Monday, January 27, 2020
Difference Between Operating Systems And Application Software
Difference Between Operating Systems And Application Software What is application software? Aà programà or group of programs designed forà end users. Applicationà software can be divided into two general classes:à systems softwareà andà applications software. Systems software consists of low-level programs that interact with theà computerà at a very basic level. This includesà operating systems compilers , andà utilitiesà for managing computerà resources. In contrast, applications software (also calledà end-userà programs) includes databaseà programs,à word processors, andà spreadsheets. Figuratively speaking, applications software sits on top of systems software because it is unable toà runà without the operating system andà systemà utilities. There are a lot of terms can be found over the internet related to computer. All type of computer have processor, Memory, keyboard, mouse and screen to display output. But their is a significant difference how people or organizations use computes for their usage. We can divide all type of computers to 6 categories. Personal Computer ,Server Computer, Mainframe Computer , Super Computer, Embedded Computer, Mobile Computer. Operatingà Systems Softwareà designedà toà handleà basicà elementsà ofà computerà operation,suchà asà sendingà instructionsà toà hardwareà devicesà likeà diskà drives andà computerà screens,à andà allocatingà systemà resourcesà suchà as memoryà toà differentà softwareà applicationsà beingà run.à Given uniformlyà designedà operatingà systemsà thatà runà onà manyà different computers,à developersà ofà softwareà doà notà needà toà concern themselvesà withà theseà problems,à andà areà providedà withà aà standard platformà forà newà programs. Application softwareà is a subclass ofà computer softwareà that employs the capabilities of a computer directly to a task that the user wishes to perform. This should be contrasted withà system softwareà which is involved in integrating a computers various capabilities, but does not directly apply them in the performance of tasks that benefit the user. Custom Applications The software is tailor-made software.à The software developed to meet all the requirements specified by the user. General Applications This type of software developers to carry out specific tasks in mind the overall requirements.à Many users can use it, because it meets the general requirements. Application software is computer software, which uses a computer the ability to direct and complete the task, users want to run sub-classes. This should be contrasted with system software, the software is the integration of various functions in the computer, but usually not directly applicable to the task, a user-friendly performance. In an application suite usually have a separate application user interface with some common makes it easier for users to learn and use each application. Often they may have some capacity, with people in ways that favor the user. For example, a spreadsheet might be able to document in a word processor, even if it has been in the embedded application to create a separate spreadsheet.à User-written software tailors systems to meet users specific needs. User-written software include spreadsheet templates, word processor macros, scientific simulations, graphics and animation scripts. Users create this software themselves how important it is often overlooked.à In some types of embedded systems, application software and operating system software may be unable to distinguish between users, such as software used to control the VCR, DVD player or microwave oven case. Operating system The use of low-level computer software called the operating system (O / S), to help people build and run their own programs.à Operating system software runs not only in notebook computers, but also mobile phones, network routers and other so-called embedded devices. The type of operating system Operating system is a set of procedures, control application software, the user runs the hardware provided between the collection and the current software running on the computer link.à The operating system is also responsible for the management and control of all resources (memory, hard drives, monitors, etc.) between them may be running different applications at the same time share the work. The most famous of the operating system used on personal computers: -Microsoft Windows -Mac OS X, -Linux, Some operating systems are designed for certain types of equipment, such as Google Android (Linux, a variant), and Symbian the mobile phone The Solaris and HP UX, and dangerous goods UX and other Unix variants for server computers December VM (Virtual Memory System) used to host computer Other operating systems to enjoy the notoriety of the period, but now only historical interest are: Novells Netware is the personal computer 90 in the 20th century, the popular O / S