The degradation was greatest for the thermal cycling with the longest ramp period (slow thermal cycling). It was observed that the more the exposure time per cycle, the degradations in mechanical properties are higher. The test results were compared with each other in order to understand the effect of different thermal exposure profiles on the mechanical properties of SAC+Bi solder materials. Stress-strain tests were performed on the uniaxial test specimens to investigate the change in mechanical properties which includes effective elastic modulus (E) and ultimate tensile strength (UTS). Several thermal exposure profiles between T =-40 o C and T = 125 o C were investigated: (1) 150 minutes cycles with 45 minute ramps and 30 minute dwells (slow thermal cycling), (2) air-to-air thermal shock exposures with 30 minute dwells and near instantaneous ramps (thermal shock), (3) 90 minute cycles with 45 minute ramps and 0 minute dwells (thermal ramping), and (4) isothermal aging at the high temperature extreme (aging). In particular, SAC+Bi alloys with 1%, and 2% of Bi have been studied. In the present work, we have extended this work to investigate the evolution of additional SAC+Bi lead free solder alloys for up to 20 days of thermal exposure. In our previous work, mechanical behavior evolutions of SAC305 and SAC+3%Bi lead free solder materials were reported under different thermal exposure profiles for up to 5 days of exposure. Therefore, the evolutions of mechanical properties of lead-free solder materials subjected to different thermal exposure profiles are of great importance and need to be investigated. They are often subjected to different thermal exposures such as isothermal aging and/or thermal cycling during their service life in various applications such as well drilling, automotive power electronics, aerospace engines, and geothermal energy. Lead free solder materials are widely used as interconnects in electronic assemblies. Overall, experimental and FEM results in this study reveal that solder joint reliability in the CPU assembly during thermal cycling can be improved by adopting the thicker reinforced backplate. It is also found that the residual (bending) strain on the PCB proportional to the maximum von Mises stresses of solder joints (or balls) can be used as a key parameter to correlate with the solder joint failures or cracks during the thermal cycling. The validated FEM results have suggested that maximum stress of solder balls increases almost linearly with decreasing the backplate thickness under mechanical loading during the CPU assembly, but is insensitive to the backplate thickness under thermal loading during the thermal cycling. In this study, the socket's solder joint reliability of the backplate-reinforced CPU assembly and its related mechanics under mechanical and thermal loadings are investigated experimentally using strain gauge and shadow moiré, and numerically by a finite element method (FEM). The solder ball joint reliability of the socket used in the CPU assembly becomes very important. What soldering temperature do you use? Reply in the comments field below.To meet the requirement of the high I/O and fine-pitch interconnects, the conventional insertion-mount socket for central processing unit (CPU) has been changed to surface-mount one with ball grid array. I usually solder with a temperature between 350 degrees Celsius and 400 degrees Celsius (660 to 750 Fahrenheit). If you are burning your components, it might be time to consider turning the temperature down. If you are having trouble getting the solder to melt, it means you should turn up the heat a bit. The soldering temperature is also something you will figure out as you go try. If you have a huge solder joint, you will need a higher temperature than if you have tiny, small solder joint. If you have a high effect soldering iron, and a large soldering tip that transfers heat in an efficient way – you don’t need that high temperature.īut if you are using a low effect iron with a small, tiny soldering tip that transfers heat badly – you need a higher temperature. There are few things that will impact the soldering temperature that you need on your soldering iron. Selecting a Soldering Temperature for Your Iron So we have to get the solder joint hotter than this. Most solder melts around 180 to 190 degrees Celsius, that is 360 to 370 degrees Fahrenheit. My answer to that is, you have to get the solder joint hot enough to melt the solder. Jyri wrote to me in an email about soldering and asked: “I always wondered – what is the right soldering temperature in various situations?” If you have, you might be wondering the same thing as Jyri. The right soldering temperature is something many don’t really think about.īut, have you ever used one of those soldering irons with a variable temperature setting?
0 Comments
