Shared posts

29 Dec 16:58

You won’t find the data in my pants

by vaughanbell

The journal contexts has an excellent article on the long history of exploring the sex lives of sex researchers as a veiled attempt to discredit their work.

…these stories suggest a troubling pattern: they tend to focus on researchers’ alleged sexual proclivities, spinning them as deviant motivations which compromise the research.

For example, James Miller’s biography of Michel Foucault links Foucault’s work to unconventional sexual activities like sadomasochism. Thomas Maier begins his biography with Virginia Johnson losing her virginity, portrays her as a sexually conniving secretary, and delights in exposing complicated aspects of the researchers’ sex life together. And historian James Jones depicts Kinsey as deeply twisted.

The problem is not simply that sexuality research remains stigmatized. It is that, in many circumstances, sex itself remains stubbornly discrediting. Sexuality’s cultural meanings are paradoxical—it is simultaneously repulsive and attractive, taboo yet vital to our happiness. It is difficult to write sexual stories without reproducing what Michael Warner calls “the ordinary power of sexual shame.” Moreover, stories that examine sex research through the prism of the researcher’s sex life rely on the simplistic notion that there is a specific connection between one’s sexual experiences and research.

A fascinating piece which covers the sort of leering interest sex research continually attracts despite it being one of the most important and under-investigated aspects of human health and behaviour.
 

Link to ‘The Sex Lives of Sex Researchers’ in contexts.


27 Dec 23:30

Christmas

by Justin Boyd

Christmas

I’ve gotten better at wrapping, but my skills will always be subpar. At least I get to practice at least once a year!

Merry Christmas and Happy Holidays, everyone!

27 Dec 23:23

12 Days: Christmas…A Roman Holiday

by April Stevens

By Caroline Lawrence (Wonders & Marvels contributor)

When I was researching my sixth Roman Mystery, set during the mid-winter festival called the Saturnalia, I was amazed by how many ancient Roman customs have survived, embedded in our Christmas celebrations. Here are twelve!

1. Five day vacation. In the first century AD the Romans set aside five days holiday to celebrate the festival of the Saturnalia, a mid-winter pagan festival to bring back the sun. We take approximately the same number of days off for Christmas.

2. December 25th. Romans sacrificed to Saturn but by the first century some were celebrating the birth of an eastern god of light on the 25th of December. No, not Jesus: Mithras! His rites and rituals shared many similarities with our Christian ceremonies. There was a baptism, a sacramental meal, an observance of Sunday, and the god himself was born on the 25th of December

3. Christmas tree, mistletoe, wreaths, etc. Romans decorated their houses with greenery. As Sheldon from Big Bang Theory says, “In the pre-Christian era, as the winter solstice approached and the plants died, pagans brought evergreen boughs into their homes as an act of sympathetic magic, intended to guard the life essences of the plants until spring. This custom was later appropriated by Northern Europeans and eventually became the so-called Christmas tree.”

4. Lights & candles. Romans also decorated their houses with extra lights at this darkest time of the year. Again, this was a pagan attempt to bring back the sun. Torches, tapers, candleabra and oil-lamps flickered throughout the houses of the rich. Because of this Rome was a particular fire hazard in the winter. One historian estimates that a hundred fires broke out daily in the Eternal City, which had its own entire corps of firemen, the vigiles.

5. Feasting! In mid-winter instinct tells us to build up a nice layer of fat, to feast in preparation for lean times ahead. A bit like a bear before hibernation. Yum. Carbohydrates are on the menu again.

6. Drinking. It has been medically proven that a small amount of wine added to water will kill off most known bacteria. For most of the year Romans drank diluted wine, but during the Saturnalia they often drank neat wine, heated and spiced. That’s my excuse for a glass of mulled wine: it’s hygienic.

7. Partying & Role Reversal. For the five days of the Saturnalia, slaves didn’t have to work. They could eat, drink and be merry. Some masters let their slave switch roles. Others, like Pliny the Younger, just left them alone to get on with it. Today, office employees find Christmas the time when they are tempted to take the most liberty. Be careful. Once the Saturnalia is over, you have to go back to being a slave… er, employee.

8. Board games and/or cards. In first century Rome, the only time gambling was legally permitted was during the Saturnalia. Even children and slaves could roll dice for nuts or money without fear of punishment. In the West, Christmas is the only time many families play board games or cards.

9. Party pieces. On the first night of the Saturnalia many households threw dice to determine who would be the King of the Saturnalia. The “King” could command people to do things like prepare a banquet, sing a song, or run an errand. Today we often perform party pieces at our Christmas parties, but Mom usually gets landed with preparing the banquet.

10. Santa hats. Many Roman citizens wore the hats traditionally given to slaves when they were set free. The pileus or pileum – both forms are attested – showed that freeborn Roman citizens were “extra free” from the usual restrictions and laws. These “freedom caps” were conical in shape and made of colourful felt, perhaps fur-trimmed in the winter. Hmmm. A red felt conical hat trimmed with white fur. Remind you of anything?

11. Presents! The Romans gave gifts on the Saturnalia, especially small clay or wooden figures – sigillum singular, sigilla plural – often with moveable joints. Action figures, LEGO and Barbies are our modern equivalent!

12. Gift tags. Finally, Romans often composed two-line epigrams to accompany their Saturnalia gift. So come on all you NaNoWriMo graduates and would-be writers: try composing your gift tags as a two line poem!

Caroline Lawrence has been writing detective stories about first century Rome and the Wild West for over a dozen years. Her passion for plotting combined with an obession with historical accuracy means her history-mystery stories are popular with children, parents and teachers. Here she is at a Christmas booksigning, wearing her pileum or freedom cap.

This post was first published on Wonders & Marvels in December 2012.

27 Dec 23:20

No Appetite for War

by Alexander Watson

By Alexander Watson (Guest Contributor)

“Every day now brings turnips, turnips and still more turnips.” The hunger felt across Central Europe during the First World War is barely remembered today, but for millions of German and Austro-Hungarian civilians, as for the Hamburg girl who wrote those words in January 1917, it was the conflict’s defining experience. A desperate search for food dominated wartime life. Malnutrition and, in some places, starvation had killed around a million people in Central and Eastern Europe by the end of 1918.

2. Queue at a Goulash Gun

People queue in front of a “goulash gun”. The deployment of these mobile field kitchens onto the streets of Germany was one method by which the government tried to rationalize the feeding of the population. Each contained around 1,400 portions of stew.

The food shortages were partly a consequence of mobilisation for “total war”. By 1915, the drafting of hundreds of thousands of farm workers and horses to the army, soil exhaustion and bureaucratic inefficiency had precipitated crises in production and distribution. Yet the shortages were also engineered deliberately by the ring of enemies surrounding Germany and Austria-Hungary. Britain used its naval supremacy and diplomatic clout ruthlessly to halt imports to Central Europe. The Royal Navy closed the entire North Sea to international trade. What could not be blocked was purchased: Norway’s herring catch, for example, was cornered by the British and then left to rot, solely to deny it to hungry Germans.

The Central Powers struggled to overcome dearth. Officials slowly tried to centralise food management and experimented with rationing and mass soup kitchens. More darkly, occupied territories’ food stocks were callously seized. Society mobilised to search for substitutes. At universities, historians scoured dusty manuscripts to discover what people had eaten in earlier famines. Chemists tried to extract oils from grape and poppy seeds. Private business also strove to fill gaps in the markets. In all, 11,000 so-called “Ersatz” (replacement) foods were produced. Most ranged from the unappealing, through disgusting to actually poisonous. For example, in the absence of flour, wartime sausages could legally be filled with 70 per cent water, becoming squidgy tubes of slime. Walnut shells, plum stones and even turnip heads went into wartime coffee, and dishonest traders mixed sawdust into bread and marketed ash as pepper substitute.

1. German Recipe Postcard 1917

“Citizens’ Cooking Recipe”. A satirical German postcard from 1917 explaining how to make a meal solely from ration coupons unredeemed because the food was unavailable: “Take the meat ration card, coat it in the egg ration card and fry nicely brown with the butter card …”

The unappetising and inadequate diet had disastrous consequences for Germany and Austria-Hungary. Hunger eroded popular support for the conflict. It also delegitimised governments incapable of feeding their peoples. In both states, malnourished citizens rose up at the war’s end in revolution. Worse, the obsession with food security provoked by the trauma would contribute to even greater horrors a quarter of a century later. The Nazis’ genocidal ambitions to annex agricultural “living space” in the east would be motivated not just by vicious racial ideology but also – with the memory of the First World War still strong – by determination to make Germany, as Hitler himself put it, “the most blockade-proof place in the world.”

 

Ring of SteelAlexander Watson is Lecturer in History at Goldsmiths, University of London. His new book, Ring of Steel: Germany and Austria-Hungary in World War I, has just been published by Basic Books. 

W&M is excited to have two (2) copies of Ring of Steel: Germany and Austria-Hungary in World War I for this month’s giveaway! Be sure to enter below by 11:00pm EST on December 31st to qualify (your entry includes a subscription to W&M Monthly).

Please note that, at this time, we can only ship within the US.

Monthly Book Giveaways

* indicates required
Email Address *
First Name
December Book Giveaways
  • Paul Strohm, “Chaucer’s Tale:1386 and the Road to Canterbury”
  • Alexander Watson, “Ring of Steel: Germany and Austria-Hungary in World War I”


18 Dec 13:00

What We’ve Got Here is Failure to Communicate

by Adam

2014-12-05-What-Weve-Got-Here-is-Failure-to-Communicate

17 Dec 12:48

A simple trick to improve your memory

by tomstafford
Scott Akerman

I'm so glad I don't have to deal with this kind of rote memorization on a regular basis anymore.

Want to enhance your memory for facts? Tom Stafford explains a counterintuitive method for retaining information.

If I asked you to sit down and remember a list of phone numbers or a series of facts, how would you go about it? There’s a fair chance that you’d be doing it wrong.

One of the interesting things about the mind is that even though we all have one, we don’t have perfect insight into how to get the best from it. This is in part because of flaws in our ability to think about our own thinking, which is called metacognition. Studying this self-reflective thought process reveals that the human species has mental blind spots.

One area where these blind spots are particularly large is learning. We’re actually surprisingly bad at having insight into how we learn best.

Researchers Jeffrey Karpicke and Henry Roediger III set out to look at one aspect: how testing can consolidate our memory of facts. In their experiment they asked college students to learn pairs of Swahili and English words. So, for example, they had to learn that if they were given the Swahili word ‘mashua’ the correct response was ‘boat’. They could have used the sort of facts you might get on a high-school quiz (e.g. “Who wrote the first computer programs?”/”Ada Lovelace”), but the use of Swahili meant that there was little chance their participants could use any background knowledge to help them learn. After the pairs had all been learnt, there would be a final test a week later.

Now if many of us were revising this list we might study the list, test ourselves and then repeat this cycle, dropping items we got right. This makes studying (and testing) quicker and allows us to focus our effort on the things we haven’t yet learnt. It’s a plan that seems to make perfect sense, but it’s a plan that is disastrous if we really want to learn properly.

Karpicke and Roediger asked students to prepare for a test in various ways, and compared their success – for example, one group kept testing themselves on all items without dropping what they were getting right, while another group stopped testing themselves on their correct answers.

On the final exam differences between the groups were dramatic. While dropping items from study didn’t have much of an effect, the people who dropped items from testing performed relatively poorly: they could only remember about 35% of the word pairs, compared to 80% for people who kept testing items after they had learnt them.

It seems the effective way to learn is to practice retrieving items from memory, not trying to cement them in there by further study. Moreover, dropping items entirely from your revision, which is the advice given by many study guides, is wrong. You can stop studying them if you’ve learnt them, but you should keep testing what you’ve learnt if you want to remember them at the time of the final exam.

Finally, the researchers had the neat idea of asking their participants how well they would remember what they had learnt. All groups guessed at about 50%. This was a large overestimate for those who dropped items from test (and an underestimate from those who kept testing learnt items).

So it seems that we have a metacognitive blind spot for which revision strategies will work best. Making this a situation where we need to be guided by the evidence, and not our instinct. But the evidence has a moral for teachers as well: there’s more to testing than finding out what students know – tests can also help us remember.

Read more: Why cramming for tests often fails

This is my BBC Future column from last week. The original is here


17 Dec 12:44

The Golden Fleece and the Argonauts

by AdrienneMayor

"Ram-bird"by Adrienne Mayor

The origins of the oral traditions about the voyage of  Jason and the Argonauts across the Black Sea to the land of golden treasure (ancient Colchis, modern Georgia) are uncertain. The tale evolved into an epic poem sometime before Homer (8th century BC). While the epic sailing expedition to find the Golden Fleece is an imaginary adventure set in the Bronze Age and features several magic and other mythic episodes, the story also contains many nuggets of historical, ethnographic, geographic, and natural realities. Greek travelers reached the far shores of the Black Sea at a very early date, since names from the languages of Colchis and the Caucasus are preserved in archaic Greek myths and appear in inscriptions on ancient Greek artifacts. For example, Apsyrtos, Medea’s brother, has an Abkhazian name, and Circe, the seductive sorceress in Homer’s Odyssey) means “The Circassian.”


WHAT WAS THE GOLDEN FLEECE?

The Golden Fleece sought by the Argonauts has been taken by scholars to merely symbolize the wealth of Colchis. But the true identity of the Golden Fleece was already recognized in antiquity, by the the natural historian Pliny. The meaning of the Golden Fleece was also understood by the geographer Strabo, a native of Pontus who had probably traveled to neighboring Colchis.

Appian (Roman historian born ca. AD 95), gives the fullest explanation of the local tradition that explains the Golden Fleece. People of western Colchis (Svaneti) submerged ram’s fleece in streams and rivers to collect gold grains and flakes carried down from the mountains. This ancient technique is still used by local mountain villagers in Svaneti. It is plausible that it was employed in the Bronze Age. Geologists today report that gold is still suspended in rivers of western Colchis. The fact that gold adheres to the fleece would have been discovered serendipitously when people washed new lambskins in rushing streams that contained plentiful gold flakes.

When Greek adventurers sailed to Colchis and reported on its golden treasures in archaic times, they may have repeated vague rumors about the mysterious “Golden Fleece,” as something unknown associated with the fabulous gold treasures of Colchis. Later Greek travelers heard explanations of the technique and then observed it firsthand.
By the 7th century BC, Greeks had established trade colonies along the coast of Colchis in order to obtain the famous Scythian and Caucasian gold. Archaic Greeks were fascinated by the romance and mystery of “golden fleece” before they understood the technology.

This fleece technique was mystery to the Greeks because it only works in certain geographic/geological conditions, where rivers and streams are laden with gold sand eroding from high mountains bearing igneous rock with rich veins of gold. In the famous Scythian gold fields of the Central Asian deserts, for example, Bronze Age prospectors could not use the fleece method; they sifted sand for placer gold, brought down by erosion into dry gullies along the silk route below from the Altai (“gold”) Mountains.

GOLDEN FLEECE ARTIFACT

Among the small gold and bronze artifacts of rams of Colchis are what scholars describe as a curious “ram-bird” figurine (see image above), supposedly combining a ram’s head with a bird’s tail. But it seems obvious that this figure is not meant to depict a hybrid ram-bird. Instead it resembles a ram’s hide with the head attached, a common way to display and identify hides (think bearskin rugs with head attached). The texture on the hide indicates gold particles. The so-called ram-bird figurines likely represent the Golden Fleece.

