When veterans of World War II returned home to McMinn County, Tennessee, they probably weren’t surprised to find that many of the same politicians from before the war were still running the place. A local political machine run by Paul Cantrell had been suspected of running the county and committing election fraud since 1936.
However, when the sheriff’s deputies began targeting the veterans with fines for minor arrests, the vets suspected they were being taken advantage of. One veteran, Bill White, later told American Heritage magazine:
“There were several beer joints and honky-tonks around Athens; we were pretty wild; we started having trouble with the law enforcement at that time because they started making a habit of picking up GIs and fining them heavily for most anything—they were kind of making a racket out of it.
“After long hard years of service—most of us were hard-core veterans of World War II—we were used to drinking our liquor and our beer without being molested. When these things happened, the GIs got madder—the more GIs they arrested, the more they beat up, the madder we got …”
By early 1946, the vets and the townspeople were tired of what they saw as corrupt practices by Paul Cantrell and his lackeys. The vets started their own political party with candidates for five offices. The focus of the contest was the race for sheriff between Paul Cantrell and Henry Knox, a veteran of North Africa.
Everyone knew that the election could turn violent. Veterans in nearby Blount County promised 450 men who could assist in any need that McMinn County had on election day. In response, Cantrell hired two hundred “deputies” from outside the county to guard polling places.
What happened next would go down as the “Battle of Athens,” or the “McMinn County War.”
Tensions built on election day as the veterans faced off with the special deputies. By 3 p.m., an hour before the polls closed, violence broke out. Deputies beat and shot a black farmer who tried to vote and arrested two veterans who were then held hostage in the Athens Water Works. Other veterans responded by taking hostage deputies who were sent to arrest them. Still, Cantrell was able to fill most of the ballot boxes with purchased votes and get them to the jail, ensuring he would win the election.
While the sheriff and his lackeys counted the votes in the jail, White and the other veterans were getting angry. Finally, sometime after 6 p.m., White led a raid on the National Guard armory to get guns.
White said in a 1969 interview that they “broke down the armory doors and took all the rifles, two Thompson sub-machine guns, and all the ammunition we could carry, loaded it up in the two-ton truck and went back to GI headquarters and passed out seventy high-powered rifles and two bandoleers of ammunition with each one.”
The veterans set siege to the jail, firing on deputies that were outside the jail when they arrived. One deputy fell wounded into the building while another crawled under a car after he was hit in his leg. But, Cantrell and others were safely locked behind the brick walls of the jail. The veterans needed to get through before other police or the National Guard arrived.
Molotov cocktails proved ineffective but at 2:30 in the morning, someone arrived with dynamite. At about the same time, an ambulance arrived and the veterans let it through, assuming it was there for the wounded. Instead, Paul Cantrell and one of his men escaped in it.
A few minutes later, the vets started throwing dynamite. The first bundle was used to blow up a deputy’s cruiser, flipping it over. Then, three more bundles were thrown. One landed on the porch roof, one under another car, and one against the jail wall. The nearly simultaneous explosions destroyed the wall and car and threw the jail porch off of its foundation.
The deputies in the jail, as well as some hiding out in the courthouse, surrendered immediately. The veterans were then forced to protect the deputies as local townspeople attempted to kill them. At least one deputy had his throat slit and another of Cantrell’s men was shot in the jaw.
The veterans established a patrol to keep the peace. To prevent a counterattack by Cantrell, the vets placed machine guns at all the approaches to Athens, where the jail and courthouse were located.
The rest of the incident played out without violence. Henry Knox took over as sheriff Aug. 4, 1946 and future elections dismantled what was left of Cantrell’s machine.
Bill Withers died earlier in the week from complications from heart disease at age 81. Withers was known for his amazing vocals, soulful songs and was one of the best soul singers of all time. He was also a veteran of the United States Navy.
His death has resulted in an outpouring of mourning and grief from singers, artists and fans cross the world.
Regarded as one of the best songwriters of his generation, his influence has been seen in multiple genres of music and generations of artists. Withers gave us such classics as ‘Lean On Me,’ ‘Ain’t No Sunshine,’ ‘Grandma’s Hands,’ ‘Just the Two of Us’ and ‘Lovely Day.’
But there is one song that really resonates with veterans. In 1973, Withers released a song he had written while America was still involved in Vietnam.
Withers was born July 4, 1938, in Slab Fork, West Virginia. He was afflicted with a stutter from the time he was a child. He enlisted in the Navy at 18 where he served as an aircraft mechanic. He had good reason for wanting that field.
Withers told Rolling Stone, “My first goal was, I didn’t want to be a cook or a steward. So I went to aircraft-mechanic school. I still had to prove to people that thought I was genetically inferior that I wasn’t too stupid to drain the oil out of an airplane.”
While he was in the Navy, he was able to do speech therapy so he could stop stuttering. In fact, he stayed in the Navy as long as he could so he could work on his speech. He overcame his stutter using various techniques while also developing an interest in singing and songwriting. After nine years of service, he was discharged in 1965 and moved to Los Angeles to try and break into the music business. Withers worked for the aviation industry during the day while playing local night clubs at night trying to get noticed. His hard work paid off, when in 1970, he was signed to a record contract. His first album came out a year later and his career took off shortly thereafter.
After a couple of years of hits, Withers would write and perform a song that would be hailed as one of the most poignant songs about veterans and the war in Vietnam.
“I Can’t Write Left-Handed” was written from the perspective of a wounded warrior. It wasn’t a political statement, it wasn’t self-righteous, it wasn’t inflammatory. It was simply what he thought Vietnam Veterans went through and what they were going to go through. It was one of the first songs to touch on the mental anguish and post traumatic stress many Vietnam Veterans experienced in the years after the war.
Withers opened the song with a spoken intro….
