Monday, January 27, 2020

Difference Between Operating Systems And Application Software

Difference Between Operating Systems And Application Software What is application software? A  program  or group of programs designed for  end users. Application  software can be divided into two general classes:  systems software  and  applications software. Systems software consists of low-level programs that interact with the  computer  at a very basic level. This includes  operating systems compilers , and  utilities  for managing computer  resources. In contrast, applications software (also called  end-user  programs) includes database  programs,  word processors, and  spreadsheets. Figuratively speaking, applications software sits on top of systems software because it is unable to  run  without the operating system and  system  utilities. There are a lot of terms can be found over the internet related to computer. All type of computer have processor, Memory, keyboard, mouse and screen to display output. But their is a significant difference how people or organizations use computes for their usage. We can divide all type of computers to 6 categories. Personal Computer ,Server Computer, Mainframe Computer , Super Computer, Embedded Computer, Mobile Computer. Operating  Systems Software  designed  to  handle  basic  elements  of  computer  operation,such  as  sending  instructions  to  hardware  devices  like  disk  drives and  computer  screens,  and  allocating  system  resources  such  as memory  to  different  software  applications  being  run.  Given uniformly  designed  operating  systems  that  run  on  many  different computers,  developers  of  software  do  not  need  to  concern themselves  with  these  problems,  and  are  provided  with  a  standard platform  for  new  programs. Application software  is a subclass of  computer software  that employs the capabilities of a computer directly to a task that the user wishes to perform. This should be contrasted with  system software  which is involved in integrating a computers various capabilities, but does not directly apply them in the performance of tasks that benefit the user. Custom Applications The software is tailor-made software.  The software developed to meet all the requirements specified by the user. General Applications This type of software developers to carry out specific tasks in mind the overall requirements.  Many users can use it, because it meets the general requirements. Application software is computer software, which uses a computer the ability to direct and complete the task, users want to run sub-classes. This should be contrasted with system software, the software is the integration of various functions in the computer, but usually not directly applicable to the task, a user-friendly performance. In an application suite usually have a separate application user interface with some common makes it easier for users to learn and use each application. Often they may have some capacity, with people in ways that favor the user. For example, a spreadsheet might be able to document in a word processor, even if it has been in the embedded application to create a separate spreadsheet.  User-written software tailors systems to meet users specific needs. User-written software include spreadsheet templates, word processor macros, scientific simulations, graphics and animation scripts. Users create this software themselves how important it is often overlooked.  In some types of embedded systems, application software and operating system software may be unable to distinguish between users, such as software used to control the VCR, DVD player or microwave oven case. Operating system The use of low-level computer software called the operating system (O / S), to help people build and run their own programs.  Operating system software runs not only in notebook computers, but also mobile phones, network routers and other so-called embedded devices. The type of operating system Operating system is a set of procedures, control application software, the user runs the hardware provided between the collection and the current software running on the computer link.  The operating system is also responsible for the management and control of all resources (memory, hard drives, monitors, etc.) between them may be running different applications at the same time share the work. The most famous of the operating system used on personal computers: -Microsoft Windows -Mac OS X, -Linux, Some operating systems are designed for certain types of equipment, such as Google Android (Linux, a variant), and Symbian the mobile phone The Solaris and HP UX, and dangerous goods UX and other Unix variants for server computers December VM (Virtual Memory System) used to host computer Other operating systems to enjoy the notoriety of the period, but now only historical interest are: Novells Netware is the personal computer 90 in the 20th century, the popular O / S IBMs OS / 2 was an early PC-O / Ss competition with Microsoft Windows for a time, but limited success Multics is a particularly innovative in the mainframe operating system created in the 60s of last century, which affected the future of Unix development. Different between Operating System and Application Software The Operating System is the System Software that makes the Computer work. We can say that an Operating System (OS) is Software that acts as an interface between you and the hardware. It not only contains drivers used to speak the hardwares language, but also offers you a very specific graphical user interface (GUI) to control the computer. An OS can also act as an interface (from the hardware) to the other software. A complex OS like Windows or Linux or Mac OS offers the services of an OS, but also has applications built in. Solitaire, Paint, Messenger, etc. are all applications. Application software is the software that you install onto your Operating System. It consists of the programs that actually let you do things with your computer. These Applications are written to run under the various Operating Systems. These include things like your word processing programs, spread sheets, email clients, web browser, games, etc. Many programs, such as most of the Microsoft Office suite of programs, are written in both Mac and Windows versions, but you still have to have the right version for your OS. So, the operating system of a computer is the software that allows the computer work. It provides the framework under which the applications run. The Operating system of a Computer is the Software that allows the Computer work. It provides the framework under which the Applications run. An operating system is the type of Computer system you have such as Window XP or Window 95, 98, Mac, etc. The applications are the software that actually allows the user to do something with the computer. Without the applications, all you can do is change settings and navigate among the folders.The Applications are the Software that actually allows the user to do something with the Computer. Without the applications, all you can do is change settings and navigate among the folders. You can purchase its CD from a software company or download from a software companys web site. Types of Computer Systems Different  types of computer  systems are nowadays available for different purposes according the user needs.When youll have to  order  yours or even to build it, you should  first  define the  expected use of your computer.This step will help you to  describe  the basic capabilities and know the costs of your system. Example : Personal Computer ,Server Computer, Mainframe Computer , Super Computer, Embeded Computer, Mobile Computer. Supercomputers Supercomputers are the most fastest, and expensive modern computer systems. They are mostly used for intense processing and forecasting such as forecasting the weather, or super high resolution graphics such as ray traced images. Government processes such as immigration clearances, and all other high level functionalities are handled by a supercomputer. Supercomputers are also extensively used in the military to manage and calculate or even analyze full range of information from coordinates to traffic control and even launching systems. Today, the worlds fastest supercomputer was developed by IBM the IBM Roadrunner which runs on 1.026 1.105 Pflops or petaflops and is placed in the Los Alamos National Laboratory, New Mexico USA taking up a space of 6000 square feet. Mainframe computers Mainframe computers are used in large organizations such as insurance companies and banks, where many people frequently need to use the same data. In a traditional mainframe environment, each user accesses the mainframes resources through a terminal (network terminal). There are two kinds of terminal, one is a dumb terminal which does not process or store data, just basic I/O input output and the intelligent terminal which can perform processing operations but these terminals normally do not have any storage. Mainframes are large and powerful systems to handle the processing of thousands of users at any one time. Most large organizations implement mainframes due to their flexibilities in which department computers can be allocated a certain functionality that is related to the department in response to all programs. For instance, an airline company which wishes to sell tickets online through the internet will require to connect their current website interface to a mainframe system. You as the user would then connect to the website or the mainframe system to key in your ticket purchase. Personal computers Microcomputer  designed for use by one person at a time. A typical PC assemblage comprises a  CPU; internal  memory  consisting of  RAM  and  ROM; data storage devices (including a  hard disc, a  floppy disc, or  CD-ROM); and input/output devices (including a display screen, keyboard,  mouse, and  printer). The PC industry began in 1977 when Apple Computer, Inc. (now  Apple Inc.), introduced the Apple II. Radio Shack and Commodore Business Machines also introduced PCs that year.  