background preloader

Medieval Sourcebook

Update Information 2006: In 2006 the Internet Medieval Sourcebooks and associated sourcebooks are undergoing a major overhaul to remove bad links and add more documents. 2. 2. 3. Note: This site aims to present medieval sources. Sourcebook Contents The Internet Medieval Sourcebook is organized as three main index pages, with a number of supplementary documents. Selected Sources This is the main entry to the resources here. Full Text Sources Full texts of medieval sources arranged according to type. Saints' Lives Devoted to Ancient, Medieval and Byzantine hagiographical sources. Supplementary Documents Help! Search the Sourcebook Search the full texts of all the Sourcebook texts physically located on Fordham servers, at ORB, or selected ancient, late antique, and medieval text databases. Sourcebook Accessions A listing of primary sources in all parts of the site in order of accession. Livre des Sources Médiévales A Section of the Sourcebook devoted to texts available in French.

Lisa Gold: Research Maven Main Page The Internet Ancient History Sourcebook has expanded greatly since its creation, and now contains hundred of local files as well as links to source texts throughout the net. See Introduction for an explanation of the Sourcebook's goals. See the Help! The Ancient History Sourcebook works as follows: This Main Index page [this page] shows all sections and sub sections. To access the sub-section pages , simply browse the sections below and select the highlighted (white text with blue background) section title on the left. In addition there are two navigation bars on the left of each page for every sub-section The top - and smaller - navigation bar directs you to the other main parts of the Sourcebook - this overall Index page [clicking IAHS logo will also take you there if you ever get lost]; the Full Texts page; the Legal Texts page: the Search page; and a new HELP! For materials added since July 1998 see the New Additions page. Additional Study/Research Aids Introduction © Paul Halsall, 1999.

The coolest technology you've never seen | Mobile apps Here's one you have to see to believe. Autonomy, the largest British software company -- best known for its enterprise search and compliance technology -- has applied its intellectual horsepower in meaning-based computing to visual recognition for smartphones. Soon you'll be able to download its Aurasma iPhone/iPad app, which enables you to point your camera at static real-world objects that, once recognized, magically come to life on the smartphone screen, similar to the way pictures in the Daily Prophet newspaper animated themselves in Harry Potter. Check the video demo. According to Autonomy, the app will be able to recognize up to half a million images. The technology has its limitations. But think of the possibilities. The Aurasma app will be available for free download in the App Store next month. This story, "The coolest technology you've never seen," was originally published at InfoWorld.com.

Journalism Warning Labels & Tom Scott Contents Not Verified It seems a bit strange to me that the media carefully warn about and label any content that involves sex, violence or strong language — but there's no similar labelling system for, say, sloppy journalism and other questionable content. I figured it was time to fix that, so I made some stickers. I've been putting them on copies of the free papers that I find on the London Underground. The articles these stickers are attached to are used strictly as an illustration: I'm not passing judgment on the specific articles or journalists. Let's start with the obvious one. I'm not sure how these newspapers would fill their pages without these. Oh yeah, that's what they use. The Daily Mail's attempt to classify everything as either 'causing' and 'curing' cancer is already well documented, but there are plenty of wacky medical claims in all the newspapers. ...and we all know what happens when you do this. Is there some celebrity with a wacky religion they're really touchy about?

Internet Indian History Sourcebook Women Homosexuality: General It has proved to be extraordinarily difficult to find much information about South Asian homosexuality. Hindu Ramakrishnan: "Bisexuality: identities, behaviors, and politics" , Trikone April 1996 [At Internet Archive, from U Texas] Vatsyayana: Kama Sutra , Part 2. The Vinaya [Buddhist Monastic Precepts] WEB Shri Krishna as Kali and Lalita [At Shivashakti] Although the sexual relationships of Indian gods often follow heterosexual expectations, the individual God/dess may change form and be incarnate as another. WEB Tantrik Links [At Shivashakti] Tantricism was the "short path" to Enlightenment in Hinduism and Buddhism. Muslim 2ND Richard Burton: Terminal Essay , from his edition of the Arabian Nights . Further Resources on Indian History As in a number of other historical areas, a real problem with much of the online material on South Asian history is that it is presented with manifest nationalist (or other ideological bias). © This text is copyright.