About the author: A Research Scholar in Classics and History of Science, Stanford University. Adrienne Mayor is the author of  “The Poison King: Mithradates, Rome’s Deadliest Enemy,” a nonfiction finalist for the 2009 National Book Award, and “The Amazons: Lives and Legends of Warrior Women across the Ancient World” (2014).

17 Dec 04:36

My email is a monster

by Matthew Inman
Scott Akerman

Ugh, the fake courtesy in writing an email is a butt. I still send and get emails from people I talk to everyday of the form: "Hi ____, Yadda yadda yadda. Thanks, ___"

17 Dec 03:57

#1081; The Lingering Icebergs (1 of 3)

by David Malki

the only thing not crossed out on this list is 'figure out how to reconcile yourself to a level of productivity that you can reasonably achieve'

17 Dec 03:57

#1080; In which Excitement is sought

by David Malki

Meanwhile, for the deer, it's just another Thursday.

17 Dec 03:48

Diagnosis

by Justin Boyd

Diagnosis

Hello me.

–WENDELL–

Bonus Wendell for everyone. This is the face he makes when you give him a bit of an orange. My girlfriend and I call it his Orange Face.

orangeface

This Orange Face is currently the wallpaper on my phone and it makes me happy.



bonus panel
17 Dec 03:47

To-do

by Justin Boyd

To-do

I just opened up a couple of my todo.txt files. Yeah, there is a lot of stuff that was never to-done…

Maybe I’ll go old school and go with the Post-It approach.



bonus panel
17 Dec 03:46

Hark, A Vagrant: Lady's Favor




buy this print!

It's always Stupid Medieval Type Joke Day here at Hark A Vagrant


Topatoco's holiday shipping deadlines approach, so get it while it's hot/available!

Clicking on the image will take you to the store. Hooray!!


17 Dec 03:36

DIY Gift Idea: Surprise Balls!

by Tara

DnD Surprise Ball

Surprise balls are one of the ultimate DIY gifts. Seriously. These gifts are like mini parties in one: your recipient has the joy of unwrapping their gift and getting multiple tiny surprises, while covering themselves with colorful crepe paper! Plus, you look like a wonderful and creative human being, and it only took you a few bucks and a few minutes! Win-win.

The premise is simple: Start with your largest gift in the center and wrap around it with crepe paper streamers. Continue to wrap the streamer around, working it towards a ball-shape, and pause every once in a while to add another small gift. Continue to do this until all gifts are fully wrapped inside of the ball. That’s it!

Surprise Ball Steps

The fun, though, is coming up with ways to decorate and theme the ball. You can change the color of the streamers throughout by taping two colored streamers together, you can dress up the front with washi tape and stickers, or you can create a replica of a round object and theme the gifts inside appropriately.

Harry Potter Surprise Ball

Here are some ideas for geeky surprise balls:

HP Ball Contents

The Golden Snitch

Using gold crepe paper, create a surprise ball and add wings to the back. Fill with Harry Potter-themed goodies! These can include:

  • Bertie Botts Every Flavor Beans
  • Gold from Gringotts Bank
  • A Time Turner
  • Pins, stickers, and other accessories in the recipient’s house colors
  • Favorite quotes from the books

DnD Ball Contents

The Dungeon Master

Invite your friends to a Dungeons and Dragons game, and give them everything they’ll need to start their adventure! This can include:

  • A set of dice
  • A miniature
  • Riddles or puzzles
  • Clues that will help them during the campaign
  • “Coupons” they can cash in during the campaign. For instance:
    • Redeem this slip of paper for: One re-roll. (Can be given to another player or NPC.)
    • Redeem this slip of paper for: One random item from the Trinkets page.
    • Redeem this slip of paper for: Advantage or Disadvantage on the roll of your choice. (Can be given to another player or NPC.)

Here are some other fun ideas:

  • Put a bunch of stocking stuffers/candies in a surprise ball with black crepe paper streamers–it’ll look like coal!
  • Make a pokeball-themed surprise ball with mini Pokemon goodies inside!
  • Know a sports fan? Put sports-themed goodies (or a note saying you’ve got tickets to the big game) inside a surprise ball that looks like their sports ball of choice!

What type of surprise ball do you want to make? Let me know in the comments!

11 Dec 13:23

Recipe: Edible Fireballs

by Tara

Edible FireballsTruffles are one of my go-to treats for the holidays. They’re a delicious treat that would be considered a bit of a luxury when bought from a chocolate shop. Once you get the hang of the recipe, it’s a lot of fun to create custom flavor and presentation combos to suit the recipient. These fireball truffles were created for a Dungeons and Dragons lover. The truffle, named after a popular spell from D&D, has a hint of spice and a bit of a kick from the Pop Rocks. Use them to butter up a new DM or make them for everyone in your adventuring party!

Ingredients:

  • 3/4 cup heavy whipping cream,
  • 2 12 oz. bags of semi-sweet chocolate chips
  • 1/2 tsp cayenne pepper
  • 1 tsp cinnamon
  • red Pop Rocks

Directions:

In a medium-sized saucepan, mix the cream, cayenne pepper, and cinnamon together over medium-low heat. Heat until it starts simmering.

Turn off the stove and start adding 12 oz. of semi-sweet chocolate chips into the mixture. Stir until the chocolate has melted and everything is smooth and mixed together.

Pour the mixture onto a wax paper lined pie plate or shallow casserole dish. Place in the fridge to chill for 1+ hours or until firm but scoopable.

Remove the plate from the fridge and roll the truffle filling into small balls using a spoon and your hands. Sizing of the balls is up to you, I’d recommend sizing them somewhere between a teaspoon and a tablespoon. Place the balls on a plate covered in wax paper and place back in the fridge for 30 minutes.

Place the other 12 ounces of chocolate in a bowl and microwave for 30 seconds. Stir, then microwave in 10 second intervals while mixing in between until the chocolate is smooth.  Microwaving for longer can result in burnt chocolate. Trust me–you don’t want that. (If your chocolate stops melting/mixing and starts looking clumpy/gritty while smelling bad, you’ve burnt it.)

Pull the truffle balls out of the fridge and dip into the melted chocolate. (Use a fork to fish the truffles out of the chocolate so any excess can go through the tines.) Place the dipped chocolates on a wax paper lined plate or cookie sheet.

While the chocolate is still wet, sprinkle red Pop Rocks on the top.

Place back into the fridge until you’re ready to serve!

 

11 Dec 13:22

Nuclear Reactor Building, North Carolina State College, Raleigh, N.C.

by Raleigh Boy

NC State Reactor_web

Did you know Raleigh is the home of the nation’s “First Temple of the Atom”? You can find out why this week on Flashback Friday as we visit the Nuclear Reactor Building on the NC State campus.

NC State Reactor_back_web

No message this week!

Nuclear Reactor Building
This is the first facility of its kind to be devoted exclusively to peacetime development of the atom. The unique one-story building which houses the reactor also contains the training and research laboratories, and an observation room.This is the first college-owned reactor and is open to the public without restriction.

The R-1 reactor was the first non-government-run nuclear reactor in the world and the first designed, built, and operated by an academic institution. Design and construction began in 1950, and was completed in 1955.

Photo courtesy NCSU Libraries Special Collections Research Center

Photo courtesy NCSU Libraries Special Collections Research Center

In this ca 1955 photo the brand new Nuclear Reactor Building is ready to split its first atom.

“The First Temple of the Atom”

National attention was brought to NC State in 1955 when the first nuclear reactor in the world devoted solely to the peacetime application of nuclear fission was installed in a building on campus specifically designed for the purpose.

Nicknamed the ‘first temple of the atom’ by the Associated Press, the nuclear reactor building, later renamed Burlington Nuclear Laboratories, was designed in 1951 by Raleigh architect G. Milton Small, Jr. It was his first major commission following the establishment of his own firm in 1949, and the first of his several subsequent projects for NC State.

The site chosen for the reactor building was an open, unpaved plaza on central campus, adjacent to the Diesel Engineering Building. At the time, a large concrete fountain, which had been built in 1947 as a cooling  tower for the diesel engines, occupied the site.

Photo courtesy NCSU Libraries Special Collections Research Center

Photo courtesy NCSU Libraries Special Collections Research Center

The futuristic-looking concrete fountain cooled the water which cooled the diesel engines located in the nearby Diesel Building. It was well over 20 feet tall.

(Note to readers: the structure seen in the background is not the Diesel Building. Anybody care to guess what that building is and what later replaced it; and where the Diesel Building itself is located?)

Photo courtesy NCSU Libraries Special Collections Research Center

Photo courtesy NCSU Libraries Special Collections Research Center

Construction of the Nuclear Reactor Building began with the installation of the R-1 reactor. Below, the steel framework of the building and its cooling tower takes shape.

Photo courtesy NCSU Libraries Special Collections Research Center

Photo courtesy NCSU Libraries Special Collections Research Center

The reactor sits in the center of a room that is 8 feet below ground level, 60 feet in diameter, and 35 feet high.

Photo courtesy NCSU Libraries Special Collections Research Center

Photo courtesy NCSU Libraries Special Collections Research Center

Here is the control panel which operated the reactor.

Photo courtesy NCSU Libraries Special Collections Research Center

Photo courtesy NCSU Libraries Special Collections Research Center

At the dedication of the Nuclear Reactor Building in 1955 Gov. Luther Hodges himself takes the controls.

State Archives of North Carolina photo

State Archives of North Carolina photo

This 1960s video features technicians operating the R-1 nuclear reactor. (Run time 6 minutes. Courtesy NCSU Libraries Special Collections Research Center)

Curiously, in November 1963, as a condition of maintenance, 60 gallons of anti-freeze were poured into the reactor’s cooling tower to keep the 250 gallons of water in the tower from freezing during the winter.

The nuclear reactor building was enlarged in 1973, at which time the name was changed from Burlington Nuclear Laboratories to Burlington Nuclear Engineering Laboratories.

Nowadays nuclear studies at NC State University include training of nuclear reactor operators, methods of power generation using nuclear science, and the medical and industrial uses of radiation.

Photo courtesy NCSU Libraries Special Collections Research Center

Photo courtesy NCSU Libraries Special Collections Research Center

This mid-1960s aerial view shows Burlington Labs and the adjacent diesel cooling fountain. The oddball campus landmark was demolished in 1972 to make way for a three-story addition to Burlington Labs. The rest of the plaza was later transformed into the Gardner Arboretum in the mid-1970s.

 

Our Flashback Friday photochrome postcard this week was printed by Colourpicture Publishers of Boston, MA.

Colourpicture Publishers  (1938-1969)
Boston and Cambridge, MA

A major publisher and printer of linen view-cards of the United States. They later went on to publish photochromes and small spiral bound picture booklets under the name trade name Plastichrome in the 1950’s.

 

“Flashback Friday” is a weekly feature of Goodnight, Raleigh! in which we showcase vintage postcards depicting our historic capital city. We hope you enjoy this week end treat!

 

 

 

 

 

 

02 Dec 18:13

Evidence based debunking

by tomstafford
Scott Akerman

Debunking (especially online debunking) is so tricky and the backfire effects are largely why I've just stopped trying.

Fed up with futile internet arguments, a bunch of psychologists investigated how best to correct false ideas. Tom Stafford discovers how to debunk properly.

We all resist changing our beliefs about the world, but what happens when some of those beliefs are based on misinformation? Is there a right way to correct someone when they believe something that’s wrong?

Stephen Lewandowsky and John Cook set out to review the science on this topic, and even carried out a few experiments of their own. This effort led to their “Debunker’s Handbook“, which gives practical, evidence-based techniques for correcting misinformation about, say, climate change or evolution. Yet the findings apply to any situation where you find the facts are falling on deaf ears.

The first thing their review turned up is the importance of “backfire effects” – when telling people that they are wrong only strengthens their belief. In one experiment, for example, researchers gave people newspaper corrections that contradicted their views and politics, on topics ranging from tax reform to the existence of weapons of mass destruction. The corrections were not only ignored – they entrenched people’s pre-existing positions.

Backfire effects pick up strength when you have no particular reason to trust the person you are talking to. This perhaps explains why climate sceptics with more scientific education tend to be the most sceptical that humans are causing global warming.

The irony is that understanding backfire effects requires that we debunk a false understanding of our own. Too often, argue Lewandowsky and Cook, communicators assume a ‘deficit model’ in their interactions with the misinformed. This is the idea that we have the right information, and all we need to do to make people believe is to somehow “fill in” the deficit in other people’s understanding. Just telling people the evidence for the truth will be enough to replace their false beliefs. Beliefs don’t work like that.

Psychological factors affect how we process information – such as what we already believe, who we trust and how we remember. Debunkers need to work with this, rather than against if they want the best chance of being believed.

The most important thing is to provide an alternative explanation. An experiment by Hollryn Johnson and Colleen Seifert, shows how to persuade people better. These two psychologists recruited participants to listen to news reports about a fictional warehouse fire, and then answer some comprehension questions.

Some of the participants were told that the fire was started by a short circuit in a closet near some cylinders containing potentially explosive gas. Yet when this information was corrected – by saying the closet was empty – they still clung to the belief.

A follow-up experiment showed the best way to effectively correct such misinformation. The follow-up was similar to the first experiment, except that it involved participants who were given a plausible alternative explanation: that evidence was found that arson caused the fire. It was only those who were given a plausible alternative that were able to let go of the misinformation about the gas cylinders.

Lewandowsky and Cook argue that experiments like these show the dangers of arguing against a misinformed position. If you try and debunk a myth, you may end up reinforcing that belief, strengthening the misinformation in people’s mind without making the correct information take hold.

What you must do, they argue, is to start with the plausible alternative (that obviously you believe is correct). If you must mention a myth, you should mention this second, and only after clearly warning people that you’re about to discuss something that isn’t true.

This debunking advice is also worth bearing in mind if you find yourself clinging to your own beliefs in the face of contradictory facts. You can’t be right all of the time, after all.

Read more about the best way to win an argument.

If you have an everyday psychological phenomenon you’d like to see written about in these columns please get in touch @tomstafford or ideas@idiolect.org.uk. Thanks to Ullrich Ecker for advice on this topic.

This is my BBC Future column from last week, original here


01 Dec 15:21

Handwritten Russian Cipher Stumps FBI

by April Stevens
Scott Akerman

Ciphers are so friggin cool. I need to read up on this stuff more so I can actually have decent understanding of them.

By Riley Dankovich (Guest Contributor)

Hollow Nickel

FBI (2008). The hollow nickel handed to the Brooklyn paperboy

In the wake of World War II, when cryptography had largely become mechanized, no one expected one of the most difficult-to-crack ciphers to be one created using pencil and paper.

In the summer of 1953, a young boy in Brooklyn received payment for a newspaper sale — unlike ordinary payment, one of the nickels was hollow. Something about the nickel seemed strange to the boy; he threw it to the ground, where it promptly split open. Inside was a piece of microfilm with 10 columns of numbers. Within days, word had reached a detective about the hollow nickel, which was quickly turned over to the FBI. The nickel, it turns out, was given to the paperboy by the wife of a Russian spy.

For four years, the FBI struggled with this cipher. They referred to the case as the “Hollow Nickel Case” (Rudolph), as they knew next to nothing else about the cipher text on the piece of microfilm, and had no further cipher text. Fortunately for the FBI, in 1957, a man approached them, declaring that he was a Russian intelligence officer, and wanted to defect. This man was Reino Häyhänen, codenamed “VICTOR,” from which the VIC Cipher, as this cipher came to be called, derives its name. After nearly four years without making much progress, Häyhänen’s defection was the FBI’s lucky break.

Likely the most complex pen and paper cipher ever created, the technical name for the VIC Cipher would be “a ‘straddling bipartite monoalphabetic substitution superenciphered by modified double transposition’” (Kahn). Most hand ciphers are either substitution ciphers, in which the letters are substituted for either other letters or numbers, or transposition ciphers, in which the order of the letters is scrambled. As cryptography became more advanced, cryptographers began to combine the two. The VIC Cipher contains not only a substitution and two transpositions, but also is passed through a straddling checkerboard to obtain the substitution, and then split in half (bipartite). Though this all seems incredibly complicated, the agent enciphering the text needed only to remember four simple key words or phrases, making messages much simpler to encipher for the Russians than to decipher for foreign intelligence.

The Straddling Checkerboard

A straddling checkerboard is a manner in which to obtain a more complex substitution, one that is therefore more difficult to decipher. It needs a keyword, which, in the case of the VIC Cipher, was СНЕГОПА, or “snowfall” in Russian. The numbers 0-9 are scrambled and placed above a ten-column-by-four-row grid.

Transposition Table 1

Riley Dankovich (2014). Straddling checkerboard using the keyword СНЕГОПА (“snowfall”)

Under the numbers, the keyword (СНЕГОПА) is placed in the first row, leaving the last three columns blank. In the next three rows, the rest of the Russian alphabet follows, including a “.” and a “,” as well as the symbols Н/Ц, П/Л, Н/Т, and ПВТ, each of which have a meaning helpful to decipherment. The three numbers above the blanks left by the keyword are placed at the beginning of the second, third, and fourth rows. The letters in the first row, the keyword, will be enciphered as the numbers at the top of their subsequent columns. Any letter in the other rows, however, will be enciphered as two numbers: first, the number at the beginning of its row, and then the number at the top of its column. The word СПОСИБО (“thank you”) would be enciphered as 5 9 8 5 8 20 65 8. Before the plaintext is run through the straddling checkerboard, it is bisected. As a bisected cipher, the plaintext is cut into two parts in some random place, and the first half is attached to the end of the last half. The symbol H/T is placed before the true beginning of the cipher.

Next Comes Transposition Tables

After being run through the straddling checkerboard, what is now the cipher text is run through two transposition tables. This cipher uses three pieces of information (the first twenty letters of a popular Russian song, the date of Allied victory over Japan, and Häyhänen’s personal identification number) to generate a string of seemingly random numbers. These numbers determine the number of columns and rows in the tables, and several other minor factors. The cipher manipulates these three pieces of information, which have all been converted to numbers, using arithmetic modulo 10 and chain arithmetic. In modulo 10 arithmetic, once two numbers are added, the digit in the tens place is dropped. In chain arithmetic, numbers in a series are added continually until a desired series length is reached.

Transposition Table 2

Riley Dankovich (2014). Beginning of Transposition Table 2, with disruption areas outlined

If the original series is, for example, 4, 9, 5, 3 7, the first two digits, 4 and 9, are added together (dropping the tens digit) to get 3, which is then added to the end of the series. Then the second and third digits, 9 and 5, are added to get 4, to get a series of 4, 9, 5, 3, 7, 3, 4, … until the desired series length (one of the factors determined by the seemingly random numbers) is reached. The numbers obtained from the straddling checkerboard are arranged in the first transposition table and then taken out in a different order and put into the second table. The numbers are taken in order from this table to form the final ciphertext.

Transposition ciphers, even without added manipulations, are difficult to decipher, though less so with the use of a strong computer. Because a transposition cipher simply rearranges the letters, the number of possible plaintexts can be determined easily, though the correct one is difficult to determine. If a cipher text has only 10 letters, it will have 10! (10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1) possible arrangements. This amounts to upwards of three million possibilities, and the VIC cipher is a great deal longer than 10 letters.

Original VIC cipher

FBI (2008). The original cipher text of the VIC Cipher on microfilm

The VIC Cipher that Häyhäden explained to the FBI was sent to him from the Soviet Union soon after he arrived in the United States. Far from containing sinister instructions, the beginning of the decoded message read (in Russian): “We congratulate you on a safe arrival. We confirm the receipt of your letter to the address “V repeat V” and the reading of letter number 1” (Rudolph). Knowing the mechanism of this cipher, however, allowed the FBI to arrest, among others, Colonel Rudolf Ivanovich Abel, a Russian spy. He was sentenced to prison on three counts of conspiracy. As written in the FBI’s article Rudolph Ivanovich Abel (Hollow Nickel Case), “an investigation which had started with a newsboy’s hollow nickel ultimately resulted in the smashing of a Soviet spy ring.”

This cipher, though written with the simplest of utensils, pencil and paper and some arithmetic, stumped the United States’ foremost intelligence bureau for four years. Without the defection of Häyhänen, the world would still probably see the VIC Cipher as only 1035 numbers on microfilm (Kahn).Widely regarded as “the most complex hand-operated cipher ever seen,” the VIC Cipher was, to put it simply, an astronomically impressive feat of cryptographic skill.

 

This post is part of a series of essays on the history of cryptography produced by students at Vanderbilt University in honor of the release of The Imitation Game, a major motion picture about the life of British codebreaker and mathematician Alan Turing. The students wrote these essays for an assignment in a first-year writing seminar taught by mathematics instructor Derek Bruff.  For more information on the cryptography seminar, see the course blog.  And for more information on The Imitation Game, which opens in the US on November 28, 2014, see the film’s website.

Sources:

Book cipher, running key cipher, vic cipher and secom cipher. Retrieved October 14, 2014, from http://rageuniversity.com/PRISONESCAPE/COMMUNICATION%20CODES%20AND%20INKS/BOOK%20CIPHER,%20RUNNING%20KEY%20CIPHER,%20VIC%20CIPHER%20AND%20SECOM%20CIPHER.pdf

Clarke, B. (2008, October 13). Hollow nickel spy case. Retrieved October 14, 2014, from http://www.prc68.com/I/NickelSpy.shtml

FBI. (2008). Hollow Nickel [Photograph], Retrieved October 14, 2014, from: http://commons.wikimedia.org/wiki/File:Hollow_Nickel.jpg

FBI. (2008). Hollow Nickel Message [Photograph], Retrieved October 14, 2014, from: http://commons.wikimedia.org/wiki/File:Hollow_Nickel_Message.jpg

Kahn, D. (1993, September 22). Number one from Moscow. Retrieved October 14, 2014, from https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol5no4/html/v05i4a09p_0001.htm

Rudolph Ivanovich Abel (hollow nickel case). (n.d.). Retrieved October 14, 2014, from http://www.fbi.gov/about-us/history/famous-cases/hollow-nickel/rudolph-ivanovich-abel-hollow-nickel-case/

01 Dec 12:39

Let’s Play Fair: A Deceptively Simple Cipher

by April Stevens

By Nathan Dumessa (Guest Contributor)

Lock

“Good Bye.” by Zarko Drincic via Flickr CC.

What is the best way to keep your secret messages safe? Using a cipher that is deceptively simple. This is what makes the Playfair cipher stand out among the other ciphers.

Charles Wheatstone may be more famous for his contributions to the invention of the telegraph, but what some may not know is that he invented the Playfair cipher, which he named after his friend, Lyon Playfair. Wheatstone was also an important figure in the study of vision. He made a revolutionary contribution with his invention of the stereoscope in 1838 (Banerjee, 2014). This was one of his greatest inventions that led to his popularity. In addition, his work on the telegraph may have led to the creation of the Playfair cipher. After all, the invention of the telegraph was a game-changer in the world of cryptography.

One of the most famous uses of the Playfair Cipher involved John F. Kennedy during World War II (Lyons, n.d.). He was able to send a message encrypted using this cipher when his PT-109 sank in the Solomon Islands and managed to get his crew and himself rescued.

What I really admire about this cipher is how simple it can seem, but is actually difficult to decipher. The structure of the Playfair cipher is a 5×5 grid of the English alphabet. This will of course exclude a letter, but in this cipher, the letters I and J are combined to represent one letter. Similar to the Keyword Cipher, the Playfair cipher also uses a keyword. The rules for the keyword apply here as well with the addition of one new rule: If any letter is repeated in the key, it is eliminated, the entire grid has to contain all of the letters except for J since it is represented by the letter I, and finally the key cannot contain the letters J and I.

The next step to setting up this cipher is to split up your message into two-letter pairs called digraphs. When doing this, you have to disregard all punctuation and write out any numbers that may be included. Now there are a few restrictions that apply here: Any double letters are separated by the letter X, and if you have an odd number of letters in your message, you add an extra X at the end to make it even, for example, the word BELL would be written as BE LX LX. Now the only thing left is to encrypt the message. So for this example our sentence will be HE RANG THE BELL AT SEVEN PMPlayfair Cipher

The sentence would then be broken apart into: HERANGTHEBELLATSEVENPM

HE RA NG TH EB EL LA TS EV EN PM

Note that it was not necessary to put an X between the two L’s in the word BELL because they were in two separate digraphs.

The encryption process has a specific algorithm. For our example, we will use the keyword LYON and set up a grid first.

Now to encrypt our message, we will look at each pair of letters at a time.

HE RA NG TH EB EL LA TS EV EN PM

The way you encrypt each pair is by looking at their locations in the grid, so HE forms a 2×3 rectangle. You start by looking at the H and following it to the E column and you get the letter K. Then you follow the E left to the H column and you get the letter B. So the first pair will be encrypted to KB.

If two letters are located in the same row, you would shift one position to the right. For example, if you are trying to encrypt the letters IM, it would be translated to KP. If the letters are in the same row and in the first or last columns for example LA, you would translate it to YL. Similarly, if two letters are in the same column, you would shift down one position so the letters AP for example, would be encrypted to GU, and following the same pattern, CW would be translated to IY.

So our message would be encrypted to:

HE RA NG TH EB EL LA TS EV EN PM

KB UY AF QM FC BO YL UT BX FO HP

Or: KBUYAFQMFCBOYLUTBXFOHP

Clock

“Time Is Running out.. Explored.” By richardbrunsveld.nl. via Flickr CC..

The main weakness of the Playfair cipher is the fact that the sender would have to inform the recipient of the keyword. If an enemy were to intercept this information, the message would be decrypted in a very short amount of time. However, without information on the key, cracking this cipher would prove to be a daunting task.

In attempting to cryptanalyze a message like this, one would first need to figure out whether or not it is a Playfair cipher. The important characteristics are: an even number of letters, no double letters, and if it’s a long message, a frequency analysis that shows no more than 25 letters. Once that is done, most of the approach involves a trial and error method. Contextual evidence would help because it would provide some plausible guesses. Because the cipher is digraphic, substituting a pair of letters at a time, frequency analysis would not be an efficient method to decipher it. Therefore, a cryptanalyst would have to use a different approach to crack this cipher. One thing to consider is that in this cipher, reversed plaintext digraphs correspond to reversed cipher text digraphs, so that would help pick out a few letters.

The Playfair cipher was actually used in World War II by the German army, but instead of using the regular cipher, they used a double Playfair which eliminated the weaknesses in the cipher (Christensen, 2006). In the double Playfair, the first letter of the digraph would be in one grid and the second would be in the other. Therefore, reversed plaintext digraphs would not actually correspond to reversed cipher text digraphs. In addition, double letters could be present in the cipher text which can give a false pattern to a cryptanalyst.

The Playfair cipher is one that is very simple to utilize but time consuming and difficult to decipher. The main weakness is how easy it is to crack it if someone knows the keyword. Otherwise, it is one of the best ciphers to securely encrypt a message as long as your intended recipient knows the key. It is important to note that the keyword is vital. The security of the message depends on the mutual understanding of the key between the sender and recipient and as little written evidence of it as possible.

I will leave you with this:

TAZSQVRMIPPBLMDQDYRIRFEPDATAQLMCRCPQAFTAFAVAMIIDLMALEOIMERVTHFSVKZ

This post is part of a series of essays on the history of cryptography produced by students at Vanderbilt University in honor of the release of The Imitation Game, a major motion picture about the life of British codebreaker and mathematician Alan Turing. The students wrote these essays for an assignment in a first-year writing seminar taught by mathematics instructor Derek Bruff.  For more information on the cryptography seminar, see the course blog.  And for more information on The Imitation Game, which opens in the US on November 28, 2014, see the film’s website.

Sources:

Akins, T. Playfair Cipher. (n.d.). Retrieved October 15, 2014. http://rumkin.com/tools/cipher/playfair.php.

Banerjee, J. (2014, August 15). Charles Wheatstone (1802-1875). Retrieved October 15, 2014. http://www.victorianweb.org/technology/inventors/wheatstone.html

Christensen, C. (2006, January 1). Playfair Cipher. Retrieved October 15, 2014. http://www.nku.edu/~christensen/section%2019%20playfair%20cipher.pdf

Lyons, J. Playfair Cipher. (n.d.). Retrieved October 15, 2014. http://practicalcryptography.com/ciphers/playfair-cipher/

22 Nov 20:06

#1077; In which it’s Lonely at the Top

by David Malki

Chompsenberg had a few good turns in that Krandanayev anthology but Krandanayev was never the same post-Trantlydoff.

19 Nov 23:01

Downtowner Motor Inn, Raleigh, N.C.

by Raleigh Boy

Raleigh Downtowner_web

This week’s Flashback Friday postcard is a colorful depiction of Raleigh’s Downtowner Motor Inn, one of the handful of urban motels that once dotted the downtown area in the 1960s.

Raleigh Downtowner_back_web

Downtowner Motor Inn
309 Hillsboro St
Raleigh, North Carolina

Combined advantages of Motel and Hotel facilities in a Downtown location. 82 Spacious Rooms — Free T.V. — Heated Swimming Pool — Free Parking — No Tipping — Candlelight Restaurant — Free TWX Reservation Service. For the finest in accommodations Phone: 833-5771

That ‘free TV’ was color TV, I’m sure — Nonetheless, the description of the Raleigh Downtowner says it all!

This week’s card was postmarked on April 11, 1967.

Hi: Hope all is well with the two of you. I’m fine, & am working here. Head housekeeper, and am living at 410 Elm St. Raleigh. Thought you might like a card & stamp.

Love,
Lillian

Love the way ‘Lillian’ crossed out the motel’s address and wrote over it her own. I wonder how her tenure as head housekeeper at the Downtowner worked out?

The Thing About the Downtowner Motor Inn

The Downtowner Corporation was organized in 1958 in Memphis, TN. The chain targeted downtown business districts in medium-sized cities throughout the South and Midwest as the focus location for its motels.

Downtowner Motor Inns opted to locate near larger established hotels with the aim to accommodate room shortages during conventions, trade shows and other similar big-draw events.

The company embraced a modernist architectural style as their building brand, characteristically using a grid pattern of colorful panels as their signature street facade.

downtowner_Columbia SC_web

These two 1960s chrome postcards depict the Columbia, SC Downtowner Inn, above; below, the Downtowner Motor Inn in Wheeling, WV bears a striking resemblance to the Raleigh Downtowner.

DowntownerInn-1967 Wheeling WV

Before It Was Raleigh’s Downtowner

Raleigh’s Downtowner was erected in 1964 at 309 Hillsboro St., once the site of the grand Jeremiah Stainback residence.

State Archives of North Carolina photo

State Archives of North Carolina photo

The Jeremiah Stainback residence at 309 Hillsboro St, ca 1905.

The Victorian era house had been built on Raleigh’s fashionable residential Hillsboro St. in the 1890s. Jeremiah Stainback acquired it around 1903, and lived there with his family until the mid 1920s.

By 1927 a partnership of five local physicians bought the property, and, with one of the partners living in residence, occupied the mansion for nearly 35 years.

The Rise and Fall of Raleigh’s Downtowner Motor Inn

Raleigh City Directories listed the former Stainback lot as ‘vacant’ in 1962, ‘under construction’ in 1963, and finally as the ‘Downtowner Motor Inn and Candlelight Restaurant’ in 1964. Sadly, though, too much, too late.

As Raleigh’s downtown business district declined during the late 1960s and into the 1980s, so did its urban motels, including, among others, the Raleigh Cabana Motel, the Heart of Raleigh Motel, the Raleigh TraveLodge and the Raleigh Downtowner Motor Inn.

Raleighs_Heart_of_Raleigh_Motel_Raleigh_NC_web

The Heart of Raleigh Motel opened about 1960 in the repurposed Faircloth Hall, a onetime dormitory on the former downtown Meredith College campus.

By 1973 the motel had been renamed the Golden Eagle Motor Inn. From 1977 to 1978 the Downtowner name was back. In 1979, following a corporate merger, it was rebranded the Downtowner/Eagle Motor Inn. Then for two years, 1980-82, it operated under the name Downtowner/Capital Motor Inn. As the decline continued, the motel became an EconoLodge Motel, 1983-89; and finally, 1990-92, a Friendship Inn.

By that time the former Downtowner was a lost cause and could no longer maintain any measure of profitability.  The hulking and deteriorating building, which had long lost its bright modernist color scheme, was demolished in 1993. The site of this once vibrant urban motel today is a parking lot.

 

Our Flashback Friday photochrome postcard this week was printed by the Curt Teich Co. of Chicago under the trade name ‘CurTeichColor.’

Curt Teich Co. (1893-1974)  Chicago, IL

A major publisher and printer. Their U.S. factories turned out more cards in quantity than any other printer. They published a wide range of national view-cards of America and Canada. Many consider them one of the finest producers of White Border Cards. The Linen Type postcard came about through their innovations as they pioneered the use of offset lithography. They were purchased by Regensteiner Publishers in 1974 which continued to print cards at the Chicago plant until 1978.

Curt Teich logo

 

“Flashback Friday” is a weekly feature of Goodnight, Raleigh! in which we showcase vintage postcards depicting our historic capital city. We hope you enjoy this week end treat!

 

14 Nov 00:58

Twitter Tuesday: The Dogs Selection

by Ursula Rodriguez

Our #TwitterTuesday theme for this week was #Dogs. Usually it’s tough to make our weekly selection but this time was certainly quite a challenge. You let us see how big is the love for your canines and the work we found in each of your photos was purely amazing! With so many different stages dogs were the super stars. Happy faces, sad faces, thoughtful faces… A wonderful awakening to the animal world.

Here are our favorites, but we highly recommend you to go directly to our Twitter Feeds to see all the original furry submissions.

_1020951-2
Loving Spring
Oscar
Hasta la vista Darla
Myrtle Smiling
Self and dog. Fujicolor Superia 200
27 - Aug - 2013 - Dog Day
#twittertuesday #dogs
Preguiça (Em preto, branco e amarelo)
IMG_3185
Duna
IMG_3208
King Socrates
I got snow on my nose!
365 weekly theme, #46.3, one subject
Sup Dog! - Border Collie
Cone Life.
Gunner
The dog that thought he was an ostrich.
Olly
Lily, Mam Tor, Derbyshire

14 Nov 00:51

The history of tampons – in ancient Greece?

by Helen King

by Helen King

Did ancient Greek women use tampons? It’s clear that women today are curious as to what women in the past did when they were menstruating. As regular readers of Wonders & Marvels know, I did my PhD on ancient Greek menstruation and I also feel I’m on a crusade to clear up some of the ‘creative’ (actually, just plain wrong) statements about Hippocrates that are out there on the WWW. In a previous post here I’ve looked at the ‘using rags’ theory. But recently I’ve come across another claim that seems to originate in the marketing for Tampax but which has been picked up without any critical analysis by a lot of other sites. The original source seems to be the claim on the Tampax site that “The Greek physician Hippocrates, writing in the fifth century B.C., described another type of tampon, which was made of lint wrapped around lightweight wood” .

Leaving aside the ‘did Hippocrates write anything in the Hippocratic corpus?’ question, can we really find anything like that in ancient Greek medicine? Variations on other internet sites that seem to derive from the Tampax claim include “as described in the writings of Hippocrates, a tampon used pieces of wood, wrapped [sic] fiber” and, with a cheerful disregard for the whole Greece/Rome thing, “Apparently Hippocrates documented that Roman women used wooden sticks wrapped with lint.”. I like that ‘apparently’. Someone else has realised that there is an important question about how we are supposed to know this: what’s the evidence?

The wonderful Museum of Menstruation site, which makes a real effort to identify its sources and to engage with historians working on the topic, is much more cautious, talking about ancient usage of “tampons for contraception, which possibly means that women also used material as tampons to control menstruation.” Note that ‘possibly’. Just because you insert things into the vagina for one purpose doesn’t mean you do it for another; although at least, as the founder of the Museum of Menstruation, Harry Finley, pointed out when we had a chat about this, it shows that there is no sort of taboo attached to such insertion.

Tampons up the nose?

So what about the ancient Greek medical texts that came to be known as the ‘Hippocratic corpus’? In the Hippocratic treatises Joints and Instruments of Reduction, when the nose is fractured, the physician is told to roll up lint in a rag or in thin Carthaginian leather (chosen because it is so soft) and insert this into the nose. The ancient Greek word used here is motos. This, as here, can mean lint for dressing wounds, but in its entry for motos the indispensable ancient Greek-English dictionary by Liddell, Scott and Jones (known cheerfully to classicists as ‘LSJ’) also gives ‘tent, tampon’. Is this where the imaginary ‘Hippocratic tampon’ comes from?

Now, in a medical context, a tent is not somewhere you spend the night during an outdoor vacation, but an expansible plug of soft material for opening up an orifice. In medical English, tampons also have a rather different meaning to that which we now assume. Before Tampax came on the scene, there were tampons, but not as we know them. A tampon was simply a plug of some sort, used to stop bleeding, and inserted into a wound or, if menstrual flow seemed excessive, into the vagina. The word comes from the verb ‘to tamp’ meaning to stop up a hole, or to push down – you can ‘tamp’ tobacco into the bowl of a pipe before smoking it. But when Tampax came on the scene as a commercial product, the word was shifted more narrowly towards menstruation, so today’s near-exclusive application of the word to menstrual products is the result of the invention of Tampax.

Does the motos feature in the Hipppocratic treatises on women’s bodies? Yes, but not in the context of a way of absorbing normal menstrual flow. In Diseases of Women 1 (Littré 8.138.12) it means some soothing lint applied to the mouth of the womb and in book 2 of the same treatise (Littré 8.332.18) there are three motoi of increasing size inserted into the mouth of the womb because the neck of the womb is hard and closed so the menstrual blood can’t get out. Similarly, although different words are used, when a remedy needs to be inserted into the vagina – for example, beetles to irritate the womb and bring on a delayed menstrual period – it is wrapped up in wool first. But none of these uses concerns management of normal menstrual flow.

The pig-pen?