IBM  entered the PC market in 1981. The IBM PC, with increased memory capacity and backed by IBMs large sales organization, quickly became the industry standard. Apples Macintosh (1984) was particularly useful for  desktop publishing.  Microsoft Corp. introduced MS  Windows(1985), a  graphical user interface  that gave PCs many of the capabilities of the Macintosh, initially as an overlay of  MS-DOS. Windows went on to replace MS-DOS as the dominant  operating syst em  for personal computers. Uses of PCs multiplied as the machines became more powerful and application  software  proliferated. Today, PCs are used for  word processing,  Internet  access, and many other daily tasks. Computer servers Computer servers are among the most important infrastructure in any organization. The basic answer to the question what is a computer server, lies in the name of the term. It is a computer that serves all the computers or terminals, that are connected to it. Applications are stored in this computer and the other computer terminals connected to it, can access it. Although  computer  servers used to only be a part of enterprise networks, servers have now become a part of smaller, home or office networks. Servers can be used for several functions, such as supporting files, backups, security or gaming. For enterprise applications, servers are usually high-powered machines that can handle many requests from clients. Home or small-office servers can be another desktop that is used for file sharing and printing. Embedded Computer An  embedded system  is a special-purpose  computer  system, which is completely encapsulated by the device it controls. An embedded system has specific requirements and performs pre-defined tasks, unlike a general-purpose  personal computer. Programs on an embedded system often must run with  real-time  constraints with limited  hardware  resources: often there is no disk drive, operating system, keyboard or screen. A  flash drive  may replace rotating media, and a small keypad and  LCD  screen may be used instead of a PCs keyboard and screen. Firmware  is the name for  software  that is embedded in hardware devices, e.g. in one or more  ROM/Flash  memory  IC  chips. Embedded systems are routinely expected to maintain 100% reliability while running continuously for long periods of time, sometimes measured in years.  Firmware  is usually developed and tested to much stricter requirements than is general purpose  software  (which can usually be easily restarted if a problem occurs). In addition, because the embedded system may be outside the reach of humans (down an  oil well  borehole, launched into  outer space, etc.), embedded firmware must usually be able to self-restart even if some sort of catastrophic  data corruption  has taken place. This last feature often requires external hardware assistance such as a  watchdog timer  that can automatically restart the system in the event of a software failure. Mobile Computer Mobile computers are computing devices small enough to fit in your hand. A popular type of handheld computer is the personal digital assistant (PDA). A PDA is no larger than a small appointment book and is normally used for special applications such as taking notes, displaying telephone numbers and addresses and keeping track of dates or agendas. Many PDAs can be connected to computers to exchange data. Most PDAs come with a pen (stylus) that allows for handwriting recognition and some even have tiny built-in keyboards or microphones for voice input. A wireless connection (Wi-Fi) can be used to access the internet with a PDA. PDAs in the later part of this century were converted into phones, cameras, music players and GPS. The demands for PDA phones have been in the increase and of late have been mostly replaced by smart-phones that are equipped with much functionality similar to a computer. Conclusion Computers have become very important nowadays because they are accurate, fast and can accomplish many tasks easily. Otherwise to complete those tasks manually much more time is required. It can do very big calculations in just a fraction of a second. Moreover it can store huge amount of data in it. We also get information on different aspects using internet on our computer. O S and A S These provisions are applicable for both software applications and operating systems.   They address program features that must be contained in software for the product to meet the standards.   Because there are many programming languages from which a software producer may select, it is impossible to give specific coding techniques.   In some cases it is possible that a particular programming language may not possess the features necessary to fulfil these requirements.   In those instances, another language for creating the program would most likely have to be considered for the product to meet the standards. Since the invention of computers from first generation and fourth generation computers, they have been classified according to their types and how they operate that is input, process and output information. Below you will get a brief discussion on various types of Computers we have

Sunday, January 19, 2020

Application Assignment: Southern Care Hospital Essay

There are various options for organizing a project. Selecting the organizational structure for your project can be an important step in organizing for success. In your readings, you explored the advantages and disadvantages of various organizational structures. In this Application Assignment, you will explore the role of the project manager and select the appropriate organizational structure for the Southern Care Hospital Project. After reading Chapter 2 of the Mantel text, carefully reread the Southern Care Hospital case study on pages 74–77 and answer the following questions: Describe the primary roles and responsibilities of a project manager. According to (Mantel Jr., Meredith, Shafer, & Sutton, 2011) A project manager is considered a facilitator. The primary role of a project manager is to manage project effectively as it relates to the entire process such as the scope, resource management, budget management, time management, risk management. The success of the project depends on the leadership of the project manager and how well he or she place there team and utilizes their skills. The project manager must ensure that those who work on the project have the appropriate knowledge and resources. A Project Manager position is to coordinate and control the process from start to end. This includes specific functions to perform regular progress checks, to coordinate requirements, to monitor quality, etc. – See more at: http://www.brighthubpm.com/certification/79369-the-general-functions-of-a-project-manager/#sthash.Qs03z2Tb.dpuf How would you recommend the project be organized? Functional Project? Pure Project? Matrix? If one was the project manager on the Southern Care Hospital team one think the Matrix project will work best for this case. Based on the scenario at Southern Care Hospital the strong matrix will work best for their situation because they need quick and accurate decision making in an effort to resolve the issues of decreasing their lead time from three day turnaround to a day and half turn around. The reason for the choice of Matrix is because Strong matrix allows the project manager to be in full control over the project organization, and have full-time project managers with considerable authority and full-time project administrative staff.

Friday, January 10, 2020

Habeas Corpus Essay

Course  Date This essay focuses mainly on the general meaning of the right of habeas corpus according to the U.S constitution, habeas relationship with civil liberties, historical evolution and the American and English traditions of the writ. Sample cases in history of suspension of freedom of habeas corpus and today’s applicability of the writ is also provided. The paper also provides and analysis of the significance of habeas corpus to the current U.S. situation in tackling terrorism. At the same time, it explains interpretation of the right of habeas corpus by the Supreme Court in United States with respect to ‘enemy combatant’ or unlawful combatants. Finally, evaluation of various viewpoints on habeas corpus, expressed by justice of the High Court, Government leaders in other branches and analysts in both popular and academic press is given at the end of the paper. Habeas Corpus is a summon that may be issued to bring a party before a judge or court, having as its function the freeing of the party from illegal control or the citizen’s right to get such a summon. Habeas corpus refers to the legal guide which holds that a prisoner may not be kept in detention without just cause. Habeas writ is a request, issued to the custodian of a person under arrest (prison, official, police, and sheriff). It requires the warden to bring the charged person into court along with whatever evidence the custodian is using to validate continuing the custody (Gregory et al., 2013) The American constitution grants an individual the right to question confinement before a judge. Interestingly; the infringement of the right of habeas corpus has not been the harshest of civil freedoms that have been provided to both citizens in U.S and those of other states. The right of Habeas permits a prisoner to pinpoint the guaranteed that have been during a trial broken upon hence protecting the prisoner. The history of Habeas corpus is ancient. Habeas corpus originated mainly from Anglo-Saxon common law. It came after the 1215 Magna Carta. Since then, the practice  surroundin g the Habeas corpus writ has evolved. The writ from has been obliged to grant an appearance of a detained person to be brought before a judge. Originally the habeas corpus was a ‘privileged writ’ of the King and courts. However, it has evolved over time it has into a prerogative writ started by the person jailed or custodian rather than by the King and courts. The habeas corpus comes from the fact that that the government must either incriminate any accused or set him free. Compared to other civil liberties, the writ of habeas corpus serves the same purpose as freedom of speech. People are provided given the freedom to not only speak the truth, but to also stand in court to provide evidence on some innocence. As well, the entitlement to habeas corpus gives a person privilege to exercise their right to legal representation (Habeas corpus, 2010). The people who founded the constitution knew that the right of habeas corpus was crucial. From personal incidents they had an understanding on how it felt to be viewe d as an enemy combatant, incarcerated indefinitely, and not given the chance to appear before an unbiased judge. In order to eradicate this alarming tool of oppression, the Constitution founders had more resolution to save the Americans from such government abuses. (Rutherford Institute, 2013). The Habeas Corpus was codified by the congress in 1879 in the 14th section of the Judiciary Act. In the U.S history, the habeas corpus has been suspended severally. The habeas corpus has been suspended three times since the Constitution was ratified. In 1861, the first habeas corpus suspension was made. It happened in Maryland state and some regions in Midwestern. It was done by the then President Abraham Lincoln in reply to riots and local militia force action, as well as the threat that Maryland would split from the Union. Through this suspension Lincoln permitted the detention of militia members, war prisoners, and alleged traitors to be kept in captive for the duration of the civil war without trial. The second suspension occurred in the early 1870s during Reconstruction in response by President Ulys ses S. Grant to civil rights violations by the Klan of Ku Klux. It was then restricted to nine counties in South Carolina. President Bush also suspended the right of habeas corpus on 17TH October, 2006. The president passed a given law that suspended the right of habeas corpus to individuals that the government viewed as enemies in the fight against international terror. Several criticisms resulted from this with the law being accused of  failing to determine who is and who not any â€Å"enemy combatant† is (Walker, 2006). The habeas corpus is crucial to the contemporary U.S. situation in the war on terror. In tackling war and terror, people are arrested, and the right of defendants to be charged for war or terror crimes should be put into consideration. The suspects ought to be tried for that crime in a timely manner. The government must justify detention of any person under the right of habeas corpus. They should provide proof of keeping the person under custody. Failure to provide evidence, they must set the captives free. Nevertheless, a controversy occurs on whether the government can simpl y detain the war/terror suspects for long durations of time as â€Å"enemy combatants† without charging them with a particular crime. For years, the importance of the right of habeas corpus has constantly been confirmed by the U.S. Supreme Court. However, there exist some disagreements when it comes to how the court makes an interpretation of the right of habeas corpus with consideration of enemy combatants or unlawful combatants. U.S highest court has come into criticism when it comes to the rights of habeas corpus of enemy combatants. First, the court does not provide perfect or standard definition of who is any enemy combatant and who is not. The court has held contradictory analyses of the Constitution and of actions to be pursued in the case of rights of habeas corpus to illegal combatants. The federal and military court organizations have been given a mandate to handle such case. The 5-4 ruling in Boumediane v. Bush provides a clear scenario of how the Supreme Court interprets the right to habeas corpus. From the rulings of cases in this scenario, even the â€Å"illegal enemy combatants† held in Guanta namo had constitutional right to habeas corpus. In the Guantà ¡namo cases, the government was of the opinion that non-citizens as enemy combatants outside the country have no rights of habeas corpus that the Supreme Court opposed. The Supreme Court held that noncitizens detained by American government in territory over which another country have any rights under the American Constitution. The Supreme Court abides with the constitution that; the habeas corpus freedom shall not be suspended, except in cases of revolution or invasion of the safety of the public. The president as the commander in chief has the power to make effectual use of bestowed forces. The Suspension Clause is not applicable to the President. However, for other reasons the policy of incidental powers does in the  Constitution. He can only do so in actual theatre of war. The president does not have the authority of setting up hearings for the trial and sentence of offenders, whether armed forces or ordinary citizens. The only time he/she can do that is through the sanction of Congress and in cases of taking necessary controls. The congress plays a major role in suspension of the writ of habeas corpus. The Constitution predominately gives powers to the Congress to suspend the habeas writ. It has the power to suspend it through affirmative action. The congress can also suspend the writ through an express delegation to the Executive. The Executive is not authorized to suspend the writ of habeas corpus. Such suspension can occur in cases of civil war when state prisoners are held in custody violation of the federal law (Latima, 2011). The Supreme Court plays an important role in the protection of civil liberties, including the judicial philosophy. If the Supreme Court believes that the acts of the elected branches in judiciary violate the Constitution, it has the power to overturn them. By so doing, the Supreme Court can attempt to prevent the selected branches from infringing civil liberties. One such scenario is the Boumediene v. Bush. In this case, through its laws, the Supreme Court suspended the privilege to habeas corpus for persons who were considered to be illegal combatants i n the war on terror. Such actions are the manifestation of the role played by Supreme Court in fulfilling the role of protecting civil liberties. There is a very huge paradox when it comes to looking at civil liberties and harmonization with the state security (Brysk, 2007). For example, detaining a terror suspect for years seems fit for the state but at the same time unconstitutional. In the fight against terror, striking a balance between the liberties of individuals and a call for effective investigation is not easy. It is a very difficult balancing act. In the quest to disrupt and deter terrorism, protection of the civil liberties and the constitutional rights of all Americans is required. One cannot achieve each without the other and they must be done both and do them very well. In summary, there is need of proper understanding of the habeas corpus and the constitution as well. Since the enactment of habeas corpus Clause has been a center of controversies day in day out. It is the high time the issue is taken keenly and solved once and for all. Apart from proper understanding of the habeas corpus, amendment should be done to factor in all stakeholders and reduce  the criticisms. References Habeas corpus: From England to empire. (2010). Cambridge, Mass: Belknap Press Gregory, Anthony. 2013. The power of habeas corpus in America: from the King’s Prerogative to the War on Terror Latimer, C. P. (2011). Civil liberties and the state: A documentary and reference guide. Santa Barbara, Calif: Greenwood In Brysk, A. (2007). National Insecurity and Human Rights: Democracies Debate Counterterrorism. Berkeley, Calif: California University Press Walker, R. S. (2006). Habeas corpus writ of liberty: English and American origins and development ; being a reprint of The Constitutional and Legal Development of Habeas Corpus as the Writ of Liberty, together with 2006 revised edition, The American Reception of the Writ of Liberty. S.l.: BookSurge

Thursday, January 2, 2020

Ahmose Tempest Stela - Weather Report in Ancient Egypt

The Ahmose Tempest Stele is a block of calcite with ancient Egyptian hieroglyphs carved into it. Dated to the early New Kingdom in Egypt, the block is a genre of art similar to political propaganda used by many rulers in many different societies--a decorated carving meant to extol the glorious and/or heroic deeds of a ruler. The Tempest Steles main purpose, so it seems, is to report on the efforts of Pharaoh Ahmose I to restore Egypt to its former glory after a cataclysmic disaster. However, what makes the Tempest Stele so interesting to us today, is that some scholars believe that the disaster described on the stone is the after-effects of the volcanic eruption of the Thera volcano, which decimated the Mediterranean island of Santorini and pretty much ended the Minoan culture. The tying of the story on the stone to the Santorini eruption is a crucial piece of evidence nailing down the still-debated dates of the rise of the New Kingdom and the Mediterranean Late Bronze Age in general. The Tempest Stone The Ahmose Tempest Stele was erected at Thebes by Ahmose, the founding pharaoh of the 18th dynasty of Egypt, who ruled between 1550-1525 BC (according to the so-called High Chronology) or between 1539-1514 BC (Low Chronology). Ahmose and his family, including his elder brother Kamose and their father Sequenenre, are credited with ending the rule of the mysterious Asiatic group called the Hyksos, and reuniting Upper (south) and Lower (north including the Nile delta) Egypt. Together they founded what would become the pinnacle of ancient Egyptian culture known as the New Kingdom. The stele is a calcite block that once stood over 1.8 meters tall (or about 6 feet). Eventually it was broken into pieces and used as fill in the Third Pylon of the Karnak Temple of Amenhotep IV, that pylon known to have been erected in 1384 BC. The pieces were found found, reconstructed and translated by Belgian archaeologist Claude Vandersleyen [born 1927]. Vandersleyen published a partial translation and interpretation in 1967, the first of several translations. The text of the Ahmose Tempest Stele is in Egyptian hieroglyphic script, inscribed into both sides of the stele. The front side was also painted with red horizontal lines and incised hieroglyphs highlighted in blue pigment, although the reverse side is unpainted. There are 18 lines of text on the front and 21 on the back. Above each text is a lunette, a half-moon shape filled with dual images of the king and fertility symbols. The Text The text begins with a standard string of titles for Ahmose I, including a reference to his divine appointment by the god Ra. Ahmose was residing in the town of Sedjefatawy, so reads the stone, and he traveled south to Thebes, to visit Karnak. After his visit, he returned south and while he was traveling away from Thebes, a tremendous storm blew up, with devastating effects throughout the entire country. The storm is said to have lasted for several days, with bellowing noises louder than the cataracts at Elephantine, torrential rainstorms, and an intense darkness, so dark that not even a torch could relieve it. The driving rains damaged chapels and temples and washed houses, construction debris, and corpses into the Nile where they are described as bobbing like papyrus boats. Theres also a reference to both sides of the Nile being stripped bare of clothing, a reference that has lots of interpretations. The most extensive section of the stele describes the kings actions to remedy the destruction, to restablish the Two Lands of Egypt and provide the flooded territories with silver, gold, oil and cloth. When he finally arrives in Thebes, Ahmose is told that the tomb chambers and monuments have been damaged and some have collapsed. He orders that the people restore the monuments, shore up the chambers, replace the contents of the shrines and double the wages of the personnel, in order to return the land to its former state. And so it is completed. The Controversy Controversies among the scholarly community focus on the translations, the meaning of the storm, and the date of the events described on the stele. Some scholars are certain the storm refers to the after-effects of the Santorini eruption. Others believe that the description is literary hyperbole, propaganda to glorify the pharaoh and his works. Others still interpret its meaning as metaphorical, referring to a storm of Hyksos warriors and the great battles that occurred to chase them out of lower Egypt. To these scholars, the storm is interpreted as a metaphor for Ahmose restoring order from the social and political chaos of the second Intermediate period, when the Hyksos ruled the north end of Egypt. The most recent translation, from Ritner and colleagues in 2014, points out that although there are a handful of texts referring to Hyksos as a metaphorical storm, the Tempest Stele is the only one that includes clear descriptions of meteorological anomalies including rain storms and floods. Ahmose himself, of course, believed the storm was the result of the great displeasure of the gods for his leaving Thebes: his rightful location for the rule over both Upper and Lower Egypt. Sources This article is a part of the About.com guide to Ancient Egypt  and the Dictionary of Archaeology. Bietak M. 2014. Radiocarbon and the date of the Thera eruption. Antiquity 88(339):277-282. Foster KP, Ritner RK, and Foster BR. 1996. Texts, Storms, and the Thera Eruption. Journal of Near Eastern Studies 55(1):1-14. Manning SW, Hà ¶flmayer F, Moeller N, Dee MW, Bronk Ramsey C, Fleitmann D, Higham T, Kutschera W, and Wild EM. 2014. Dating the Thera (Santorini) eruption: archaeological and scientific evidence supporting a high chronology. Antiquity 88(342):1164-1179. Popko L. 2013. Late Second Intermediate Period to Early New Kingdom. In: Wendrich W, Dieleman J, Frood E, and Grajetzki W, editors. UCLA Encyclopedia of Egtypology. Los Angeles: UCLA. Ritner RK, and Moeller N. 2014. The Ahmose ‘Tempest Stela’, Thera and Comparative Chronology. Journal of Near Eastern Studies 73(1):1-19. Schneider T. 2010. A theophany of Seth-Baal in the Tempest Stele. Ägypten und Levante / Egypt and the Levant 20:405-409. Wiener MH, and Allen JP. 1998. Separate Lives: The Ahmose Tempest Stela and the Theran Eruption. Journal of Near Eastern Studies 57(1):1-28.