Famous KGB Spies: Where Are They Now? - By Katie Cella Ever since the 1950s, when the world got wind of the three letters that stood for the Soviet Union's intelligence agency, KGB spies -- with their (real or imagined) bug-planting lifestyles and sexy accomplices -- have provided endless material for thrilling novels, movies, and comic books. The fascination continues even now: In 2011, the U.S. television network FX announced the pilot of a new series about KGB spies living in Washington, D.C., in the 1980s. In the latest issue of Foreign Policy, retired CIA officer Milton Bearden remembers his Soviet counterpart Leonid Shebarshin, who died in an apparent suicide in March 2012. The former head of the KGB's foreign intelligence division, who served as KGB chairman for all of one day after his boss attempted a coup in 1991, remained loyal to the agency his entire life and spent his post-KGB days in Moscow. That can't be said for all KGB spies, however. CARL COURT/AFP/GettyImages AFP/AFP/Getty Images MARTIN HAYHOW/AFP/Getty Images FARJANA K.

Internet East Asian History Sourcebook There is no way of avoiding the fact that China is the central culture of Eastern Asia. Massively larger than any of her neighbors, China may have developed its cultural forms in relative isolation, but since the advent of Buddhism has both absorbed outside influences and disseminated its own culture. Japanese, Korean and Vietnamese cultures are not comprehensible without taking into account power of Chinese culture in art, literature and religion. Chinese culture itself is highly complex, and the other East Asian cultures also reflect local circumstances and traditions. For instance the (later) Chinese ideal of a scholar-gentleman contrasts strongly with Japanese warrior ideals. See my Brooklyn College: Chinese Cultural Studies class page. This page is a subset of texts derived from the three major online Sourcebooks listed below, along with added texts and web site indicators. General The Korean War Cambodia Constitution, 1993 [At Cambodian Parliament.org] The Non-Aligned Movement U.S.

Requiem for a Russian Spy - By Milton Bearden On the second-to-last day of March, Leonid Vladimirovich Shebarshin, the former head of the KGB's foreign intelligence arm and chairman of the KGB -- for a single day in the turmoil of the August 1991 coup attempt against Soviet President Mikhail Gorbachev -- died in his central Moscow apartment, apparently taking his own life. According to Russian media accounts, the last entry in his diary found at the scene was: "March, 29 - 17.15, left eye failure. 19.00, went completely blind. Foreign Intelligence duty officer 4293593." Beside his body was a service pistol presented to him upon his retirement from the KGB, and media reports said there was a suicide note. His death marks the end of an era, the passing of one of the most thoughtful, cultured, and effective leaders of the redoubtable Cold War KGB. For much of the last decade of my CIA career, Shebarshin was the closest thing I had to a main adversary in the Soviet spy apparatus. The deal was set in motion. Courtesy of Milton Bearden

Internet Women's History Sourcebook Halsall Home | Ancient History Sourcebook | Medieval Sourcebook | Modern History Sourcebook Other History Sourcebooks: African | East Asian | Indian | Islamic | Jewish | LGBT | Global | Science "Yes, I am fond of history." "I wish I were too. I read it a little as a duty, but it tells me nothing that does not either vex or weary me. The quarrels of popes and kings, with wars or pestilences, in every page; the men all so good for nothing, and hardly any women at all -- it is very tiresome:" Catherine Morland, in Northhangar Abbey (1803), by Jane Austen How are historians to remedy the silence about women in many traditional accounts of history? The first solution was to locate the great women of the past, following the lead of much popular historiography that focuses on "great men". The next solution was to examine and expose the history of oppression of women. In recent years, while not denying the history of oppression, historians have begun to focus on the agency of women .

List of cyber-weapons developed by Pentagon to streamline computer warfare “So whether it’s a tank, an M-16 or a computer virus, it’s going to follow the same rules so that we can understand how to employ it, when you can use it, when you can’t, what you can and can’t use,” a senior military official said. The integration of cyber-technologies into a formal structure of approved capabilities is perhaps the most significant operational development in military cyber-doctrine in years, the senior military official said. The framework clarifies, for instance, that the military needs presidential authorization to penetrate a foreign computer network and leave a cyber-virus that can be activated later. The military does not need such approval, however, to penetrate foreign networks for a variety of other activities. These include studying the cyber-capabilities of adversaries or examining how power plants or other networks operate. One example of a cyber-weapon is the Stuxnet worm that disrupted operations at an Iranian nuclear facility last year.

Related: