under the right conditions, oil of amber is produced, and in past times this was combined carefully with nitric acid to create "artificial musk" – a resin with a peculiar musky odor. Although when burned, amber does give off a characteristic "pinewood" fragrance, modern products, such as perfume, do not normally use actual amber because fossilized amber produces very little scent. In perfumery, scents referred to as "amber" are often created and patented to emulate the opulent golden warmth of the fossil. The scent of amber was originally derived from emulating the scent of ambergris and/or the plant resin labdanum, but since sperm whales are endangered, the scent of amber is now largely derived from labdanum. The term "amber" is loosely used to describe a scent that is warm, musky, rich and honey-like, and also somewhat earthy. Benzoin is usually part of the recipe. Vanilla and cloves are sometimes used to enhance the aroma. "Amber" perfumes may be created using combinations of labdanum, benzoin resin, copal (a type of tree resin used in incense manufacture), vanilla, Dammara resin and/or synthetic materials. In Arab Muslim tradition, popular scents include amber, jasmine, musk and oud (agarwood). Imitation substances. Young resins used as imitations: Plastics used as imitations:
|
180
|
[Title: """Andriscus"""] Andriscus (, "Andrískos"; 154/153 BC – 146 BC), also often referenced as Pseudo-Philip, was a Greek pretender who became the last independent king of Macedon in 149 BC as Philip VI (, "Philipos"), based on his claim of being Philip, a now-obscure son of the last legitimate Macedonian king, Perseus. His reign lasted just one year and was toppled by the Roman Republic during the Fourth Macedonian War. Ancient sources generally agree that he was originally a fuller from Adramyttium in Aeolis in western Anatolia. Around 153 BC, his ancestry was supposedly revealed to him, upon which he travelled to the court of his claimed uncle, the Seleucid monarch Demetrius I Soter, to request assistance in claiming his throne. Demetrius refused and had him sent to Rome, where he was judged harmless and exiled to a city in Italy; he managed to escape, and after gathering support, primarily from Thrace, he launched an invasion of Macedon, defeating Rome's clients and establishing his rule as king. The Romans naturally reacted militarily, triggering war; after some initial successes, Andriscus was defeated and captured by the praetor Quintus Caecilius Metellus Macedonicus, who subdued Macedon once again. He was imprisoned for two years before being paraded in Metellus' triumph in 146 BC, after which he was executed. In the aftermath of his revolt, the Romans established the Roman province of Macedonia, ending Macedonian independence and establishing a permanent presence in the region. Origins and early life. Details of his origins are vague and sometimes conflicting, though it is generally believed that he was a fuller from Adramyttium in Aeolis in western Anatolia. His exact date of birth is unknown, though according to his own story, he was "of maturity" when he made his claims of royalty in 154 BC, and had been raised by a Cretan in Adramyttium. By his own claims, he was educated at Adramyttium until adolescence, until the Cretan died, after which he was raised with his foster mother.
|
181
|
[Title: """Andriscus"""] Upon reaching maturity, his mother (or foster mother, according to his claim) gave him a sealed parchment that was supposedly written by Perseus himself, along with the knowledge of the location of two hidden treasures, at Amphipolis and Thessalonica; he would later use these to advance his claims. Ancient sources are unanimous in calling him an impostor and dismiss the story as false; Niese suggests that there is a possibility of his claims being true, but generally agrees that he was a pretender; his main advantage in his claims was his close resemblance to Perseus. Around 154/153 BC, he left Pergamon for Syria, where he declared his claim to be the illegitimate son of Perseus by a concubine. According to his own account, it was due to his mother (or foster mother) urging him to leave Pergamon to avoid the wrath of the pro-Roman Eumenes II. Claiming the throne. In Syria. He first staked his claim in Syria. Livy and Cassius Dio write that he simply went from Pergamon to Syria and directly staked his claim before the Seleucid monarch, Demetrius I Soter. Diodorus Siculus offers a different account. According to him, Andriscus was already a mercenary in Demetrius' army. Due to his resemblance to the former Macedonian king, his comrades started jokingly calling him "son of Perseus"; these jokes soon began becoming serious suspicions, and at one point, Andriscus himself decided to seize the opportunity and claimed that he was indeed the son of Perseus. Niese attempts to reconcile both accounts, suggesting that he might have travelled to Syria and then enlisted as a mercenary before staking his claim. He appealed to the king to help him win back his "ancestral" throne, and found great popular support among the Seleucid populace, to the extent that there were riots in the capital, Antioch. Large segments of the Seleucid population were of Macedonian descent, nurturing strong anti-Roman sentiment since the Roman conquest of Macedon in the Third Macedonian War; they were eager to help the claimant. They proceeded to such an extent that there were even calls for deposing the king if he did not help the pretender. Unmoved, or perhaps frightened, Demetrius had Andriscus arrested and sent to Rome.
|
182
|
[Title: """Andriscus"""] In Rome. In Rome, he was brought before the Senate, where Dio writes that he stood "in general contempt" due to what was perceived to be his ordinary nature and transparently false claim. The Romans believed his claim to be fake, because the real Philip had died at Alba Fucens two years after his father Perseus. Considering him harmless, they simply exiled him to an Italian city, but he managed to escape; fleeing Italy, he went to the Greek world, to the city of Miletus. Gaining support. In Miletus, he tried to advance his claims further, attracting significant attention and sympathy. When the leaders of Miletus learned about this, they arrested him and sought advice from visiting Roman envoys on what to do with him; the envoys were contemptuous of the pretender and told the Miletans he was safe to release. He continued his travels through Ionia, meeting former acquaintances of Perseus and gaining an audience with Kallipa, a former concubine of Perseus who was now married to Athenaios, brother of the Pergamene king Attalus II Philadelphus. Being a Macedonian by birth, and due to her former connections to the Antigonids, she accepted his claim and agreed to help him, giving him money and slaves, and probably recommending that he travel to Thrace, where he would find a following. He was also received favourably in Byzantium. He finally arrived in Thrace, where he met Teres III, who had married the granddaughter of Perseus and was the son of Cotys IV, who had once been an ally of Perseus. Teres and the other Thracian chieftains, especially a certain Barsabas, received him enthusiastically; he held a coronation ceremony at Teres' court, was given a few hundred Thracian troops, and set off on his campaign. Conquest of Macedon. His first attempt to invade was unsuccessful, and he initially did not inspire much enthusiasm among the Macedonians; this made the Romans complacent about the pretender. However, he soon managed to encounter a force of Rome's Macedonian client republics, defeating them in Odomantice; he then invaded Macedon proper, defeating Rome's clients on the banks of the Strymon river.
|
183
|
[Title: """Andriscus"""] Amidst popular acclaim, he crowned himself king at the old Macedonian capital of Pella in 150/149 BC. Popular support. Although the Macedonians' initial attitude had been lukewarm, his successes won him popularity and widespread support in Macedon. Anti-Roman sentiment was common in Macedon; the populace was obliging in overthrowing the old regime. Support for Andriscus was not uniform — there was significantly more hesitation among the gentry and upper classes, and somewhat more enthusiasm among the lower classes — but the popular mood was largely in his favour. His claims were bolstered by his correct prediction of the locations of two treasures, which he claimed were specified in the "sealed writing" that had been handed to his caretakers by Perseus, and had later been given to him. Even if there were apprehensions about the veracity of his claim, Niese notes that "one liked to believe what one wished; the re-establishment of Macedonia enabled liberation from the burden of Roman rule. The longer these burdens had been borne, the happier they [the Macedonians] were at the prospect of Macedonia under a king restored from the old lineage." However, it has also been suggested that the extent of his support may not have been as widespread as often believed, and that a significant amount of the Macedonian populace remained pro-republican and pro-Roman. The relative lack of reprisals towards Macedon after his defeat, as compared to the destructions of Corinth and Carthage in the same period, has been suggested as evidence for this theory. Reign. Military campaigns. Andriscus' reign was defined to a significant degree by his military campaigns, due to his being in a constant state of war with Rome. After his conquest of the Kingdom, he enlarged the army and began campaigns to conquer Thessaly, a key part of the realm of the old Antigonids. Initial resistance to him were from "ad hoc" forces of Roman allies in Greece, a few Roman units and legates in the region and some resistance from the remnants of Rome's client republics in Macedon, some elements of which seem to have survived for some time into his reign. Soon, however, the Romans sent a legion under the praetor Publius Juventius Thalna to defeat the pretender.