IBMs OS / 2 was an early PC-O / Ss competition with Microsoft Windows for a time, but limited success Multics is a particularly innovative in the mainframe operating system created in the 60s of last century, which affected the future of Unix development. Different between Operating System and Application Software The Operating System is the System Software that makes the Computer work. We can say that an Operating System (OS) is Software that acts as an interface between you and the hardware. It not only contains drivers used to speak the hardwares language, but also offers you a very specific graphical user interface (GUI) to control the computer. An OS can also act as an interface (from the hardware) to the other software. A complex OS like Windows or Linux or Mac OS offers the services of an OS, but also has applications built in. Solitaire, Paint, Messenger, etc. are all applications. Application software is the software that you install onto your Operating System. It consists of the programs that actually let you do things with your computer. These Applications are written to run under the various Operating Systems. These include things like your word processing programs, spread sheets, email clients, web browser, games, etc. Many programs, such as most of the Microsoft Office suite of programs, are written in both Mac and Windows versions, but you still have to have the right version for your OS. So, the operating system of a computer is the software that allows the computer work. It provides the framework under which the applications run. The Operating system of a Computer is the Software that allows the Computer work. It provides the framework under which the Applications run. An operating system is the type of Computer system you have such as Window XP or Window 95, 98, Mac, etc. The applications are the software that actually allows the user to do something with the computer. Without the applications, all you can do is change settings and navigate among the folders.The Applications are the Software that actually allows the user to do something with the Computer. Without the applications, all you can do is change settings and navigate among the folders. You can purchase its CD from a software company or download from a software companys web site. Types of Computer Systems Differentà types of computerà systems are nowadays available for different purposes according the user needs.When youll have toà orderà yours or even to build it, you shouldà firstà define theà expected use of your computer.This step will help you toà describeà the basic capabilities and know the costs of your system. Example : Personal Computer ,Server Computer, Mainframe Computer , Super Computer, Embeded Computer, Mobile Computer. Supercomputers Supercomputers are the most fastest, and expensive modern computer systems. They are mostly used for intense processing and forecasting such as forecasting the weather, or super high resolution graphics such as ray traced images. Government processes such as immigration clearances, and all other high level functionalities are handled by a supercomputer. Supercomputers are also extensively used in the military to manage and calculate or even analyze full range of information from coordinates to traffic control and even launching systems. Today, the worlds fastest supercomputer was developed by IBM the IBM Roadrunner which runs on 1.026 1.105 Pflops or petaflops and is placed in the Los Alamos National Laboratory, New Mexico USA taking up a space of 6000 square feet. Mainframe computers Mainframe computers are used in large organizations such as insurance companies and banks, where many people frequently need to use the same data. In a traditional mainframe environment, each user accesses the mainframes resources through a terminal (network terminal). There are two kinds of terminal, one is a dumb terminal which does not process or store data, just basic I/O input output and the intelligent terminal which can perform processing operations but these terminals normally do not have any storage. Mainframes are large and powerful systems to handle the processing of thousands of users at any one time. Most large organizations implement mainframes due to their flexibilities in which department computers can be allocated a certain functionality that is related to the department in response to all programs. For instance, an airline company which wishes to sell tickets online through the internet will require to connect their current website interface to a mainframe system. You as the user would then connect to the website or the mainframe system to key in your ticket purchase. Personal computers Microcomputerà designed for use by one person at a time. A typical PC assemblage comprises aà CPU; internalà memoryà consisting ofà RAMà andà ROM; data storage devices (including aà hard disc, aà floppy disc, orà CD-ROM); and input/output devices (including a display screen, keyboard,à mouse, andà printer). The PC industry began in 1977 when Apple Computer, Inc. (nowà Apple Inc.), introduced the Apple II. Radio Shack and Commodore Business Machines also introduced PCs that year.