凯南长电报英文版
三年高考两年模拟高考历史专题汇编 专题十六 第二次世界大战后世界政治格局的演变-人教版高三全册历史试
专题十六第二次世界大战后世界政治格局的演变A组三年高考真题(2016~2014年)1.(2016·课标全国Ⅱ,35)20世纪50年代中期,美国一位著名黑人爵士乐演唱家,在美国新闻署的资助和安排下,多次赴非洲等地巡演,赢得了大量歌迷,很多人通过他的演唱知道了美国。
美国政府机构支持该演唱家海外巡演的主要目的是()A.争取国内黑人选民支持B.展示美国的经济实力C.抵制不结盟运动的发展D.与苏联争夺中间地带2.(2016·文综,23)电影往往是社会现实与舆论的一种反映。
1943年,好莱坞拍摄了一些歌颂苏联的电影,比如《光荣的日子》《出使莫斯科》等。
1948年,苏联对美国的威胁成为好莱坞电影的重要主题之一,这类影片有《铁幕背后》《红色威胁》等。
与这一时期电影主题转变相关的政治背景有()①“杜鲁门主义”的提出②北大西洋公约组织成立③联合国成立④不结盟运动兴起A.①②B.②③C.③④D.①④3.(2016·课标全国Ⅰ,35)1947年,美国国务卿马歇尔提出援助欧洲复兴计划,并敦促欧洲方面首先拟定一项联合性质的计划,要求该计划即使不能得到所有欧洲国家的同意,也应征得一部分国家的同意。
马歇尔计划体现出来的美国对欧政策()A.有利于煤钢联营的建立B.促成了欧美平等伙伴关系C.导致欧洲出现对峙D.成为德国分裂的根源4.(2015·课标全国Ⅱ,35)如果以“两极格局的确立与解体”为题撰写专著,贯穿全书的主线应该是美苏两国()A.根本利益的趋同 B.军事冲突的加剧C.国家实力的消长 D.敌对意识的淡化5.(2015·某某文综,12)下图是20世纪50年代朝鲜半岛形势图。
该图可以反映出()A.冷战格局的扩展B.马歇尔计划的实施C.美苏的直接对抗D.联合国势力的扩X6.(2015·某某理综,12)1960年1月,英国首相麦克米伦在结束非洲之行后发表演讲:我看到了国家意识的觉醒,在过去的几个世纪里,这些国家的人们依赖着别的国家生存;十五年前这一运动风靡亚洲,今天非洲发生了同样的事情,变迁之风吹遍整个非洲大陆。
《凯南日记》——5分钟总结一本书
《凯南日记》关于作者本书作者乔治·凯南是美国最重要的一位外交家,他开创了冷战的格局,被誉为“冷战之父”,对20世纪下半叶的国际局势有着举足轻重的影响。
关于本书这部日记是从乔治·凯南将近2万页的日记手稿当中筛选出来的精华部分,忠实还原了他将近一生的所见所闻、所思所感,包括他所有的政治评述,以及个人生活中的重要方面。
透过这部作品,我们能了解乔治·凯南这样一位20世纪的伟大人物,他内心脆弱的时刻,他最细腻、最隐秘、最深入人心的思想轨迹。
核心内容乔治·凯南人生中的三重矛盾,包括事业、家庭和俄罗斯情结,塑造出他多面复杂的人格特点。
这是乔治·凯南人生的三重底色,也是我们理解他政治生涯高峰的几把钥匙。
乔治·凯南一生中最为光彩夺目的高峰,他全部冷战思想的精华,都凝结在著名的8000字长电报和《苏联行为的根源》这两篇文章中。
他深刻地剖析了苏联政府的心理和行动逻辑,并向美国政府提出了长期遏制苏联的政策。
在冷战开始之后,整个20世纪的下半叶里,冷战的发展与乔治·凯南的预期事与愿违,这位“冷战之父”在他的后半生里,一直在为冷战的纠偏做着不懈的努力。
一、乔治·凯南人生中的三重矛盾1. 渴望建功立业与悲观厌世之间的矛盾乔治·凯南一生的成就,其实没有达到他自己的期望。
他总是梦想成为一个受人尊重的、富有影响力的人,他认为自己是世界级的政治家,可以和印度总理尼赫鲁相提并论。
乔治·凯南确实有他的过人之处,他1947年预言苏联解体的方式,和1991年实际发生的情形几乎一模一样,超前了将近半个世纪。
虽然人生中有过辉煌的时刻,但是乔治·凯南常常感到忧郁和悲观,这在他的日记里体现得非常明显。
他19岁就在日记里担心,“虽然这个世界五彩缤纷,但是我觉得一切可能都会变得枯燥乏味,没有任何意义。
”31岁的时候,他又在担心,“我觉得自己在想象力枯萎之前,在变成白发人之前,没有办法改变这个世界了。
乔治凯南8000字长电报(George+Kennan+8000+word+long+telegram
乔治凯南8000字长电报(George Kennan 8000 word longtelegram)乔治凯南8000字长电报(George Kennan 8000 word long telegram)The American embassy in Soviet union, George Kennan, sent the telegram to the state council......The first part of the Soviet propaganda machine's view of the postwar problem was as follows:A. The Soviet union still lives in hostile "capital encirclement", and in the long run, it is sustained with capitalismPeaceful coexistence is not possible. As Stalin told a delegation of American workers in 1927."Will be formed in the process of international revolution continues to develop the center of the scale of the two worlds. One is to put those tends to communist countries gathered around their communist center, one is to put those tends to capitalism countries gathered around their capitalist center. The two camps to dominate the world economy struggles will determine the fate of the whole world of capitalism and communism."B. Capitalism is plagued by the contradictions inherent in it. These contradictions cannot be resolved by peaceful compromise, and the biggest is the conflict between Britain and the United States.C. the inherent contradiction of capitalism is inevitably going tobe war. There are two types of wars: the wars between the two capitalist countries and the wars they have waged against the socialist world. The shrewd capitalists who want to escape the contradictions of capitalism tend to be in the latter category.D. Although interference with the Soviet union would bring disaster to the countries doing so, their intervention would, after all, delay the development of Soviet socialist socialism. So it must be prevented at all costs.E. the contradiction between the capitalist countries, although the Soviet union also is full of risk but also to promote the cause of socialism provides the possibility of a huge, remain strong, especially if the Soviet union in the military field rock solid in terms of ideology, and loyal to it wise leader.F. It must be remembered that the Soviet union believed that capitalism was not all bad. In addition to irredeemable reactionaries and bourgeois elements, capitalist societies include:(1) to unite some very open and positive people within the communist party.(2) some other molecules (now the sake of strategy called progress understanding or Democrats), their reactions, desire and activities happen to "objectively" is conducive to the interests of the Soviet union. The second species must be encouraged and used for the purpose of the Soviet union.G. characters on the opposite side of the capitalist society, the most dangerous is the so-called people's false friends that Lenin moderate socialists or social Democratic Party leaders (in other words, and never succumb to the communist party of the left). These people than outright reactionaries more dangerous, because the reactionaries emerged as they face, while moderate leftist leaders with socialist confuse people, to serve the interests of the reactionary capital.So that's the premise. From the point of view of Soviet policy, they were inferred from these premises:A. must do everything possible to improve the relative strength of the Soviet union as a member of the international community.Conversely, don't miss out on any opportunity to weaken the power and influence of all or very individual capitalist countries.B. The Soviet union and its friends abroad must be committed to deepening and exploiting the differences and contradictions between the capitalist powers. If the differences and contradictions between the capitalist countries and the "imperialist" wars were developed, then the capitalist countries would have to turn the war into a revolutionary uprising.C. Maximize the use of foreign "Democrats and progressives" to put pressure on the capitalist governments in accordance with the principles of Soviet interests.D. Must be ruthless with foreign socialists and social democratic leaders.The second part of this view is the background.Several aspects of the Soviet communist party line should be paid attention to before the concrete implementation of the communist party line.First, the communist party line does not represent the original view of the Russian people. Generally speaking, the Russian people are friendly to the outside world. They aspire to the recognition of the outside world, eager to compete with the people of the outside world for their talents, especially the fruits of their labours for a peaceful life. The party line only represents the official propaganda machine with the clever technique and the great patience to make the argument to the masses, while the masses "deep in the heart" often have a surprising resistance to those arguments. But the party line is binding on the views and actions of the people of the party, the secret police, the government, and so on.Second, pay attention to the elements of the Soviet communist party line, which are largely untrue. Experience has shown that peaceful coexistence between capitalism and socialist countries is entirely possible. The basic contradiction in advanced countries is not the contradiction between the capitalist ownership of the production information, but the contradiction between urbanization and industrialization itself. Russia has so far not suffered from a high degree of urbanization and industrialization, not because he issocialist, but because he is still backward. The competition within capitalism does not necessarily produce wars, and wars do not always result from it. After the destruction of Germany and Japan, after the recent war, the possibility of intervention in the Soviet union was a complete nonsense. If there is no provocation by the dissidents and the forces engaged in subversive activity, the possibility of peaceful coexistence between the capitalist world and between him and Russia is high. Finally, no sane person can doubt the sincerity of the moderate socialist leader in the west. In the Scandinavian peninsula, for example, whenever there is a chance, they always try their best to improve the living conditions of the working people, and deny that their achievements in this regard are unjust.These conclusions were made before world war ii and provedcompletely wrong by the war itself. In fact, the differences between Britain and America are not the main differences between the west. In addition to the axis countries,Capitalist countries have no intention of resolving theirdifferences by joining the anti-soviet crusaders. The Soviet union did not turn into a civil war or a revolution. Instead, the Soviet union had to publicly recognize it as a common goal to fight alongside thecapitalist powers.However, no matter how unsubstantiated and unproven, they are still bold today. What does that mean? This suggests that the Soviet partyline was not based on an objective analysis of Russian external forms.Indeed, he had little to do with anything beyond the Soviet border. Itis primarily a productof Russia's internal needs, which existed before the recent war.It's still there today.The kremlin's neurotic view of world affairs stems from theRussian's traditional and instinctive insecurities. A peaceful agricultural nation, living together with the fierce nomads in the vast wilderness, would create a sense of insecurity without insurance. In addition to these insecurities, the insecurities of the country, as well as the economic and advanced western countries, add to the fear of a more competent, more powerful and organized society in the west. This latter insecurity is not so much to torture the Russian people as to torture the Russian rulers. Because Russia's rulers always believed that their rulers knew the truth about the outside world, or that foreigners knew the truth inside Russia, that there would be consequences. The only way they learn to seek safety is to destroy the fight against the country that competes with him, and never agree or compromise with any other country.Has been around for a half a century in Western Europe and there is no effect of marxism, the first in Russia under the root, and caused the prairie fire, it is no accident, think that the social and economic contradictions by peaceful means to solve this doctrine, only get promoted in Russia, because the country has never been a friendly neighbors. In fact, there has never been a balance of tolerance amongthe great powers, inter and international. After the Bolshevik regime set up by Lenin explanation of marxism more cruel, more intolerant, thus become to spread the perfect tool of insecurity, this anxiety makes the bolsheviks even ruled more distressing than Russia in the past. In this basic goal belongs to the doctrine of altruism,the bolsheviks to their innate fear of the outside world, for their dictatorial system, for their use of torture, and to demand the sacrifice, find a theoretical basis. Under the guise of marxism, they discard all moral values in methods and strategies. Today, they can't live without marxism. Marxism makes them a FIG leaf of moral and ideological respectability. They did not have this FIG leaf in history, at best, the last generation of the tyrannical and civil Russian ruler. The ruthless rulers of Russia brought their military strength to an unprecedented peak to ensure that the infirmity of the regime was externally secure. The intent of the Soviet union must always be solemnly clothed in the cloak of marxism,That is why it is important to not underestimate the importance of dogma in Soviet affairs. This way, the leader of the Soviet union under the history and status quo of the practical need of, puts forward a kind of doctrine, the external, as a sin, hostile, and threat of the Soviet union the world, and that the world within gestates the bacteria spread disease, is bound to be more and more internal unrest, finally received thriving socialist forces a fatal blow, thus giving way to a new and better world. This theory has given them legitimate grounds forexpanding their military and police forces, isolating the Russian people from the outside world and exerting constant pressure to expand the powers of the Russian police. All these are natural and instinctive demands of the Russian rulers. This is mainly to show that, over the centuries, the uneasy Russian nationalist movement has made remarkable progress. In this movement, the concept of aggression and self-defence is not well known. However, a new international marxist cloak, with sweet words to a desperate, war damage to the outside world to make promises, Russian democracy righteousness is more dangerous and more cunning than ever.But we should not assume that all those who have made the path for the Soviet party are false and insincere. Many of them are too ignorant of the outside world and are so dependent on their minds that they do not doubt themselves. They were credulous about things that only the words could make people feel comfortable and convenient. Finally, we also have a mystery, that is, in this great country, who - if there is such a person - can you get about the outside world more accurate and unbiased information. In the mysterious and secretive atmosphere of the east, the possibilities for distorting and poisoning intelligence are limitless in an atmosphere of widespread intrigue in the government. The Russian people don't respect the objective real reason - in fact, they don't believe in the existence of objective reality principle - the fact that everything that makes them understand as a tool, used to achieve the goal of this or that skeletons. There is good reason to suspect thatthis government is actually a small plot in a big conspiracy. At least I personally don't believe, Stalin can get massive long-term credit, I believe that the Soviet government may finally be done like it in the 30 s, for international economic exchanges is desirable that verbally talk. On the contrary, I think most Soviet foreign trade may limit itssecurity domain of the Soviet union, including the German occupation, and in critical view shall implement the principle of the general economic cooperation between countries.H. as for cultural cooperation, the Soviet union also verbally say, for instance, deepen cultural exchanges between ourpeoples is desirable, in practice never made any could undermine the safety of all nationalities in the Soviet union. Policy in the aspects of the actual performance, will be limited to someone with official visit, and join the ceremony, assembly, so that some libraries in pointless ways, and eating too much vodka and lengthy speeches, but does not produce lasting results.I. In addition to the official relations between the Soviet union and various diplomatic states,It would take a route that could be called "right" to maintain the prestige of the Soviet union and its leaders, with meticulous attention to international etiquette (which runs counter to good manners).......The fifth part is the actual deduction from the Angle of American policy....... To sum up, we face a political force, a frenetic state of support for his ways, and the damage to our country's international authority. The political power can control one of the greatest nation in the world energy and one of the most prosperous country in the world of information, and it is behind a strong Russian nationalism trend inoculation. In addition, he has a delicate, wide range of organizations, to play its influence in foreign, the agency has amazing flexibility and variety of skills, to manage it for underground work method is probably an unprecedented experience and skill. In the end, thepolitical force seems to be making a fundamental response that seems to be not to think about the real situation. For him, a lot of objective facts about human society, is not like us, is often used to test and modify people view of scale, but from a grab bag of arbitrarily, have a tendency to take out the specific facts in order to support the established views. This is certainly not a pleasant picture. Thequestion of how to deal with this power is undoubtedly the greatest task that China's diplomacy has ever faced. He should be the starting pointfor our political staff to work at this moment. To deal with this problem in the same spirit and prudence as in the resolution of the wartime major strategic issues, it is necessary to make the same big efforts in the planning work as necessary. I can't try to come up withall the answers here, but I would like to express my confidence that we have the ability to solve this problem without having to go through acomprehensive military conflict. To prove my belief, I would like to offer some more encouraging views.