“We recorded this song on October the 6th. Since then the war’s been declared over. If you’re like me you’ll remember it like anybody remembers any war: one big drag. Lot of people write songs about wars and government … Very social things. But I think about young guys who were like I was when I was young. I had no more idea about any government, or political things or anything. And I think about those kind of young guys now who all of a sudden somebody comes up, and they’re very law-abiding, so if somebody says go they don’t ask any questions they just go. And I can remember not too long ago seeing a young guy with his right arm gone. Just got back. And I asked him how he was doing. He said he was doing all right now but he had thought he was gonna die. He said getting shot at didn’t bother him, it was getting shot that shook him up. And I tried to put myself in his position. Maybe he cried, maybe he said…”
The lyrics then tell us the story of the man with a missing right arm.
I can’t write left handed
Would you please write a letter to my mother Tell her to tell the family lawyer Try to get a deferment for my younger brother
Tell the Reverend Harris to pray for me, lord, lord, lord I ain’t gonna live, I don’t believe I’m going to live to get much older Strange little man over here in Vietnam, I ain’t never Bless his heart I ain’t never done nothin’ to, he done shot me in my shoulder
Boot camp we had classes You know we talked about fightin’, fightin’ everyday And lookin’ through rosy, rosy colored glasses I must admit it seemed exciting anyway But something that day overlooked to tell me Bullet look better I must say Rather when they comin’ at you. But go without the other way
And please call up the Reverend Harris And tell him to ask the lord to do some good things for me Tell him, I ain’t gonna live, I ain’t gonna live, I ain’t gonna live to get much older Strange little man over here in Vietnam, I ain’t never seen, bless his heart I Ain’t never done nothing to, he done shot me in my shoulder
After a long career with many hits, Withers withdrew from the music industry. He felt that he was too old and that touring and performing were a young man’s game. Withers will go down as one of the true icons of soul and one of the best vocalists of his generation. Let us also remember him for his service to our country as well as using his talent to give a voice to those who served in Vietnam. Rest in peace, Sir.
The Defense Advanced Research Projects Agency is more apt to describe their new climbing technology to be more like geckos than Spider-Man. Despite being less awesome, DARPA’s comparison is much more accurate – but only because Spider-Man isn’t real and geckos are. Still, the tech would allow troops to scale surfaces like glass walls in full kit with no extra noise.
Sound too good to be true? It’s called the Z-Man project, and it has already been tested.
American troops never know where they could end up until they’re prepping to go. Even then they don’t really know what kinds of obstacles they’ll encounter during the missions – or more importantly, how they’ll overcome those obstacles. The how is part of DARPA’s job. Its mission is to develop technology that creates transformational change across industries in order to give American troops an edge on the battlefields of tomorrow. For the last couple of years, it’s been notoriously adept at making our superhero dreams become a reality. Now they’ve gone and done it again: this time it’s Spider-Man.
Which is a really good choice, not only because of the urban environments U.S. troops frequently encounter but because all branches encounter unending problems when working in a foreign environment and could rely on the flexibility provided by the kinds of powers Spider-Man has. The first test was the development of polymer microstructures that would allow wearers to scale any surface.
Intermolecular forces between its toes and a surface means the gecko easily attaches to and from any surface.
Geckos have hundreds of stalk-like setae that are around 100 microns in length and 2 microns in radius all over their feet. From individual setae, a bundle of hundreds of terminal tips called spatulae, approximately 200 nanometers in diameter at their widest, branch out and contact the climbing surface. A Gecko can hold itself up with one toe, making it the animal world’s expert on climbing. Until now.
DARPA demonstrated the power of the new climbing system on a glass wall. A 218-pound man ascended a 25-foot tall wall with an additional carrying load of 25 pounds. He had no other climbing equipment than the gecko-inspired climbing gear. The climber used paddles with the gecko tech to ascend the structure.
A DARPA engineer scales a wall using the new Z-Man technology.
“Like many of the capabilities that the Department of Defense pursues, we saw with vertical climbing that nature had long since evolved the means to efficiently achieve it,” said Dr. Matt Goodman, the DARPA program manager for Z-Man. “The challenge to our performer team was to understand the biology and physics in play when geckos climb and then reverse-engineer those dynamics into an artificial system for use by humans.”
“We would like to reaffirm that we have strong determination, confidence and capability to destroy any type of ‘Taiwan independence’ scheme in order to safeguard the country’s sovereignty and territorial integrity,” Ma Xiaoguang, a spokeswoman for the State Council’s Taiwan Affairs Office, recently said.
The Chinese also flew bombers around Taiwan in a show of force as well, and though tensions decreased a bit when promised live-fire drills were scaled back, the events are a reminder to analysts and policymakers that one of the worlds oldest Cold War-era conflicts remains unsolved, and could escalate to war.
A war of nerves
Much of that has to do with Chinese President and General Secretary of the Communist Party Xi Jinping, who has taken a much more aggressive stance on Taiwan than his immediate predecessors.
“Xi Jinping has essentially linked rejuvenation of the Chinese Nation to the retaking of Taiwan,” Bonnie Glaser, the director of the China Power Project at the Center for Strategic and International Studies, told Business Insider.
“We were in a period of relative quiet with the Taiwan issue, and now it’s in a more primary place on the agenda as far as Beijing is concerned,” Glaser said.
At the core of the issue is that the Peoples Republic of China wants Taiwan, known officially as the Republic of China, to return to the fold to create one country that is unified under the rule of the Communist Party of China.
(Photo by Michel Temer)
But Taiwan, with the help of the US, has so far managed to resist the PRC’s attempts to isolate it politically and economically, and has even shown signs of moving further away from the PRC and towards official independence — a move that would almost certainly provoke an armed response from the mainland.
“The current situation in the Taiwan [Strait] is a war of nerves,” Ian Easton, a research fellow at the Project 2049 Institute and the author of “The Chinese Invasion Threat: Taiwan’s Defense and American Strategy in Asia,” told Business Insider in an email.
“Taiwan is winning. They have not compromised under pressure, but tensions are running high and are likely to get much worse.”
Taiwan’s military has advantages — and problems
Taiwan’s military has a few advantages if it comes to war. First and foremost, Taiwan has been training to defend the island for decades.
For a country of only 23 million people, its military is quite capable. It has an active force of around 180,000 troops, with 1.5 million reservists — putting its size on par with the militaries of Germany and Japan, despite having a much smaller population.
Some of its equipment is relatively high-end. Its air force operates around 100 US-made F-16s, and 100 indigenously made F-CK-1A/Cs. Its Army maintains a number of AH-64 Apache gunships, and AH-1W SuperCobras.
Taiwan’s navy has roughly eight destroyers and 20 frigates in service, mostly former Oliver Hazard Perry-class and Knox-class ships. But they also have six French-built La Fayette-class frigates. The navy also sails a large number of fast missile boats, and two modified Zwaardvis-class attack submarines.
On top of that, Taiwan has a lot of anti-air and anti-ship defenses, and hundreds of cruise missiles that can strike mainland China.
Taiwan’s geography also provides another advantage. Crossing the Taiwan Strait would take up to 7-8 hours by sea, and during that time Taiwan could prepare for an invasion, and use its navy and air force to attack incoming Chinese ships, and set up anti-ship mines along the Strait.
The PRC also does not currently have the capability to transport the required number of troops (once estimated to be as high as 400,000) needed to take the island.
Furthermore, Taiwan is very mountainous, and does not offer a lot of landing zones where the People’s Liberation Army (PLA) could establish solid beachheads. Roughly only 10% of its shoreline is suitable for the large-scale amphibious landing that the PLA would have to make.
All of this means an invasion of Taiwan by the PRC would be extremely costly. “China has no obvious starting move that guarantees that they don’t absorb a lot of risk from this,” Scott Harold, the associate director of the RAND Corporation’s Center for Asia Pacific Policy, told Business Insider.
But Taiwan’s military has two large problems — a lack of advanced equipment, and problems with its transition from compulsory service to a fully volunteer force.
Much of the military equipment needs to be modernized, especially its tanks and ships, and this can’t be done for diplomatic reasons. Only around 20 nations officially recognize Taiwan, and the PRC puts a lot of pressure on other countries to not do business with the island, especially in terms of defense.
The only nation that is willing to sell Taiwan complete weapon systems is the US, but they have “been slow to provide the weapons that Taiwan has been requesting, especially over the past 10 years,” according to Easton.
The military is also having difficulty making hiring quotas, which is affecting overall capability and performance because they are trying to replace its largely conscript service with professional soldiers.
“China has a massive military, so Taiwan must maintain its advantage in quality,” Easton said.
An uncertain future
A war between the PRC and Taiwan would also risk involving the US, which, while not under legal obligation, has opposed to any use of force against Taiwan in the past.
It deployed carrier battle groups to the Strait in 1995 to prevent war from breaking out, and relations between the two countries remain strong. One analyst Business Insider spoke to calculated that US submarines could sink 40% of a PLA invasion force.
War between the two Chinas, then, would be catastrophic. “In short, it would be extremely complex and fraught with risk for both China and Taiwan,” Easton said, adding that “both sides would stand to lose hundreds of thousands, if not millions of lives, and the U.S. would almost certainly join the fight on Taiwan’s side.”
Such a quagmire could turn into a war of attrition, and if it were it to result in failure for the PLA, it would be devastating to the Chinese Communist Party.
“It is inextricably tied to the legitimacy of the Communist Party,” Glaser said. “I think that that is the belief in the leadership — that they can never be seen as soft on Taiwan. They cannot compromise.”
She pointed to Xi’s comments at the 19th Party Congress in October 2017; “We will resolutely uphold national sovereignty and territorial integrity and will never tolerate a repeat of the historical tragedy of a divided country,” he stated to wild applause.
“We have firm will, full confidence, and sufficient capability to defeat any form of Taiwan independence secession plot. We will never allow any person, any organization, or any political party to split any part of the Chinese territory from China at any time or in any form.
“This article originally appeared on Business Insider. Follow @BusinessInsider on Twitter.
US special operations is researching how to counteract a new breed of warfare that Russia, China and Iran have been using quite successfully in recent years, Defense News reported.
Known as gray-zone conflict or hybrid warfare, it encompasses “activities conducted to enable a resistance movement or insurgency to coerce, disrupt, or overthrow a government or occupying power by operating through or with an underground, auxiliary, or guerrilla force in a denied area,” according to the 2016 National Defense Authorization Act.
In response, US special ops is looking to develop “predictive analytic technologies that will help us identify when countries are utilizing unconventional warfare techniques at levels essentially below our normal observation thresholds,” Under Secretary of Defense for Policy Theresa Whelan told Congress on May 2.
That’s because in hybrid warfare, aggressors will try to mask who they really are, such as Russia’s use of “little green men” in Crimea and in eastern Ukraine where its own special operations forces helped support an insurgency.
“Without a credible smoking gun, NATO will find it difficult to agree on an intervention,” according to NATO REVIEW Magazine.
The Pentagon study will help the US identify early evidence of unconventional warfare, Whelan said.
Many people in countries along Russia’s border, especially in the eastern part of those countries, have close cultural ties, like language and history, to Russia. Therefore public opinion about identity and Russia in these regions is oftentimes sharply divided.
No one yet knows how the US will actually try to counteract such warfare, but “technology will play a significant role,” Gayle Tzemach Lemmon, a senior fellow at the Council on Foreign Relations, told Business Insider, specifically mentioning artificial intelligence, robotics and drones.
The presence and use of special ops will also increase, as they already have in places like Iraq and Syria. “More special ops died last year than conventional forces,” Lemmon said. “I think that points to the future of warfare.”
This new kind of warfare also brings up questions about the rules of engagement, and how the US can counteract it without triggering a full-scale conventional war.
“I genuinely think no one can answer that,” Lemmon said. “It is taking the idea of warfare into a totally different realm.”
While the results of the study are two years late, the Pentagon expects to have an “answer with our thoughts” before the end of June, Whalen told Congress.
While the World Wide Web was initially invented by one person (see: What was the First Website?), the genesis of the internet itself was a group effort by numerous individuals, sometimes working in concert, and other times independently. Its birth takes us back to the extremely competitive technological contest between the US and the USSR during the Cold War.
The Soviet Union sent the satellite Sputnik 1 into space on October 4, 1957. Partially in response, the American government created in 1958 the Advanced Research Project Agency, known today as DARPA—Defense Advanced Research Projects Agency. The agency’s specific mission was to
…prevent technological surprises like the launch of Sputnik, which signaled that the Soviets had beaten the U.S. into space. The mission statement has evolved over time. Today, DARPA’s mission is still to prevent technological surprise to the US, but also to create technological surprise for our enemies.
To coordinate such efforts, a rapid way to exchange data between various universities and laboratories was needed. This bring us to J. C. R. Licklider who is largely responsible for the theoretical basis of the Internet, an “Intergalactic Computer Network.” His idea was to create a network where many different computer systems would be interconnected to one another to quickly exchange data, rather than have individual systems setup, each one connecting to some other individual system.
He thought up the idea after having to deal with three separate systems connecting to computers in Santa Monica, the University of California, Berkeley, and a system at MIT:
For each of these three terminals, I had three different sets of user commands. So if I was talking online with someone at S.D.C. and I wanted to talk to someone I knew at Berkeley or M.I.T. about this, I had to get up from the S.D.C. terminal, go over and log into the other terminal and get in touch with them…. I said, oh man, it’s obvious what to do: If you have these three terminals, there ought to be one terminal that goes anywhere you want to go where you have interactive computing. That idea is the ARPAnet.”
So, yes, the idea for the internet as we know it partially came about because of the seemingly universal human desire to not have to get up and move to another location.
With the threat of a nuclear war, it was necessary to decentralize such a system, so that even if one node was destroyed, there would still be communication between all the other computers. The American engineer Paul Baran provided the solution to this issue; he designed a decentralized network that also used packet switching as a means for sending and receiving data.
Many others also contributed to the development of an efficient packet switching system, including Leonard Kleinrock and Donald Davies. If you’re not familiar, “packet switching” is basically just a method of breaking down all transmitted data—regardless of content, type, or structure—into suitably sized blocks, called packets. So, for instance, if you wanted to access a large file from another system, when you attempted to download it, rather than the entire file being sent in one stream, which would require a constant connection for the duration of the download, it would get broken down into small packets of data, with each packet being individually sent, perhaps taking different paths through the network. The system that downloads the file would then re-assemble the packets back into the original full file.
The platform mentioned above by Licklider, ARPANET was based on these ideas and was the principle precursor to the Internet as we think of it today. It was installed and operated for the first time in 1969 with four nodes, which were located at the University of California at Santa Barbara, the University of California at Los Angeles, SRI at Stanford University, and the University of Utah.
The first use of this network took place on October 29, 1969 at 10:30 pm and was a communication between UCLA and the Stanford Research Institute. As recounted by the aforementioned Leonard Kleinrock, this momentous communiqué went like this:
We set up a telephone connection between us and the guys at SRI… We typed the L and we asked on the phone,
“Do you see the L?”
“Yes, we see the L,” came the response.
We typed the O, and we asked, “Do you see the O.”
“Yes, we see the O.”
Then we typed the G, and the system crashed… Yet a revolution had begun.
By 1972, the number of computers that were connected to ARPANET had reached twenty-three and it was at this time that the term electronic mail (email) was first used, when a computer scientist named Ray Tomlinson implemented an email system in ARPANET using the “@” symbol to differentiate the sender’s name and network name in the email address.
Alongside these developments, engineers created more networks, which used different protocols such as X.25 and UUCP. The original protocol for communication used by the ARPANET was the NCP (Network Control Protocol). The need for a protocol that would unite all the many networks was needed.
In 1974, after many failed attempts, a paper published by Vint Cerf and Bob Kahn, also known as “the fathers of the Internet,” resulted in the protocol TCP (Transmission Control Protocol), which by 1978 would become TCP/IP (with the IP standing for Internet Protocol). At a high level, TCP/IP is essentially just a relatively efficient system for making sure the packets of data are sent and ultimately received where they need to go, and in turn assembled in the proper order so that the downloaded data mirrors the original file. So, for instance, if a packet is lost in transmission, TCP is the system that detects this and makes sure the missing packet(s) get re-sent and are successfully received. Developers of applications can then use this system without having to worry about exactly how the underlying network communication works.
On January 1, 1983, “flag day,” TCP/IP would become the exclusive communication protocol for ARPANET.
Also in 1983, Paul Mockapetris proposed a distributed database of internet name and address pairs, now known as the Domain Name System (DNS). This is essentially a distributed “phone book” linking a domain’s name to its IP address, allowing you to type in something like todayifoundout.com, instead of the IP address of the website. The distributed version of this system allowed for a decentralized approach to this “phone book.” Previous to this, a central HOSTS.TXT file was maintained at Stanford Research Institute that then could be downloaded and used by other systems. Of course, even by 1983, this was becoming a problem to maintain and there was a growing need for a decentralized approach.
This brings us to 1989 when Tim Berners-Lee of CERN (European Organization for Nuclear Research) developed a system for distributing information on the Internet and named it the World Wide Web.
What made this system unique from existing systems of the day was the marriage of the hypertext system (linked pages) with the internet; particularly the marriage of one directional links that didn’t require any action by the owner of the destination page to make it work as with bi-directional hypertext systems of the day. It also provided for relatively simple implementations of web servers and web browsers and was a completely open platform making it so anyone could contribute and develop their own such systems without paying any royalties. In the process of doing all this, Berners-Lee developed the URL format, hypertext markup language (HTML), and the Hypertext Transfer Protocol (HTTP).
Around this same time, one of the most popular alternatives to the web, the Gopher system, announced it would no longer be free to use, effectively killing it with many switching to the World Wide Web. Today, the web is so popular that many people often think of it as the internet, even though this isn’t the case at all.
Also around the time the World Wide Web was being created, the restrictions on commercial use of the internet were gradually being removed, which was another key element in the ultimate success of this network.
Next up, in 1993, Marc Andreessen led a team that developed a browser for the World Wide Web, named Mosaic. This was a graphical browser developed via funding through a U.S. government initiative, specifically the “High Performance Computing and Communications Act of 1991.″
This act was partially what Al Gore was referring to when he said he “took the initiative in creating the Internet.” All political rhetoric aside (and there was much on both sides concerning this statement), as one of the “fathers of the internet,” Vincent Cerf said, “The Internet would not be where it is in the United States without the strong support given to it and related research areas by the Vice President [Al Gore] in his current role and in his earlier role as Senator… As far back as the 1970s, Congressman Gore promoted the idea of high speed telecommunications as an engine for both economic growth and the improvement of our educational system. He was the first elected official to grasp the potential of computer communications to have a broader impact than just improving the conduct of science and scholarship… His initiatives led directly to the commercialization of the Internet. So he really does deserve credit.” (For more on this controversy, see: Did Al Gore Really Say He Invented the Internet?)
As for Mosaic, it was not the first web browser, as you’ll sometimes read, simply one of the most successful until Netscape came around (which was developed by many of those who previously worked on Mosaic). The first ever web browser, called WorldWideWeb, was created by Berners-Lee. This browser had a nice graphical user interface; allowed for multiple fonts and font sizes; allowed for downloading and displaying images, sounds, animations, movies, etc.; and had the ability to let users edit the web pages being viewed in order to promote collaboration of information. However, this browser only ran on NeXT Step’s OS, which most people didn’t have because of the extreme high cost of these systems. (This company was owned by Steve Jobs, so you can imagine the cost bloat… ;-))
In order to provide a browser anyone could use, the next browser Berners-Lee developed was much simpler and, thus, versions of it could be quickly developed to be able to run on just about any computer, for the most part regardless of processing power or operating system. It was a bare-bones inline browser (command line / text only), which didn’t have most of the features of his original browser.
Mosaic essentially reintroduced some of the nicer features found in Berners-Lee’s original browser, giving people a graphic interface to work with. It also included the ability to view web pages with inline images (instead of in separate windows as other browsers at the time). What really distinguished it from other such graphical browsers, though, was that it was easy for everyday users to install and use. The creators also offered 24 hour phone support to help people get it setup and working on their respective systems.
And the rest, as they say, is history.
Bonus Internet Facts:
The first domain ever registered was Symbolics.com on March 15, 1985. It was registered by the Symbolics Computer Corp.
The “//” forward slashes in any web address serve no real purpose according to Berners-Lee. He only put them in because, “It seemed like a good idea at the time.” He wanted a way to separate the part the web server needed to know about, for instance “www.todayifoundout.com”, from the other stuff which is more service oriented. Basically, he didn’t want to have to worry about knowing what service the particular website was using at a particular link when creating a link in a web page. “//” seemed natural, as it would to anyone who’s used Unix based systems. In retrospect though, this was not at all necessary, so the “//” are essentially pointless.
Berners-Lee chose the “#” for separating the main part of a document’s url with the portion that tells what part of the page to go to, because in the United States and some other countries, if you want to specify an address of an individual apartment or suite in a building, you classically precede the suite or apartment number with a “#”. So the structure is “street name and number #suite number”; thus “page url #location in page”.
Berners-Lee chose the name “World Wide Web” because he wanted to emphasize that, in this global hypertext system, anything could link to anything else. Alternative names he considered were: “Mine of Information” (Moi); “The Information Mine” (Tim); and “Information Mesh” (which was discarded as it looked too much like “Information Mess”).
Pronouncing “www” as individual letters “double-u double-u double-u” takes three times as many syllables as simply saying “World Wide Web.”
Most web addresses begin with “www” because of the traditional practice of naming a server according to the service it provides. So outside of this practice, there is no real reason for any website URL to put a “www” before the domain name; the administrators of whatever website can set it to put anything they want preceding the domain or nothing at all. This is why, as time goes on, more and more websites have adopted allowing only putting the domain name itself and assuming the user wants to access the web service instead of some other service the machine itself may provide. Thus, the web has more or less become the “default” service (generally on port 80) on most service hosting machines on the internet.
The earliest documented commercial spam message on an internet is often incorrectly cited as the 1994 “Green Card Spam” incident. However, the actual first documented commercial spam message was for a new model of Digital Equipment Corporation computers and was sent on ARPANET to 393 recipients by Gary Thuerk in 1978.
The famed Green Card Spam incident was sent April 12, 1994 by a husband and wife team of lawyers, Laurance Canter and Martha Siegal. They bulk posted, on Usenet newsgroups, advertisements for immigration law services. The two defended their actions citing freedom of speech rights. They also later wrote a book titled “How to Make a Fortune on the Information Superhighway“, which encouraged and demonstrated to people how to quickly and freely reach over 30 million users on the Internet by spamming.
Though not called spam, back then, telegraphic spam messages were extremely common in the 19th century in the United States particularly. Western Union allowed telegraphic messages on its network to be sent to multiple destinations. Thus, wealthy American residents tended to get numerous spam messages through telegrams presenting unsolicited investment offers and the like. This wasn’t nearly as much of a problem in Europe due to the fact that telegraphy was regulated by post offices in Europe.
The word “internet” was used as early as 1883 as a verb and adjective to refer to interconnected motions, but almost a century later, in 1982, the term would, of course, be used to describe a worldwide network of fully interconnected TCP/IP networks.
In 1988, the very first massive computer virus in history called “The Internet Worm” was responsible for more than 10 percent of the world’s Internet servers shutting down temporarily.
The term “virus,” as referring to self-replicating computer programs, was coined by Frederick Cohen who was a student at California’s School of Engineering. He wrote such a program for a class. This “virus” was a parasitic application that would seize control of the computer and replicate itself on the machine. He then specifically described his “computer virus” as: “a program that can ‘infect’ other programs by modifying them to include a possibly evolved copy of itself.” Cohen went on to be one of the first people to outline proper virus defense techniques. He also demonstrated in 1987 that no algorithm could ever detect all possible viruses.
Though it wasn’t called such at the time, one of the first ever computer viruses was called “Creeper” and was written by Bob Thomas in 1971. He wrote this virus to demonstrate the potential of such “mobile” computer programs. The virus itself wasn’t destructive and simply printed the message “I’m the creeper, catch me if you can!” Creeper spread about on ARPANET. It worked by finding open connections and transferring itself to other machines. It would also attempt to remove itself from the machine that it was just on, if it could, to further be non-intrusive. The Creeper was ultimately “caught” by a program called “the reaper” which was designed to find and remove any instances of the creeper out there.
While terms like “Computer Worm” and “Computer Virus” are fairly commonly known, one less commonly heard term is “Computer Wabbit.” This is a program that is self-replicating, like a computer virus, but does not infect any host programs or files. The wabbits simply multiply themselves continually until eventually causing the system to crash from lack of resources. The term “wabbit” itself references how rabbits breed incredibly quickly and can take over an area until the environment can no longer sustain them. Pronouncing it “wabbit” is thought to be in homage to Elmer Fudd’s pronunciation of “rabbit.”
Computer viruses/worms don’t inherently have to be bad for your system. Some viruses are designed to improve your system as they infect it. For instance, as noted previously, the Reeper, which was designed to go out and destroy all instances of the Creeper it found. Another virus designed by Cohen would spread itself on a system to all executable files. Rather than harm them though, it would simply safely compress them, freeing up storage space.
Al Gore was one of the so called “Atari Democrats.” These were a group of Democrats that had a “passion for technological issues, from biomedical research and genetic engineering to the environmental impact of the greenhouse effect.” They basically argued that supporting development of various new technologies would stimulate the economy and create a lot of new jobs. Their primary obstacle in political circles, which are primarily made up of a lot of “old fogies,” was simply trying to explain a lot of the various new technologies, in terms of why they were important, to try to get support from fellow politicians for these things.
Gore was also largely responsible for the “Information Superhighway” term becoming popular in the 1990s. The first time he used the term publicly was way back in 1978 at a meeting of computer industry workers. Originally, this term didn’t mean the World Wide Web. Rather, it meant a system like the Internet. However, with the popularity of the World Wide Web, the three terms became synonymous with one another. In that speech, Gore used the term “Information Superhighway” to be analogous with Interstate Highways, referencing how they stimulated the economy after the passing of the National Interstate and Defense Highways Act of 1956. That bill was introduced by Al Gore’s father. It created a boom in the housing market; an increase in how mobile citizens were; and a subsequent boom in new businesses and the like along the highways. Gore felt that an “information superhighway” would have a similar positive economic effect.
Coming out to his military parents was difficult for Julian Woodhouse. It didn’t turn out the way he thought. He tried to suppress his sexuality and with that, any interest in being a fashion designer.
“I not only found myself as a person, but I also rekindled my interest in fashion and design,” he told the New York Times.
That didn’t stop his interest in joining the military, however. Woodhouse is now a 26-year-old Army officer who also has a burgeoning fashion collection.
“I really love being in the military,” he told the Times. “I love serving my country, and I love the life.”
Woodhouse came to New York on leave so he could present his creations during New York Men’s Day, which opened fashion week.
Woodhouse is currently stationed in Korea, where his label Wood House is based. The New York Times’ Guy Trebay described his clothes as having “elements of soft suiting … infused with sensuality, but they are emphatically made for guys.”
“I’m inspired a lot by the design philosophy and aesthetics designers in South Korea are going for,” he said. “I don’t want to push men outside of their comfort zones, but I think they are looking for something a little more directed.”
Stanley Kubrick’s “Full Metal Jacket” is arguably one of the most influential military movies of all time. It’s the movie would-be troops romanticize about before enlisting in the military and it’s certainly the movie they watch to mentally prepare themselves before shipping off to boot camp to face their drill instructors.
However, as iconic as this 1987 film has become, it almost didn’t turn out that way. This 30-minute video shows how Full Metal Jacket was made and what the cast and crew did to “get it right.” There are plenty of interesting tidbits, like how relatively unknown actor Vincent D’Onofrio initially didn’t even want to do the film, and why a horrific scene between “Animal Mother” and the sniper was cut out.
The Marine Corps and Raytheon are developing a new precision-guided 120mm explosive mortar round so that forward deployed forces can more effectively target and destroy enemies from farther distances than existing mortars.
The weapon is designed to shoot up into the air in a vertical trajectory before identifying, tracking and exploding and enemy target upon decent to the ground. The vertical landing allows the weapon to achieve great precision, Raytheon officials said.
Called the Precision Extended Range Munition, or PERM, the program is test firing a GPS-guided mortar round able to extend the range of today’s mortar weapons from about seven kilometers to about 16 kilometers, Paul Daniels, Raytheon Program Manager, told Scout Warrior in an interview.
“This doubles their range and gives them precision,” Daniels added.
The extended range could provide a key tactical advantage because 16 kilometers stand-off distance from the enemy could enable Marines to destroy enemy positions without themselves being vulnerable to incoming fire.
Raytheon was recently awarded a qualification and production contract by the Marine Corps, which plans to use the new weapon as part of its emerging Expeditionary Fire Support System, or EFSS.
This system is put together to allow forward-deployed Marines to quickly maneuver into enemy territory with precision firepower and mobility. EFSS can deploy on board an MV-22 Osprey tiltrotor aircraft, a CH-53 Super Stallion helicopter or travel from ship-to-shore as part of an amphibious operation, among other things. The new weapon will serve as part of the Corps’ fires triad which includes 155mm artillery rounds, 120mm mortars and Multiple Launch Rocket Systems, or MLRS.
PERM can fill what’s called a needed “capability gap,” because there may be some targets that are not suitable for larger 155mm artillery rounds and are better attacked by 120mm mortars.
Precision mortar fire could bring tactical advantages for Marines in combat, particularly in condensed urban areas or mountainous terrain where elevation might separate attacking forces from the enemy.
“Mortars are particularly useful. They have a very high angle and rate of fire. They can fire almost straight up,” Daniels said.
For instance, the precision targeting technology integrated into PERM could allow forces to attack enemy positions in urban areas without risking damage to nearby civilians; this kind of attack would not be possible with today’s unguided 120mm mortar rounds.
“It will be ready within a couple of years,” Daniels said.
Hunkered down in sniper positions on the top floor of an abandoned building in the Syrian city of Raqqa, two Americans and a British volunteer face off against Islamic State snipers on the other side of the front line. The trio, including two who were battle-hardened by experience in the French Foreign Legion and the war in Iraq, have made the war against IS in Syria their own.
They are among several US and British volunteers in the decisive battle against the Islamic State group for Raqqa, the city in northeastern Syria that the militants declared the capital of their self-proclaimed caliphate in parts of Syria and neighboring Iraq.
The men joined US-allied Syrian militias for different reasons — some motivated by testimonies of survivors of the unimaginable brutality that IS flaunted in areas under its control.
Others joined what they see as a noble quest for justice and a final battle with the “heart of darkness,” in a belief that violence can only be met with violence.
Taylor Hudson, a 33-year old from Pasadena, compares the fight for Raqqa to the 1945 Battle of Berlin in World War II that was critical to ending the rule of Adolf Hitler.
“This is the Berlin of our times,” said Hudson, who doubles as a platoon medic and a sniper in the battle against the militants. For him, IS extremists “represent everything that is wrong with humanity.”
Syria’s war, now in its seventh year, has attracted foreign fighters to all sides of the complicated conflict.
Islamic extremists from Europe, Asia, and North Africa have boosted the ranks of the Islamic State group, as well as rival radical al-Qaeda-linked groups. Shiite Iranian and Lebanese militias have sided with the Syrian government, deepening the sectarian nature of the conflict that has killed over 400,000 people and displaced over 11 million, half of Syria’s pre-war population.
On the anti-IS side — though far less in numbers than the thousands of foreigners who swelled the IS ranks — most Western foreign volunteers have been drawn to the US-allied Kurdish militia known as The People’s Protection Units, or by their Kurdish initials as the YPG. The US military has developed a close relationship with the YPG and its extension, the Syrian Democratic Forces, in the war against IS.
Some Western volunteers have died in battle — earlier in July the YPG announced that 28-year-old Robert Grodt, of Santa Cruz, California, and 29-year-old Nicholas Alan Warden, of Buffalo, died in the battle for Raqqa.
Since launching the push on Raqqa on June 6, the US-backed forces have conquered a third of the city.
Hudson, who has been fighting in Syria for the past 13 months, said he was moved to tears by stories in the media of Iraqi Yazidi women who were enslaved by IS militants and looked for a way to help. A pharmacy student who learned combat medicine in the field, he said he had treated some 600 wounded ahead of the march onto Raqqa.
The presence of Western anti-IS volunteers in Syria has created something of a conundrum for their governments, which have often questioned them on terrorism charges.
“I am not a terrorist,” said Macer Gifford, a 30-year former City broker in London, who came to Syria three years ago to volunteer first with the Kurdish militia. Now he is fighting with an Assyrian militia, also part of the US-backed forces battling IS militants.
“I am here defending the people of Syria against terrorists,” he added.
Gifford has been questioned by both his British government and by the US government. At home, he has written and lectured about the complex situation in Syria, offering a first-hand experience of IS’ evolving tactics.
He believes the militants can only be defeated by sheer force.
“The Islamic State (group) is actually an exceptional opponent,” Gifford said. “We can’t negotiate them away, we can’t wish them away. The only way we can defeat them is with force of arms.”
For Kevin Howard, a 28-year old former US military contractor from California who fought in Iraq in 2006, the war against the Islamic State group is more personal.
A skilled sniper who prides himself in having killed 12 IS militants so far, Howard said he is doing it for the victims of the Bataclan Theatre in France, where the sister of one of his best friends survived. The Nov. 13, 2015 attacks claimed by IS killed 130 people at Paris cafes, the national stadium, and the Bataclan, where 90 died.
“This is a continuation of that fight, I think if you leave something unfinished, it will remain unfinished for a lifetime,” he said, showing off his 1972 sniper rifle.
On his forehead and neck, he has tattooed the “Rien N’empêche” — or “Nothing Prevents”— words from the song of the French Foreign Legion in which he served, and “life is pain.”
“For me this is a chance to absolutely go to the heart of darkness and grab it and get rid of it,” he added.
From his sniper position on Raqqa’s front line, he peeked again through the rifle hole. For Howard, the orders to march deeper into the IS-held city can’t come soon enough.
Freakin’ Russia, man! That country is everywhere in the news these days. Whether it be unexplained deaths of Putin’s opposition, election meddling, weird political memes, or @lookatthisRussian they seem to be everywhere.
Because of this borderline second Cold War, the U.S. military has taken a renewed interest in cold-weather training. Russia is a cold place, and a foreseen conflict will probably occur, at least partially in the Arctic Circle. Not because it’s a “Cold” war, read a textbook!
With the potential that you may end up in some type of cold weather environment either in training or on an Op, it’s a good idea to take a look at what that exposure to the frigid cold may have on your body and mind.
You may have heard of cold shock proteins, you may have even dabbled with a cold shower or some Wim Hof breathing. Let me spare you the Ice Man’s Polish accent and just get to the good things that cold exposure is doing to your body.
Sgt. Bruce Allen, assigned to the 4th Infantry Brigade Combat Team (Airborne), 25th Infantry Division, proceeds to the rally point after completing an airborne training jump at Joint Base Elmendorf–Richardson, Alaska, in January 2018.
(U.S. Air Force photo by Alejandro Peña, Joint Base Elmendorf–Richardson Public Affairs)
Strengthens the immune system
Cold exposure three times a week for six weeks actually increases the number of immune cells that you have. Of course, that’s not the only magic combination of exposure that you have to do, it’s just what’s been tested.
Winter swimmers have some insane immune systems. It used to be just them bragging, but some real research has backed them up. It appears the cold water is making these people superhuman.
A Soldier prepares to climb out of a hole cut into an ice-covered Big Sandy Lake after jumping in the water as part of cold-water immersion training for Class 19-01 of the Cold-Weather Operations Course on Dec. 13, 2018, at Fort McCoy, Wis.
(U.S. Army Photo by Scott T. Sturkol, Public Affairs Office, Fort McCoy, Wis)
Depressed? Angry? Outlook grim? Hop in an icy lake; it may be just the thing you need to shake your funk.
When you expose yourself to the cold, your body releases this hormone called norepinephrine (AKA noradrenaline) to constrict your blood vessels. This decreases the amount of heat you lose from your blood by decreasing the surface area of the blood.
There are a few side benefits to norepinephrine, one of which being that it also functions as a neurotransmitter in your brain that helps increase vigilance, attention, and mood.
Cold Weather Leaders Course 19-004 students fire from the standing supported position at the Northern Warfare Training Center’s Black Rapids Training Site during the 10-kilometer biathlon March 12, 2019.
(Army photo/John Pennell)
Fixes your brain
Cold shock proteins are these things that form when you experience extreme amounts of cold exposure. They tend to be rather awesome for you. This is where some of the real hype about cold exposure comes from.
Scientists have even found that in mice, cold exposure results in this cold shock protein called RBM3.
RBM3 appears to fix lost connections in the brain!
If you at all worry about dementia or just losing your mental edge, cold exposure should be on your to-do list.
In addition to cold-water immersion training, students were trained on a variety of cold-weather subjects, including skiing and snowshoe training as well as how to use ahkio sleds and other gear.
(U.S. Army Photo by Scott T. Sturkol, Public Affairs Office, Fort McCoy, Wis.)
Inflammation is the key driver in the aging process, meaning the more you can manage unnecessary inflammation, the more likely you are to slow the aging process.
The aging process includes a lot more than just developing wrinkles. Things like joint degeneration, memory loss, slower recovery times, digestive efficiency are all included in the aging process. Basically, anytime something stops working the way you want it to, that’s the aging process.
Inflammation occurs when we hurt ourselves like a swollen joint. Inflammation also occurs from stress. If you’re always stressed, you’re always experiencing increased amounts of inflammation. Remember, more inflammation means more aging.
To help the physical symptoms of inflammation, try some cold exposure like cold water immersion or cryotherapy.
The best for last. It appears that cold exposure increases the amount of brown fat we have. Brown fat is fat that is much more active than other fat tissue. The browner, fat tissue is, the more active it is because of the increased number of mitochondria that it has.
More active fat cells help us warm our bodies in cold environments through what’s called non-shivering thermogenesis. Basically, your body heats up without shivering. The amount of heat that you produce from this effect requires energy to conduct, AKA calories.
Respond in the comments of this article on Facebook to keep this conversation alive!
I’m also making a push to keep the conversation going over at the Mighty Fit Facebook Group. If you haven’t yet joined the group, do so. It’s where I spend the most time answering questions and helping people get the most out of their training.
Cold exposure is another tool you should keep in your toolkit to keep yourself in the fight. That being said, it won’t make up for missed training sessions or a shitty diet. If you want to learn how to maximize cold exposure, diet, or your training, shoot me an email at email@example.com.
Respond in the comments of this article on Facebook to keep this conversation alive!
I’m also making a push to keep the conversation going over at the Mighty Fit Facebook Group. If you haven’t yet joined the group, do so. It’s where I spend the most time answering questions and helping people get the most out of their training.
The U.S. Air Force just flew its first test flight of the AGM-183A Air Launched Rapid Response Weapon, a hypersonic weapon Lockheed Martin says it will continue to ground and flight test over the next three years.
The weapon, known as ARRW (pronounced “Arrow”), flew on a B-52 Stratofortress bomber aircraft on June 12, 2019, at Edwards Air Force Base, California. The tests were aimed to gather data on “drag and vibration impact” to the weapon as well as the performance of the carriage bay on the aircraft, the service said. The Air Force released photos of the flight via Twitter on June 18, 2019.
As part of a rapid prototyping scheme, the Air Force has been working with Lockheed, the prime contractor, to develop the hypersonic tech that would move five times the speed of sound as the Pentagon races to win the global race for new hypersonic technologies.
Lockheed officials touted the Air Force’s first flight here at the Paris air show.
“This captive-carry flight is the most recent step in the U.S. Air Force’s rapid prototyping effort to mature the hypersonic weapon, AGM-183A, which successfully completed a preliminary design review in March,” Lockheed officials said in a release. “More ground and flight testing will follow over the next three years.”
(U.S. Air Force)
Joe Monaghen, spokesman for Lockheed’s tactical and strike missiles and advanced programs, told Military.com that the first test of ARRW represented a milestone that paved the way for future flights and continued integration.
While the Defense Department is pursuing multiple avenues for hypersonic technologies, the variety will give the Pentagon better selection “to determine what works best operationally, across the different branches and mission sets,” Monaghen said.
Boeing Co., manufacturer of the B-52, said the recent test shows that the Cold War-era bomber can operate for years to come despite its age.
(U.S. Air Force)
“This recent success put the [Air Force] well on its way to the live-launch testing of an extraordinary weapon soon,” said Scot Oathout, director of bomber programs at Boeing, in a statement. “The future B-52, upgraded with game-changing global strike capability, such as ARRW, and crucial modernizations like a new radar and new engines, is an essential part of the [Air Force’s] Bomber Vector vision through at least 2050.”
The Air Force awarded a second contract to Lockheed in August 2018 — not to exceed 0 million — to begin designing a second hypersonic prototype of ARRW. The Air Force first awarded Lockheed a contract April 2019 to develop a separate prototype hypersonic cruise missile, the Hypersonic Conventional Strike Weapon (HCSW).
This article originally appeared on Military.com. Follow @militarydotcom on Twitter.