à IBMà entered the PC market in 1981. The IBM PC, with increased memory capacity and backed by IBMs large sales organization, quickly became the industry standard. Apples Macintosh (1984) was particularly useful forà desktop publishing.à Microsoft Corp. introduced MSà Windows(1985), aà graphical user interfaceà that gave PCs many of the capabilities of the Macintosh, initially as an overlay ofà MS-DOS. Windows went on to replace MS-DOS as the dominantà operating syst emà for personal computers. Uses of PCs multiplied as the machines became more powerful and applicationà softwareà proliferated. Today, PCs are used forà word processing,à Internetà access, and many other daily tasks. Computer servers Computer servers are among the most important infrastructure in any organization. The basic answer to the question what is a computer server, lies in the name of the term. It is a computer that serves all the computers or terminals, that are connected to it. Applications are stored in this computer and the other computer terminals connected to it, can access it. Althoughà computerà servers used to only be a part of enterprise networks, servers have now become a part of smaller, home or office networks. Servers can be used for several functions, such as supporting files, backups, security or gaming. For enterprise applications, servers are usually high-powered machines that can handle many requests from clients. Home or small-office servers can be another desktop that is used for file sharing and printing. Embedded Computer Anà embedded systemà is a special-purposeà computerà system, which is completely encapsulated by the device it controls. An embedded system has specific requirements and performs pre-defined tasks, unlike a general-purposeà personal computer. Programs on an embedded system often must run withà real-timeà constraints with limitedà hardwareà resources: often there is no disk drive, operating system, keyboard or screen. Aà flash driveà may replace rotating media, and a small keypad andà LCDà screen may be used instead of a PCs keyboard and screen. Firmwareà is the name forà softwareà that is embedded in hardware devices, e.g. in one or moreà ROM/Flashà memoryà ICà chips. Embedded systems are routinely expected to maintain 100% reliability while running continuously for long periods of time, sometimes measured in years.à Firmwareà is usually developed and tested to much stricter requirements than is general purposeà softwareà (which can usually be easily restarted if a problem occurs). In addition, because the embedded system may be outside the reach of humans (down anà oil wellà borehole, launched intoà outer space, etc.), embedded firmware must usually be able to self-restart even if some sort of catastrophicà data corruptionà has taken place. This last feature often requires external hardware assistance such as aà watchdog timerà that can automatically restart the system in the event of a software failure. Mobile Computer Mobile computers are computing devices small enough to fit in your hand. A popular type of handheld computer is the personal digital assistant (PDA). A PDA is no larger than a small appointment book and is normally used for special applications such as taking notes, displaying telephone numbers and addresses and keeping track of dates or agendas. Many PDAs can be connected to computers to exchange data. Most PDAs come with a pen (stylus) that allows for handwriting recognition and some even have tiny built-in keyboards or microphones for voice input. A wireless connection (Wi-Fi) can be used to access the internet with a PDA. PDAs in the later part of this century were converted into phones, cameras, music players and GPS. The demands for PDA phones have been in the increase and of late have been mostly replaced by smart-phones that are equipped with much functionality similar to a computer. Conclusion Computers have become very important nowadays because they are accurate, fast and can accomplish many tasks easily. Otherwise to complete those tasks manually much more time is required. It can do very big calculations in just a fraction of a second. Moreover it can store huge amount of data in it. We also get information on different aspects using internet on our computer. O S and A S These provisions are applicable for both software applications and operating systems.à They address program features that must be contained in software for the product to meet the standards.à Because there are many programming languages from which a software producer may select, it is impossible to give specific coding techniques.à In some cases it is possible that a particular programming language may not possess the features necessary to fulfil these requirements.à In those instances, another language for creating the program would most likely have to be considered for the product to meet the standards. Since the invention of computers from first generation and fourth generation computers, they have been classified according to their types and how they operate that is input, process and output information. Below you will get a brief discussion on various types of Computers we have
Sunday, January 19, 2020
Application Assignment: Southern Care Hospital Essay
There are various options for organizing a project. Selecting the organizational structure for your project can be an important step in organizing for success. In your readings, you explored the advantages and disadvantages of various organizational structures. In this Application Assignment, you will explore the role of the project manager and select the appropriate organizational structure for the Southern Care Hospital Project. After reading Chapter 2 of the Mantel text, carefully reread the Southern Care Hospital case study on pages 74ââ¬â77 and answer the following questions: Describe the primary roles and responsibilities of a project manager. According to (Mantel Jr., Meredith, Shafer, & Sutton, 2011) A project manager is considered a facilitator. The primary role of a project manager is to manage project effectively as it relates to the entire process such as the scope, resource management, budget management, time management, risk management. The success of the project depends on the leadership of the project manager and how well he or she place there team and utilizes their skills. The project manager must ensure that those who work on the project have the appropriate knowledge and resources. A Project Manager position is to coordinate and control the process from start to end. This includes specific functions to perform regular progress checks, to coordinate requirements, to monitor quality, etc. ââ¬â See more at: http://www.brighthubpm.com/certification/79369-the-general-functions-of-a-project-manager/#sthash.Qs03z2Tb.dpuf How would you recommend the project be organized? Functional Project? Pure Project? Matrix? If one was the project manager on the Southern Care Hospital team one think the Matrix project will work best for this case. Based on the scenario at Southern Care Hospital the strong matrix will work best for their situation because they need quick and accurate decision making in an effort to resolve the issues of decreasing their lead time from three day turnaround to a day and half turn around. The reason for the choice of Matrix is because Strong matrix allows the project manager to be in full control over the project organization, and have full-time project managers with considerable authority and full-time project administrative staff.
Friday, January 10, 2020
Habeas Corpus Essay
Courseà Date This essay focuses mainly on the general meaning of the right of habeas corpus according to the U.S constitution, habeas relationship with civil liberties, historical evolution and the American and English traditions of the writ. Sample cases in history of suspension of freedom of habeas corpus and todayââ¬â¢s applicability of the writ is also provided. The paper also provides and analysis of the significance of habeas corpus to the current U.S. situation in tackling terrorism. At the same time, it explains interpretation of the right of habeas corpus by the Supreme Court in United States with respect to ââ¬Ëenemy combatantââ¬â¢ or unlawful combatants. Finally, evaluation of various viewpoints on habeas corpus, expressed by justice of the High Court, Government leaders in other branches and analysts in both popular and academic press is given at the end of the paper. Habeas Corpus is a summon that may be issued to bring a party before a judge or court, having as its function the freeing of the party from illegal control or the citizenââ¬â¢s right to get such a summon. Habeas corpus refers to the legal guide which holds that a prisoner may not be kept in detention without just cause. Habeas writ is a request, issued to the custodian of a person under arrest (prison, official, police, and sheriff). It requires the warden to bring the charged person into court along with whatever evidence the custodian is using to validate continuing the custody (Gregory et al., 2013) The American constitution grants an individual the right to question confinement before a judge. Interestingly; the infringement of the right of habeas corpus has not been the harshest of civil freedoms that have been provided to both citizens in U.S and those of other states. The right of Habeas permits a prisoner to pinpoint the guaranteed that have been during a trial broken upon hence protecting the prisoner. The history of Habeas corpus is ancient. Habeas corpus originated mainly from Anglo-Saxon common law. It came after the 1215 Magna Carta. Since then, the practiceà surroundin g the Habeas corpus writ has evolved. The writ from has been obliged to grant an appearance of a detained person to be brought before a judge. Originally the habeas corpus was a ââ¬Ëprivileged writââ¬â¢ of the King and courts. However, it has evolved over time it has into a prerogative writ started by the person jailed or custodian rather than by the King and courts. The habeas corpus comes from the fact that that the government must either incriminate any accused or set him free. Compared to other civil liberties, the writ of habeas corpus serves the same purpose as freedom of speech. People are provided given the freedom to not only speak the truth, but to also stand in court to provide evidence on some innocence. As well, the entitlement to habeas corpus gives a person privilege to exercise their right to legal representation (Habeas corpus, 2010). The people who founded the constitution knew that the right of habeas corpus was crucial. From personal incidents they had an understanding on how it felt to be viewe d as an enemy combatant, incarcerated indefinitely, and not given the chance to appear before an unbiased judge. In order to eradicate this alarming tool of oppression, the Constitution founders had more resolution to save the Americans from such government abuses. (Rutherford Institute, 2013). The Habeas Corpus was codified by the congress in 1879 in the 14th section of the Judiciary Act. In the U.S history, the habeas corpus has been suspended severally. The habeas corpus has been suspended three times since the Constitution was ratified. In 1861, the first habeas corpus suspension was made. It happened in Maryland state and some regions in Midwestern. It was done by the then President Abraham Lincoln in reply to riots and local militia force action, as well as the threat that Maryland would split from the Union. Through this suspension Lincoln permitted the detention of militia members, war prisoners, and alleged traitors to be kept in captive for the duration of the civil war without trial. The second suspension occurred in the early 1870s during Reconstruction in response by President Ulys ses S. Grant to civil rights violations by the Klan of Ku Klux. It was then restricted to nine counties in South Carolina. President Bush also suspended the right of habeas corpus on 17TH October, 2006. The president passed a given law that suspended the right of habeas corpus to individuals that the government viewed as enemies in the fight against international terror. Several criticisms resulted from this with the law being accused ofà failing to determine who is and who not any ââ¬Å"enemy combatantâ⬠is (Walker, 2006). The habeas corpus is crucial to the contemporary U.S. situation in the war on terror. In tackling war and terror, people are arrested, and the right of defendants to be charged for war or terror crimes should be put into consideration. The suspects ought to be tried for that crime in a timely manner. The government must justify detention of any person under the right of habeas corpus. They should provide proof of keeping the person under custody. Failure to provide evidence, they must set the captives free. Nevertheless, a controversy occurs on whether the government can simpl y detain the war/terror suspects for long durations of time as ââ¬Å"enemy combatantsâ⬠without charging them with a particular crime. For years, the importance of the right of habeas corpus has constantly been confirmed by the U.S. Supreme Court. However, there exist some disagreements when it comes to how the court makes an interpretation of the right of habeas corpus with consideration of enemy combatants or unlawful combatants. U.S highest court has come into criticism when it comes to the rights of habeas corpus of enemy combatants. First, the court does not provide perfect or standard definition of who is any enemy combatant and who is not. The court has held contradictory analyses of the Constitution and of actions to be pursued in the case of rights of habeas corpus to illegal combatants. The federal and military court organizations have been given a mandate to handle such case. The 5-4 ruling in Boumediane v. Bush provides a clear scenario of how the Supreme Court interprets the right to habeas corpus. From the rulings of cases in this scenario, even the ââ¬Å"illegal enemy combatantsâ⬠held in Guanta namo had constitutional right to habeas corpus. In the Guantà ¡namo cases, the government was of the opinion that non-citizens as enemy combatants outside the country have no rights of habeas corpus that the Supreme Court opposed. The Supreme Court held that noncitizens detained by American government in territory over which another country have any rights under the American Constitution. The Supreme Court abides with the constitution that; the habeas corpus freedom shall not be suspended, except in cases of revolution or invasion of the safety of the public. The president as the commander in chief has the power to make effectual use of bestowed forces. The