5,010 research outputs found

    The Unsuccessful Inquisition in Tudor England

    Full text link
    The Spanish Inquisition was tasked with finding heretics and either returning them to their faith or punishing them for their unfaithfulness. This institution lasted for hundreds of years and prosecuted thousands of cases across the Iberian Peninsula. When Mary Tudor took the throne, she instituted her own, smaller inquisition in her attempts to return her people to the Catholic faith. Yet while the Spanish Inquisition was a secretive organization, the trials and arrests in England were far more public and accessible. Much of the methodology and questioning processes were similar, yet Mary’s Inquisition met great resistance and died with her after only a few years. Martyrs were created from the “poor souls” trapped and killed by Bloody Mary and Bloody Bishop Bonner. Secrecy was the Spanish Inquisition’s main weapon and advantage, and Mary’s Inquisition could not and did not succeed without it

    Instabilities and the roton spectrum of a quasi-1D Bose-Einstein condensed gas with dipole-dipole interactions

    Full text link
    We point out the possibility of having a roton-type excitation spectrum in a quasi-1D Bose-Einstein condensate with dipole-dipole interactions. Normally such a system is quite unstable due to the attractive portion of the dipolar interaction. However, by reversing the sign of the dipolar interaction using either a rotating magnetic field or a laser with circular polarization, a stable cigar-shaped configuration can be achieved whose spectrum contains a `roton' minimum analogous to that found in helium II. Dipolar gases also offer the exciting prospect to tune the depth of this `roton' minimum by directly controlling the interparticle interaction strength. When the minimum touches the zero-energy axis the system is once again unstable, possibly to the formation of a density wave.Comment: 7 pages, 6 figures. Special Issue: "Ultracold Polar Molecules: Formation and Collisions

    A comparison of the in vitro and in planta responses of Phytophthora cinnamomi isolates to phosphite

    Get PDF
    Research in plant pathology often relies on testing interactions between a fungicide and a pathogen in vitro and extrapolating from these results what may happen in planta. Likewise, results from glasshouse experiments are used to estimate what will happen if the fungicide is applied in the field. However, it is difficult to obtain conditions in vitro and in the glasshouse which reflect the conditions where the fungicide may eventually be used, in the field. The aim of this paper is to compare results of the effect of phosphite on P. cinnamomi isolates in vitro and in planta

    Why Not God the Mother?

    Get PDF

    Norman Kretzmann, THE METAPHYSICS OF CREATION: AQUINAS\u27S NATURAL THEOLOGY IN SUMMA CONTRA GENTILES II

    Get PDF

    Norman Kretzmann and Eleonore Stump, eds., THE CAMBRIDGE COMPANION TO AQUINAS

    Get PDF

    Visually Managing IPsec

    Get PDF
    The United States Air Force relies heavily on computer networks to transmit vast amounts of information throughout its organizations and with agencies throughout the Department of Defense. The data take many forms, utilize different protocols, and originate from various platforms and applications. It is not practical to apply security measures specific to individual applications, platforms, and protocols. Internet Protocol Security (IPsec) is a set of protocols designed to secure data traveling over IP networks, including the Internet. By applying security at the network layer of communications, data packets can be secured regardless of what application generated the data or which protocol is used to transport it. However, the complexity of managing IPsec on a production network, particularly using the basic command-line tools available today, is the limiting factor to widespread deployment. This thesis explores several visualizations of IPsec data, evaluates the viability of using visualization to represent and manage IPsec, and proposes an interface for a visual IPsec management application to simplify IPsec management and make this powerful security option more accessible to the information warfighter
    • …
    corecore