We measured the acoustic and background noise during sSWAN and cSWAN imaging and calculated the contrast-to-noise ratio (CNR) of the phantom consisting of eight chambers with different concentrations of superparamagnetic iron oxide. To compare the effectiveness of silent susceptibility-weighted angiography (sSWAN), a new imaging technique with lower acoustic noise, with conventional susceptibility-weighted angiography (cSWAN) in the detection of intracranial hemorrhagic lesions. We will discuss the progress of MRI systems, the enabling technology, established applications, current trends, and the future outlook. In this review, MRI advances in the last two decades will be considered. These hybrid systems provide additional capabilities. MRI systems are now combined with other modalities, such as positron emission tomography (PET) or therapeutic devices. With high performance computing and MR technology innovations, MRI can now provide large volumes of functional and anatomical image datasets, which are important tools in various research fields. New technologies outside of the MRI field, for example, computer science, data processing, and semiconductors, have been immediately incorporated into MRI development, which resulted in innovative applications. Progress in each component has induced new technology development opportunities in other components. In MRI technical development, the developments in each MRI system component, including data acquisition, image reconstruction, and hardware systems, have impacted the others. The percent contrast of silent and conventional MRI sequences had a strong correlation (T1W, correlation coefficient = 0.76 T1W excluding the middle cerebellar peduncle, CC = 0.82 T2W, CC = 0.91).įor brain MRI, silent sequences significantly reduced acoustic noise and provided diagnostic image quality for myelination evaluations however, the two methods differed with respect to cerebellar delineation on T1W sequences.Ĭlinical MRI systems have continually improved over the years since their introduction in the 1980s. Inter-method comparison indicated overall good to excellent agreement (T1W and T2W images, κ = 0.76 and 0.80, respectively) however, agreement was poor for cerebellar myelination on T1W images (κ = 0.14). The degree of myelination was qualitatively assessed via consensus, and T1W and T2W signal intensities were quantitatively measured by percent contrast.Īcoustic noise levels were significantly lower during silent sequences than during conventional sequences (P < 0.0001 for both T1W and T2W). Acoustic noise levels were analyzed and compared. The aim of this study was to compare the validity of T1- (T1W) and T2-weighted (T2W) silent sequences for myelination assessment in children with conventional spin-echo sequences.Ī total of 30 children (21 boys, 9 girls age range: 1-83 months, mean age: 35.5 months, median age: 28.5 months) were examined using both silent and spin-echo sequences. load the parameter files and update the spectrometer dependent parameters by hand.Silent magnetic resonance imaging (MRI) scans produce reduced acoustic noise and are considered more gentle for sedated children.simply type the name of the experiment into the VnmrJ command line to load the experiment.if you have BioPack properly installed and calibrated:.compile the pulse program using the seqgen command.untar the file from within this directory, using the command: tar xvf  /.cd to your vnmrsys directory (or go to the /vnmr directory to install the experiment in the main directory).To install an experiment onto your machine: Each tar file contains the pulse program, parameter files,  a macro to load the pulse sequence, VnmrJ customized pages, a manual page. If used incorrectly these programs may potentially damage your instrument! Users employ the pulse programs at their own risk. Neither NMRFAM nor University of Wisconsin-Madison are liable for any physical or other damage incurred during the use of the pulse programs.Įach pulse sequence is saved as a tar file. These pulse programs are provided “as is” for your information. Note. This page is currently under construction, new material is being added every day. The main emphasis of this pulse program library is directed towards protein and nucleic acids NMR spectroscopy of isotope enriched proteins in solution.Īll pulse programs are written and tested on Varian VNS consoles running VnmrJ 2.1B and have been optimized for running on ColdProbes. The TRIM command is sent by the OS to the SSD to identify what pages of data can be ignored during garbage collection. I talk about how TRIM came into existence and why it is necessary in my blog …. TRIM is beneficial to all SSDs regardless of what kind of garbage collection is used. Foreground GC is harder to achieve and I believe only the SandForce controller is able to do it today In simple terms background garbage collection will increase write amplification (WA) and wear out the SSD sooner. The difference between them is covered in my blog. Some use foreground GC and some use background or idle-time GC. The newly erased block of blank pages is then ready to save new data.Īll NAND Flash-based SSDs use GC. But first all surrounding pages with valid data must be read and then rewritten to blank pages. Random writes put the new data in previously erased pages elsewhere, peppering a block of valid data with “patches of invalid data.” In order to write new data to these patches, the whole block – all 128 pages – must be erased. The complexity of writing data really starts to escalate in the case of random writes replacing previously written data. But a page can only be erased within a group of typically 128 pages called a block. Once a page is written, it cannot be rewritten until it is erased. Trim can be considered an aid to garbage collection.įor the short explanation flash memory is organized in groups of pages where data can be written. OCZ SSDs use a Sandforce controller which has built in foreground garbage collection that delays the need to erase blocks, reducing but not removing the need for TRIM support. System/Library/Extensions/IOAHCIFamily.kext/Contents/PlugIns/IOAHCIBlockStorage.kext/Contents/MacOS/IOAHCIBlockStorage.original $sudo cp /System/Library/Extensions/IOAHCIFamily.kext/Contents/PlugIns/IOAHCIBlockStorage.kext/Contents/MacOS/IOAHCIBlockStorage You can also enable trim manually by looking for all 'Apple' occurrences in the file and patching them in a hex-editor or via terminal: #1. Which checks if the ssd is a 3rd-party or Apple Branded SSD: The Trim Enabler patches the following Kext-File /System/Library/Extensions/IOAHCIFamily.kext/Contents/PlugIns/IOAHCIBlockStorage.kext/Contents/MacOS/IOAHCIBlockStorage Brought it right up to me like room service."Īnd what of Michael Herr, author of this narration, whose voice intoned the tales that made Dispatches. Dr it might belong to a hardboiled, Philip Marlowe-type hero, the type evoked at once by the words, spoken with that familiar, drained indifference: The voice may belong to this Willard character, this man we don't yet know and whose voice we therefore can't identify. Just as the opening scene dissolves each image and sound into another, and then layers even those, so too the voices and characters are composite references traced back and forth through time, cinema, society, and literature. One of the pleasures of APOCALYPSE NOW is that Coppola never settles for a single explanation. To our amazement, what voice should come from Willard's mind (it's an offscreen voice, Willard's lips are fixed and mute) but the numbed, skeptical voice of the paperback private eye! The narrator of Conrad's story was named Harlow, so it's the simplest, slyest sleight of Coppola's hand to transform him into another mythic namesake, the redoubtable Philip Marlowe, private detective. The helicopters fade, the whirring chorus of sounds dies down, and Willard, lying upside down to the camera lens, speaks. We are either inside his head looking out, or inside his room looking in. They've been widely described: a flat plane of jungle seen in full 70mm panorama its vista crossed and recrossed by helicopters gliding in super closeup across our field of vision, Dolby saturation enveloping us in their noise the perfect green peace erupting into a bonfire of napalm, "the smell," as the infuriated Lieutenant Colonel Kilgore will later say, "of victory." Advance reports of this film in no way prepare one for the hallucinatory spell of these images, reassembled inside Willard's brain back in his hotel room, which is what the flaming jungle dissolves into, its helicopters transmuted into a ceiling fan, the intense close-ups of the machines of war giving way to other close-ups of Willard's personal effects (a bottle of Martell, a lighter, a gun) and Willard's eyes. But the first images are scraped from the depths of his waking nightmares. The story involves one Captain Willard (Martin Sheen), who at the film's beginning is relaxing, so to speak, in his Saigon hotel room. Imagine you're Captain Ahab, and you're heading upriver on a Raymond Chandler assignment into the darkest regions of the Wild West. For openers, APOCALYPSE NOW is the archetypal male quest, done up real good. Everything else is up for grabs and open to examination: the theme, the sources, the beginning and (God help us) the ending, the technology, the genre, the Meaning, and maybe even the Vietnam War and Amerika, if it ever comes around to that. We both know the story and we both know the stakes. What we have, then, is a relatively unusual critical occasion. Important or not as an event, great or not as a film, APOCALYPSE NOW has succeeded at commanding our media's attention, and therefore our own. It's more than a film by now, it's a special event, and this reviewer's opinion of its "quality" assumes a quite minor importance beside the mere fact, finally, of its existence. Furthermore, you know the story behind the story: the devastation of Typhoon Olga, the budget inching up to the $31 million mark, the crisis over the ending. Ruby Rich JUMP CUTĬopyright Jump Cut: A Review of Contemporary Media, 1980, 2005īy now you all know the story of APOCALYPSE NOW: one part Vietnam, one part Joseph Conrad's Heart of Darkness, one part Jonestown as it could have been. The desired area of 28 is shown as a horizontal line. Let us solve this one by Completing the Square. How many you sell depends on price, so use "P" for Price as the variable what is the best price? And how many should you make?
This is my first time I've written an OSX app, so don't judge the code too hard. To build this project, you must open the ".xcworkspace" file in XCode and run it. You will send value updates when you have the appropriate midi events comming in.Then you should receive device/value updates which will be reflected in the UI.On the Focusrite Control Software, you will approve the Focusrite Midi Control client.You then will have to subscribe to your device. You then will receive a detailed description of the connected devices.This is both used in how you read and write to the TCP socket. BTW, every TCP message has a "Length=0009ab" suffix, with the length of your message as the nr.Constantly (every ~3 secs) send a "keep-alive" message.Connect, then send a "client-details" message with your name and key.The TCP communication process is roughly:.I copied the model of the "Focusrite Control" and "iOS Control", they are actually both TCP clients connecting to the FocusriteControlServer.), but quickly abandoned the idea for the lazier route, which was to learn Swift and XCode and get it done quick and easy. Had the brave idea to make a cross-platform app (Java, C++. I reverse-engineered Focusrite's messaging protocols. I've only coded an app for OSX because it was faster to achieve, but the hard part of cracking the code behind the code is done, so if you're a developer check the code/examples/resources in this project to make your own app for Windows, Android, whatever. There are quite a few input/output options, but there might be things that will be missing from your device.Ĭreate an issue with your specific problem, and I'll see what I can sort out. I've specifically tailored this app to work with my device, which is a Scarlett 18i8 (2nd gen). This doesn't work with my Focusrite machine For some tracks, I want to control the DAW loop volume and Focusrite monitor volume at the same time (and having the same value)Īlas, you can now have a central mixer for both your DAW and Focusrite on the same Midi Controller.To unify my DAW volume controls with the Focusrite direct monitoring ones.Controlling volumes using a mouse sucks. If you want to have a slight performance gain, I suggest running only the Midi Control during a performance (uses less RAM and CPU then the original one) Why did you do it? The Midi Mapping procedure should be failry intuitive. This works just like the iOS Control App: You need to approve it from the "Focusrite Control" sofware first, so you can have the appropriate permissions. The FocusriteControlServer service must be running, but that is automatically started by the system and you do not have to worry about it. However, you do NOT have to have it running. You must have the Focusrite Control software installed. It's an App that let's you Midi Map the volumes of your Focusrite interface. On Chrome you might receive a "Focusrite Midi Control.zip is not commonly downloaded and may be dangerous" warning, you have to click "Keep" to continue the donwload. Similar App for Universal Audio interfaces: If the player loses all their lives, they are sent back to the game's hub world. If all are lost, it will result in losing a life, and moving back to the last checkpoint they touched. The hero is given a set number of hit points, which can be upgraded to a maximum of seven depending on how far the player is in the game. Just like the other objects that are drawn in this game, power-ups are drawn by the player as well. Īlong with the hero's basic moves, there are also the addition of power-ups, ranging from basic weapons to defend against enemies and bosses, or gear for getting through previously inaccessible areas. These moves are used to do things like break crates, push buttons, and attack enemies. They are given the ability to jump, ground pound, and attack or "karate chop", similarly seen in the show. The custom hero has basic maneuverability compared to most games. Throughout the game, the player is assigned to draw a variety of platforms and other objects that are required to beat the level, which are indicated when the player finds a blank easel within the level, or are sometimes assigned right away. At the beginning of the game, the player draws a hero with the DS touchscreen to play as for the rest of the game. Gameplay ĭrawn to Life: SpongeBob SquarePants Edition is at its core a 2D platforming game, and one that's fairly similar to Drawn to Life. SpongeBob Squidward and Patrick take off back to Bikini Bottom on their rocket ship, leaving the now befriended Doodlebob and Doodlepants to live life in the doodle version of Bikini Bottom. SpongeBob decides to erase Doodlebob's menacing face and draw a more happy face, resulting in a more friendly Doodlebob. Doodlepants chases him once again to another planet and defeats the giant Doodlebob with the magic pencil.Īs Squidward decides to finish him off, SpongeBob objects with a realization that Doodlebob only created his own version of Bikini Bottom out of a desire for friends. They confront Doodlebob and after a fight, seemingly catch him, only for him to escape at the last second in a rocket ship of his own. Doodlebob had drawn a replica of Bikini Bottom on the Moon, for the supposed intent of confusion. Īfter chasing Doodlebob through the Jungle and Deep Sea, Doodlepants and the others draw a rocket ship to pursue Doodlebob into Outer Space. Krabs, who reopens the Krusty Krab which was closed from his absence. It's there where they recruit Squidward, who claims to have had his clarinet stolen by the doodle army (Nicknamed "Doodle Dudes" in the game) and demands his house to be repaired. Soon after, an army of doodles summoned by Doodlebob arrives and kidnaps SpongeBob, prompting Patrick and the new hero Doodlepants to give chase.