(1) unlike Hitler's Germany, the Soviet regime did not have systematic planning, nor did it engage in risky activities. He is not acting on a fixed plan. He doesn't take unnecessary risks. Logic is indifferent to reason, but it is sensitive to the logic of force. Because of this, when he encounters strong resistance anywhere, he can easily retreat, and he often does. Therefore, if the other party has sufficient force, and indicates readiness to use force, it practically USES no force. If the other person handles the situation correctly, there is no need to have a reputation showdown.(2) the Soviet union was a much weaker force than the rest ofthe western world. Therefore, their success will depend on the degree of unity, identification and strength that the western world can achieve. And this is a factor that we have the ability to influence.(3) as a form of domestic power, the success of the Soviet systemhas not been proved. Whether he can stand the power to move from one person to another, or from a small group of people to another, has yet to be proved. The first such transfer of power after Lenin's death resulted in the destruction of the Soviet union for years.A second transfer of power will occur after Stalin's death or retirement. But this will not be the final test. Because of the recent territorial expansion, the Soviet domestic system will now be subjected to a series of additional pressures that prove to be a serious burden onthe tsarist regime. Here, we are convinced that, since the end of the civil war, the vast majority of the Russian people have never been more emotionally detached from the communist party doctrine. In Russia, it is now a huge and successful dictatorship - but he is no longer a source of charisma. There is no guarantee that internal volume and movement will last.(4) all Soviet propaganda, outside the Soviet security sphere, was basically negative and destructive. It should be easy, therefore, to combat it with any smart, truly constructive platform.For all these reasons, I think we can deal with Russia calmly and bravely. As for the approach, I only want to make thefollowing observations as a conclusion.1. I think the first step must be to understand and understand the nature and truth of the movement we are dealing with. We must study hard to bundle with a doctor and the patient's that kind of courage, without reason is a transcendental attitude and objective spirit, study of it, and have the determination, such as doctors was not swayed by emotion, don't make by it.We must try our best to learn the truth about the form of Russia by our people. The importance of this point cannot be overemphasized. It should not be done by the newspaper alone. It should be done by the government. The government must have more experience and more knowledge of the practical issues involved. In this work, we needn't be daunted by the ugly situation. I firmly believe that if the people of our countryknow more about the true situation of this situation, today our country will be much less anti-soviet. There is no more dangerous and scarier than ignorance. Perhaps there is a debate about how much more of our difficulties in dealing with Russia could have an adverse effect on russian-american relations. I think if there is any risk here, we should have the courage to face it, and the sooner the better. But I don't see what we're going to risk. Even after all the hype about our friendship with the Russian people, our stakes for them are minimal. There we have no investment to defend, no real trade to be lost, and few citizens to protect, and there is little cultural exchange to sustain. The only thing we have a stake in them is not what we have, but what we want. I am convinced that we will have more opportunities to achieve these hopes that if citizens know the situation in our country, if our relationship with the russianscompletely built on the basis of reality, seeking truth from facts.A large part of the problem depends on the health and vitality ofour own society. The world communist movement, like the malignant parasite, relies on diseased muscle tissue to feed itself.This is where domestic policy and foreign policy will be. Whatever our own internal social problems, to strengthen the confidence of our people, discipline, morale and team spirit of any item of the kokang powerful measures, is a diplomatic victory for Moscow, its value can be comparable to one thousand diplomatic notes and the joint communique. If we can't abandon fatalism in front of their social defects andindifferent attitude, Moscow will get benefits, Moscow in its foreign policy is not to benefit from it.4. We have to plan and propose for other countries, more actively and constructively than we have been in the past, and the kind of world picture we would like to see. Similar to our country's political process only urged other countries to people's development is not enough, many foreign people, at least, the peoples of Europe, for the past experience has tired and afraid, for freedom in the abstract has not interested in the safe. They are seeking guidance. If we don't give guidance, the russians will.Finally, we must have the courage and confidence to adhere to our own methods and our views on human society. In the end, when we deal with the problem of Soviet communism, the greatestdanger that may fall on our heads is that we make ourselves thesame as the people we are dealing with.。
烬的台词的语音mp3(范本)(3)
烬的台词的语音m p3烬的台词的语音mp3解压缩后直接找exe后缀文件启动软件,然后 File-open M PQ-定位到你机器的魔兽世界安装根目录-D ata文件夹-这时候选择en CN是英文语音包,选择zhC N是中文语音包!-不管进哪个,进去之后找对应的speeh-enCN.M PQ和spee h-zhCN.MPQ -so und-Cre ature- OK看见的就是大部分语音文件了,不过貌似这些大都是TB C以前的,要找TBC以后的就得从接这两个文件expans ion-spe eh-enCN.MPQ和ex pansion-speeh-zhCN.MP Q然后就好找了! 使用例如M p3utter什么的分割截取软件魔兽世界专有词汇英汉对照表人名艾德拉斯·布莱克摩尔 Aed elas Bl akmore艾格文 Aeg n 阿尔萨斯·米奈希尔 Ar thas Me nethil阿克蒙德 Ar himonde安度因·洛萨 Anduin Lothar阿鲁巴拉克Anub'arakh阿莱克斯塔萨 Alexst rasza 奥蕾莉亚 All eria 阿伦索斯·法奥A lonsusFaol 艾萨拉 Azsha ra 阿纳克洛斯 Anahr onos 阿奴布雷坎Anub'Re khan 艾索雷葛斯Azu regos 大法师阿鲁高Ar hmage A rugal 大主教本尼·迪塔斯Arhbis hop Ben editus猎手阿图门A ttumenthe Hun tsman 血领主曼多基尔Bloodlo rd Mand okir 瑞文戴尔男爵 Ba ron Riv endare迦顿男爵Bar on Gedd on 凯恩·血蹄 Cairn e Blood hoof 塞纳留斯Cena rius 克苏恩 C'Thun 加尔范上尉 Ca ptain G alvanga r 死亡之翼Deathin戴林·普罗德摩尔 Dael in Prou dmore 杜隆坦Duro tan 黑暗院长加丁 Dar kmaster Gandli ng 德雷克塔尔Drek'Tha r 艾露恩E lune 伊兰尼库斯 Era nikus 爱德温·范克里夫Edin Va nCleef范达尔·鹿盔Fandral Staghe l 格罗姆·地狱咆哮 Gro m Hells ream 古尔丹 Gul'dan屠龙者格鲁尔G ruul th e Drago nkiller加尔 Gar r 焚化者古雷曼格Golem agg the Ininer ator 大检察官伊森利恩G rand In quisito r Isill ien 收割者戈提克Got hik the Harves ter 加尔鲁什·地狱咆哮Garrosh Hellsr eam 哈卡Hakkar伯瓦尔·弗塔根公爵Highlo rd Bolv ar Ford ragon 大工匠梅卡托克H igh Tin ker Mek katorqu e 大领主提里奥·弗丁 Hi ghlordTirionFordrin g 大领主泰兰·弗丁High lord Ta elan Fo rdring大检察官怀特迈恩High I nquisit or Whit emane 大领主莫格莱尼灰烬使者 Hi ghlordMograin e The A shbring er 伊利丹·怒风 Ill idan St ormrage教官拉苏维奥斯 Instr utor Ra zuvious吉安娜·普罗德摩尔 Jai na Prou dmoore妖术师金度Ji n'd o the H exxer 凯尔萨斯·逐日者 Kael'thas Sunstr ider 克尔苏加德Kel'th uzad 基尔加丹 Kil'jae den 基尔罗格·死眼Ki lrogg D eadee 卡扎克 KaXX ak 欺诈者卡拉然Kalar an theDeeiver 瓦里安·乌瑞恩国王 Kin g Varia n Wrnn卡德加 Kha dgar 巫妖王Lih K ing 莱恩Llane 维克多·奈法里奥斯Lord V itor Ne farius女公爵布劳缪克斯 Lad B laumeux洛瑟玛·塞隆Lor'themar Theron玛法里奥·怒风 Malfu rion St ormrage玛瑟里顿M agtheri don 玛维·影歌 Maie v Shado song 麦迪文 Mediv h 玛里苟斯Malgos穆拉丁·铜须Muradin Bronze beard 麦格尼·铜须M agni Br onzebea rd 管理者埃克索图斯Maj ordomoExeutus摩拉迪姆Mo r'L adim 耐奥祖 Ner'zhul聂拉斯·埃兰 Nielas Aran 诺兹多姆 Noz dormu 奈法利安 Nef arian 奥格瑞姆·毁灭之锤Ogrim Doomha mmer 奥妮克希亚 Onx ia 桑德兰王子 PrineThunde rXXn 先知维纶 Prop het Vel en 帕奇维克 Pather k 拉格纳罗斯 Ragnar os 罗宁R honin 萨格拉斯 Sar geras萨弗隆先驱者Sul furon H arbinge r 希尔瓦纳斯·风行者Slv anas Wi ndrunne r 腐蚀者塞索瓦尔 Sat hrovarr the Co rruptor萨菲隆S apphiro n 瑟里耶克爵士 Sir Z eliek 泰瑞纳斯·米奈希尔Terena s Menet hil 泰兰德·语风 Tr ande Wh isperin d 萨尔T hrall 图拉扬 Tura lon 库尔塔兹领主 Tha ne Kort h'a XX 塔隆·血魔 Teron Gorefi end 乌瑟尔·光明使者U ther Li ghtbrin ger 沃金 Vol'jin 瓦拉斯塔兹Va elastra sz 瓦里玛萨斯Varima thras 范达尔·雷矛Va nndar S tormpik e 温蕾萨·风行者 Vere esa Win drunner大酋长雷德·黑手 Warh ief Ren d Blakh and 伊瑟拉 Ysera祖尔金Zu l'j in 组织银色黎明 Ar gent Da n 联盟 Al liane 奥尔多Aldo r 灰舌死誓者 Ashton gue Dea thsorn火刃氏族B urningBlade C lan 燃烧军团 Burni ng Legi on 血环氏族 Bleedi ng Holl oClan黑牙氏族Bla k Tooth Grin C lan 黑石氏族 Blakr ok Clan诺兹多姆的子嗣 Brood of Noz dormu 血帆海盗 Bl oodsail塞纳里奥议会 Cenari on Cirl e 诅咒神教Cult of the Da mned 星界财团Cons ortium龙喉氏族 Dr agonmaClan 暗矛部族 Dark spear t ribe 暗月马戏团 Dar kmoon F aire 烈焰行者 Flam eaker 霜狼氏族Fro stolf C lan 部落Horde 上层精灵 Hig hborne白银之手骑士团Knight s of th e Silve r Hand时光守护者 Ke epers o f Time库雷尼Kur enai 嘲颅氏族 Laug hing Sk ull Cla n 贫民窟L oer Cit玛格汉Ma g'h ar 奥格瑞拉 Ogri'la 皇家药剂师协会RoalAp othearSoiet 影子议会 Sh ado Cou nil 影月氏族 Shado moon Cl an 艾露恩姐妹会 Sist erhoodof Elun e 血色十字军 Sarle t Crusa de 占星者Srer 破碎残阳 Shat tered S un 天空卫队 Skguar d 流沙之鳞Sale of Sands沙塔尔 Sha'ta r 辛德拉S hen'dralar雷王氏族T hunderl ord Cla n 肯瑞托议会 The Or der OfKirin T or 迪菲亚兄弟会 The Defias The De fias 探险者协会 Th eExplo rers' Guil d 辛迪加The Snd iate 瑟银兄弟会 Tho rium Br otherho od 木喉熊怪 Timbe rma fur bolgs 守护者 Guar dian 紫罗兰之眼 Vio let Ee蛮锤部族 Wi ldhamme r 达拉 Za ndalar种族血精灵 BloodElf 半人马 Centau r 奇美拉C himaera地穴魔 Cp t Fiend树妖 Dra d 矮人 Da rf 恶魔D emon 龙鹰 Dragon hak 黑铁矮人 DarkIron 德莱尼 Draen ei 地狱战马 Dreads teed 死亡军马Deat hharger篇二:趣味语言论幽默短信的结构和语用功能自1998年我国开通手机短信以来,几年时间,它已奇迹般地发展成为了继报纸杂志、广播、电视、网络之后的“第五媒体”。
ATC5300操作手册
合格人员
本文中所述的产品/系统只能由符合 符合特定任务资格要求的人员 资格要求的人员按照特定任务的相关资料,尤其是警告通知和安全指示 符合 资格要求的人员 进行操作。合格人员是指在操作这些产品/系统时能够凭借培训内容和经验识别风险并避免潜在危险的人员。
适当使用西门子产品 适当使用西门子产品
注意事项如下:
免责声明
本公司已经审核过本刊物的内容,确保与所述的硬件和软件情况相符。由于无法完全排除变更情况,因此本公司无 法保证完全相符。但是,本刊物的信息会定期接受审核,任何必要的修正内容会加入后续版本中。
目录
目录
1 概述 ..............................................................................................................................................................5 1.1 1.2 1.3 1.4 1.5 2 版本 ................................................................................................................................................5 说明 ................................................................................................................................................5 应用 ................................................................................................................................................6 安装 ................................................................................................................................................6 电源电路的相关注意事项 ................................................................................................................6
课件1:第18课 冷战与国际格局的演变
冷战是指第二次世界大战后的40多年间,以美、苏为首的两大集团之间既非战 争又非和平的对峙与竞争状态。简而言之,就是除武装进攻以外的一切敌对行 动。
►[注] 战后初期的苏联 军事力量空前强大,到1945年,拥有军队1 140万人,军事工业仅次于美国。 扩大了领土面积,西部邻国的一些地区先后划入苏联版图。 在苏联影响和帮助下,东欧和亚洲一系列国家建立起人民民主政权,苏联的国 际威望空前提高。
二、冷战的发展与多极力量的成长 1.冷战发展 (1)特点:20世纪50年代中期以后,东西方关系既有缓和,也有激烈的冷战对抗。 (2)表现:在美苏开展对话的同时,出现了第二次柏林危机和古巴导弹危机。 (3)影响:没有达到局部热战的程度,但带来空前严重的战争,特别是核战争的风 险 2.国际关系的变化 (1)以美国为首的西方集团逐渐分化,_西__欧___和日本逐渐成为重要的国际力量。 (2) 东 欧 国 家 反 对 苏 联 控 制 的 斗 争 , 以 及 中 苏 关 系 的 破 裂 , 以 苏 联 为 首 的 _社__会__主__义__阵__营___开始瓦解。
——杜鲁门1947年3月12日在国会 两院联席会议上的讲话
(2)马歇尔计划隐含美国多重国家利益要求 [史料] 我们的政策不是反对任何国家或任何主义,而是反对饥饿、贫穷、冒险 和混乱。我们的政策的目的应该是恢复世界上行之有效的经济制度,从而使自 由制度赖以存在的政治和社会条件能够出现。
——1947年美国国务卿马歇尔在哈佛大学的演说 探究:如何理解杜鲁门、马歇尔讲话中隐含的对外立场? 提示:(1)从史料来看,杜鲁门主张美国要以遏制共产主义作为国家意识形态和 对外政策的指导思想。 (2)马歇尔讲话表面是追求和平、稳定,背后隐含着稳定欧洲资本主义制度,恢 复欧洲资本主义经济秩序,遏制苏联,称霸世界的多重目的。
红警中的各种语言配音中文翻译
红警中的各种语言配音中文翻译生产:没钱了 Insufficient funds可以造新东西了 New construction options开始建造建筑物 building开始生产作战单位 Training暂停生产 On hold取消生产 Canceled生产进行中目前不接受新的生产指令 Can not comply building in progress建筑已造好 Construction complete单位已造好 Unit ready建筑被卖掉 Structure sold建筑修理 Repairing电力不足生产减缓 Low power选定主要建筑物(战车工厂/兵营等)Primary building selected作战:单位已修好 Unit repaired单位升级了 Unit promoted作战单位被灭 Unit lost(战车工厂/兵营/维修厂)建立新的集结点 New ___ point established 我们的建筑物正遭受攻击 Our base is under attack援军(空降部队)准备好了 Reinforcements ready进入该建筑盗得金钱 Building ininfiltrated cash stolen进入该建筑盗得科技 Building ininfiltrated New technology acquired进入该建筑敌方电力切断 Building ininfiltrated enemy base power down进入该建筑敌方雷达探明 Building ininfiltrated radar subtouched 占领(敌方)建筑 Building captured占领科技(油井空降场等)建筑 Tech building captured(油井空降场等)建筑被敌占领 Tech building lost被敌方盗得金钱 Cash stolen桥梁已修好 Bridge repaired大兵驻扎建筑物 Structure garrisoned脱离驻扎建筑物 Structure abandoned(超级武器)选择目标 Select target玩家被击败 Player defeated你胜利了 You are victorious谭雅:shake it,baby!(炸建筑时喊!)move now,boss!(是的,老大!)you`ve gonna order?(你有命令么?)美国大兵:can~ do!(拖长喊:能搞定!)All the move!(保持行动!)Closing in!(接近中!)Sir,yes sir!(是的,先生!)Enemy spotted!(遭遇敌人!)驱逐舰:Man in battlestation!(准备作战!)order`selvier no headache!(抱怨:“发命令的人自己倒不觉得什么!”)间谍:operation on the way!(正在行动中!)You Give me a plan!(给个计划!)yes commandor!(是的指挥官先生!)超时空转换:Telegraphing troops arriving in 5,4,3,2,1,Reinforcements have arrived!(传送部队到达倒记时:5,4,3,2,1,援军到达!——任务版)闪电风暴:lighting storm created!(闪电风暴已经生成!)苏联矿车:war miner is here!(战斗矿车在此!汗!)天启坦克:it is the judgement day!(今天就是审判日!)Soviet power superian!(苏联力量强大无比!)雷达:Spy plane ready!(侦察机完毕!)尤里:tell me your wish~(告诉我你在想什么~ )your mind disclevered!(清除你的个体意识!)苏联动员兵:Attack it!(攻击吧!)Yes comrade!(是,同志!)Da!(是!), Comrade?(同志,请下令!)Moving out!(出发!),Waiting orders!(等待指示!)Conscript reporting!(动员兵报告!)All that received!(收到!)For the Union!(为了苏维埃!),Attacking!(全力攻击!)You are shot!(你完蛋了!)For the mothers at Russia!(为了远在俄罗斯的母亲!)For the whole country!(为了国家!).基洛夫空艇:Giroff Report!(基洛夫刚刚造好.基洛夫报道!)*美国大兵Sir yes sir!长官,是长官!Ready!准备好了!Squared away sir!正远方,长官![猜的] Orders?命令是?How about some action?来一些行动,怎么样?Can do!能干!Who's next?下一个是谁(目标)?Move'n out!移动并出去[猜的]Got it!拿下它!On my way!正在路上!Double time!快跑时间!On the move!在移动中!Attacking!正在攻击!You got it!你干掉它!Enemy sighted!敌人已看见!Let's do it!让我们行动!Diggin' in!渗人里面![猜的]Safety first, sir!安全第一,长官!We're pinned down!我们被压制了!We're being attacked!我们正在被攻击!*动员兵Waiting orders.等待命令中。
Doc_13_12_Oxygen_Pipeline_and_Piping_Systems
IGC Doc 13/12/E
OXYGEN PIPELINE AND PIPING SYSTEMS
Disclaimer
All technical publications of EIGA or under EIGA's name, including Codes of practice, Safety procedures and any other technical information contained in such publications were obtained from sources believed to be reliable and are based on technical information and experience currently available from members of EIGA and others at the date of their issuance. While EIGA recommends reference to or use of its publications by its members, such reference to or use of EIGA's publications by its members or third parties are purely voluntary and not binding. Therefore, EIGA or its members make no guarantee of the results and assume no liability or responsibility in connection with the reference to or use of information or suggestions contained in EIGA's publications. EIGA has no control whatsoever as regards, performance or non-performance, misinterpretation, proper or improper use of any information or suggestions contained in EIGA's publications by any person or entity (including EIGA members) and EIGA expressly disclaims any liability in connection thereto. EIGA's publications are subject to periodic review and users are cautioned to obtain the latest edition.
乔治凯南长电报名词解释
乔治凯南长电报名词解释
乔治:指乔治·亚历山大·亚伯拉罕·伯窑(George Alexander Aberle)或乔治·约翰·特拉福(George John Trall)等可能的人物名字。
凯南:指凯南·帕特森·布雷恩(Kunan Poshin Bhargava)或凯南·瓦利瓦基尔(Kunan Valivaikil)等可能的人物名字。
长电:泛指长期电台广播或电报通信方式。
在电报通信中,长电广播是指通过电台广播机构持续播放一段已经事先录制好的音频信息,供接收者收听。
词解释:根据给出的信息,乔治凯南长电可能是指乔治和凯南两人之间,通过长电报(电台广播和电报通信方式)进行通信或传递特定信息的方式。
具体涉及到的人名和电信方式需要根据上下文和背景进一步确认。
乔治凯南:长电报(194602)
乔治· 凯南:长电报(194602 )来自:Dr.Faustus(静勤诚明,游刃有余)乔治•凯南时间:1946 年 2 月22 日地点:美国驻苏联大使馆人物:大使级代办乔治•凯南和秘书多萝西•海斯曼主题:凯南就美国财政部询问苏联会否加入世界银行及世界货币基金组织一事回电内容:如下国务院 2 月 3 日第284 号电令要求回答的问题,既复杂又非常敏感,既与我们常规思考极为不同,又对分析我们所处的国际环境十分重要,我实在无法将我的回复压缩简单化。
据此,我希望国务院能够容忍我将我的回复用五个在一份简单的电文中,又避免造成我认为是非常危险的过分部分提出。
这五部分的小标题分别是:1、苏联战后(战略)思维的基本特征;2、这一思维的背景;3、这一思维在政府政策层面的反映;4、这一思维在非政府层面的反映;5、从美国政策角度的可行性推断。
请允许我先就对电报通讯所造成的负担表示歉意。
然而,所涉及的问题,特别是考虑到目前发生的事件,是那么的急迫、那么的重要,我认为对这些问题的解释——如果这些问题确实需要我们予以重视的话采用如此长电的形式)是值得的。
下面是我的解释。
第一部分苏联政府宣传机器所宣扬的战后(战略)思维的基本特征如下:苏联仍处于敌对的“资本主义(世界)的包围”之中,长期看来,取得并保持永久的和平共处是不可能的。
正如斯大林1927 年对一个美国工人代表团所表述的:“在国际革命继续发展的过程中,将会出现两个世界规模的中心:一个是社会主义中心,吸引着所有倾向于发展社会主义的国际;一个是资本主义中心,集结着那些希望走资本主义道路的国际。
这两个中心之间为了争夺世界经济主导权的斗争将会决定世界范围内资本主义和共产主义的命运。
、资本主义世界正在受到它本身固有的多种矛盾的困扰。
这些冲突无法通过和平的妥协得以解决,其中最大的是美国与英国之间的冲突。
三、资本主义内部的冲突不可避免地要导致战争。
由此产生的战争可能会有两种形式:一种是资本主义内部两个资本主义国家之间的战争,一种是对社会主义世界的侵略战争。
重读乔治·凯南的长电报
Rereading George F. Kennan's"Long Telegram"
作者: 张小明
作者机构: 北京大学国际关系学院
出版物刊名: 美国研究
页码: 117-128页
年卷期: 2021年 第2期
主题词: 美国军事与外交;冷战;美苏关系;乔治·凯南;"长电报"
摘要:乔治·凯南1946年2月22日从美国驻苏联大使馆给美国国务院发送的第511号电报,即"长电报",是研究冷战史和战后美国对外战略的重要文献之一.需要注意的是,这份电报有一些明显的瑕疵,研究者需要加以注意.另外,很长时间以来,在学术界一直存在着对"长电报"的某些误解或者误读,包括把"长电报"称为"八千字电报",把"logic of force"解读为"武力的逻辑",等等.本文希望能澄清有关凯南"长电报"的这些误解或误读.。
诺维科夫报告与冷战初期的苏联外交政策
“诺维科夫报告”与冷战初期的苏联外交政策何伟内容提要1946年苏联驻美大使诺维科夫撰写了一份题为《战后美国外交政策》的报告,这份报告在一定程度上反映了苏联政府对当时世界局势的判断,对冷战爆发前的苏联对外政策产生了某种影响作用。
中外学术界对这份报告颇为关注,本文认为如果把诺维科夫报告视为苏联在战后初期外交政策的纲领性文件同凯南的“八千字长电报”相提并论是不确切的。
关键词“诺维科夫报告”美苏关系冷战起源1946年苏联驻美国大使尼古拉·诺维科夫的报告——《战后美国外交政策》(下称“诺维科夫报告”)在封沉多年之后于1990年被苏联学者披露出来。
1991年该电报内容被刊登在美国《外交史》杂志第15卷第4期上。
1993年,肯尼斯·杰森编写的《冷战起源》[1]一书中又将这篇报告置于开篇的重要位置,与乔治·凯南[2]和弗兰克·罗伯兹[3]的电报和报告并列,试图引导研究者中将三者加以比较,并试图揭示其中的联系或关系。
“诺维科夫报告”这一资料的提出给冷战史研究提供了一定新的视角,以至在90年代中期以后西方出版的许多有关冷战史或世界通史性质的著作中,都将该报告作为苏联冷战开始的标志性文件。
但是,据笔者所察,无论是肯尼斯·杰森,还是其他学者的这种比较并没有取得很大的进展,原因仍然在于有关背景资料的不足。
在中国学术界,关于冷战的研究也由于诺维科夫报告的披露而发生了一些变化。
各种涉及冷战的著作、文章虽然没有像美国史学著作那样将诺维科夫报告视为苏联冷战开始的标志性文件,但也无一例外都将其作为填补冷战史空白的文件列入客观史实陈述之中。
但是把诺维科夫报告作为一个专题进行分析的文章却极为鲜见。
张盛发在《斯大林与冷战》中用6页的篇幅对该报告作了较为详细的阐述[4]。
林军在《俄罗斯外交史稿》中认为“诺维科夫报告”在冷战起源的影响方面“不亚于凯南的‘长电报’”[5],但仍语焉不详。
本文试图从“诺维科夫报告”产生的背影、电文内容以及它在冷战初期苏联对外政策中的作用几个方面对其作一论述,并且将其与乔治·凯南著名的“长电报”进行初步的比较。
Native Instruments MASCHINE MIKRO MK3用户手册说明书
The information in this document is subject to change without notice and does not represent a commitment on the part of Native Instruments GmbH. The software described by this docu-ment is subject to a License Agreement and may not be copied to other media. No part of this publication may be copied, reproduced or otherwise transmitted or recorded, for any purpose, without prior written permission by Native Instruments GmbH, hereinafter referred to as Native Instruments.“Native Instruments”, “NI” and associated logos are (registered) trademarks of Native Instru-ments GmbH.ASIO, VST, HALion and Cubase are registered trademarks of Steinberg Media Technologies GmbH.All other product and company names are trademarks™ or registered® trademarks of their re-spective holders. Use of them does not imply any affiliation with or endorsement by them.Document authored by: David Gover and Nico Sidi.Software version: 2.8 (02/2019)Hardware version: MASCHINE MIKRO MK3Special thanks to the Beta Test Team, who were invaluable not just in tracking down bugs, but in making this a better product.NATIVE INSTRUMENTS GmbH Schlesische Str. 29-30D-10997 Berlin Germanywww.native-instruments.de NATIVE INSTRUMENTS North America, Inc. 6725 Sunset Boulevard5th FloorLos Angeles, CA 90028USANATIVE INSTRUMENTS K.K.YO Building 3FJingumae 6-7-15, Shibuya-ku, Tokyo 150-0001Japanwww.native-instruments.co.jp NATIVE INSTRUMENTS UK Limited 18 Phipp StreetLondon EC2A 4NUUKNATIVE INSTRUMENTS FRANCE SARL 113 Rue Saint-Maur75011 ParisFrance SHENZHEN NATIVE INSTRUMENTS COMPANY Limited 5F, Shenzhen Zimao Center111 Taizi Road, Nanshan District, Shenzhen, GuangdongChina© NATIVE INSTRUMENTS GmbH, 2019. All rights reserved.Table of Contents1Welcome to MASCHINE (23)1.1MASCHINE Documentation (24)1.2Document Conventions (25)1.3New Features in MASCHINE 2.8 (26)1.4New Features in MASCHINE 2.7.10 (28)1.5New Features in MASCHINE 2.7.8 (29)1.6New Features in MASCHINE 2.7.7 (29)1.7New Features in MASCHINE 2.7.4 (31)1.8New Features in MASCHINE 2.7.3 (33)2Quick Reference (35)2.1MASCHINE Project Overview (35)2.1.1Sound Content (35)2.1.2Arrangement (37)2.2MASCHINE Hardware Overview (40)2.2.1MASCHINE MIKRO Hardware Overview (40)2.2.1.1Browser Section (41)2.2.1.2Edit Section (42)2.2.1.3Performance Section (43)2.2.1.4Transport Section (45)2.2.1.5Pad Section (46)2.2.1.6Rear Panel (50)2.3MASCHINE Software Overview (51)2.3.1Header (52)2.3.2Browser (54)2.3.3Arranger (56)2.3.4Control Area (59)2.3.5Pattern Editor (60)3Basic Concepts (62)3.1Important Names and Concepts (62)3.2Adjusting the MASCHINE User Interface (65)3.2.1Adjusting the Size of the Interface (65)3.2.2Switching between Ideas View and Song View (66)3.2.3Showing/Hiding the Browser (67)3.2.4Showing/Hiding the Control Lane (67)3.3Common Operations (68)3.3.1Adjusting Volume, Swing, and Tempo (68)3.3.2Undo/Redo (71)3.3.3Focusing on a Group or a Sound (73)3.3.4Switching Between the Master, Group, and Sound Level (77)3.3.5Navigating Channel Properties, Plug-ins, and Parameter Pages in the Control Area.773.3.6Navigating the Software Using the Controller (82)3.3.7Using Two or More Hardware Controllers (82)3.3.8Loading a Recent Project from the Controller (84)3.4Native Kontrol Standard (85)3.5Stand-Alone and Plug-in Mode (86)3.5.1Differences between Stand-Alone and Plug-in Mode (86)3.5.2Switching Instances (88)3.6Preferences (88)3.6.1Preferences – General Page (89)3.6.2Preferences – Audio Page (93)3.6.3Preferences – MIDI Page (95)3.6.4Preferences – Default Page (97)3.6.5Preferences – Library Page (101)3.6.6Preferences – Plug-ins Page (109)3.6.7Preferences – Hardware Page (114)3.6.8Preferences – Colors Page (114)3.7Integrating MASCHINE into a MIDI Setup (117)3.7.1Connecting External MIDI Equipment (117)3.7.2Sync to External MIDI Clock (117)3.7.3Send MIDI Clock (118)3.7.4Using MIDI Mode (119)3.8Syncing MASCHINE using Ableton Link (120)3.8.1Connecting to a Network (121)3.8.2Joining and Leaving a Link Session (121)4Browser (123)4.1Browser Basics (123)4.1.1The MASCHINE Library (123)4.1.2Browsing the Library vs. Browsing Your Hard Disks (124)4.2Searching and Loading Files from the Library (125)4.2.1Overview of the Library Pane (125)4.2.2Selecting or Loading a Product and Selecting a Bank from the Browser (128)4.2.3Selecting a Product Category, a Product, a Bank, and a Sub-Bank (133)4.2.3.1Selecting a Product Category, a Product, a Bank, and a Sub-Bank on theController (137)4.2.4Selecting a File Type (137)4.2.5Choosing Between Factory and User Content (138)4.2.6Selecting Type and Character Tags (138)4.2.7Performing a Text Search (142)4.2.8Loading a File from the Result List (143)4.3Additional Browsing Tools (148)4.3.1Loading the Selected Files Automatically (148)4.3.2Auditioning Instrument Presets (149)4.3.3Auditioning Samples (150)4.3.4Loading Groups with Patterns (150)4.3.5Loading Groups with Routing (151)4.3.6Displaying File Information (151)4.4Using Favorites in the Browser (152)4.5Editing the Files’ Tags and Properties (155)4.5.1Attribute Editor Basics (155)4.5.2The Bank Page (157)4.5.3The Types and Characters Pages (157)4.5.4The Properties Page (160)4.6Loading and Importing Files from Your File System (161)4.6.1Overview of the FILES Pane (161)4.6.2Using Favorites (163)4.6.3Using the Location Bar (164)4.6.4Navigating to Recent Locations (165)4.6.5Using the Result List (166)4.6.6Importing Files to the MASCHINE Library (169)4.7Locating Missing Samples (171)4.8Using Quick Browse (173)5Managing Sounds, Groups, and Your Project (175)5.1Overview of the Sounds, Groups, and Master (175)5.1.1The Sound, Group, and Master Channels (176)5.1.2Similarities and Differences in Handling Sounds and Groups (177)5.1.3Selecting Multiple Sounds or Groups (178)5.2Managing Sounds (181)5.2.1Loading Sounds (183)5.2.2Pre-listening to Sounds (184)5.2.3Renaming Sound Slots (185)5.2.4Changing the Sound’s Color (186)5.2.5Saving Sounds (187)5.2.6Copying and Pasting Sounds (189)5.2.7Moving Sounds (192)5.2.8Resetting Sound Slots (193)5.3Managing Groups (194)5.3.1Creating Groups (196)5.3.2Loading Groups (197)5.3.3Renaming Groups (198)5.3.4Changing the Group’s Color (199)5.3.5Saving Groups (200)5.3.6Copying and Pasting Groups (202)5.3.7Reordering Groups (206)5.3.8Deleting Groups (207)5.4Exporting MASCHINE Objects and Audio (208)5.4.1Saving a Group with its Samples (208)5.4.2Saving a Project with its Samples (210)5.4.3Exporting Audio (212)5.5Importing Third-Party File Formats (218)5.5.1Loading REX Files into Sound Slots (218)5.5.2Importing MPC Programs to Groups (219)6Playing on the Controller (223)6.1Adjusting the Pads (223)6.1.1The Pad View in the Software (223)6.1.2Choosing a Pad Input Mode (225)6.1.3Adjusting the Base Key (226)6.2Adjusting the Key, Choke, and Link Parameters for Multiple Sounds (227)6.3Playing Tools (229)6.3.1Mute and Solo (229)6.3.2Choke All Notes (233)6.3.3Groove (233)6.3.4Level, Tempo, Tune, and Groove Shortcuts on Your Controller (235)6.3.5Tap Tempo (235)6.4Performance Features (236)6.4.1Overview of the Perform Features (236)6.4.2Selecting a Scale and Creating Chords (239)6.4.3Scale and Chord Parameters (240)6.4.4Creating Arpeggios and Repeated Notes (253)6.4.5Swing on Note Repeat / Arp Output (257)6.5Using Lock Snapshots (257)6.5.1Creating a Lock Snapshot (257)7Working with Plug-ins (259)7.1Plug-in Overview (259)7.1.1Plug-in Basics (259)7.1.2First Plug-in Slot of Sounds: Choosing the Sound’s Role (263)7.1.3Loading, Removing, and Replacing a Plug-in (264)7.1.4Adjusting the Plug-in Parameters (270)7.1.5Bypassing Plug-in Slots (270)7.1.6Using Side-Chain (272)7.1.7Moving Plug-ins (272)7.1.8Alternative: the Plug-in Strip (273)7.1.9Saving and Recalling Plug-in Presets (273)7.1.9.1Saving Plug-in Presets (274)7.1.9.2Recalling Plug-in Presets (275)7.1.9.3Removing a Default Plug-in Preset (276)7.2The Sampler Plug-in (277)7.2.1Page 1: Voice Settings / Engine (279)7.2.2Page 2: Pitch / Envelope (281)7.2.3Page 3: FX / Filter (283)7.2.4Page 4: Modulation (285)7.2.5Page 5: LFO (286)7.2.6Page 6: Velocity / Modwheel (288)7.3Using Native Instruments and External Plug-ins (289)7.3.1Opening/Closing Plug-in Windows (289)7.3.2Using the VST/AU Plug-in Parameters (292)7.3.3Setting Up Your Own Parameter Pages (293)7.3.4Using VST/AU Plug-in Presets (298)7.3.5Multiple-Output Plug-ins and Multitimbral Plug-ins (300)8Using the Audio Plug-in (302)8.1Loading a Loop into the Audio Plug-in (306)8.2Editing Audio in the Audio Plug-in (307)8.3Using Loop Mode (308)8.4Using Gate Mode (310)9Using the Drumsynths (312)9.1Drumsynths – General Handling (313)9.1.1Engines: Many Different Drums per Drumsynth (313)9.1.2Common Parameter Organization (313)9.1.3Shared Parameters (316)9.1.4Various Velocity Responses (316)9.1.5Pitch Range, Tuning, and MIDI Notes (316)9.2The Kicks (317)9.2.1Kick – Sub (319)9.2.2Kick – Tronic (321)9.2.3Kick – Dusty (324)9.2.4Kick – Grit (325)9.2.5Kick – Rasper (328)9.2.6Kick – Snappy (329)9.2.7Kick – Bold (331)9.2.8Kick – Maple (333)9.2.9Kick – Push (334)9.3The Snares (336)9.3.1Snare – Volt (338)9.3.2Snare – Bit (340)9.3.3Snare – Pow (342)9.3.4Snare – Sharp (343)9.3.5Snare – Airy (345)9.3.6Snare – Vintage (347)9.3.7Snare – Chrome (349)9.3.8Snare – Iron (351)9.3.9Snare – Clap (353)9.3.10Snare – Breaker (355)9.4The Hi-hats (357)9.4.1Hi-hat – Silver (358)9.4.2Hi-hat – Circuit (360)9.4.3Hi-hat – Memory (362)9.4.4Hi-hat – Hybrid (364)9.4.5Creating a Pattern with Closed and Open Hi-hats (366)9.5The Toms (367)9.5.1Tom – Tronic (369)9.5.2Tom – Fractal (371)9.5.3Tom – Floor (375)9.5.4Tom – High (377)9.6The Percussions (378)9.6.1Percussion – Fractal (380)9.6.2Percussion – Kettle (383)9.6.3Percussion – Shaker (385)9.7The Cymbals (389)9.7.1Cymbal – Crash (391)9.7.2Cymbal – Ride (393)10Using the Bass Synth (396)10.1Bass Synth – General Handling (397)10.1.1Parameter Organization (397)10.1.2Bass Synth Parameters (399)11Working with Patterns (401)11.1Pattern Basics (401)11.1.1Pattern Editor Overview (402)11.1.2Navigating the Event Area (404)11.1.3Following the Playback Position in the Pattern (406)11.1.4Jumping to Another Playback Position in the Pattern (407)11.1.5Group View and Keyboard View (408)11.1.6Adjusting the Arrange Grid and the Pattern Length (410)11.1.7Adjusting the Step Grid and the Nudge Grid (413)11.2Recording Patterns in Real Time (416)11.2.1Recording Your Patterns Live (417)11.2.2Using the Metronome (419)11.2.3Recording with Count-in (420)11.3Recording Patterns with the Step Sequencer (422)11.3.1Step Mode Basics (422)11.3.2Editing Events in Step Mode (424)11.4Editing Events (425)11.4.1Editing Events with the Mouse: an Overview (425)11.4.2Creating Events/Notes (428)11.4.3Selecting Events/Notes (429)11.4.4Editing Selected Events/Notes (431)11.4.5Deleting Events/Notes (434)11.4.6Cut, Copy, and Paste Events/Notes (436)11.4.7Quantizing Events/Notes (439)11.4.8Quantization While Playing (441)11.4.9Doubling a Pattern (442)11.4.10Adding Variation to Patterns (442)11.5Recording and Editing Modulation (443)11.5.1Which Parameters Are Modulatable? (444)11.5.2Recording Modulation (446)11.5.3Creating and Editing Modulation in the Control Lane (447)11.6Creating MIDI Tracks from Scratch in MASCHINE (452)11.7Managing Patterns (454)11.7.1The Pattern Manager and Pattern Mode (455)11.7.2Selecting Patterns and Pattern Banks (456)11.7.3Creating Patterns (459)11.7.4Deleting Patterns (460)11.7.5Creating and Deleting Pattern Banks (461)11.7.6Naming Patterns (463)11.7.7Changing the Pattern’s Color (465)11.7.8Duplicating, Copying, and Pasting Patterns (466)11.7.9Moving Patterns (469)11.8Importing/Exporting Audio and MIDI to/from Patterns (470)11.8.1Exporting Audio from Patterns (470)11.8.2Exporting MIDI from Patterns (472)11.8.3Importing MIDI to Patterns (474)12Audio Routing, Remote Control, and Macro Controls (483)12.1Audio Routing in MASCHINE (484)12.1.1Sending External Audio to Sounds (485)12.1.2Configuring the Main Output of Sounds and Groups (489)12.1.3Setting Up Auxiliary Outputs for Sounds and Groups (494)12.1.4Configuring the Master and Cue Outputs of MASCHINE (497)12.1.5Mono Audio Inputs (502)12.1.5.1Configuring External Inputs for Sounds in Mix View (503)12.2Using MIDI Control and Host Automation (506)12.2.1Triggering Sounds via MIDI Notes (507)12.2.2Triggering Scenes via MIDI (513)12.2.3Controlling Parameters via MIDI and Host Automation (514)12.2.4Selecting VST/AU Plug-in Presets via MIDI Program Change (522)12.2.5Sending MIDI from Sounds (523)12.3Creating Custom Sets of Parameters with the Macro Controls (527)12.3.1Macro Control Overview (527)12.3.2Assigning Macro Controls Using the Software (528)13Controlling Your Mix (535)13.1Mix View Basics (535)13.1.1Switching between Arrange View and Mix View (535)13.1.2Mix View Elements (536)13.2The Mixer (537)13.2.1Displaying Groups vs. Displaying Sounds (539)13.2.2Adjusting the Mixer Layout (541)13.2.3Selecting Channel Strips (542)13.2.4Managing Your Channels in the Mixer (543)13.2.5Adjusting Settings in the Channel Strips (545)13.2.6Using the Cue Bus (549)13.3The Plug-in Chain (551)13.4The Plug-in Strip (552)13.4.1The Plug-in Header (554)13.4.2Panels for Drumsynths and Internal Effects (556)13.4.3Panel for the Sampler (557)13.4.4Custom Panels for Native Instruments Plug-ins (560)13.4.5Undocking a Plug-in Panel (Native Instruments and External Plug-ins Only) (564)14Using Effects (567)14.1Applying Effects to a Sound, a Group or the Master (567)14.1.1Adding an Effect (567)14.1.2Other Operations on Effects (574)14.1.3Using the Side-Chain Input (575)14.2Applying Effects to External Audio (578)14.2.1Step 1: Configure MASCHINE Audio Inputs (578)14.2.2Step 2: Set up a Sound to Receive the External Input (579)14.2.3Step 3: Load an Effect to Process an Input (579)14.3Creating a Send Effect (580)14.3.1Step 1: Set Up a Sound or Group as Send Effect (581)14.3.2Step 2: Route Audio to the Send Effect (583)14.3.3 A Few Notes on Send Effects (583)14.4Creating Multi-Effects (584)15Effect Reference (587)15.1Dynamics (588)15.1.1Compressor (588)15.1.2Gate (591)15.1.3Transient Master (594)15.1.4Limiter (596)15.1.5Maximizer (600)15.2Filtering Effects (603)15.2.1EQ (603)15.2.2Filter (605)15.2.3Cabinet (609)15.3Modulation Effects (611)15.3.1Chorus (611)15.3.2Flanger (612)15.3.3FM (613)15.3.4Freq Shifter (615)15.3.5Phaser (616)15.4Spatial and Reverb Effects (617)15.4.1Ice (617)15.4.2Metaverb (619)15.4.3Reflex (620)15.4.4Reverb (Legacy) (621)15.4.5Reverb (623)15.4.5.1Reverb Room (623)15.4.5.2Reverb Hall (626)15.4.5.3Plate Reverb (629)15.5Delays (630)15.5.1Beat Delay (630)15.5.2Grain Delay (632)15.5.3Grain Stretch (634)15.5.4Resochord (636)15.6Distortion Effects (638)15.6.1Distortion (638)15.6.2Lofi (640)15.6.3Saturator (641)15.7Perform FX (645)15.7.1Filter (646)15.7.2Flanger (648)15.7.3Burst Echo (650)15.7.4Reso Echo (653)15.7.5Ring (656)15.7.6Stutter (658)15.7.7Tremolo (661)15.7.8Scratcher (664)16Working with the Arranger (667)16.1Arranger Basics (667)16.1.1Navigating Song View (670)16.1.2Following the Playback Position in Your Project (672)16.1.3Performing with Scenes and Sections using the Pads (673)16.2Using Ideas View (677)16.2.1Scene Overview (677)16.2.2Creating Scenes (679)16.2.3Assigning and Removing Patterns (679)16.2.4Selecting Scenes (682)16.2.5Deleting Scenes (684)16.2.6Creating and Deleting Scene Banks (685)16.2.7Clearing Scenes (685)16.2.8Duplicating Scenes (685)16.2.9Reordering Scenes (687)16.2.10Making Scenes Unique (688)16.2.11Appending Scenes to Arrangement (689)16.2.12Naming Scenes (689)16.2.13Changing the Color of a Scene (690)16.3Using Song View (692)16.3.1Section Management Overview (692)16.3.2Creating Sections (694)16.3.3Assigning a Scene to a Section (695)16.3.4Selecting Sections and Section Banks (696)16.3.5Reorganizing Sections (700)16.3.6Adjusting the Length of a Section (702)16.3.6.1Adjusting the Length of a Section Using the Software (703)16.3.6.2Adjusting the Length of a Section Using the Controller (705)16.3.7Clearing a Pattern in Song View (705)16.3.8Duplicating Sections (705)16.3.8.1Making Sections Unique (707)16.3.9Removing Sections (707)16.3.10Renaming Scenes (708)16.3.11Clearing Sections (710)16.3.12Creating and Deleting Section Banks (710)16.3.13Working with Patterns in Song view (710)16.3.13.1Creating a Pattern in Song View (711)16.3.13.2Selecting a Pattern in Song View (711)16.3.13.3Clearing a Pattern in Song View (711)16.3.13.4Renaming a Pattern in Song View (711)16.3.13.5Coloring a Pattern in Song View (712)16.3.13.6Removing a Pattern in Song View (712)16.3.13.7Duplicating a Pattern in Song View (712)16.3.14Enabling Auto Length (713)16.3.15Looping (714)16.3.15.1Setting the Loop Range in the Software (714)16.3.15.2Activating or Deactivating a Loop Using the Controller (715)16.4Playing with Sections (715)16.4.1Jumping to another Playback Position in Your Project (716)16.5Triggering Sections or Scenes via MIDI (717)16.6The Arrange Grid (719)16.7Quick Grid (720)17Sampling and Sample Mapping (722)17.1Opening the Sample Editor (722)17.2Recording Audio (724)17.2.1Opening the Record Page (724)17.2.2Selecting the Source and the Recording Mode (725)17.2.3Arming, Starting, and Stopping the Recording (729)17.2.5Checking Your Recordings (731)17.2.6Location and Name of Your Recorded Samples (734)17.3Editing a Sample (735)17.3.1Using the Edit Page (735)17.3.2Audio Editing Functions (739)17.4Slicing a Sample (743)17.4.1Opening the Slice Page (743)17.4.2Adjusting the Slicing Settings (744)17.4.3Manually Adjusting Your Slices (746)17.4.4Applying the Slicing (750)17.5Mapping Samples to Zones (754)17.5.1Opening the Zone Page (754)17.5.2Zone Page Overview (755)17.5.3Selecting and Managing Zones in the Zone List (756)17.5.4Selecting and Editing Zones in the Map View (761)17.5.5Editing Zones in the Sample View (765)17.5.6Adjusting the Zone Settings (767)17.5.7Adding Samples to the Sample Map (770)18Appendix: Tips for Playing Live (772)18.1Preparations (772)18.1.1Focus on the Hardware (772)18.1.2Customize the Pads of the Hardware (772)18.1.3Check Your CPU Power Before Playing (772)18.1.4Name and Color Your Groups, Patterns, Sounds and Scenes (773)18.1.5Consider Using a Limiter on Your Master (773)18.1.6Hook Up Your Other Gear and Sync It with MIDI Clock (773)18.1.7Improvise (773)18.2Basic Techniques (773)18.2.1Use Mute and Solo (773)18.2.2Create Variations of Your Drum Patterns in the Step Sequencer (774)18.2.3Use Note Repeat (774)18.2.4Set Up Your Own Multi-effect Groups and Automate Them (774)18.3Special Tricks (774)18.3.1Changing Pattern Length for Variation (774)18.3.2Using Loops to Cycle Through Samples (775)18.3.3Load Long Audio Files and Play with the Start Point (775)19Troubleshooting (776)19.1Knowledge Base (776)19.2Technical Support (776)19.3Registration Support (777)19.4User Forum (777)20Glossary (778)Index (786)1Welcome to MASCHINEThank you for buying MASCHINE!MASCHINE is a groove production studio that implements the familiar working style of classi-cal groove boxes along with the advantages of a computer based system. MASCHINE is ideal for making music live, as well as in the studio. It’s the hands-on aspect of a dedicated instru-ment, the MASCHINE hardware controller, united with the advanced editing features of the MASCHINE software.Creating beats is often not very intuitive with a computer, but using the MASCHINE hardware controller to do it makes it easy and fun. You can tap in freely with the pads or use Note Re-peat to jam along. Alternatively, build your beats using the step sequencer just as in classic drum machines.Patterns can be intuitively combined and rearranged on the fly to form larger ideas. You can try out several different versions of a song without ever having to stop the music.Since you can integrate it into any sequencer that supports VST, AU, or AAX plug-ins, you can reap the benefits in almost any software setup, or use it as a stand-alone application. You can sample your own material, slice loops and rearrange them easily.However, MASCHINE is a lot more than an ordinary groovebox or sampler: it comes with an inspiring 7-gigabyte library, and a sophisticated, yet easy to use tag-based Browser to give you instant access to the sounds you are looking for.What’s more, MASCHINE provides lots of options for manipulating your sounds via internal ef-fects and other sound-shaping possibilities. You can also control external MIDI hardware and 3rd-party software with the MASCHINE hardware controller, while customizing the functions of the pads, knobs and buttons according to your needs utilizing the included Controller Editor application. We hope you enjoy this fantastic instrument as much as we do. Now let’s get go-ing!—The MASCHINE team at Native Instruments.MASCHINE Documentation1.1MASCHINE DocumentationNative Instruments provide many information sources regarding MASCHINE. The main docu-ments should be read in the following sequence:1.MASCHINE MIKRO Quick Start Guide: This animated online guide provides a practical ap-proach to help you learn the basic of MASCHINE MIKRO. The guide is available from theNative Instruments website: https:///maschine-mikro-quick-start/2.MASCHINE Manual (this document): The MASCHINE Manual provides you with a compre-hensive description of all MASCHINE software and hardware features.Additional documentation sources provide you with details on more specific topics:►Online Support Videos: You can find a number of support videos on The Official Native In-struments Support Channel under the following URL: https:///NIsupport-EN. We recommend that you follow along with these instructions while the respective ap-plication is running on your computer.Other Online Resources:If you are experiencing problems related to your Native Instruments product that the supplied documentation does not cover, there are several ways of getting help:▪Knowledge Base▪User Forum▪Technical Support▪Registration SupportYou will find more information on these subjects in the chapter Troubleshooting.Document Conventions1.2Document ConventionsThis section introduces you to the signage and text highlighting used in this manual. This man-ual uses particular formatting to point out special facts and to warn you of potential issues.The icons introducing these notes let you see what kind of information is to be expected:This document uses particular formatting to point out special facts and to warn you of poten-tial issues. The icons introducing the following notes let you see what kind of information canbe expected:Furthermore, the following formatting is used:▪Text appearing in (drop-down) menus (such as Open…, Save as… etc.) in the software andpaths to locations on your hard disk or other storage devices is printed in italics.▪Text appearing elsewhere (labels of buttons, controls, text next to checkboxes etc.) in thesoftware is printed in blue. Whenever you see this formatting applied, you will find thesame text appearing somewhere on the screen.▪Text appearing on the displays of the controller is printed in light grey. Whenever you seethis formatting applied, you will find the same text on a controller display.▪Text appearing on labels of the hardware controller is printed in orange. Whenever you seethis formatting applied, you will find the same text on the controller.▪Important names and concepts are printed in bold.▪References to keys on your computer’s keyboard you’ll find put in square brackets (e.g.,“Press [Shift] + [Enter]”).►Single instructions are introduced by this play button type arrow.→Results of actions are introduced by this smaller arrow.Naming ConventionThroughout the documentation we will refer to MASCHINE controller (or just controller) as the hardware controller and MASCHINE software as the software installed on your computer.The term “effect” will sometimes be abbreviated as “FX” when referring to elements in the MA-SCHINE software and hardware. These terms have the same meaning.Button Combinations and Shortcuts on Your ControllerMost instructions will use the “+” sign to indicate buttons (or buttons and pads) that must be pressed simultaneously, starting with the button indicated first. E.g., an instruction such as:“Press SHIFT + PLAY”means:1.Press and hold SHIFT.2.While holding SHIFT, press PLAY and release it.3.Release SHIFT.1.3New Features in MASCHINE2.8The following new features have been added to MASCHINE: Integration▪Browse on , create your own collections of loops and one-shots and send them directly to the MASCHINE browser.Improvements to the Browser▪Samples are now cataloged in separate Loops and One-shots tabs in the Browser.▪Previews of loops selected in the Browser will be played in sync with the current project.When a loop is selected with Prehear turned on, it will begin playing immediately in-sync with the project if transport is running. If a loop preview starts part-way through the loop, the loop will play once more for its full length to ensure you get to hear the entire loop once in context with your project.▪Filters and product selections will be remembered when switching between content types and Factory/User Libraries in the Browser.▪Browser content synchronization between multiple running instances. When running multi-ple instances of MASCHINE, either as Standalone and/or as a plug-in, updates to the Li-brary will be synced across the instances. For example, if you delete a sample from your User Library in one instance, the sample will no longer be present in the other instances.Similarly, if you save a preset in one instance, that preset will then be available in the oth-er instances, too.▪Edits made to samples in the Factory Libraries will be saved to the Standard User Directo-ry.For more information on these new features, refer to the following chapter ↑4, Browser. Improvements to the MASCHINE MIKRO MK3 Controller▪You can now set sample Start and End points using the controller. For more information refer to ↑17.3.1, Using the Edit Page.Improved Support for A-Series Keyboards▪When Browsing with A-Series keyboards, you can now jump quickly to the results list by holding SHIFT and pushing right on the 4D Encoder.▪When Browsing with A-Series keyboards, you can fast scroll through the Browser results list by holding SHIFT and twisting the 4D Encoder.▪Mute and Solo Sounds and Groups from A-Series keyboards. Sounds are muted in TRACK mode while Groups are muted in IDEAS.。
WiFi_Offload_White_Paper[1]
Wi-Fi Offload WhitepaperVersion 1.0201019AprilCopyright NoticeCopyright © 2010 GSM AssociationAntitrust NoticeThe information contained herein is in full compliance with the GSM Association’s antitrust compliancepolicy.TABLE OF CONTENTS1 DOCUMENT PURPOSE (4)2 EXECUTIVE SUMMARY (4)3 INTRODUCTION (4)3.1 O VERVIEW (4)3.2 S COPE (5)3.3 D EFINITION OF TERMS (5)4 WHAT IS WI-FI OFFLOADING? (6)5 EXAMPLE USE CASES (7)5.1 U SE CASE USING D EVICE ACCESSING VIDEO –M OBILE TV AND/OR Y OU T UBE (7)5.2 U SE C ASE USING L APTOPS DOING BROWSING AND/OR Y OU T UBE (8)5.3 U SE C ASE USING MULTIPLE SSID S (9)6 EXISTING SOLUTIONS (10)6.1 S TANDARD B ODIES (10)6.1.1 IEEE (10)6.1.2 IETF (10)6.1.3 3GPP (10)6.2 I NDUSTRY B ODIES (11)6.2.1 Wi-Fi Alliance (11)6.2.2 Wireless Broadband Alliance (WBA) (11)6.3 E XISTING V ENDOR S OLUTIONS (11)7 TERMINAL & NETWORK REQUIREMENTS (12)7.1 O VERVIEW (12)7.1.1 Automatic provisioning (12)7.1.2 Manual provisioning (12)7.2 T ERMINALS (12)7.2.1 Smartphones (12)7.2.2 Netbooks and Dongles (13)7.3 N ETWORK R EQUIREMENTS: (14)7.4 N ETWORK S ELECTION: (14)8 QUALITY OF SERVICE (15)9 SECURITY AND FRAUD (15)9.1 W I-F I NETWORK ACCESS SECURITY (15)9.1.1 802.11i (15)9.1.2 Web Portals & EAP 802.1X (16)9.2 S ERVICES ACCESS SECURITY (16)10 RECOMMENDATIONS (18)10.1 A UTOMATIC C LIENTS (18)10.2 A UTHENTICATION WITH 802.1X AND EAP-SIM AND EAP-AKA (18)10.3 S ECURITY (19)10.4 Q UALITY OF S ERVICE (19)10.5 R OAMING AND H ANDOFF (19)10.6 P OWER O PTIMISATION (19)10.7 F OCUS ON S TANDARDS D EVELOPMENT O RGANISATIONS (19)ANNEX - TODAY’S WI-FI WORLD SOLUTIONS (20)A1 IEEE (20)A1.1 802.11-2007 (Was previously known as 802.11a/b/d/e/g/h/i/j) (20)A1.2 802.11n (20)A1.3 802.11u (20)A1.4 802.11r (20)A1.5 802.21 (20)A1.6 802.11e (20)A1.7 802.11i (20)A1.8 802.1X (20)A2 IETF (21)A2.1 RADIUS (21)A2.2 EAP (21)A2.3 Network Selection – RFC 5113 (21)A2.4 Mobility management protocols (21)A3 3GPP (22)A3.1 TS 23.402 I-WLAN: Architecture Enhancements for non-3GPP Access to 3GPP networks (23)A3.2 TS 23.302 Access to the 3GPP EPC via non-3GPP access networks (24)A3.3 TS 33.234 and 33.402 3GPP and WLAN Interworking Security (24)A3.4 TR 22.912 3GPP Study on Network Selection Requirements for non-3GPP Access 25A3.5 Service Continuity (25)A3.6 IP Flow Mobility, Local IP Access and Selected Internet IP Traffic Offload (27)A3.7 GAN – Generic Access Network (formerly known as UMA) (28)DOCUMENT MANAGEMENT (29)1 DOCUMENT PURPOSEThis document is in support of GSM Association’s Wi-Fi Offload initiative and is intended to facilitate development of an ecosystem for the availability of Wi-Fi Offload. This is to deliver services to customers whether they are in or out of 3GPP network coverage and also to help reduce the load on the 3GPP network.2 EXECUTIVE SUMMARYThis document explains the current state of Wi-Fi networks and the work being carried out in the relevant standards organisations and also other industry bodies who are working towards a variety of solutions and technologies needed to support Wi-Fi Offload. There are sample use cases covering how operators envisage possibly using Wi-Fi Offload in the future.The document also covers the terminal and network requirements and the important issues of security and quality of service needed to make Wi-Fi Offload available to 3GPP network operators.It also makes the following recommendations that the GSMA consider important to the development and deployment of Wi-Fi Offload that can be used by 3GPP network operators. These recommendations cover:•Automatic connection management client•Authentication with 802.1X and EAP-SIM and EAP-AKA•Roaming and Handoff• Security•Quality of Service• Power OptimisationAnd finally the GSMA will liaise as required with the Standards Development Organisations including 3GPP, IEEE, the Wireless Broadband Alliance, and the Wi-Fi Alliance as the main bodies to be considered for any development and standardisation related to 3GPP-Wi-Fi data offloading using protocols defined in the IETF. The GSMA will liaise with these bodies to ensure the development of a suitable Wi-Fi Offload eco-system as required by 3GPP network operators.3 INTRODUCTION3.1 OverviewThis whitepaper outlines the needs of the mobile community in how it would like to utilise Wi-Fi Offload to help promote and develop the usefulness and availability of its services. The paper gives some simple use cases as examples.The whitepaper gives an overview of the current Wi-Fi world; it then provides a high level outline of the expected network and terminal requirements. It considers some of the security and fraud risks before making some recommendations for the 3GPP and Wi-Fi network operators and associated vendor community to consider.3.2 ScopeThe primary objective of this document is to provide a guide to Wi-Fi Offload technology for data services by Mobile Network Operators. It covers deployment scenarios where Wi-Fi Offload is applicable.The focus of the document will be on aspects of the user terminal and infrastructure that are affected by support of Wi-Fi Offload.Out of scope of this whitepaper is the seamless handoff of voice communication (including service continuity across non-interconnected networks) and the business methods for subscribing or unsubscribing to a network;The initial intended audience for this document is the 3GPP and Wi-Fi network operators and associated vendor community.The scope of this work includes scenarios for using Wi-Fi Offload, industry perspective and SDO work, usage scenarios and network and terminal requirements.3.3 Definition of terms3GPP Third Generation Partnership ProjectAAA Authentication,Authorization and AccountingAGW AccessGatewayAES Advanced Encryption StandardANDSF Access Network Discovery and Selection FunctionBSS Basic Service SetCCMP Counter Mode with Cipher Block Chaining MessageAuthentication Code ProtocolCS CircuitSwitchedEAP ExtensibleAuthentication ProtocolEDCA EnhancedDistributed Channel AccessEPC Evolved Packet CoreePDG Evolved Packet Data GatewayEPS Evolved Packet SystemFMC FixedMobileConvergenceGAN GenericAccessNetworkGPRS General Packet Radio ServiceGSM Global System for MobileIEEE Institute of Electrical and Electronics EngineersIETF ICS Internet Engineering Task Force IMS Centralised ServicesIMS IP Multimedia SubsystemI-WLAN InterworkingWirelessLANLAN MAC MAPIM MMS Local Area NetworkMedia Access ControlMulti Access PDN connectivity and IP flow Mobility Multi Media ServicePLMN Public Land Mobile NetworkQoS Quality of ServiceRADIUS Remote Authentication Dial In User ServiceRSN Robust Security NetworkSDO StandardsDevelopmentOrganisations SIM Subscriber Identity ModuleSMS Short Message ServiceSSID Service Set IdentifierUE UserEquipmentUICC Universal Integrated Circuit cardUMA Unlicensed Mobile AccessUMTS Universal Mobile Telecommunications System USIM Universal Subscriber Identity ModuleWBA Wireless Broadband AllianceWi-Fi Wireless network using IEEE 802.11 standards WiMAX Worldwide Interoperability for Microwave Access WISP Wireless Internet Service ProviderWISPr Wireless Internet Service Provider roamingWLAN Wireless Local Area NetworkWPA2 WRIX Wi-Fi Protected Access Version 2 Wireless Roaming Intermediary eXchange4 WHAT IS WI-FI OFFLOADING?It would be advantageous for the mobile operator to be able to offer packet based services to its customers over more networks than just its own 3GPP network. This would potentially mean that in some cases there would be greater overall network capacity available than existing 3GPP networks alone can offer, or service where none currently exists due to the physical constraints of 3GPP networks, such as some in-building areas where external based cell signals cannot penetrate. Thus, any installed Wi-Fi hotspot could potentially be exploited by the 3GPP operator and its customers.Whilst there are other wireless technologies available, this whitepaper is focusing on the use of Wi-Fi as the deployment of public hotspots, and Wi-Fi in homes and enterprises is becoming extremely widespread.One of the important aspects in Wi-Fi Offload is that it must not degrade, rather preferably improve or enhance, the service to the end user, or provide service where it would otherwise not be available. Its use should be functionally invisible to the end user. The service delivery should be seamless and ideally require no end user interaction.Wi-Fi should be complementary to the excellent wide coverage area 3GPP networks already deliver today and LTE networks will deliver in the future.Currently, the level of functionality required by each operator may be different. Functionality may range from manual selection of a Wi-Fi access point for connection to the internet, to fully automatic selection and authentication with operator based network services. Our vision is that seamless (once set up) network selection and authentication will be a common goal. However, different operators will have different core network implementations and differing views on session continuity and service transparency. Such functionality may be achieved in a number of ways, some standardized and some proprietary. As 3GPP operators, there is a strong interest in the deployment of IMS-based core networks as well as a level of network and service transparency. This leads to a strong interest in the implementation of ICS and IP-based messaging (which must interwork with traditional SMS/MMS functionality), impacting both network and device elements though these aspects are beyond the normal sphere of Wi-Fi Offloading and will not be addressed in this paper.5 EXAMPLE USE CASES5.1 Use case using Device accessing video – Mobile TV and/or You TubeA 3GPP network customer has a Smartphone terminal that also has a Wi-Fi capability. They subscribe to mobile TV services as well as regularly watching music videos on You Tube. They are a regular traveller and are often in range of Wi-Fi hotspots in coffee shops, trains and airport terminals as well as hotels.Scenario:•On the bus from the hire car drop-off to the airport terminal the user begins to watch the news from an international news network on the 3GPP network.•As the user enters the airport terminal, his phone detects the presence of a Wi-Fi hotspot.•The device automatically connects and authenticates the user with the hotspot using the USIM/UICC.•Having already checked-in online the user goes straight to security and pockets the phone.•As soon as he is in the departure area, his device is back in his hands and he resumes watching the news programme, however this time the service is being provided via the Wi-Fi Hotspot in the departure area.•He enters a different terminal, where the Wi-Fi coverage is provided by a different Wi-Fi operator, with which a roaming agreement exists.•The device checks that the new provider is allowed, and checks operator policy on use of the roaming network. If there is no charging difference the operation continues on thevisited network. If charging is different due to the change, the user is notified and must approve roaming onto this new network.•The user arrives at his home airport on his delayed flight and catches a taxi home, his local football team is playing tonight and he will miss the match so he selects the TV application from his device’s home screen.•The user selects the football match from the options on his screen, his pre-existing TV subscription is activated.•The user begins to watch the match via the 3GPP network on his device in the taxi.•As the user enters his stone built cottage the coverage from the local 3GPP cell fails but he has a Wi-Fi network in his home.•The device automatically connects and authenticates the user with the residential hotspot using the USIM/UICC.•The user continues to watch the match on his device, and does not miss the first goal being scored by his team. This may be by session re-establishment and not by an uninterrupted handover, this would depend on the implementation deployed.5.2 Use Case using Laptops doing browsing and/or You TubeSimilar to 3GPP roaming, it is desired to be able to transparently connect to various Wi-Fi hotspots provided by different owners whilst being charged accordingly.The laptop is Wi-Fi enabled with 3GPP access provided via integrated hardware or a dongle. Scenario:• A 3GPP subscriber is working on a confidential document on her laptop computer at a local Starbucks café through her secured corporate VPN portal.•After completing her work, she needs to print out the document for her clients.•She heads off to a local Internet Café and rents a computer workstation.•She reaches into her briefcase and looks for her flash drive to transfer the document.•Unfortunately, she remembers that she left her flash drive back at the home office.•After some quick thinking she reaches for her laptop so that she can email the document to her personal email account and then retrieve it from Café’s PC.•She starts the Network Client on her laptop and notices that there is a Wi-Fi hotspot operated by the store.•Instead of connecting to a 3GPP network, the client software automatically authenticates to the Wi-Fi network through pre-loaded credentials, or by using the dongle’s USIM/UICC, and the interoperator roaming agreements.•She emails the document to herself, accesses it on the Cafe’s computer, and prints it out; ready to head to her client’s meeting.5.3 Use Case using multiple SSIDsA network service provider would like to use custom configured access points with multiple SSIDs to offer WLAN connectivity to casual users who are not the owners or normally resident at the premises where the access point is installed. This may support a commercial relationship between the 3GPP operator and the WLAN provider. The casual users’ devices would have to be pre-configured to authenticate to the SSIDs in the access point.Scenario:• A customer has a Wi-Fi capable device which has been pre-configured with the SSID(s) allocated by the 3GPP network provider for use in this service. As part of the commercial offering the customer may also be required to advertise the same SSID’s on their home Wi-Fi Router.•The customer receives a call from a colleague who needs a file to be sent to them urgently. There is no easily accessible and/or obviously Wi-Fi capable establishment(coffee shop, hotel etc) in the near locale and macro 3GPP network coverage is poor.•The customer knows they are a subscriber to this Wi-Fi service and activates the Wi-Fi on their device. Luckily – there is a Wi-Fi Router advertising the pre-configured SSID of the service.•The device authenticates on the Wi-Fi router and he is able to establish a connection and send the file.Figure 1:Network configuration for multiple pre-configured SSID’s6 EXISTING SOLUTIONS6.1 Standard BodiesThere are three main standards bodies involved in Wi-Fi and Wi-Fi Offload. They are the IEEE, 3GPP and IETF.6.1.1 IEEEThe IEEE are responsible for the standardisation of Wi-Fi access and the various improvements and additions that have been carried out. The focus of this paper is the 802.11 and 802.1 suite of standards.6.1.2 IETFThe IETF have standardised many of the protocols used in Wi-Fi including RADIUS, security methods and also mobility mechanisms.6.1.3 3GPP3GPP have defined systems and protocols for interworking 3GPP networks to non-3GPP networks such as Wi-Fi. This includes solutions such as I-WLAN.A summary of the details of the most relevant work of these bodies is included in the annex.6.2 Industry Bodies6.2.1 Wi-Fi AllianceThe Wi-Fi Alliance has published “Best Current Practices for Wireless Internet Service Provider Roaming”1. The document does not specify a standard of any kind, but does rely on the operational application of standards-based protocols and methodologies.WISPr was chartered by the Wi-Fi Alliance to describe the recommended operational practices, technical architecture, and AAA framework needed to enable subscriber roaming among Wi-Fi based WISP’s. This roaming framework allows Wi-Fi compliant devices to roam into Wi-Fi enabled hotspots for public access and services. The user can be authenticated, using RADIUS, and billed (if appropriate) for service by their Home Entity (such as another service provider or corporation).The WFA also certifies devices using Wi-Fi Protected Setup. WPS enables typical users who possess little understanding of traditional Wi-Fi configuration and security settings to automatically configure new wireless networks, add new devices and enable security. This is worth considering as a method to enhance the security of home networks and helping add new devices to the home network.In February 2010 a new Operators Members Interest Meeting was created. This is to offer a voice for operators and to structure their requirements and input to the Wi-Fi community.6.2.2 Wireless Broadband Alliance (WBA)Founded in 2003 by leading telecom operators, the WBA goal is to drive wireless broadband adoption globally by developing common commercial and technical frameworks for interoperability across networks, technologies and devices. Collectively, the WBA members operate around 90,000 Wi-Fi hotspots worldwide with more than 230 million subscribers across Europe & Middle East, Asia Pacific and the Americas.The WBA has implemented commercial Wi-Fi roaming globally using WBA WRIX (Wireless Roaming Intermediary eXchange); The WBA WRIX makes it easier to implement roaming between operators. The WBA collaborates with other industry forums to further enhance WRIX and help harmonize wireless broadband roaming standards.In April 2010, the WBA released WISPr 2.0. WISPr 2.0 is designed for “non” IEEE 802.1X networks as it requires IP communication with the Access Gateway prior to the authentication of the user. WISPr offers authentication services based on layer 3 networking. WISPr 2.0 is designed as a front end to authentication protocols such as Radius, Diameter and the WBA WRIX specification.6.3 Existing Vendor SolutionsThere are several vendors selling Wi-Fi equipment to build networks. Many of these vendors also offer solutions that allow a degree of 3GPP and Wi-Fi internetworking. However often these solutions are proprietary and require additional network elements as well as unique clients1 Best Current Practices for Wireless Internet Service Provider Roaming, Version 1.0, February 2003, Wi-Fi Allianceon the devices. These solutions greatly reduce the opportunity for the user to be able to roam freely and access the services they require where and when they want as they do not offer a standardised solution to allow roaming between networks owned by other operators. Such solutions, or part solutions, are being offered by companies like Attila, Cisco and Ruckus.7 TERMINAL & NETWORK REQUIREMENTS7.1 OverviewIt is important that access points and end user devices support the necessary standard amendments to handle the requirements on data throughput, interference handling, security, authentication and interworking with 3GPP technologies.Apart from that, there exist today innovative technology solutions in the market which can leverage mesh networking principles to solve the backhaul challenge, or smart antenna technologies which can help to deal with interference or to enhance coverage.Today, Wi-Fi Offload is used by some operators to enhance the customer experience with their Smart phones. The current methods include:7.1.1 Automatic provisioningThe mobile device is already provisioned with the SSIDs (and any security keys if required) of the operator’s preferred Wi-Fi providers. On first access to a Wi-Fi provider preferred hotspot, the user may have to enter identification (e.g. the mobile phone number of the device, or PIN number from a text message sent to phone) to verify that he is entitled to the agreed usage tariff (e.g. free use). After the initial access by the device, all future Wi-Fi hotspot access is automatic.7.1.2 Manual provisioningWhere there is no automatic provisioning, the user has to search for and select a Wi-Fi network and enter any security keys required to get access. The facility often exists to store profiles so that every time the device is in range of an existing Wi-Fi hotspot setup, the connection is automatic.7.2 Terminals7.2.1 SmartphonesSmart phones should implement functionality that performs automatic network detection and selection. The device should automatically scan for the appropriate SSID and connect in accordance with operator policy/preference in combination with user defined networks and preferences.The desired functions and features include:•Connection management client, this may be part of the operating system or an additional application.•Downloadable SSID list with operator specified priority and credentials (if not SIM/UICC based). Operator specification of auto authentication parameters, preferred network list, network/SSID blacklist, roaming policies and credentials•Ability for the user to define SSID and credentials for additional networks•Ability to automatically initiate a VPN for specified networks•Respond to Radius request with credentials• Enable 802.1X•Enable EAP-SIM or EAP-AKA•Support of 802.11i/WPA2•Implement power saving features•Support of WPS, including push button configuration•If service continuity is desired, support of the desired scenario highlighted in the annex section A3.5, should be provided along with the appropriate level of Wi-Fi and 3GPP network interconnection. Specifically, the device should include a SIP based IMS client, and possibly support for ICS.7.2.2 Netbooks and DonglesLaptops and netbooks may either have built in 3GPP connectivity or may use dongles to provide connectivity. Nearly all laptops and netbooks are now built including Wi-Fi devices as standard equipment.The desired functions and features include:• Connection management software•Downloadable SSID list with operator specified priority and credentials (if not SIM/UICC based). Operator specification of auto authentication parameters, preferred network list, network/SSID blacklist, roaming policies and credentials•Ability for user to define SSID and credentials for additional networks•Ability to automatically initiate a VPN for specified networks•Automatically scan for SSID and connect in accordance with operator policy/preference in combination with user defined networks and preferences•Respond to Radius request with credentials• Enable 802.1X•Enable EAP-SIM or EAP-AKA, if there is built in 3GPP connectivity or using a 3GPP dongle•Support of 802.11i/WPA2•Implement power saving features•Support of WPS, including push button configuration•If service continuity is desired, support of the desired scenario highlighted in the annex section A3.5, should be provided along with the appropriate level of Wi-Fi and 3GPPnetwork interconnection. Specifically, the device should include a SIP based IMS client, and possibly support for ICS.7.3 Network Requirements:The following is a list of the expected requirements for the networks to support Wi-Fi Offload.•Support of 802.1X•Support of 802.11i/WPA2•EAP-SIM or EAP-AKA enabled•Home access points should support WPS, including push button configuration•Interconnection with 3GPP network operator via I-WLAN or via Internet•Automatic and seamless handoff may become a requirement. Out of scope for this paper.•Collection of billing data and ability to properly format and communicate to the mobile operator.•If service continuity is desired, support of the desired scenario highlighted in section11.3.5 (annex) should be provided along with the appropriate level of Wi-Fi and 3GPPnetwork interconnection.•If session continuity is required then the network must implement such capability based on 3GPP or proprietary solutions.•As standards evolve, support for IP Flow Mobility, Local IP Access and Selected Internet IP Traffic Offload should be considered.7.4 Network Selection:Network selection should provide the following capabilities:•For the device to select the network based on the capability of the network such as QoS, connectivity, signal strength etc.•For the device to detect and switch to the preferred network (when not in an active communication state with the current network).•The Home Operator to be able to configure the list of the preferred Wi-Fi access networks that can be used for automatic selection.•The user to be able to configure the list of the preferred Wi-Fi access networks that can be used for automatic selection.•The user to be able to select manually from the available Wi-Fi accesses available. Network selection mechanisms have been specified by 3GPP and these include network selection for I-WLAN and ANDSF. For operators which have both WiFi and 3GPP infrastructures, it is possible to use ANDSF. This is a layer 3 protocol specified by 3GPP. Itenables mobile devices located in areas of two or more different types of access connectivity to select the most appropriate access network by exchanging information between the mobile device and a server. This is covered in more detail in the Annex A3.1.1. There is a need for further investigation of the ANDSF functions and whether they meet the requirements for network selectionNetwork selection requirements for I-WLAN is specified by 3GPP in specification TS22.2348 QUALITY OF SERVICEMultimedia applications such as VoIP, VoD and Internet Radio have different traffic characteristics and quality of service QoS requirements as compared to traditional internet data traffic. For example VoD requires high bandwidth while VoIP is bursty in nature and requires low delay and jitter. As a result, to ensure a high level of user experience, these traffic types need to be treated differently from the traditional internet traffic. Further, the available bandwidth in the Wi-Fi based WLAN is also limited. Thus it is very essential to manage the access to the Wi-Fi based WLAN resources and prioritise the traffic to ensure appropriate QoS to different kinds of traffic.The IEEE 802.11e standard addresses the link level (between a station and an access point) QoS on Wi-Fi thorough enhancement to the MAC (Media Access Control) layer protocol. The standard provides two approaches - Prioritisation of Traffic and Parameterisation of Traffic. In the traffic prioritization approach, the traffic is classified into one of the four categories - Voice, Video, Best Effort and Background. The transmission is done using Enhanced Distributed Channel Access (EDCA) mechanism.As the QoS capabilities of the 802.11e standard provide QoS on a per-link basis, it can extend existing end-to-end QoS frameworks across Wi-Fi access to end terminals. In general, there are two approaches for providing end-to-end QoS - one using differentiated services and the other based on resource reservation.9 SECURITY AND FRAUDTwo sets of security requirements need to be addressed:•Wi-Fi network access security: This concerns authentication of the customer towards the Wi-Fi network, of the network towards the customer device, and the protection of the Wi-Fi access link.•Services access security: This concerns authentication of the customer towards operator or third party services when connected via Wi-Fi (or other non-cellular access networks), and the protection of this link.In order to provide basic offload of Internet access, Wi-Fi network access security is needed to protect against theft of service and other attacks. However, for the offload operator or third party provided services that are normally secured based on 3GPP network techniques (e.g. music portal, application store, etc.), additional service access security is needed.9.1 Wi-Fi network access security9.1.1 802.11i。
AESOP_Fables
Aesop's Fables Translated by George Fyler TownsendAesop's Fables (1)Translated by George Fyler Townsend (1)Preface (7)The Wolf and the Lamb (11)The Bat and the Weasels (11)The Ass and the Grasshopper (12)The Lion and the Mouse (12)The Charcoal−Burner and the Fuller (12)The Father and His Sons (12)The Boy Hunting Locusts (12)The Cock and the Jewel (12)The Kingdom of the Lion (13)The Wolf and the Crane (13)The Fisherman Piping (13)Hercules and the Wagoner (13)The Ants and the Grasshopper (13)The Traveler and His Dog (13)The Dog and the Shadow (14)The Mole and His Mother (14)The Herdsman and the Lost Bull (14)The Hare and the Tortoise (14)The Pomegranate, Apple−Tree, and Bramble (14)The Farmer and the Stork (15)The Farmer and the Snake (15)The Fawn and His Mother (15)The Bear and the Fox (15)The Swallow and the Crow (15)The Mountain in Labor (15)The Ass, the Fox, and the Lion (16)The Tortoise and the Eagle (16)The Flies and the Honey−Pot (16)The Man and the Lion (16)The Farmer and the Cranes (16)The Dog in the Manger (17)The Fox and the Goat (17)The Bear and the Two Travelers (17)The Oxen and the Axle−Trees (17)The Thirsty Pigeon (18)The Raven and the Swan (18)The Goat and the Goatherd (18)The Miser (18)The Sick Lion (18)The Horse and Groom (19)The Ass and the Lapdog (19)The Lioness (19)The Boasting Traveler (19)The Cat and the Cock (19)The Boy and the Filberts (20)The Lion in Love (20)The Laborer and the Snake (20)The Wolf in Sheep's Clothing (20)The Ass and the Mule (21)The Frogs Asking for a King (21)The Boys and the Frogs (21)The Sick Stag (21)The Salt Merchant and His Ass (21)The Oxen and the Butchers (22)The Lion, the Mouse, and the Fox (22)The Vain Jackdaw (22)The Goatherd and the Wild Goats (22)The Mischievous Dog (23)The Fox Who Had Lost His Tail (23)The Boy and the Nettles (23)The Man and His Two Sweethearts (23)The Astronomer (23)The Wolves and the Sheep (24)The Old Woman and the Physician (24)The Fighting Cocks and the Eagle (24)The Charger and the Miller (24)The Fox and the Monkey (24)The Horse and His Rider (25)The Belly and the Members (25)The Vine and the Goat (25)Jupiter and the Monkey (25)The Widow and Her Little Maidens (25)The Shepherd's Boy and the Wolf (25)The Cat and the Birds (26)The Kid and the Wolf (26)The Ox and the Frog (26)The Shepherd and the Wolf (26)The Father and His Two Daughters (26)The Farmer and His Sons (27)The Crab and Its Mother (27)The Heifer and the Ox (27)The Swallow, the Serpent, and the Court of Justice (27)The Thief and His Mother (27)The Old Man and Death (27)The Fir−Tree and the Bramble (28)The Mouse, the Frog, and the Hawk (28)The Man Bitten by a Dog (28)The Two Pots (28)The Wolf and the Sheep (28)The Aethiop (29)The Fisherman and His Nets (29)The Old Woman and the Wine−Jar (29)The Fox and the Crow (29)The Two Dogs (30)The Stag in the Ox−Stall (30)The Hawk, the Kite, and the Pigeons (30)The Widow and the Sheep (30)The Wild Ass and the Lion (31)The Eagle and the Arrow (31)The Sick Kite (31)The Lion and the Dolphin (31)The Lion and the Boar (31)The One−Eyed Doe (32)The Shepherd and the Sea (32)The Ass, the Cock, and the Lion (32)The Mice and the Weasels (32)The Mice in Council (32)The Wolf and the Housedog (33)The Rivers and the Sea (33)The Playful Ass (33)The Three Tradesmen (33)The Master and His Dogs (33)The Wolf and the Shepherds (33)The Dolphins, the Whales, and the Sprat (34)The Ass Carrying the Image (34)The Two Travelers and the Axe (34)The Old Lion (34)The Old Hound (34)The Bee and Jupiter (34)The Milk−Woman and Her Pail (35)The Seaside Travelers (35)The Brazier and His Dog (35)The Ass and His Shadow (35)The Ass and His Masters (36)The Oak and the Reeds (36)The Fisherman and the Little Fish (36)The Hunter and the Woodman (36)The Wild Boar and the Fox (36)The Lion in a Farmyard (37)Mercury and the Sculptor (37)The Swan and the Goose (37)The Swollen Fox (37)The Fox and the Woodcutter (37)The Birdcatcher, the Partridge, and the Cock (38)The Monkey and the Fishermen (38)The Flea and the Wrestler (38)The Two Frogs (38)The Cat and the Mice (38)The Doe and the Lion (39)The Farmer and the Fox (39)The Seagull and the Kite (39)The Philosopher, the Ants, and Mercury (39)The Mouse and the Bull (39)The Lion and the Hare (40)The Peasant and the Eagle (40)The Image of Mercury and the Carpenter (40)The Bull and the Goat (40)The Dancing Monkeys (40)The Monkeys and Their Mother (41)The Oaks and Jupiter (41)The Hare and the Hound (41)The Traveler and Fortune (41)The Bald Knight (41)The Shepherd and the Dog (41)The Lamp (42)The Lion, the Fox, and the Ass (42)The Bull, the Lioness, and the Wild−Boar Hunter (42)The Oak and the Woodcutters (42)The Hen and the Golden Eggs (42)The Ass and the Frogs (42)The Crow and the Raven (43)The Trees and the Axe (43)The Crab and the Fox (43)The Woman and Her Hen (43)The Ass and the Old Shepherd (43)The Kites and the Swans (44)The Wolves and the Sheepdogs (44)The Hares and the Foxes (44)The Bowman and Lion (44)The Camel (44)The Wasp and the Snake (44)The Dog and the Hare (45)The Bull and the Calf (45)The Stag, the Wolf, and the Sheep (45)The Peacock and the Crane (45)The Fox and the Hedgehog (45)The Eagle, the Cat, and the Wild Sow (46)The Thief and the Innkeeper (46)The Mule (46)The Hart and the Vine (46)The Serpent and the Eagle (47)The Crow and the Pitcher (47)The Two Frogs (47)The Wolf and the Fox (47)The Walnut−Tree (47)The Monkey and the Dolphin (48)The Jackdaw and the Doves (48)The Horse and the Stag (48)The Kid and the Wolf (48)The Prophet (48)The Fox and the Monkey (49)The Thief and the Housedog (49)The Man, the Horse, the Ox, and the Dog (49)The Apes and the Two Travelers (49)The Wolf and the Shepherd (50)The Hares and the Lions (50)The Lark and Her Young Ones (50)The Fox and the Lion (50)The Weasel and the Mice (50)The Boy Bathing (51)The Ass and the Wolf (51)The Seller of Images (51)The Fox and the Grapes (51)The Man and His Wife (51)The Peacock and Juno (52)The Hawk and the Nightingale (52)The Dog, the Cock, and the Fox (52)The Wolf and the Goat (52)The Lion and the Bull (52)The Goat and the Ass (53)The Town Mouse and the Country Mouse (53)The Wolf, the Fox, and the Ape (53)The Fly and the Draught−Mule (53)The Fishermen (53)The Lion and the Three Bulls (54)The Fowler and the Viper (54)The Horse and the Ass (54)The Fox and the Mask (54)The Geese and the Cranes (54)The Blind Man and the Whelp (54)The Dogs and the Fox (55)The Cobbler Turned Doctor (55)The Wolf and the Horse (55)The Brother and the Sister (55)The Wasps, the Partridges, and the Farmer (55)The Crow and Mercury (56)The North Wind and the Sun (56)The Two Men Who Were Enemies (56)The Gamecocks and the Partridge (56)The Quack Frog (56)The Lion, the Wolf, and the Fox (57)The Dog's House (57)The Birds, the Beasts, and the Bat (57)The Spendthrift and the Swallow (57)The Fox and the Lion (57)The Owl and the Birds (58)The Trumpeter Taken Prisoner (58)The Ass in the Lion's Skin (58)The Sparrow and the Hare (58)The Flea and the Ox (58)The Goods and the Ills (58)The Dove and the Crow (59)Mercury and the Workmen (59)The Eagle and the Jackdaw (59)The Fox and the Crane (59)Jupiter, Neptune, Minerva, and Momus (60)The Eagle and the Fox (60)The Man and the Satyr (60)The Ass and His Purchaser (60)The Two Bags (61)The Stag at the Pool (61)The Jackdaw and the Fox (61)The Lark Burying Her Father (61)The Gnat and the Bull (61)The Bitch and Her Whelps (61)The Dogs and the Hides (62)The Shepherd and the Sheep (62)The Grasshopper and the Owl (62)The Monkey and the Camel (62)The Peasant and the Apple−Tree (62)The Two Soldiers and the Robber (63)The Trees Under the Protection of the Gods (63)The Mother and the Wolf (63)The Ass and the Horse (63)Truth and the Traveler (63)The Cat and Venus (65)The She−Goats and Their Beards (65)The Camel and the Arab (66)The Miller, His Son, and Their Ass (66)The Crow and the Sheep (66)The Fox and the Bramble (66)The Wolf and the Lion (66)The Dog and the Oyster (67)The Ant and the Dove (67)The Partridge and the Fowler (67)The Flea and the Man (67)The Thieves and the Cock (67)The Dog and the Cook (67)The Travelers and the Plane−Tree (68)The Lion, Jupiter, and the Elephant (68)The Lamb and the Wolf (68)The Rich Man and the Tanner (69)The Shipwrecked Man and the Sea (69)The Mules and the Robbers (69)The Viper and the File (69)The Lion and the Shepherd (69)The Camel and Jupiter (69)The Panther and the Shepherds (70)The Ass and the Charger (70)The Eagle and His Captor (70)The Bald Man and the Fly (70)The Olive−Tree and the Fig−Tree (70)The Eagle and the Kite (71)The Ass and His Driver (71)The Thrush and the Fowler (71)The Rose and the Amaranth (71)The Frogs' Complaint Against the Sun (71)LIFE OF AESOP (71)Aesop's FablesTranslated by George Fyler Townsend This page copyright © 2001 Blackmask Online.•PrefaceThe Wolf and the Lamb••The Bat and the Weasels•The Ass and the Grasshopper•The Lion and the Mouse•The Charcoal−Burner and the Fuller•The Father and His Sons•The Boy Hunting Locusts•The Cock and the Jewel•The Kingdom of the Lion•The Wolf and the Crane•The Fisherman Piping•Hercules and the Wagoner•The Ants and the Grasshopper•The Traveler and His Dog•The Dog and the ShadowThe Mole and His Mother••The Herdsman and the Lost Bull•The Hare and the Tortoise•The Pomegranate, Apple−Tree, and Bramble•The Farmer and the Stork•The Farmer and the Snake•The Fawn and His Mother•The Bear and the Fox•The Swallow and the Crow•The Mountain in Labor•The Ass, the Fox, and the Lion•The Tortoise and the Eagle•The Flies and the Honey−Pot•The Man and the Lion•The Farmer and the Cranes•The Dog in the Manger•The Fox and the Goat•The Bear and the Two Travelers•The Oxen and the Axle−Trees•The Thirsty Pigeon•The Raven and the SwanThe Goat and the Goatherd••The Miser•Aesop's Fables The Ass and the Lapdog••The Lioness•The Boasting TravelerThe Cat and the Cock•The Piglet, the Sheep, and the Goat•The Boy and the Filberts•The Lion in Love•The Laborer and the Snake•The Wolf in Sheep's Clothing••The Ass and the MuleThe Frogs Asking for a King•The Boys and the Frogs•The Sick Stag•The Salt Merchant and His Ass•The Oxen and the Butchers••The Lion, the Mouse, and the FoxThe Vain Jackdaw•The Goatherd and the Wild Goats••The Mischievous DogThe Fox Who Had Lost His Tail•The Boy and the Nettles••The Man and His Two SweetheartsThe Astronomer•The Wolves and the Sheep••The Old Woman and the PhysicianThe Fighting Cocks and the Eagle••The Charger and the Miller•The Fox and the MonkeyThe Horse and His Rider•The Belly and the Members•The Vine and the Goat•Jupiter and the Monkey•The Widow and Her Little Maidens•The Shepherd's Boy and the Wolf••The Cat and the BirdsThe Kid and the Wolf•The Ox and the Frog•The Shepherd and the Wolf•The Father and His Two Daughters•The Farmer and His Sons••The Crab and Its MotherThe Heifer and the Ox•The Swallow, the Serpent, and the Court of Justice••The Thief and His MotherThe Old Man and Death•The Fir−Tree and the Bramble••The Mouse, the Frog, and the HawkThe Man Bitten by a Dog•The Two Pots••The Fisherman and His Nets••The Huntsman and the Fisherman•The Old Woman and the Wine−Jar•The Fox and the Crow•The Two Dogs•The Stag in the Ox−StallThe Hawk, the Kite, and the Pigeons••The Widow and the Sheep•The Wild Ass and the LionThe Eagle and the Arrow••The Sick Kite•The Lion and the Dolphin•The Lion and the Boar•The One−Eyed Doe•The Shepherd and the SeaThe Ass, the Cock, and the Lion••The Mice and the Weasels•The Mice in Council•The Wolf and the Housedog•The Rivers and the Sea•The Playful Ass•The Three Tradesmen•The Master and His Dogs•The Wolf and the Shepherds•The Dolphins, the Whales, and the Sprat •The Ass Carrying the Image•The Two Travelers and the Axe•The Old LionThe Old Hound••The Bee and Jupiter•The Milk−Woman and Her Pail•The Seaside Travelers•The Brazier and His Dog•The Ass and His Shadow•The Ass and His Masters•The Oak and the ReedsThe Fisherman and the Little Fish••The Hunter and the WoodmanThe Wild Boar and the Fox••The Lion in a Farmyard•Mercury and the SculptorThe Swan and the Goose••The Swollen Fox•The Fox and the Woodcutter•The Birdcatcher, the Partridge, and the Cock •The Monkey and the Fishermen•The Flea and the Wrestler•The Two Frogs•The Cat and the Mice•The Lion, the Bear, and the FoxThe Farmer and the Fox••The Seagull and the Kite•The Philosopher, the Ants, and Mercury•The Mouse and the Bull•The Lion and the Hare•The Peasant and the EagleThe Image of Mercury and the Carpenter••The Bull and the Goat•The Dancing MonkeysThe Monkeys and Their Mother••The Oaks and Jupiter•The Hare and the Hound•The Traveler and Fortune•The Bald Knight•The Shepherd and the DogThe Lamp••The Lion, the Fox, and the Ass•The Bull, the Lioness, and the Wild−Boar Hunter •The Oak and the Woodcutters•The Hen and the Golden Eggs•The Ass and the Frogs•The Crow and the Raven•The Trees and the Axe•The Crab and the Fox•The Woman and Her Hen•The Ass and the Old Shepherd•The Kites and the Swans•The Wolves and the SheepdogsThe Hares and the Foxes••The Bowman and Lion•The Camel•The Wasp and the Snake•The Dog and the Hare•The Bull and the Calf•The Stag, the Wolf, and the Sheep•The Peacock and the CraneThe Fox and the Hedgehog••The Eagle, the Cat, and the Wild SowThe Thief and the Innkeeper••The Mule•The Hart and the VineThe Serpent and the Eagle••The Crow and the Pitcher•The Two Frogs•The Wolf and the Fox•The Walnut−Tree•The Gnat and the Lion•The Monkey and the Dolphin•The Jackdaw and the Doves•The Horse and the StagThe Prophet••The Fox and the Monkey•The Thief and the Housedog•The Man, the Horse, the Ox, and the Dog •The Apes and the Two Travelers•The Wolf and the ShepherdThe Hares and the Lions••The Lark and Her Young Ones•The Fox and the LionThe Weasel and the Mice••The Boy Bathing•The Ass and the Wolf•The Seller of Images•The Fox and the Grapes•The Man and His WifeThe Peacock and Juno••The Hawk and the Nightingale•The Dog, the Cock, and the Fox•The Wolf and the Goat•The Lion and the Bull•The Goat and the Ass•The Town Mouse and the Country Mouse •The Wolf, the Fox, and the Ape•The Fly and the Draught−Mule•The Fishermen•The Lion and the Three Bulls•The Fowler and the Viper•The Horse and the AssThe Fox and the Mask••The Geese and the Cranes•The Blind Man and the Whelp•The Dogs and the Fox•The Cobbler Turned Doctor•The Wolf and the Horse•The Brother and the Sister•The Wasps, the Partridges, and the Farmer The Crow and Mercury••The North Wind and the SunThe Two Men Who Were Enemies••The Gamecocks and the Partridge•The Quack FrogThe Lion, the Wolf, and the Fox••The Dog's House•The Wolf and the Lion•The Birds, the Beasts, and the Bat•The Spendthrift and the Swallow•The Fox and the Lion•The Owl and the Birds•The Trumpeter Taken Prisoner•The Ass in the Lion's SkinThe Flea and the Ox••The Goods and the Ills•The Dove and the Crow•Mercury and the Workmen•The Eagle and the Jackdaw•The Fox and the CraneJupiter, Neptune, Minerva, and Momus ••The Eagle and the Fox•The Man and the SatyrThe Ass and His Purchaser••The Two Bags•The Stag at the Pool•The Jackdaw and the Fox•The Lark Burying Her Father•The Gnat and the BullThe Bitch and Her Whelps••The Dogs and the Hides•The Shepherd and the Sheep•The Grasshopper and the Owl•The Monkey and the Camel•The Peasant and the Apple−Tree•The Two Soldiers and the Robber•The Trees Under the Protection of the Gods •The Mother and the Wolf•The Ass and the Horse•Truth and the Traveler•The Cat and Venus•The She−Goats and Their BeardsThe Camel and the Arab••The Miller, His Son, and Their Ass•The Crow and the Sheep•The Fox and the Bramble•The Wolf and the Lion•The Dog and the Oyster•The Ant and the Dove•The Partridge and the FowlerThe Flea and the Man••The Thieves and the CockThe Dog and the Cook••The Travelers and the Plane−Tree•The Hares and the FrogsThe Lion, Jupiter, and the Elephant••The Lamb and the Wolf•The Rich Man and the Tanner•The Shipwrecked Man and the Sea•The Mules and the Robbers•The Viper and the File•The Lion and the Shepherd•The Camel and Jupiter•The Panther and the Shepherds•The Eagle and His Captor•The Bald Man and the Fly•The Olive−Tree and the Fig−Tree•The Eagle and the KiteThe Ass and His Driver••The Thrush and the Fowler•The Rose and the AmaranthThe Frogs' Complaint Against the Sun••LIFE OF AESOPPrefaceTHE TALE, the Parable, and the Fable are all common and popular modes of conveying instruction. Each is distinguished by its own special characteristics. The Tale consists simply in the narration of a story either founded on facts, or created solely by the imagination, and not necessarily associated with the teaching of any moral lesson. The Parable is the designed use of language purposely intended to convey a hidden and secret meaning other than that contained in the words themselves; and which may or may not bear a special reference to the hearer, or reader. The Fable partly agrees with, and partly differs from both of these. It will contain, like the Tale, a short but real narrative; it will seek, like the Parable, to convey a hidden meaning, and that not so much by the use of language, as by the skilful introduction of fictitious characters; and yet unlike to either Tale or Parable, it will ever keep in view, as its high prerogative, and inseparable attribute, the great purpose of instruction, and will necessarily seek to inculcate some moral maxim, social duty, or political truth. The true Fable, if it rise to its high requirements, ever aims at one great end and purpose representation of human motive, and the improvement of human conduct, and yet it so conceals its design under the disguise of fictitious characters, by clothing with speech the animals of the field, the birds of the air, the trees of the wood, or the beasts of the forest, that the reader shall receive advice without perceivingthe presence of the adviser. Thus the superiority of the counsellor, which often renders counsel unpalatable, is kept out of view, and the lesson comes with the greater acceptance when the reader is led, unconsciously to himself, to have his sympathies enlisted in behalf of what is pure, honorable, and praiseworthy, and to havehis indignation excited against what is low, ignoble, and unworthy. The true fabulist, therefore, discharges a most important function. He is neither a narrator, nor an allegorist. He is a great teacher, a corrector of morals, a censor of vice, and a commender of virtue. In this consists the superiority of the Fable over the Tale or the Parable. The fabulist is to create a laugh, but yet, under a merry guise, to convey instruction. Phaedrus, the great imitator of Aesop, plainly indicates this double purpose to be the true office of the writer of fables.Duplex libelli dos est: quod risum movet,Et quod prudenti vitam consilio monet.The continual observance of this twofold aim creates the charm, and accounts for the universal favor, of the fables of Aesop. "The fable," says Professor K. O. Mueller, "originated in Greece in an intentional travestieof human affairs. The 'ainos,' as its name denotes, is an admonition, or rather a reproof veiled, either from fear of an excess of frankness, or from a love of fun and jest, beneath the fiction of an occurrence happening among beasts; and wherever we have any ancient and authentic account of the Aesopian fables, we find it to be the same." lThe construction of a fable involves a minute attention to (1) the narration itself; (2) the deduction of the moral; and (3) a careful maintenance of the individual characteristics of the fictitious personages introduced into it. The narration should relate to one simple action, consistent with itself, and neither be overladen with aand so intimately interwoven with, and so necessarily dependent on, the narration, that every reader should be compelled to give to it the same undeniable interpretation. The introduction of the animals or fictitious characters should be marked with an unexceptionable care and attention to their natural attributes, and to the qualities attributed to them by universal popular consent. The Fox should be always cunning, the Hare timid, the Lion bold, the Wolf cruel, the Bull strong, the Horse proud, and the Ass patient. Many of these fables are characterized by the strictest observance of these rules. They are occupied with one short narrative, from which the moral naturally flows, and with which it is intimately associated. "'Tis the simple manner," says Dodsley, 2 "in which the morals of Aesop are interwoven with his fables that distinguishes him, and gives him the preference over all other mythologists. His 'Mountain delivered of a Mouse,' produces the moral of his fable in ridicule of pompous pretenders; and his Crow, when she drops her cheese, lets fall, as it were by accident, the strongest admonition against the power of flattery. There is no need of a separate sentence to explain it; no possibility of impressing it deeper, by that load we too often see of accumulated reflections." 3 An equal amount of praise is due for the consistency with which the characters of the animals, fictitiously introduced, are marked. While they are made to depict the motives and passions of men, they retain, in an eminent degree, their own special features of craft or counsel, of cowardice or courage, of generosity or rapacity.These terms of praise, it must be confessed, cannot be bestowed on all the fables in this collection. Many of them lack that unity of design, that close connection of the moral with the narrative, that wise choice in the introduction of the animals, which constitute the charm and excellency of true Aesopian fable. This inferiority of some to others is sufficiently accounted for in the history of the origin and descent of these fables. The great bulk of them are not the immediate work of Aesop. Many are obtained from ancient authors prior to the time in which he lived. Thus, the fable of the "Hawk and the Nightingale" is related by Hesiod; 4 the "Eagle wounded by an Arrow, winged with its own Feathers," by Aeschylus; 5 the "Fox avenging his wrongs on the Eagle," by Archilochus. 6 Many of them again are of later origin, and are to be traced to the monks of the middle ages: and yet this collection, though thus made up of fables both earlier and later than the era of Aesop, rightfully bears his name, because he composed so large a number (all framed in the same mould, and conformed to the same fashion, and stamped with the same lineaments, image, and superscription) as to secure to himself the right to be considered the father of Greek fables, and the founder of this class of writing, which has ever since borne his name, and has secured for him, through all succeeding ages, the position of the first of moralists.7The fables were in the first instance only narrated by Aesop, and for a long time were handed down by the uncertain channel of oral tradition. Socrates is mentioned by Plato 8 as having employed his time while in prison, awaiting the return of the sacred ship from Delphos which was to be the signal of his death, in turning some of these fables into verse, but he thus versified only such as he remembered. Demetrius Phalereus, a philosopher at Athens about 300 B.C., is said to have made the first collection of these fables. Phaedrus, a slave by birth or by subsequent misfortunes, and admitted by Augustus to the honors of a freedman, imitated many of these fables in Latin iambics about the commencement of the Christian era. Aphthonius, a rhetorician of Antioch, A.D. 315, wrote a treatise on, and converted into Latin prose, some of these fables. This translation is the more worthy of notice, as it illustrates a custom of common use, both in these and in later times. The rhetoricians and philosophers were accustomed to give the Fables of Aesop as an exercise to their scholars, not only inviting them to discuss the moral of the tale, but also to practice and to perfect themselves thereby in style and rules of grammar, by making for themselves new and various versions of the fables. Ausonius, 9 the friend of the Emperor Valentinian, and the latest poet of eminence in the Western Empire, has handed down some of these fables in verse, which Julianus Titianus, a contemporary writer of no great name, translated into prose. Avienus, also a contemporary of Ausonius, put some of these fables into Latin elegiacs, which are given by Nevelet (in a book we shall refer to hereafter), and are occasionally incorporated with the editions of Phaedrus.。
乔治·凯南与冷战的起源
乔治·凯南与冷战的起源乔治·凯南是美国冷战遏制政策的提出者,他的苏联观受到叔父的影响,20世纪三四十年代的驻苏经历使其成为“苏联通”。
1946年他在一封八千字长电报中提出对苏战略,即美国要运用政治、经济、外交等多种途径抑制苏联的发展和对外扩张。
次年他在《苏联行为的根源》中完善了自己的遏制思想。
在欧洲,他主张以德国为中心建立欧洲联邦抵御苏联的渗透;在亚洲,他忽视新中国的地位和作用,希望通过民主改造重塑日本。
他的这些思想对日后美国的冷战政策产生了深远持久的影响。
尽管凯南誉满天下,但不善妥协的性格给他的职业生涯造成困境,对中国的误判也证明他的局限性。
标签:乔治·凯南;冷战;遏制思想;外交影响乔治·凯南是美国著名的国际关系学家,外交家,外交评论学者,历史学家,尤其在苏联问题方面研究成果显著。
凯南在学界被誉为“遏制之父”,他倾其一生为美国的冷战政策尤其是冷战时期的对苏政策作出了突出的贡献。
凱南生于1904年,在威斯康星州的一个爱尔兰裔移民家庭。
他日后成为“苏联通”很大程度上到受了他叔父老凯南的影响。
老凯南是一位美国记者,职业生涯中曾多次到访俄国,其中1885—1886年间他实地考察了俄国的西伯利亚流放地,这段经历深深影响了老凯南对苏联印象。
他还就调查结果出版了一本书,真实地记录了当时西伯利亚流放地政治犯们忍受的非人的痛苦。
可以说老凯南是美国研究苏联问题的先驱。
凯南也追随他叔父的脚步,选择了研究苏联问题的道路,他在晚年的回忆录中说道“脑中有老凯南创立的家庭传统。
”这也成了凯南一生的转折点。
1925年他从普林斯顿大学毕业,1926年进入外交机构,被派往欧洲。
1929—1931年进入柏林大学东方学院,专门学习俄国的语言,文化,历史地理法律以及经济,这些学习也为他日后研究苏联问题打下了坚实的基础。
1931—1933任职于拉脱维亚里加美国大使馆。
在里加的那段时间里凯南在处理公务之余,还会通过当地的报刊体验旧俄文化生活等方法了解苏联,这也成为凯南研究苏联问题的起点。
Little Nikita《美苏间谍战(1988)》完整中英文对照剧本
(drumming)(鼓声)(whistle)(口哨声)(cheering)(欢呼)(marching band playing)(乐队演奏)Where is he?他在哪?He promised.他答应了。
You know his promises.你知道他的承诺。
He¡¯s not gonna miss this, is he?他不会错过的,是吗?He¡¯ll be here, sweetheart.他会来的,亲爱的。
But但是Well, that¡¯s okay, Joaquin,好吧,没关系,华金,just put them all on the front of the float. 把它们都放在浮子的前面。
Where¡¯s all the flags?所有的旗子都在哪里?Okay.可以。
(beeping)(嘟嘟声)See ya later.再见。
Jeff, for God¡¯s sake.杰夫,看在上帝的份上。
I¡¯m here.我在这儿。
I¡¯m ready, I¡¯m going.我准备好了,我要走了。
Jeffrey, Jeff.杰弗里,杰夫。
General Grant, right?格兰特将军,对吧?Get dressed.穿好衣服。
I¡¯m getting dressed.我正在穿衣服。
Go, go!快走,快走!He had a beard, you know.他有胡子,你知道的。
Jeffrey.杰弗里。
Never mind, never mind!没关系,没关系!I love it, it¡¯s fabulous!我喜欢,太棒了!(laughing)(笑)Hurry up!快点!(bagpipes playing)(吹风笛)Yes!对!That looks like a blue ribbon.看起来像条蓝♥丝♥带♥。
英语演讲稿-20日:全世界联合打击伊斯兰国(中英lrc)
英语演讲稿20日:全世界联合打击伊斯兰国(中英lrc)Obama’s Weekly Address WEEKLY ADDRESS: The World Is United in the Fight Against ISIL奥巴马周末演讲: 全世界联合打击伊斯兰国Over the past week, the United States has continued to lead our friends and allies in the strategy todegrade and ultimately destroy the terrorist group known as ISIL. As I’ve said before, ourintelligence community has not yet detected specific plots from these terrorists against America. Right now, they pose a threat to the people of Iraq, Syria, and the broader Middle East. But itsleaders have threatened America and our allies. And if left unchecked, they could pose a growingthreat to the United States.过去一周,合众国带领盟友一起实施打击直至消灭ISIL组织的战略。
正如我之前所说的,我们的情报机构还没有发现恐怖分子的活动针对美国。
现在,他们正在威胁伊拉克、叙利亚和其它中东地区人民的安宁。
但该组织的领导多次扬言要袭击美国和我们的盟友。
如果我们疏于防范,他们就可能坐大而威胁合众国的安全。
So, last month, I gave the order for our military to begin taking targeted action against ISIL. Sincethen, American pilots have flown more than 170 airstrikes against these terrorists in Iraq. AndFrance has now joined us in these airstrikes.因此,上个月,我命令部队对ISIL进行定点打击。
SIMATIC Energy Manager PRO V7.2 - Operation Operat
2 Energy Manager PRO Client................................................................................................................. 19
2.1 2.1.1 2.1.2 2.1.3 2.1.4 2.1.5 2.1.5.1 2.1.5.2 2.1.6
Basics ................................................................................................................................ 19 Start Energy Manager ........................................................................................................ 19 Client as navigation tool..................................................................................................... 23 Basic configuration ............................................................................................................ 25 Search for object................................................................................................................ 31 Quicklinks.......................................................................................................................... 33 Create Quicklinks ............................................................................................................... 33 Editing Quicklinks .............................................................................................................. 35 Help .................................................................................................................................. 38
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
The Long TelegramGeorge KennanMoscow22 February 1946Answer to Dept’s 284, Feb. 3,11 involves questions so intricate, so delicate, so strange to our form of thought, and so important to analysis of our international environment that I cannot compress answers into single brief message without yielding to what I feel would be dangerous degree of oversimplification. I hope, therefore, Dept will bear with me if I submit in answer to this question five parts, subjects of which will be roughly as follows:(1) Basic features of postwar Soviet outlook.(2) Background of this outlook.(3) Its projection in practical policy on official level.(4) Its projection on unofficial level.(5) Practical deductions from standpoint of US policy.I apologize in advance for this burdening of telegraphic channel; but questions involved are of such urgent importance, particularly in view of recent events, that our answers to them, if they deserve attention at all, seem to me to deserve it at once. There follows:Part 1: Basic Features of Postwar Soviet Outlook as Put Forward by Official Propaganda Machine, Are as Follows(a) USSR still lives in antagonistic "capitalist encirclement" with which in the long run there can be no permanent peaceful coexistence. As stated by Stalin in 1927 to a delegation of American workers: "In course of further development of international revolution there will emerge two centers of world significance: a socialist center, drawing to itself the countries which tend toward socialism, and a capitalist center, drawing to itself the countries that incline toward capitalism. Battle between these two centers for command of world economy will decide fate of capitalism and of communism in entire world.(b) Capitalist world is beset with internal conflicts, inherent in nature of capitalist society. These conflicts are insoluble by means of peaceful compromise. Greatest of them is that between England and US.(c) Internal conflicts of capitalism inevitably generate wars. Wars thus generated may be of two kinds: intra-capitalist wars between two capitalist states and wars of intervention against socialistworld. Smart capitalists, vainly seeking escape from inner conflicts of capitalism, incline toward latter.(d) Intervention against USSR, while it would be disastrous to those who undertook it, would cause renewed delay in progress of Soviet socialism and must therefore be forestalled at all costs.(e) Conflicts between capitalist states, though likewise fraught with danger for USSR, nevertheless hold out great possibilities for advancement of socialist cause, particularly if USSR remains militarily powerful, ideologically monolithic and faithful to its present brilliant leadership.(f) It must be borne in mind that capitalist world is not all bad. In addition to hopelessly reactionary and bourgeois elements, it includes (1) certain wholly enlightened and positive elements united in acceptable communistic parties and (2) certain other elements (now described for tactical reasons as progressive or democratic) whose reactions, aspirations and activities happen to be "objectively" favorable to interests of USSR. These last must be encouraged and utilized for Soviet purposes.(g) Among negative elements of bourgeois-capitalist society, most dangerous of all are those whom Lenin called false friends of the people, namely moderate-socialist or social-democratic leaders (in other words, non-Communist left-wing). These are more dangerous than out-and-out reactionaries, for latter at least march under their true colors, whereas moderate left-wing leaders confuse people by employing devices of socialism to serve interests of reactionary capital.So much for premises. To what deductions do they lead from standpoint of Soviet policy? To following:(a) Everything must be done to advance relative strength of USSR as factor in international society. Conversely, no opportunity must be missed to reduce strength and influence, collectively as well as individually, of capitalist powers.(b) Soviet efforts, and those of Russia’s friends abroad, must be directed toward deepening and exploiting of differences and conflicts between capitalist powers. If these eventually deepen into an "imperialist" war, this war must be turned into revolutionary upheavals within the various capitalist countries.(c) "Democratic-progressive" elements abroad are to be utilized to maximum to bring pressure to bear on capitalist governments along lines agreeable to Soviet interests.(d) Relentless battle must be waged against socialist and soial-democratic leaders abroad.Part 2: Background of OutlookBefore examining ramifications of this party line in practice there are certain aspects of it to which I wish to draw attention.First, it does not represent natural outlook of Russian people. Latter are, by and large, friendly to outside world, eager for experience of it, eager to measure against it talents they are conscious of possessing, eager above all to live in peace and enjoy fruits of their own labor. Party line only represents thesis which official propaganda machine puts forward with great skill and persistence to a public often remarkably resistant in the stronghold of its innermost thoughts. But party line is binding for outlook and conduct of people who make up apparatus of power--party, secret police and Government--and it is exclusively with these that we have to deal.Second, please note that premises on which this party line is based are for most part simply not true. Experience has shown that peaceful and mutually profitable coexistence of capitalist and socialist states is entirely possible. Basic internal conflicts in advanced countries are no longer primarily those arising out of capitalist ownership of means of production, but are ones arising from advanced urbanism and industrialism as such, which Russia has thus far been spared not by socialism but only by her own backwardness. Internal rivalries of capitalism do not always generate wars; and not all wars are attributable to this cause. To speak of possibility of intervention against USSR today, after elimination of Germany and Japan and after example of recent war, is sheerest nonsense. If not provoked by forces of intolerance and subversion, "capitalist" world of today is quite capable of living at peace with itself and with Russia. Finally, no sane person has reason to doubt sincerity of moderate socialist leaders in Western countries. Nor is it fair to deny success of their efforts to improve conditions for working population whenever, as in Scandinavia, they have been given chance to show what they could do.Falseness of these premises, every one of which predates recent war, was amply demonstrated by that conflict itself. Anglo-American differences did not turn out to be major differences of Western world. Capitalist countries, other than those of Axis, showed no disposition to solve their differences by joining in crusade against USSR. Instead of imperialist war turning into civil wars and revolution, USSR found itself obliged to fight side by side with capitalist powers for an avowed community of aims.Nevertheless, all these theses, however baseless and disproven, are being boldly put forward again today. What does this indicate? It indicates that Soviet party line is not based on any objective analysis of situation be yond Russia’s borders; that it has, indeed, little to do with conditions outside of Russia; that it arises mainly from basic inner-Russian necessities which existed before recent war and exist today.At bottom of Kremlin’s neurotic view of world affairs i s traditional and instinctive Russian sense of insecurity. Originally, this was insecurity of a peaceful agricultural people trying to live on vast exposed plain in neighborhood of fierce nomadic peoples. To this was added, as Russia came into contact with economically advanced West, fear of more competent, more powerful, more highly organized societies in that area. But this latter type of insecurity was one which afflicted Russian rulers rather than Russian people; for Russian rulers have invariably sensed that their rule was relatively archaic in form, fragile and artificial in its psychological foundations, unable to stand comparison or contact with political systems of Western countries. For this reason they havealways feared foreign penetration, feared direct contact between Western world and their own, feared what would happen if Russians learned truth about world without or if foreigners learned truth about world within. And they have learned to seek security only in patient but deadly struggle for total destruction of rival power, never in compacts and compromises with it.It was no coincidence that Marxism, which had smouldered ineffectively for half a century in Western Europe, caught hold and blazed for the first time in Russia. Only in this land which had never known a friendly neighbor or indeed any tolerant equilibrium of separate powers, either internal or international, could a doctrine thrive which viewed economic conflicts of society as insoluble by peaceful means. After establishment of Bolshevist regime, Marxist dogma, rendered even more truculent and intolerant by Lenin’s interpretation, become a perfect vehicle for sense of insecurity with which Bolsheviks, even more than previous Russian rulers, were afflicted. In this dogma, with its basic altruism of purpose, they found justification for their instinctive fear of outside world, for the dictatorship without which they did not know how to rule, for cruelties they did not dare not to inflict, for sacrifices they felt bound to demand. In the name of Marxism they sacrificed every single ethical value in their methods and tactics. Today they cannot dispense with it. It is fig leaf of their moral and intellectual respectability. Without it they would stand before history, at best, as only the last of that long succession of cruel and wasteful Russian rulers who have relentlessly forced country on to ever new heights of military power in order to guarantee external security of their internally weak regimes. This is why Soviet purposes must always be solemnly clothed in trappings of Marxism, and why no one should underrate importance of dogma in Soviet affairs. Thus Soviet leaders are driven [by] necessities of their own past and present position to put forward a dogma which [apparent omission] outside world as evil, hostile and menacing, but as bearing within itself germs of creeping disease and destined to be wracked with growing internal convulsions until it is given final coup de grace by rising power of socialism and yields to new and better world. This thesis provides justification for that increase of military and police power of Russian state, for that isolation of Russian population from outside world, and for that fluid and constant pressure to extend limits of Russian police power which are together the natural and instinctive urges of Russian rulers. Basically this is only the steady advance of uneasy Russian nationalism, a centuries old movement in which conceptions of offense and defense are inextricably confused. But in new guise of international Marxism, with its honeyed promises to a desperate and war-torn outside world, it is more dangerous and insidious than ever before.It should not be thought from above that Soviet party line is necessarily disingenuous and insincere on part of those who put it forward. Many of them are too ignorant of outside world and mentally too dependent to question [apparent omission] self-hypnotism, and who have no difficulty making themselves believe what they find it comforting and convenient to believe. Finally we have the unsolved mystery as to who, if anyone, in this great land actually receives accurate and unbiased information about outside world. In atmosphere of oriental secretiveness and conspiracy which pervades this Government, possibilities for distorting or poisoning sources and currents of information are infinite. The very disrespect of Russians for objective truth--indeed, their disbelief in its existence--leads them to view all stated facts as instruments for furtherance of one ulterior purpose or another. There is good reason to suspect that this Government is actually a conspiracy witin a conspiracy; and I for one am reluctant to believe thatStalin himself receives anything like an objective picture of outside world. Here there is ample scope for the type of subtle intrigue at which Russians are past masters. Inability of foreign governments to place their case squarely before Russian policy makers--extent to which they are delivered up in their relations with Russia to good graces of obscure and unknown advisers whom they never see and cannot influence--this to my mind is most disquieting feature of diplomacy in Moscow, and one which Western statesmen would do well to keep in mind if they would understand nature of difficulties encountered here.Part 3: Projection of Soviet Outlook in Practical Policy on Official LevelWe have now seen nature and background of Soviet program. What may we expect by way of its practical implementation?Soviet policy, as Department implies in its query under reference, is conducted on two planes: (1) official plane represented by actions undertaken officially in name of Soviet Government; and (2) subterranean plane of actions undertaken by agencies for which Soviet Government does not admit responsibility.Policy promulgated on both planes will be calculated to serve basic policies (a) to (d) outlined in part 1. Actions taken on different planes will differ considerably, but will dovetail into each other in purpose, timing and effect.On official plane we must look for following:(a) Internal policy devoted to increasing in every way strength and prestige of Soviet state: intensive military-industrialization; maximum development of armed forces; great displays to impress outsiders; continued secretiveness about internal matters, designed to conceal weaknesses and to keep opponent in the dark.(b) Wherever it is considered timely and promising, efforts will be made to advance official limits of Soviet power. For the moment, these efforts are restricted to certain neighboring points conceived of here as being of immediate strategic necessity, such as northern Iran, Turkey, possibly Bornholm. However, other points may at any time come into question, if and as concealed Soviet political power is extended to new areas. Thus a "friendly" Persian Government might be asked to grant Russia a port on Persian Gulf. Should Spain fall under Communist control, question of Soviet base at Gibraltar Strait might be activated. But such claims will appear on official level only when unofficial preparation is complete.(c) Russians will participate officially in international organizations where they see opportunity of extending Soviet power or of inhibiting or diluting power of others. Moscow sees in UNO not the mechanism for a permanent and stable world society founded on mutual interest and aims of all nations, but an arena in which aims just mentioned can be favorably pursued. As long as UNO is considered here to serve this purpose, Soviets will remain with it. But if at any time they come to conclusion that it is serving to embarrass or frustrate their aims for power expansion and if theysee better prospects for pursuit of these aims along other lines, they will not hesitate to abandon UNO. This would imply, however, that they felt themselves strong enough to split unity of other nations by their withdrawal, to render UNO ineffective as a threat to their aims or security, and to replace it with an international weapon more effective from their viewpoint. Thus Soviet attitude toward UNO will depend largely on loyalty of other nations to it, and on degree of vigor, decisiveness and cohesion with which these nations defend in UNO the peaceful and hopeful concept of international life, which that organization represents to our way of thinking. I reiterate, Moscow has no abstract devotion to UNO ideals. Its attitude to that organization will remain essentially pragmatic and tactical.(d) Toward colonial areas and backward or dependent peoples, Soviet policy, even on official plane, will be directed toward weakening of power and influence and contacts of advanced Western nations, on theory that insofar as this policy is successful, there will be created a vacuum which will favor Communist-Soviet penetration. Soviet pressure for participation in trusteeship arrangements thus represents, in my opinion, a desire to be in a position to complicate and inhibit exertion of Western influence at such points rather than to provide major channel for exerting of Soviet power. Latter motive is not lacking, but for this Soviets prefer to rely on other channels than official trusteeship arrangements. Thus we may expect to find Soviets asking for admission everywhere to trusteeship or similar arrangements and using levers thus acquired to weaken Western influence among such peoples.(e) Russians will strive energetically to develop Soviet representation in, and official ties with, countries in which they sense strong possibilities of opposition to Western centers of power. This applies to such widely separated points as Germany, Argentina, Middle Eastern countries, etc.(f) In international economic matters, Soviet policy will really be dominated by pursuit of autarchy for Soviet Union and Soviet-dominated adjacent areas taken together. That, however, will be underlying policy. As far as official line is concerned, position is not yet clear. Soviet Government has shown strange reticence since termination hostilities on subject foreign trade. If large-scale long-term credits should be forthcoming, I believe Soviet Government may eventually again do lip service, as it did in 1930’s, to desirability of building up international economic exchanges in general. Otherwise I think it possible Soviet foreign trade may be restricted largely to Soviet’s own securi ty sphere, including occupied areas in Germany, and that a cold official shoulder may be turned to principle of general economic collaboration among nations.(g) With respect to cultural collaboration, lip service will likewise be rendered to desirability of deepening cultural contact between peoples, but this will not in practice be interpreted in any way which could weaken security position of Soviet peoples. Actual manifestations of Soviet policy in this respect will be restricted to arid channels of closely shepherded official visits and functions, with superabundance of vodka and speeches and dearth of permanent effects.(h) Beyond this, Soviet official relations will take what might be called "correct" course with individual foreign governments, with great stress being laid on prestige of Soviet Union and its representatives and with punctilious attention to protocol, as distinct from good manners.Part 4: Following May Be Said as to What We May Expect by Way of Implementation of Basic Soviet Policies on Unofficial, or Subterranean Plane, i.e., on Plane for Which Soviet Government Accepts No Responsibility.Agencies utilized for promulgation of policies on this plane are following:1. Inner central core of Communist parties in other countries. While many of persons who compose this category may also appear and act in unrelated public capacities, they are in reality working closely together as an underground operating directorate of world communism, a concealed Comintern12 tightly coordinated and directed by Moscow. It is important to remember that this inner core is actually working on underground lines, despite legaity of parties with which it is associated.2. Rank and Communist parties. Note distinction is drawn between these and persons defined in paragraph 1. This distinction has become much sharper in recent years. Whereas formerly foreign Communist parties represented a curious (and from Moscow’s standpoint often inconvenient) mixture of conspiracy and legitimate activity, now the conspiratorial element has been neatly concentrated in inner circle and ordered underground, while rank and longer even taken into confidence about realities of movement--are thrust forward as bona fide internal partisans of certain political tendencies within their respective countries, genuinely innocent of conspiratorial connection with foreign states. Only in certain countries where communists are numerically strong do they now regularly appear and act as a body. As a rule they are used to penetrate, and to influence or dominate, as case may be, other organizations less likely to be suspected of being tools of Soviet Government, with a view to accomplishing their purposes through [apparent omission] organizations, rather than by direct action as a separate political party.3. A wide variety of national associations or bodies which can be dominated or influenced by such penetration. These include: labor unions, youth leagues, women’s organizations, racial societies, religious societies, social organizations, cultural groups, liberal magazines, publishing houses, etc.4. International organizations which can be similarly penetrated through influence over various national components. Labor, youth and women’s organizations are prominent among them. Particular, almost vital, importance is attached in this connection to international labor movement. In this, Moscow sees possibility of sidetracking Western governments in world affairs and building up international lobby capable of compelling governments to take actions favorable to Soviet interests in various countries and of paralyzing actions disagreeable to USSR.5. Russian Orthodox Church, with its foreign branches, and through it the Eastern Orthodox Church in general.6. Pan-Slav movement and other movements (Azerbaijan, Armenian, Turcoman, etc.) based onracial groups within Soviet Union.7. Governments or governing groups willing to lend themselves to Soviet purposes in one degree or another, such as present Bulgarian and Yugoslav governments, North Persian regime, Chinese Communists, etc. Not only propaganda machines but actual policies of these regimes can be placed extensively at disposal of USSR.It may be expected that component parts of this far-flung apparatus will be utilized, in accordance with their individual suitability, as follows:(a) To undermine general political and strategic potential of major Western Powers. Efforts will be made in such countries to disrupt national self-confidence, to hamstring measures of national defense, to increase social and industrial unrest, to stimulate all forms of disunity. All persons with grievances, whether economic or racial, will be urged to seek redress not in mediation and compromise, but in defiant, violent struggle for destruction of other elements of society. Here poor will be set against rich, black against white, young against old, newcomers against established residents, etc.(b) On unofficial plane particularly violent efforts will be made to weaken power and influence of Western Powers [on] colonial, backward, or dependent peoples. On this level, no holds will be barred. Mistakes and weaknesses of Western colonial administration will be mercilessly exposed and exploited. Liberal opinion in Western countries will be mobilized to weaken colonial policies. Resentment among dependent peoples will be stimulated. And while latter are being encouraged to seek independence [from] Western Powers, Soviet dominated puppet political machines will be undergoing preparation to take over domestic power in respective colonial areas when independence is achieved.(c) Where individual governments stand in path of Soviet purposes pressure will be brought for their removal from office. This can happen where governments directly oppose Soviet foreign policy aims (Turkey, Iran), where they seal their territories off against Communist penetration (Switzerland, Portugal), or where they compete too strongly (like Labor Government in England) for moral domination among elements which it is important for Communists to dominate. (Sometimes, two if the elements are present in a single case. Then Communist opposition becomes particularly shrill and savage.)(d) In foreign countries Communists will, as a rule, work toward destruction of all forms of personal independence--economic, political or moral. Their system can handle only individuals who have been brought into complete dependence on higher power. Thus, persons who are financially independent--such as individual businessmen, estate owners, successful farmers, artisans--and all those who exercise local leadership or have local prestige--such as popular local clergymen or political figures--are anathema. It is not by chance that even in USSR local officials are kept constantly on move from one job to another, to prevent their taking root.(e) Everything possible will be done to set major Western Powers against each other. Anti-Britishtalk will be plugged among Americans, anti-American talk among British. Continentals, including Germans, will be taught to abhor both Anglo-Saxon powers. Where suspicions exist, they will be fanned; where not, ignited. No effort will be spared to discredit and combat all efforts which threaten to lead to any sort of unity or cohesion among other [apparent omission] from which Russia might be excluded. Thus, all forms of international organization not amenable to Communist penetration and control, whether it be the Catholic [apparent omission] international economic concerns, or the international fraternity of royalty and aristocracy, must expect to find themselves under fire from many, and often [apparent omission].(f) In general, all Soviet efforts on unofficial international plane will be negative and destructive in character, designed to tear down sources of strength beyond reach of Soviet control. This is only in line with basic Soviet instinct that there can be no compromise with rival power and that constructive work can start only when Communist power is dominant. But behind all this will be applied insistent, unceasing pressure for penetration and command of key positions in administration and especially in police apparatus of foreign countries. The Soviet regime is a police regime par excellence, reared in the dim half world of Tsarist police intrigue, accustomed to think primarily in terms of police power. This should never be lost sight of in gauging Soviet motives.Part 5. Practical Deductions from Standpoint of US PolicyIn summary, we have here a political force committed fanatically to the belief that with US there can be no permanent modus vivendi, that it is desirable and necessary that the internal harmony of our society be disrupted, our traditional way of life be destroyed, the international authority of our state be broken, if Soviet power is to be secure. This political force has complete power of disposition over energies of one of world’s greatest peoples and resources of world’s richest national territory, and is borne along by deep and powerful currnts of Russian nationalism. In addition, it has an elaborate and far-flung apparatus for exertion of its influence in other countries, an apparatus of amazing flexibility and versatility, managed by people whose experience and skill in underground methods are presumably without parallel in history. Finally, it is seemingly inaccessible to considerations of reality in its basic reactions. For it, the vast fund of objective fact about human society is not, as with us, the measure against which outlook is constantly being tested and re-formed, but a grab bag from which individual items are selected arbitrarily and tendenciously to bolster an outlook already preconceived. This is admittedly not a pleasant picture. Problem of how to cope with this force [is] undoubtedly greatest task our diplomacy has ever faced and probably greatest it will ever have to face. It should be point of departure from which our political general staff work at present juncture should proceed. It should be approached with same thoroughness and care as solution of major strategic problem in war and, if necessary, with no smaller outlay in planning effort. I cannot attempt to suggest all answers here. But I would like to record my conviction that problem is within our power to solve--and that without recourse to any general military conflict. And in support of this conviction there are certain observations for a more encouraging nature I should like to make.(1) Soviet power, unlike that of Hitlerite Germany, is neither schematic nor adventuristic. It does。