|
184
|
[Title: """Andriscus"""] Thalna, however, appears to have underestimated Andriscus' strength, not taking into account the fact that the king's army had grown dramatically since his enthronement. Andriscus attacked and fought him at an unspecified location in Thessaly (Dio gives it as "near the borders of Macedon"); details of the engagement are scarce, but Thalna was killed and his forces almost annihilated. It was the worst defeat Rome would suffer at the hands of the Macedonians; Florus remarks on the irony of how "they that were invincible against real kings, were defeated by this imaginary and pretended king". The victory greatly increased the king's prestige; he obtained an alliance with Carthage, and his domestic popularity was increased dramatically, allowing him to stamp out republican resistance and conquer Thessaly. Foreign policy. At first, Andriscus attempted to negotiate his position with Rome, but when it became clear that they would not recognize his throne, he embarked on a strongly anti-Roman policy, He continued to cultivate his relations with his Thracian allies, to whom he owed his throne; they would continue to provide significant forces for him during his reign. Foreign interest in relations with him increased dramatically after his victory over Thalna; as mentioned before, Carthage, which was under attack from Rome in the Third Punic War, allied itself to him and promised him money and ships, though these could not be sent before his ultimate defeat. Significant sympathy, possibly cultivated to a degree by him, arose in Greece; however, the Achaean League remained pro-Roman and continued to resist and fight him. King Attalus II Philadelphus of Pergamon remained staunchly pro-Roman; the Pergamenes were terrified of the prospect of a revived and strong Macedonia on their doorstep. Domestic policy. Domestically, Andriscus implemented a strongly anti-Roman and anti-Republican policy. Ancient historians interpreted this as his cruelty and tyranny; it has been suggested that these were simply manifestations of his anti-Roman policy and his persecutions of his opponents, including pro-Roman republicans. At the same time, it is also possible that he was indeed tyrannical. His persecutions increased significantly after his victory over Thalna, costing him significant popularity; this would have dire consequences for him later. Coinage. The extent and nature of Andriscus' coinage is a matter of debate.
|
185
|
[Title: """Andriscus"""] It has been suggested that many of his coins were overstrikes of previous Antigonid, republican and Roman coinage. He issued a very small amount of silver drachmae, on which he pictured himself as a Hellenistic king, and added Herakles on the reverse. Only three coins of Andriscus are known, two of which are overstruck, one on a drachm of the Thessalian League, the other on a Roman denarius. It is therefore possible that he also used the denarii he seized as booty after his victory against Thalna to mint his own coins. The coins are also of poor quality, due to the short duration of his reign, the need to reuse old dies and the need to quickly produce wartime coinage. Some non-royal coinage has also been discovered and dated to the period of his reign, possibly struck by the remnants of the pro-Roman republics. It has also been suggested that the king was more liberal than implied by the sources, and allowed some degree of independent coinage. Downfall and death. Thalna's defeat shook Roman prestige in the East, and made the Senate realize the full significance of the revolt. They organized a full consular army of two legions under praetor Quintus Caecilius Metellus, to defeat Andriscus and check, if not quell, his uprising. Arriving in Greece in 148 BC, Metellus marched along the Thessalian coast in a combined land and sea advance, while the allied Pergamene fleet threatened the coastal district of northern Macedonia. To protect himself against both offensives, Andriscus took up a defensive position with his main army at Pydna, where Metellus engaged him in battle. In the ensuing Battle of Pydna, Andrisus was decisively defeated. His harsh persecutions during his reign now showed their consequences; this single battle was enough to make him lose control of Macedon, as the people submitted to Metellus. He was forced to flee to Thrace, his original base of support, and began organizing a new army; however, Metellus pursued him swiftly and routed his forces before he could prepare them. Andriscus then fled to the Thracian princeling Byzes; however, Metellus managed to persuade the latter into becoming a Roman ally and handing Andriscus over as a prisoner, ending his reign.
|
186
|
[Title: """Andriscus"""] He remained a prisoner over the next two years, while Metellus subdued any remaining Macedonian resistance, organized Macedon as a province and settled the Achaean War of 146 BC. When Metellus returned to Rome in 146 BC, he received the agnomen "Macedonicus" for his victory and was granted a triumph. Andriscus was brought in chains and paraded in the triumph, and later executed — the last king to reign over Macedon. Assessment and legacy. Ancient sources are extremely hostile, not only to the origins and claims, but also of the character of Andriscus — Diodorus calls him "shot through with cruelty, greed and every base quality"; Dio and Livy call him "a man of the lowest kind". They also describe him as cruel and tyrannical; accusations of tyranny probably reflect his harsh persecutions of pro-Roman and pro-republican elements in Macedon. At the same time, it is possible that he was indeed tyrannical, especially after his victory over Thalna, and perpetrated acts of terrorism and repression against his subjects. His main legacy was that in the aftermath of his revolt, the Romans understood the strength of anti-Roman feeling that had arisen in Macedon, and realized that the old administration could not be sustained — a thorough reorganization was necessary. Another reason why reorganization was necessary was that Andriscus' persecutions had killed many pro-Roman republicans and thoroughly disrupted the old administrative structure; it would be difficult to re-establish it. Therefore, the Senate made Macedon a Roman province, with Metellus as its first governor.
|
187
|
[Title: """Aage Bohr"""] Aage Niels Bohr (; 19 June 1922 – 8 September 2009) was a Danish nuclear physicist who shared the Nobel Prize in Physics in 1975 with Ben Roy Mottelson and James Rainwater "for the discovery of the connection between collective motion and particle motion in atomic nuclei and the development of the theory of the structure of the atomic nucleus based on this connection". His father was Niels Bohr. Starting from Rainwater's concept of an irregular-shaped liquid drop model of the nucleus, Bohr and Mottelson developed a detailed theory that was in close agreement with experiments. Since his father, Niels Bohr, had won the prize in 1922, he and his father are one of the six pairs of fathers and sons who have both won the Nobel Prize and one of the four pairs who have both won the Nobel Prize in Physics. Early life and education. Bohr was born in Copenhagen on 19 June 1922, the fourth of six sons of the physicist Niels Bohr and his wife Margrethe Bohr (née Nørlund). His oldest brother, Christian, died in a boating accident in 1934, and his youngest, Harald, was severely disabled and placed away from the home in Copenhagen at the age of four. He would later die from childhood meningitis. Of the others, Hans became a physician; Erik, a chemical engineer; and Ernest, a lawyer and Olympic athlete who played field hockey for Denmark at the 1948 Summer Olympics in London. The family lived at the Institute of Theoretical Physics at the University of Copenhagen, now known as the Niels Bohr Institute, where he grew up surrounded by physicists who were working with his father, such as Hans Kramers, Oskar Klein, Yoshio Nishina, Wolfgang Pauli and Werner Heisenberg. In 1932, the family moved to the Carlsberg Æresbolig, a mansion donated by Carl Jacobsen, the heir to Carlsberg breweries, to be used as an honorary residence by the Dane who had made the most prominent contribution to science, literature, or the arts. Bohr went to high school at Sortedam Gymnasium in Copenhagen. In 1940, shortly after the German occupation of Denmark in April, he entered the University of Copenhagen, where he studied physics.
|
188
|
[Title: """Aage Bohr"""] He assisted his father, helping draft correspondence and articles related to epistemology and physics. In September 1943, word reached his family that the Nazis considered them to be Jewish, because Bohr's grandmother, Ellen Adler Bohr, had been Jewish, and that they therefore were in danger of being arrested. The Danish resistance helped the family escape by sea to Sweden. Bohr arrived there in October 1943, and then flew to Britain on a de Havilland Mosquito operated by British Overseas Airways Corporation. The Mosquitoes were unarmed high-speed bomber aircraft that had been converted to carry small, valuable cargoes or important passengers. By flying at high speed and high altitude, they could cross German-occupied Norway, and yet avoid German fighters. Bohr, equipped with parachute, flying suit and oxygen mask, spent the three-hour flight lying on a mattress in the aircraft's bomb bay. On arrival in London, Bohr rejoined his father, who had flown to Britain the week before. He officially became a junior researcher at the Department of Scientific and Industrial Research, but actually served as personal assistant and secretary to his father. The two worked on Tube Alloys, the British atomic bomb project. On 30 December 1943, they made the first of a number of visits to the United States, where his father was a consultant to the Manhattan Project. Due to his father's fame, they were given false names; Bohr became James Baker, and his father, Nicholas Baker. In 1945, the director of the Los Alamos Laboratory, J. Robert Oppenheimer, asked them to review the design of the modulated neutron initiator. They reported that it would work. That they had reached this conclusion put Enrico Fermi's concerns about the viability of the design to rest. The initiators performed flawlessly in the bombs used in the atomic bombings of Hiroshima and Nagasaki in August 1945. Career. In August 1945, with the war ended, Bohr returned to Denmark, where he resumed his university education, graduating with a master's degree in 1946, with a thesis concerned with some aspects of atomic stopping power problems. In early 1948, Bohr became a member of the Institute for Advanced Study in Princeton, New Jersey.
|
189
|
[Title: """Aage Bohr"""] While paying a visit to Columbia University, he met Isidor Isaac Rabi, who sparked in him an interest in recent discoveries related to the hyperfine structure of deuterium. This led to Bohr becoming a visiting fellow at Columbia from January 1949 to August 1950. While in the United States, Bohr married Marietta Soffer on 11 March 1950. They had three children: Vilhelm, Tomas and Margrethe. By the late 1940s it was known that the properties of atomic nuclei could not be explained by then-current models such as the liquid drop model developed by Niels Bohr amongst others. The shell model, developed in 1949 by Maria Goeppert Mayer and others, allowed some additional features to be explained, in particular the so-called magic numbers. However, there were also properties that could not be explained, including the non-spherical distribution of charge in certain nuclei. In a 1950 paper, James Rainwater of Columbia University suggested a variant of the drop model of the nucleus that could explain a non-spherical charge distribution. Rainwater's model postulated a nucleus like a balloon with balls inside that distort the surface as they move about. He discussed the idea with Bohr, who was visiting Columbia at the time, and had independently conceived the same idea, and had, about a month after Rainwater's submission, submitted for publication a paper that discussed the same problem, but along more general lines. Bohr imagined a rotating, irregular-shaped nucleus with a form of surface tension. Bohr developed the idea further, in 1951 publishing a paper that comprehensively treated the relationship between oscillations of the surface of the nucleus and the movement of the individual nucleons. Upon his return to Copenhagen in 1950, Bohr began working with Ben Roy Mottelson to compare the theoretical work with experimental data. In three papers, that were published in 1952 and 1953, Bohr and Mottelson demonstrated close agreement between theory and experiment; for example, showing that the energy levels of certain nuclei could be described by a rotation spectrum. They were thereby able to reconcile the shell model with Rainwater's concept. This work stimulated many new theoretical and experimental studies.
|
190
|
[Title: """Aage Bohr"""] Bohr, Mottelson and Rainwater were jointly awarded the 1975 Nobel Prize in Physics "for the discovery of the connection between collective motion and particle motion in atomic nuclei and the development of the theory of the structure of the atomic nucleus based on this connection". Because his father had been awarded the prize in 1922, Bohr became one of only four pairs of fathers and sons to win the Nobel Prize in Physics. Only after doing his Nobel Prize-winning research did Bohr receive his doctorate from the University of Copenhagen, in 1954, writing his thesis on "Rotational States of Atomic Nuclei". Bohr became a professor at the University of Copenhagen in 1956, and, following his father's death in 1962, succeeded him as director of the Niels Bohr Institute, a position he held until 1970. He remained active there until he retired in 1992. He was also a member of the board of the Nordic Institute for Theoretical Physics from its inception in 1957, and was its director from 1975 to 1981. In addition to the Nobel Prize, he won the Dannie Heineman Prize for Mathematical Physics in 1960, the Atoms for Peace Award in 1969, H. C. Ørsted Medal in 1970, Rutherford Medal and Prize in 1972, John Price Wetherill Medal in 1974, and the Ole Rømer medal in 1976. Bohr and Mottelson continued to work together, publishing a two-volume monograph, "Nuclear Structure". The first volume, "Single-Particle Motion," appeared in 1969; the second, "Nuclear Deformations," in 1975. In 1972 Bohr was awarded an honorary degree, doctor philos. honoris causa, at the Norwegian Institute of Technology, later part of Norwegian University of Science and Technology. He was a member of the Norwegian Academy of Science and Letters from 1980. Bohr was also an elected member of the American Academy of Arts and Sciences, the American Philosophical Society, and the United States National Academy of Sciences. In 1981, Bohr became a founding member of the World Cultural Council. Bohr's wife Marietta died on 2 October 1978. In 1981, he married Bente Scharff Meyer (1926–2011).
|
191
|
[Title: """Aage Bohr"""] His son, Tomas Bohr, is a professor of physics at the Technical University of Denmark, working in the area of fluid dynamics. Aage Bohr died in Copenhagen on 9 September 2009. He was survived by his second wife and children. Bohr's Nobel Prize medal was sold at auction in November 2011. It was subsequently sold at auction in April 2019 for $90,000.
|
192
|
[Title: """Advanced Encryption Standard"""] The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001. AES is a variant of the Rijndael block cipher developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen, who submitted a proposal to NIST during the AES selection process. Rijndael is a family of ciphers with different key and block sizes. For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits. AES has been adopted by the U.S. government. It supersedes the Data Encryption Standard (DES), which was published in 1977. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. In the United States, AES was announced by the NIST as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001. This announcement followed a five-year standardization process in which fifteen competing designs were presented and evaluated, before the Rijndael cipher was selected as the most suitable. AES is included in the ISO/IEC 18033-3 standard. AES became effective as a U.S. federal government standard on May 26, 2002, after approval by U.S. Secretary of Commerce Donald Evans. AES is available in many different encryption packages, and is the first (and only) publicly accessible cipher approved by the U.S. National Security Agency (NSA) for top secret information when used in an NSA approved cryptographic module. Definitive standards. The Advanced Encryption Standard (AES) is defined in each of: Description of the ciphers. AES is based on a design principle known as a substitution–permutation network, and is efficient in both software and hardware. Unlike its predecessor DES, AES does not use a Feistel network. AES is a variant of Rijndael, with a fixed block size of 128 bits, and a key size of 128, 192, or 256 bits.
|
193
|
[Title: """Advanced Encryption Standard"""] By contrast, Rijndael "per se" is specified with block and key sizes that may be any multiple of 32 bits, with a minimum of 128 and a maximum of 256 bits. Most AES calculations are done in a particular finite field. AES operates on a 4 × 4 column-major order array of 16 bytes termed the "state": The key size used for an AES cipher specifies the number of transformation rounds that convert the input, called the plaintext, into the final output, called the ciphertext. The number of rounds are as follows: Each round consists of several processing steps, including one that depends on the encryption key itself. A set of reverse rounds are applied to transform ciphertext back into the original plaintext using the same encryption key. The step. In the step, each byte formula_2 in the "state" array is replaced with a formula_3 using an 8-bit substitution box. Before round 0, the "state" array is simply the plaintext/input. This operation provides the non-linearity in the cipher. The S-box used is derived from the multiplicative inverse over , known to have good non-linearity properties. To avoid attacks based on simple algebraic properties, the S-box is constructed by combining the inverse function with an invertible affine transformation. The S-box is also chosen to avoid any fixed points (and so is a derangement), i.e., formula_4, and also any opposite fixed points, i.e., formula_5. While performing the decryption, the step (the inverse of ) is used, which requires first taking the inverse of the affine transformation and then finding the multiplicative inverse. The step. The step operates on the rows of the state; it cyclically shifts the bytes in each row by a certain offset. For AES, the first row is left unchanged. Each byte of the second row is shifted one to the left. Similarly, the third and fourth rows are shifted by offsets of two and three respectively. In this way, each column of the output state of the step is composed of bytes from each column of the input state. The importance of this step is to avoid the columns being encrypted independently, in which case AES would degenerate into four independent block ciphers. The step. In the step, the four bytes of each column of the state are combined using an invertible linear transformation.
|
194
|
[Title: """Advanced Encryption Standard"""] The function takes four bytes as input and outputs four bytes, where each input byte affects all four output bytes. Together with , provides diffusion in the cipher. During this operation, each column is transformed using a fixed matrix (matrix left-multiplied by column gives new value of column in the state): Matrix multiplication is composed of multiplication and addition of the entries. Entries are bytes treated as coefficients of polynomial of order formula_7. Addition is simply XOR. Multiplication is modulo irreducible polynomial formula_8. If processed bit by bit, then, after shifting, a conditional XOR with 1B16 should be performed if the shifted value is larger than FF16 (overflow must be corrected by subtraction of generating polynomial). These are special cases of the usual multiplication in formula_9. In more general sense, each column is treated as a polynomial over formula_9 and is then multiplied modulo formula_11 with a fixed polynomial formula_12. The coefficients are displayed in their hexadecimal equivalent of the binary representation of bit polynomials from formula_13. The step can also be viewed as a multiplication by the shown particular MDS matrix in the finite field formula_9. This process is described further in the article Rijndael MixColumns. The. In the step, the subkey is combined with the state. For each round, a subkey is derived from the main key using Rijndael's key schedule; each subkey is the same size as the state. The subkey is added by combining of the state with the corresponding byte of the subkey using bitwise XOR. Optimization of the cipher. On systems with 32-bit or larger words, it is possible to speed up execution of this cipher by combining the and steps with the step by transforming them into a sequence of table lookups. This requires four 256-entry 32-bit tables (together occupying 4096 bytes). A round can then be performed with 16 table lookup operations and 12 32-bit exclusive-or operations, followed by four 32-bit exclusive-or operations in the step. Alternatively, the table lookup operation can be performed with a single 256-entry 32-bit table (occupying 1024 bytes) followed by circular rotation operations. Using a byte-oriented approach, it is possible to combine the , , and steps into a single round operation.
|
195
|
[Title: """Advanced Encryption Standard"""] Security. The National Security Agency (NSA) reviewed all the AES finalists, including Rijndael, and stated that all of them were secure enough for U.S. Government non-classified data. In June 2003, the U.S. Government announced that AES could be used to protect classified information: The design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP SECRET information will require use of either the 192 or 256 key lengths. The implementation of AES in products intended to protect national security systems and/or information must be reviewed and certified by NSA prior to their acquisition and use. AES has 10 rounds for 128-bit keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys. Known attacks. For cryptographers, a cryptographic "break" is anything faster than a brute-force attacki.e., performing one trial decryption for each possible key in sequence . A break can thus include results that are infeasible with current technology. Despite being impractical, theoretical breaks can sometimes provide insight into vulnerability patterns. The largest successful publicly known brute-force attack against a widely implemented block-cipher encryption algorithm was against a 64-bit RC5 key by distributed.net in 2006. The key space increases by a factor of 2 for each additional bit of key length, and if every possible value of the key is equiprobable; this translates into a doubling of the average brute-force key search time with every additional bit of key length. This implies that the effort of a brute-force search increases exponentially with key length. Key length in itself does not imply security against attacks, since there are ciphers with very long keys that have been found to be vulnerable. AES has a fairly simple algebraic framework. In 2002, a theoretical attack, named the "XSL attack", was announced by Nicolas Courtois and Josef Pieprzyk, purporting to show a weakness in the AES algorithm, partially due to the low complexity of its nonlinear components. Since then, other papers have shown that the attack, as originally presented, is unworkable; see XSL attack on block ciphers. During the AES selection process, developers of competing algorithms wrote of Rijndael's algorithm "we are concerned about [its] use ...
|
196
|
[Title: """Advanced Encryption Standard"""] in security-critical applications." In October 2000, however, at the end of the AES selection process, Bruce Schneier, a developer of the competing algorithm Twofish, wrote that while he thought successful academic attacks on Rijndael would be developed someday, he "did not believe that anyone will ever discover an attack that will allow someone to read Rijndael traffic." By 2006, the best known attacks were on 7 rounds for 128-bit keys, 8 rounds for 192-bit keys, and 9 rounds for 256-bit keys. Until May 2009, the only successful published attacks against the full AES were side-channel attacks on some specific implementations. In 2009, a new related-key attack was discovered that exploits the simplicity of AES's key schedule and has a complexity of 2119. In December 2009 it was improved to 299.5. This is a follow-up to an attack discovered earlier in 2009 by Alex Biryukov, Dmitry Khovratovich, and Ivica Nikolić, with a complexity of 296 for one out of every 235 keys. However, related-key attacks are not of concern in any properly designed cryptographic protocol, as a properly designed protocol (i.e., implementational software) will take care not to allow related keys, essentially by constraining an attacker's means of selecting keys for relatedness. Another attack was blogged by Bruce Schneier on July 30, 2009, and released as a preprint on August 3, 2009. This new attack, by Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, and Adi Shamir, is against AES-256 that uses only two related keys and 239 time to recover the complete 256-bit key of a 9-round version, or 245 time for a 10-round version with a stronger type of related subkey attack, or 270 time for an 11-round version. 256-bit AES uses 14 rounds, so these attacks are not effective against full AES. The practicality of these attacks with stronger related keys has been criticized, for instance, by the paper on chosen-key-relations-in-the-middle attacks on AES-128 authored by Vincent Rijmen in 2010.
|
197
|
[Title: """Advanced Encryption Standard"""] In November 2009, the first known-key distinguishing attack against a reduced 8-round version of AES-128 was released as a preprint. This known-key distinguishing attack is an improvement of the rebound, or the start-from-the-middle attack, against AES-like permutations, which view two consecutive rounds of permutation as the application of a so-called Super-S-box. It works on the 8-round version of AES-128, with a time complexity of 248, and a memory complexity of 232. 128-bit AES uses 10 rounds, so this attack is not effective against full AES-128. The first key-recovery attacks on full AES were by Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger, and were published in 2011. The attack is a biclique attack and is faster than brute force by a factor of about four. It requires 2126.2 operations to recover an AES-128 key. For AES-192 and AES-256, 2190.2 and 2254.6 operations are needed, respectively. This result has been further improved to 2126.0 for AES-128, 2189.9 for AES-192, and 2254.3 for AES-256 by Biaoshuai Tao and Hongjun Wu in a 2015 paper, which are the current best results in key recovery attack against AES. This is a very small gain, as a 126-bit key (instead of 128 bits) would still take billions of years to brute force on current and foreseeable hardware. Also, the authors calculate the best attack using their technique on AES with a 128-bit key requires storing 288 bits of data. That works out to about 38 trillion terabytes of data, which was more than all the data stored on all the computers on the planet in 2016. A paper in 2015 later improved the space complexity to 256 bits, which is 9007 terabytes (while still keeping a time complexity of approximately 2126). According to the Snowden documents, the NSA is doing research on whether a cryptographic attack based on tau statistic may help to break AES. At present, there is no known practical attack that would allow someone without knowledge of the key to read data encrypted by AES when correctly implemented. Side-channel attacks.
|
198
|
[Title: """Advanced Encryption Standard"""] Side-channel attacks do not attack the cipher as a black box, and thus are not related to cipher security as defined in the classical context, but are important in practice. They attack implementations of the cipher on hardware or software systems that inadvertently leak data. There are several such known attacks on various implementations of AES. In April 2005, D. J. Bernstein announced a cache-timing attack that he used to break a custom server that used OpenSSL's AES encryption. The attack required over 200 million chosen plaintexts. The custom server was designed to give out as much timing information as possible (the server reports back the number of machine cycles taken by the encryption operation). However, as Bernstein pointed out, "reducing the precision of the server's timestamps, or eliminating them from the server's responses, does not stop the attack: the client simply uses round-trip timings based on its local clock, and compensates for the increased noise by averaging over a larger number of samples." In October 2005, Dag Arne Osvik, Adi Shamir and Eran Tromer presented a paper demonstrating several cache-timing attacks against the implementations in AES found in OpenSSL and Linux's codice_1 partition encryption function. One attack was able to obtain an entire AES key after only 800 operations triggering encryptions, in a total of 65 milliseconds. This attack requires the attacker to be able to run programs on the same system or platform that is performing AES. In December 2009 an attack on some hardware implementations was published that used differential fault analysis and allows recovery of a key with a complexity of 232. In November 2010 Endre Bangerter, David Gullasch and Stephan Krenn published a paper which described a practical approach to a "near real time" recovery of secret keys from AES-128 without the need for either cipher text or plaintext. The approach also works on AES-128 implementations that use compression tables, such as OpenSSL. Like some earlier attacks, this one requires the ability to run unprivileged code on the system performing the AES encryption, which may be achieved by malware infection far more easily than commandeering the root account. In March 2016, C.
|
199
|
[Title: """Advanced Encryption Standard"""] Ashokkumar, Ravi Prakash Giri and Bernard Menezes presented a side-channel attack on AES implementations that can recover the complete 128-bit AES key in just 6–7 blocks of plaintext/ciphertext, which is a substantial improvement over previous works that require between 100 and a million encryptions. The proposed attack requires standard user privilege and key-retrieval algorithms run under a minute. Many modern CPUs have built-in hardware instructions for AES, which protect against timing-related side-channel attacks. Quantum attacks. AES-256 is considered to be quantum resistant, as it has similar quantum resistance to AES-128's resistance against traditional, non-quantum, attacks at 128 bits of security. AES-192 and AES-128 are not considered quantum resistant due to their smaller key sizes. AES-192 has a strength of 96 bits against quantum attacks and AES-128 has 64 bits of strength against quantum attacks, making them both insecure. NIST/CSEC validation. The Cryptographic Module Validation Program (CMVP) is operated jointly by the United States Government's National Institute of Standards and Technology (NIST) Computer Security Division and the Communications Security Establishment (CSE) of the Government of Canada. The use of cryptographic modules validated to NIST FIPS 140-2 is required by the United States Government for encryption of all data that has a classification of Sensitive but Unclassified (SBU) or above. From NSTISSP #11, National Policy Governing the Acquisition of Information Assurance: "Encryption products for protecting classified information will be certified by NSA, and encryption products intended for protecting sensitive information will be certified in accordance with NIST FIPS 140-2." The Government of Canada also recommends the use of FIPS 140 validated cryptographic modules in unclassified applications of its departments. Although NIST publication 197 ("FIPS 197") is the unique document that covers the AES algorithm, vendors typically approach the CMVP under FIPS 140 and ask to have several algorithms (such as Triple DES or SHA1) validated at the same time. Therefore, it is rare to find cryptographic modules that are uniquely FIPS 197 validated and NIST itself does not generally take the time to list FIPS 197 validated modules separately on its public web site.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.