Īfter Doodlepants rescues SpongeBob, they arrive in Downtown Bikini Bottom, only to find it destroyed. The player is then assigned to draw their own character who they will play as for the remainder of the game SpongeBob and Patrick name the hero "Doodlepants". After Patrick informs SpongeBob about Doodlebob's return, they both find the other pencil that fell from earlier, and decide to draw a hero to help stop Doodlebob. This drawing turns out to be Doodlebob, where Patrick unknowingly draws him trying to remember what the forbidden drawing was.ĭoodlebob comes to life and steals Patrick's pencil, running off to Downtown Bikini Bottom to cause havoc. Patrick also remembers one drawing in particular that he's not allowed to draw, due to previous circumstances. One of the pencils lands on Patrick, and after a brief panic, remembers that it's a magic pencil that brings drawings to life. Similar to how the episode "Frankendoodle" begins, an artist at sea accidentally drops two pencils in the ocean while working on one of his artworks. He has, however, been a producer on several notable films throughout the years. This is not Peter Winther’s first feature picture, although his prior films have a relatively poor IMDb rating (under 5). Peter Winther is the director of Aftermath, for which he also wrote the script. It’s more prevalent than you believe! I liked the conclusion, although we’ve already discussed numerous movies with similar storylines. And the last one is unquestionably the most important!Īlso, if you don’t think the ending of this movie is believable, you should check up on real stories and true crimes in this region. Even if you predicted one or two of these narrative twists, there would be more. If you’ve seen movies involving hauntings, house invasions, and different “mind games” storylines, you’ll probably get it faster. When you think you’ve figured out one subject, another emerges as the main emphasis. There are numerous narrative surprises in this Netflix movie, and there are indications throughout the film. Or maybe just parts of the Aftermath finale. You’re highly likely to guess the conclusion of Aftermath. Essentially, it indicates that you’ve seen many movies and are aware of what may occur in these types of horror films. Sure, you could predict aspects of this horror-mystery around midway through, but it doesn’t detract from the picture. Then there are the eerie moments in the home, which are incredibly effective in their simplicity. This leads to some gruesome scenarios involving several “creative” crime scenes along the road. One factor is that the spouse (Shawn Ashmore) works at a crime scene cleanup company. However, this is not the only aspect, and everything works well and fits together beautifully. The house where a murder-suicide occurred, on the other hand, plays an important role. The married pair, played by Shawn Ashmore (Devil’s Gate) and Ashley Greene, are the heart of Aftermath (the Twilight movies). Also, I never expected the horror parts of this film to work so effectively. Even though this is only a tiny portion of the storyline, the underlying mystery of the haunted home story works effectively. In 2021, Proton Technologies successfully overturned a ruling that it had to collect additional data. ProtonVPN has a clear no-logging policy, which, as its transparency report reveals, means that there’s no data to hand over to the authorities if a warrant is enforced against the company. You can similarly pay using cash, which is a little more awkward but is both more secure and significantly more environmentally friendly. You can pay anonymously using Bitcoin, but you’ll need to create a free account and contact support to do so. It’s breathtakingly expensive, but is a good choice for those who wish to either support ProtonMail’s mission or use its services in a business deployment. Visionary (priced at £24.88/$30/€30 per month, £238.89/$288/€288 per year and £397.32/$479/€479 every two years) is the same, but gets you 10 simultaneous connections and the subscription bundles in the top-tier Visionary secure email service from ProtonMail. Plus gets you all that, as well as specialist secure core, Tor and streaming servers for up to five devices. It’s a good entry-level VPN offering for users on a budget, but the lack of streaming and P2P endpoints will be a deal-breaker for some and speeds are likely to be slower without access to the extra endpoints provided to Plus and above subscribers. I always use the Plus tier when testing, and it’s the one I’d recommend for most users.