There is one other isolated reference worth mentioning. This comes not from the ancient Greek medical texts but from the fifth-century BC comic playwright Aristophanes (Lysistrata 1073) who refers once to men looking like they are wearing a ‘pig-pen’ (choirokomeion) round their thighs. One of the ancient words for the female external genitalia is choiros – piggy – used for the genitals of a young girl, or – if depilated – of an older woman. So is the joke here about wearing something around your piggy that looks quite bulky – such as a home-made menstrual pad? The word choiros itself has an interesting masculine/feminine dimension, in that if it is used in the masculine it means ‘female genitalia’ but in the feminine, it’s ‘pig’! In fact, when the men who look like they are wearing pig-pens open their cloaks, what they are hiding under there are their erect penises.

If anyone would have made a choiros joke like this, it would be Aristophanes. He was well aware of the entertainment value of the word. Another of his plays, Acharnians, has an extended joke about a poor man who is trying to sell his daughters as ‘piggies’.  And in support of my suggestion, I can cite LSJ, not a dictionary to make daring assumptions. It gives as the meaning of choirokomeion – on this occasion only – ‘bandage used by females’. So is this what men called a menstrual pad, or what women called it? In any case, if we follow this line of reasoning, it could be further evidence that menstrual management in ancient Greece was by home-made pads of rags, rather than tampons.

 

For more on Aristophanes, try James Robson, Aristophanes: an Introduction (London: Bristol Classical Press, 2009) and watch the free online series ‘The Birth of Comedy’ that starts here.

 

14 Nov 00:44

Hallucinogenic bullets

by vaughanbell

An article in the American Journal of Forensic Medicine & Pathology discusses the history of ‘modern toxic antipersonnel projectiles’ and it has a short history of ammunition designed to introduce incapacitating hallucinogenic substances into the body.

As you might expect for such an unpleasant idea (chemical weapon hand guns!) they were wielded by some fairly unpleasant people

The Nazi Institute of Criminology then ordered a batch of more powerful 9-mm Parabellum cartridges that could be used with the Walther P38. This time the bullets contained Ditran, a mixture of 2 structural isomers comprising approximately 70% 1-ethyl-2-pyrrolidinylmethyl-alpha-phenylcyclopentylglycolate and 30% 1-ethyl-3-piperidyl-alpha-phenylcyclopentylglycolate (also known as Ditran B). Ditran B is the more active of the 2 isomers, both of which are strong anticholinergic drugs with hallucinogenic properties similar to those of scopolamine. Victims are thrown into such a state of mental confusion that they are incapable of reacting appropriately to the situations they find themselves in…

3-Quinuclidinyl benzilate, also known as QNB and coded BZ by NATO, is a military incapacitating agent. Like Ditran, it is an anticholinergic causing such intense mental confusion as to prevent any effective reaction against an enemy. These bullets were featured in the arsenal of the Serbian forces invading Bosnia-Herzegovina, particularly in Srebrenica in the 1990s.

 

Link to locked article ‘Modern Toxic Antipersonnel Projectiles’


05 Nov 03:12

Cabin Fever

by Justin Boyd
Scott Akerman

Haha, ha...ha....hmmmmm

Cabin Fever

Sometimes, you just gotta take things into your own hands and wait until someone else makes something happen.

–TF2–

Team Fortress 2 was a lot of fun! Thank you to everyone who made it out for the hangs and plays! I totally forgot how much fun that game is.

I definitely gotta keep planning gaming sessions for all of us. They always end up being a really great time.



bonus panel
05 Nov 03:09

I wanna go where the people aren't

by Jam
comic: 

Really excited about this show! *puts on pyjamas*

The first time I went to a teambuilding rave I didn't bring earplugs because I thought they would think I was a dork but they all brought earplugs and I suffered like an IDIOT. 

02 Nov 13:50

Davis in the Ice and Cold



Davis in the Ice and Cold

02 Nov 13:50

Davis in the Forest, Teeming with Life



Davis in the Forest, Teeming with Life

23 Oct 12:42

Wildlife Wednesday: Foxes

by Arnold Chao

For this week, we’re highlighting fans of the fox in our photography community with a photo roundup of these sly mammals, from red foxes in Canada to bat-eared foxes in Kenya.

Somethings Missing...

Newfoundland, Canada.

“This small, nocturnal animal was hanging out in the late morning next to an old termite hill that he had taken up as his shelter.” – Richard Rhee

Baby Fox

Ontario, Canada.

A lesser seen member of the family group, a vixen I think.
Full Of Life

“This family and the neighbouring one disappeared completely at the end of the summer, just like the family living here last year, no prizes for guessing what happened to them. Still I have some nice memories, not easy finding new fox families so I’ll probably find myself back here in the new year. I was gonna say hopefully new foxes will move in ( which they probably will ) but then it’s obviously not safe is it, but for a fox where is safe?” – Dan Belton

Fox on the Run

“This season I seem to have seen more foxes than usual, so I’m wondering if maybe their numbers are up. This stretch of road in the Cavendish section of PEI [Prince Edward Island] National Park is known for having a lot of foxes. Many tourists and locals feed them, which was really obvious with this one. It came running to our car looking for food, and moved on when it realized we had none. We stayed and saw it to this a few more times with other cars, and it spent a lot of time on the road. The parks staff are working to get people to stop feeding them, but I don’t think they’re having much success.” – Brianna Scott

Red Fox (Vulpes vulpes)

Lingfield, Surrey, U.K.

Bat eared foxes in dew L

Masai Mara National Reserve in Kenya.

Bat-Eared Fox (Kenya, Day 4)

Tsavo, Kenya.

Bat-eared Fox - Otocyon megalotis, Tsavo West NP, Nov 11

Tsavo West, Kenya.

This photo selection is inspired by the The Fox group.

To join this series, tweet @flickr with your favorite wildlife photos, and include the hashtag #WildlifeWednesday. And if you’d rather not tweet, simply include the same hashtag in your Flickr photo title, or tag it with WildlifeWednesday.

We look forward to seeing your contributions and featuring a new selection of your photo submissions and ideas every Wednesday here on our blog.

Previously featured in this series: Wildlife Wednesday: Bears


23 Oct 11:36

Girl Warrior Fantasies, c. 1700

by Holly Tucker
Scott Akerman

Damn SJWs have been perverting classical fiction since the 1600s.

By Christine A. Jones (Regular Contributor)

Anne Bonny

Chic girl pirate Anne Bonny

Fairy tales are how we imagine the unimaginable. Beans can be magic and grow to the heavens. Frightening beasts turn out to be great princes in disguise. And girls are saved from annoying home lives by fairies and talking animals. Crazy things can happen.

Fairy-tale history contains some really juicy stuff, not all of which made it into the Mother Goose canon. For instance, how about a girl who shows up at court dressed as a knight and becomes the queen’s lover? Crazy indeed! Well, during the 1690s three French women authors thought up an ingenious plot for fairy tales where girls did their fighting for themselves. They showed up at court dressed as soldiers and did battle for the king. In each case, in fact, they became the kingdom’s best warriors. They were valiant, but also gentle and kind, and knew how to fold laundry. A rare combination, to be sure. And in the longest and most famous of these stories, by Marie Chatherine d’Aulnoy, the cross-dressed heroine has to fend off the queen’s advances with all her might.

Okay, the girl warrior and the queen never become lovers, but the love triangle among the queen (who loves the knight), the knight (who loves the king), and the king (who loves the knight but cannot figure out why) makes up the entire plot of the story. Historically, there had been woman warriors in France by the seventeenth century, but none of them had had quite this much fun at court. Read d’Aulnoy’s story, “Belle-Belle or the Chevalier Fortunate”, in Jack Zipes, Beauties, Beasts and Enchantments: Classic French Fairy Tales (New York: New American Library, 1989).

Christine A. Jones is co-editing a fairy tale anthology and writing a book on early porcelain experiments in France.  She is Associate Professor of French and Comparative Literary and Cultural Studies at the University of Utah.

 

This post first appeared at Wonders & Marvels on 12 December 2009.