Suspension Clause is not applicable to the President. However, for other reasons the policy of incidental powers does in theà Constitution. He can only do so in actual theatre of war. The president does not have the authority of setting up hearings for the trial and sentence of offenders, whether armed forces or ordinary citizens. The only time he/she can do that is through the sanction of Congress and in cases of taking necessary controls. The congress plays a major role in suspension of the writ of habeas corpus. The Constitution predominately gives powers to the Congress to suspend the habeas writ. It has the power to suspend it through affirmative action. The congress can also suspend the writ through an express delegation to the Executive. The Executive is not authorized to suspend the writ of habeas corpus. Such suspension can occur in cases of civil war when state prisoners are held in custody violation of the federal law (Latima, 2011). The Supreme Court plays an important role in the protection of civil liberties, including the judicial philosophy. If the Supreme Court believes that the acts of the elected branches in judiciary violate the Constitution, it has the power to overturn them. By so doing, the Supreme Court can attempt to prevent the selected branches from infringing civil liberties. One such scenario is the Boumediene v. Bush. In this case, through its laws, the Supreme Court suspended the privilege to habeas corpus for persons who were considered to be illegal combatants i n the war on terror. Such actions are the manifestation of the role played by Supreme Court in fulfilling the role of protecting civil liberties. There is a very huge paradox when it comes to looking at civil liberties and harmonization with the state security (Brysk, 2007). For example, detaining a terror suspect for years seems fit for the state but at the same time unconstitutional. In the fight against terror, striking a balance between the liberties of individuals and a call for effective investigation is not easy. It is a very difficult balancing act. In the quest to disrupt and deter terrorism, protection of the civil liberties and the constitutional rights of all Americans is required. One cannot achieve each without the other and they must be done both and do them very well. In summary, there is need of proper understanding of the habeas corpus and the constitution as well. Since the enactment of habeas corpus Clause has been a center of controversies day in day out. It is the high time the issue is taken keenly and solved once and for all. Apart from proper understanding of the habeas corpus, amendment should be done to factor in all stakeholders and reduceà the criticisms. References Habeas corpus: From England to empire. (2010). Cambridge, Mass: Belknap Press Gregory, Anthony. 2013. The power of habeas corpus in America: from the Kingââ¬â¢s Prerogative to the War on Terror Latimer, C. P. (2011). Civil liberties and the state: A documentary and reference guide. Santa Barbara, Calif: Greenwood In Brysk, A. (2007). National Insecurity and Human Rights: Democracies Debate Counterterrorism. Berkeley, Calif: California University Press Walker, R. S. (2006). Habeas corpus writ of liberty: English and American origins and development ; being a reprint of The Constitutional and Legal Development of Habeas Corpus as the Writ of Liberty, together with 2006 revised edition, The American Reception of the Writ of Liberty. S.l.: BookSurge
Thursday, January 2, 2020
Ahmose Tempest Stela - Weather Report in Ancient Egypt
The Ahmose Tempest Stele is a block of calcite with ancient Egyptian hieroglyphs carved into it. Dated to the early New Kingdom in Egypt, the block is a genre of art similar to political propaganda used by many rulers in many different societies--a decorated carving meant to extol the glorious and/or heroic deeds of a ruler. The Tempest Steles main purpose, so it seems, is to report on the efforts of Pharaoh Ahmose I to restore Egypt to its former glory after a cataclysmic disaster. However, what makes the Tempest Stele so interesting to us today, is that some scholars believe that the disaster described on the stone is the after-effects of the volcanic eruption of the Thera volcano, which decimated the Mediterranean island of Santorini and pretty much ended the Minoan culture. The tying of the story on the stone to the Santorini eruption is a crucial piece of evidence nailing down the still-debated dates of the rise of the New Kingdom and the Mediterranean Late Bronze Age in general. The Tempest Stone The Ahmose Tempest Stele was erected at Thebes by Ahmose, the founding pharaoh of the 18th dynasty of Egypt, who ruled between 1550-1525 BC (according to the so-called High Chronology) or between 1539-1514 BC (Low Chronology). Ahmose and his family, including his elder brother Kamose and their father Sequenenre, are credited with ending the rule of the mysterious Asiatic group called the Hyksos, and reuniting Upper (south) and Lower (north including the Nile delta) Egypt. Together they founded what would become the pinnacle of ancient Egyptian culture known as the New Kingdom. The stele is a calcite block that once stood over 1.8 meters tall (or about 6 feet). Eventually it was broken into pieces and used as fill in the Third Pylon of the Karnak Temple of Amenhotep IV, that pylon known to have been erected in 1384 BC. The pieces were found found, reconstructed and translated by Belgian archaeologist Claude Vandersleyen [born 1927]. Vandersleyen published a partial translation and interpretation in 1967, the first of several translations. The text of the Ahmose Tempest Stele is in Egyptian hieroglyphic script, inscribed into both sides of the stele. The front side was also painted with red horizontal lines and incised hieroglyphs highlighted in blue pigment, although the reverse side is unpainted. There are 18 lines of text on the front and 21 on the back. Above each text is a lunette, a half-moon shape filled with dual images of the king and fertility symbols. The Text The text begins with a standard string of titles for Ahmose I, including a reference to his divine appointment by the god Ra. Ahmose was residing in the town of Sedjefatawy, so reads the stone, and he traveled south to Thebes, to visit Karnak. After his visit, he returned south and while he was traveling away from Thebes, a tremendous storm blew up, with devastating effects throughout the entire country. The storm is said to have lasted for several days, with bellowing noises louder than the cataracts at Elephantine, torrential rainstorms, and an intense darkness, so dark that not even a torch could relieve it. The driving rains damaged chapels and temples and washed houses, construction debris, and corpses into the Nile where they are described as bobbing like papyrus boats. Theres also a reference to both sides of the Nile being stripped bare of clothing, a reference that has lots of interpretations. The most extensive section of the stele describes the kings actions to remedy the destruction, to restablish the Two Lands of Egypt and provide the flooded territories with silver, gold, oil and cloth. When he finally arrives in Thebes, Ahmose is told that the tomb chambers and monuments have been damaged and some have collapsed. He orders that the people restore the monuments, shore up the chambers, replace the contents of the shrines and double the wages of the personnel, in order to return the land to its former state. And so it is completed. The Controversy Controversies among the scholarly community focus on the translations, the meaning of the storm, and the date of the events described on the stele. Some scholars are certain the storm refers to the after-effects of the Santorini eruption. Others believe that the description is literary hyperbole, propaganda to glorify the pharaoh and his works. Others still interpret its meaning as metaphorical, referring to a storm of Hyksos warriors and the great battles that occurred to chase them out of lower Egypt. To these scholars, the storm is interpreted as a metaphor for Ahmose restoring order from the social and political chaos of the second Intermediate period, when the Hyksos ruled the north end of Egypt. The most recent translation, from Ritner and colleagues in 2014, points out that although there are a handful of texts referring to Hyksos as a metaphorical storm, the Tempest Stele is the only one that includes clear descriptions of meteorological anomalies including rain storms and floods. Ahmose himself, of course, believed the storm was the result of the great displeasure of the gods for his leaving Thebes: his rightful location for the rule over both Upper and Lower Egypt. Sources This article is a part of the About.com guide to Ancient Egyptà and the Dictionary of Archaeology. Bietak M. 2014. Radiocarbon and the date of the Thera eruption. Antiquity 88(339):277-282. Foster KP, Ritner RK, and Foster BR. 1996. Texts, Storms, and the Thera Eruption. Journal of Near Eastern Studies 55(1):1-14. Manning SW, Hà ¶flmayer F, Moeller N, Dee MW, Bronk Ramsey C, Fleitmann D, Higham T, Kutschera W, and Wild EM. 2014. Dating the Thera (Santorini) eruption: archaeological and scientific evidence supporting a high chronology. Antiquity 88(342):1164-1179. Popko L. 2013. Late Second Intermediate Period to Early New Kingdom. In: Wendrich W, Dieleman J, Frood E, and Grajetzki W, editors. UCLA Encyclopedia of Egtypology. Los Angeles: UCLA. Ritner RK, and Moeller N. 2014. The Ahmose ââ¬ËTempest Stelaââ¬â¢, Thera and Comparative Chronology. Journal of Near Eastern Studies 73(1):1-19. Schneider T. 2010. A theophany of Seth-Baal in the Tempest Stele. Ãâgypten und Levante / Egypt and the Levant 20:405-409. Wiener MH, and Allen JP. 1998. Separate Lives: The Ahmose Tempest Stela and the Theran Eruption. Journal of Near Eastern Studies 57(1):1-28.
Subscribe to:
Posts (Atom)