īasic covers two devices and provides access to all standard servers in the 61 countries now covered by ProtonVPN, as well as some dedicated P2P servers, for a competitive £4.45/$5/€5 per month, £39.82/$48/€48 per year, and £65.53/$79/€79 every two years. This can make comparing the service to its rivals a little confusing. Pricing and SubscriptionsĪs well as an outstanding free tier, which only limits the endpoint servers you can use to three (in the US, the Netherlands and Japan) rather than restricting how much bandwidth you can use, there are three different paid tiers. I’ve based all my key price comparisons on the far more capable ProtonVPN Plus tier – which is expensive, but worth it. ProtonVPN Basic is cheap but rather limited. You do want to pay attention when picking a tier, though. It’s my current recommended VPN service for almost any purpose. ProtonVPN came out on top in my latest performance tests, and it’s easy to use, offering a good range of features. It has an excellent free tier, and its paid-for subscriptions are super-fast and great for streaming while you’re connected.ĭedicated GUI clients are available for Windows, macOS, Android and iOS, plus a Linux command line tool and instructions for using the service on other hardware such as routers. ProtonVPN is a privacy-focused VPN from the same firm responsible for encrypted email provider ProtonMail. Multi-platform support: Supports a wide range of devices, including PCs, Macs, smartphones, and even routers.Both free and paid-for tiers avaiable: The free tier has unlimited bandwidth, while paying a monthly fee will unlock more endpoints and features. Norman, OK: University of Oklahoma Press.Ĭanuto, Marcello A., and Tomás Barrientos Q. In the Realm of 8 Deer: The Archaeology of the Mixtec Codices. Paper presented at the 77th Annual Meeting of the Society for American Archaeology, Memphis, TN.īyland, Bruce E., and John M.D. The Mapping of Cerro Verde, in the Valley of Coixtlahuaca, Oaxaca, Mexico. Kowalewski, Laura Stiver, and Ellen Turck. Cambridge: Cambridge University Press.īrannan, Stefan, Stephen A. London New York: Plenum Press.īlanton, Richard E., Gary M. Houses and Households: A Comparative Study. New York: Academic Press.īlanton, Richard E. Monte Albán: Settlement Patterns at the Ancient Zapotec Capital. México, DF: Instituto de Investigaciones Antropológicas, Universidad Nacional Autónoma de México.īlanton, Richard E. Boulder, CO: University Press of Colorado.īernal, Ignacio, and Lorenzo Gamio. In Alternative Pathways to Complexity: A Collection of Essays on Architecture, Economics, Power, and Cross-Cultural Analysis, ed. Built Space as Political Fields: Community versus Lineage Strategies in the Tequila Valleys. Boulder, CO: University Press of Colorado.īeekman, Christopher S. In Political Strategies in Pre-Columbian Mesoamerica, ed. Conflicting Political Strategies in Late Formative to Early Classic Central Jalisco. Patron Gods and Patron Lords: The Semiotics of Classic Maya Community Cults. Washington, DC: American Chemical Society.īaron, Joanne P. In Archaeological Chemistry: Organic, Inorganic, and Biochemical Analysis, ed. Chemical Analysis of Residues in Floors and the Reconstruction of Ritual Activities at the Templo Mayor, Mexico. Tucson, AZ: University of Arizona Press.īarba, L.A., A. The Neighborhood as a Social and Spatial Unit in Mesoamerica. Tucson, AZ: University of Arizona Press.Īrnaud, M.Charlotte, Linda R. In The Neighborhood as a Social and Spatial Unit in Mesoamerica, ed. Intermediate Settlement Units in Late Postclassic Maya Sites in the Highlands: An Assessment from Archaeology and Ethnohistory. Current Anthropology 56: 28–55.Īnnereau-Fulbert, Marie. Private Land and Common Oceans: Analysis of the Development of Properly Regimes. It may, therefore, be possible to predict variation in one type of institutions as a partial function of its relation to other critical institutions in its assemblage.Īcheson, James M. Instead, the jostling of the whole assemblage sets the course of social evolution. Mesoamerica was not structured by any one institution (such as the state). Yet these institutions also lasted because they were adaptable to changing circumstances. The authors argue that the reason we keep finding the same persistent institutions-in their variant forms-is that these were the means by which people organized their efforts to manage omnipresent human-ecological problems critical to social life in this part of the world. Temple institutions and their personnel were entwined in the activities of all the other important institutions, acting as a sanctioning lubricant. In many cases, they persisted through the Colonial period and actually comprise a large part of the corpus of Mesoamerican ethnology and social anthropology. They were durable and persistent, some traceable to as early as the second millennium BC. These had a strong and recognizable material imprint, but they varied from place to place and over time. They found consistent evidence for the following as social institutions: states, cities, districts or neighborhoods, rural communities, marketplaces, temples, irrigation societies, guilds, and households. The authors reviewed the ethnohistorical and archaeological literature to look for research describing institutions in pre-Columbian Mesoamerica. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |