5,051 research outputs found
The Unsuccessful Inquisition in Tudor England
The Spanish Inquisition was tasked with finding heretics and either returning them to their faith or punishing them for their unfaithfulness. This institution lasted for hundreds of years and prosecuted thousands of cases across the Iberian Peninsula. When Mary Tudor took the throne, she instituted her own, smaller inquisition in her attempts to return her people to the Catholic faith. Yet while the Spanish Inquisition was a secretive organization, the trials and arrests in England were far more public and accessible. Much of the methodology and questioning processes were similar, yet Mary’s Inquisition met great resistance and died with her after only a few years. Martyrs were created from the “poor souls” trapped and killed by Bloody Mary and Bloody Bishop Bonner. Secrecy was the Spanish Inquisition’s main weapon and advantage, and Mary’s Inquisition could not and did not succeed without it
Instabilities and the roton spectrum of a quasi-1D Bose-Einstein condensed gas with dipole-dipole interactions
We point out the possibility of having a roton-type excitation spectrum in a
quasi-1D Bose-Einstein condensate with dipole-dipole interactions. Normally
such a system is quite unstable due to the attractive portion of the dipolar
interaction. However, by reversing the sign of the dipolar interaction using
either a rotating magnetic field or a laser with circular polarization, a
stable cigar-shaped configuration can be achieved whose spectrum contains a
`roton' minimum analogous to that found in helium II. Dipolar gases also offer
the exciting prospect to tune the depth of this `roton' minimum by directly
controlling the interparticle interaction strength. When the minimum touches
the zero-energy axis the system is once again unstable, possibly to the
formation of a density wave.Comment: 7 pages, 6 figures. Special Issue: "Ultracold Polar Molecules:
Formation and Collisions
What Was Job's Malady?
This article explores the nature of Job's malady on various levels, using insights from disability studies as they have been applied to other parts of the Hebrew Bible, but rarely Job. What was the nature of Job's skin disease? Beyond that, how should we assess Job's mental torment accompanying his physical illness, as part of a broader intertextual resonance of lament as known from certain Psalms? It is argued that it is Job's feelings of social exclusion that are a major aspect of his malady, a factor well attested in disability studies but often left out of account in traditional biblical studies evaluations, which tend to focus on moral issues. The relevance of the moral judgment of the friends who regard Job's disease as a punishment for sin is assessed. A fresh interpretation is offered of the strange omission of Job's restoration from illness from the Epilogue. This is the author accepted manuscript. It is currently under an indefinite embargo pending publication by SAGE
A comparison of the in vitro and in planta responses of Phytophthora cinnamomi isolates to phosphite
Research in plant pathology often relies on testing interactions between a fungicide and a pathogen in vitro and extrapolating from these results what may happen in planta. Likewise, results from glasshouse experiments are used to estimate what will happen if the fungicide is applied in the field. However, it is difficult to obtain conditions in vitro and in the glasshouse which reflect the conditions where the fungicide may eventually be used, in the field.
The aim of this paper is to compare results of the effect of phosphite on P. cinnamomi isolates in vitro and in planta
Visually Managing IPsec
The United States Air Force relies heavily on computer networks to transmit vast amounts of information throughout its organizations and with agencies throughout the Department of Defense. The data take many forms, utilize different protocols, and originate from various platforms and applications. It is not practical to apply security measures specific to individual applications, platforms, and protocols. Internet Protocol Security (IPsec) is a set of protocols designed to secure data traveling over IP networks, including the Internet. By applying security at the network layer of communications, data packets can be secured regardless of what application generated the data or which protocol is used to transport it. However, the complexity of managing IPsec on a production network, particularly using the basic command-line tools available today, is the limiting factor to widespread deployment. This thesis explores several visualizations of IPsec data, evaluates the viability of using visualization to represent and manage IPsec, and proposes an interface for a visual IPsec management application to simplify IPsec management and make this powerful security option more accessible to the information warfighter
- …