Free Essay

Ubiquitous

In:

Submitted By rayne87
Words 1174
Pages 5
Daniel Van Aken Hist223 – Pontiac’s War American Indian History Tracy Derks December 26, 2013

The story of Pontiac’s War is one of great tragedy and of great change in the geographic area of the Ohio Valley, Great Lakes Region and present day Illinois. We will look at this topic from the point of few of the American Indian who inhabits the vast area of the frontier, and the British Policies that were conducted that helped ignite hostilities. Another item for consideration is did these policies and the way the British Army conducted the war possibly set into motion more conflicts that led to the American Revolution. In 1759 white men were discovered in what is now present day Michigan by a band of Ottawa, Huron and Potawatomi. As would be the norm to strangers in a land that did not belong to them the question was asked by the leader of the Ottawa’s Pontiac why they were there. After the trading of gifts the British Rangers explained that they were there only to remove the French. The French and Indian War and been raging across the globe for 5 years. The Ottawa had allied themselves with the French but explained to the British Rangers that upon French removal they would accept the policies of the British Crown, on the condition that if the Indians felt ignored by the British King then all routes into the lush interior of the Ohio Valley would be closed off to them. The treaty of Paris ended the French and Indian War which officially ended in 1760. The end of this conflict caused great alarm among the Indians, from there point of view the land was there’s. The French paid what one could call rent, guns and ammunition to the Indians for allowing forts and French troops to inhabit the land during the war. After the defeat of France, no longer could one nation be pitted against the other for the gain of the tribes. No longer could strategic economic tactics be employed for trade and competition which only benefited the Indians. Once British troops seized positions and forts that were French all along the frontier, settlers in vast numbers began pouring into Indian Territory. The British Commander of North America at the time was Baron Jeffery Amherst who ruled much differently than the French. Amherst immediately cut off all goods to the Indians for the occupation of the forts along with Indians setting foot on them, interracial marriages were frowned upon. The policy of the British was that the Indians were not looked at as equals and therefore had no rights and could be dealt with anyway the British saw fit. To the view point of the Indians this was a drastic shift from the policy of the French and found this to be a great insult. The French were looked at as tenants, renting the land by paying tribute, never were strong sanctions or rules placed over them. The final incident that led to war involved an Indian slave woman that had killed an English trader. Amherst quickly and very publicly had the woman put to death as a statement that all Indians fell under the jurisdiction and law of the crown. In 1762 the Delaware Prophet called Neolin had a vision in which the Master of Life spoke to him concerning all white men. He was told to wage war against the white man and drive them from the land that was not meant for them. Upon returning from his vision Neolin drew the meaning of his vision on a deer skin, which was sold to various other tribes. Soon hundreds of Indians began to follow the teachings of his writings, believing that he was Winabojo reincarnated, a prestigious teacher from the past. These teachings started a movement that caught the attention of the chief of the Ottawa people, Chief Pontiac. Pontiac interpreted this as a crusade against the tyranny of the British. From the viewpoint of the American Indian this was a just cause, a just war to preserve not just their people but for their very way of life. In 1763 Neolin asked the tribes of the Three Fires Confederacy to fight the British and remove them from their land. Allies and formers enemies answered Neolins call to wage war. Success came early for Pontiac and his allies seizing 9 British forts. Hostilities continued from many other tribes as far as Pennsylvania and Virginia.
In order to help defuse the Indian rebellion and limit the loss of life the British issued the Proclamation of 1763 which mandated that no settlers were to settle west of the Appalachian Mountains; this did little to quell the rebellion in which thousands of colonists had lost their lives. The British went so far as to purposely infect blankets with small pox that were given to the Indians during peace negotiations. As brutal as warfare on the frontier was the Indians could not withstand the sheer size, gap in technology and war time supply as the British. In 1764 Pontiac offered the British a Wampum belt as a piece offering which in turn by the British was cut to pieces a horrible insult. The British Commander Amherst was blamed for the expensive war and sent home in disgrace. The new Commander Thomas Gage employed a much different approach then from his predecessor. He lavished the Indians with gifts and used the same policy that the French had used while occupying the Forts along the frontier. Colonist and Indian alike were compensated in the event of murder. The Crown also mandated to ease tensions and forbid colonists from settling west of the Appalachian Mountains, creating a boundary line that was impossible to enforce due to the vast area of the terrain. The colonists already feeling a less need for British occupation because of the elimination of the French disliked the new mandates and only made the relations between Colonist and Indian worse. One could say that a victory for Pontiac was won during the rebellion, the British changed policy and looked at the Indians as allies instead of enemies. To the view point of the Indian one see why hostilities were unavoidable, their way of life, their land and families were all threatened. Due to the treaties and the fact that the English were not removed from the land Neolin became less and less prominent as a teacher in the eyes of the Indians. If it was a victory then it was a short lived one, very small seeds of Revolution had been planted by the colonists due to the treaties and bargains that were made to the Indians. Soon the Colonists would wage their own rebellion and win, and with that victory a new wave of settlers looking to exploit the vast riches of the Ohio Valley would break all the treaties.
References
http://www.nativeamericannetroots.net/diary/906/pontiacs-war http://www.nativeamericannetroots.net/diary/1120/neolin-the-delaware- prophet http://www.americanheritage.com/content/pontiac%E2%80%99s-war

Similar Documents

Premium Essay

Nfc Technology

...device is touched against the NFC reader. • NFC tag: An NFC tag is actually an RFID tag that 8. How Does The NFC Technology Work : NFC works in an intuitive way. The touching action is taken as the triggering condition for NFC communication. Two NFC devices immediately start their communication when they are touched. The NFC application is designed so that when the mobile or the device touches some other NFC component that contains the expected form of data, it boots up. Hence, the user does not need to interact with the mobile device anymore but just touches one appropriate NFC device, which may be an NFC tag, an NFC reader, or another NFC-enabled mobile phone, because the coupling occurs intuitively and immediately. When you consider ubiquitous computing requirements, this is a useful property of NFC communication. For each NFC communication session, the party who initiates the communication is called the initiator, whereas the device that responds to the requests of the initiator is called the target. The following table shows the interactive styles of NFC devices interference: Initiator Target NFC MOBILE NFC TAG NFC MOBILE NFC MOBILE NFC READER...

Words: 604 - Pages: 3

Free Essay

Ubicomp Computing

...and sparked a frenzy of supplemental inventions. Ultimately, it altered the way businesses operate and even the way we spend our leisure time. It left many wondering, “What will they think of next?” Then came, the laptop next, the evolution of the tablet and IPAD making computing easy and eliminating the need to sit in front of a desktop or lug around storage mediums such as cds. Mark Weiser, most often referred to as the father of ubiquitous computing (ubicomp), coined the term in 1988. Ubiquitous means to exist everywhere at the same time or to be constant. His forward thinking brought about the possibility to compute on the go and from nearly anywhere. Innovation news daily provides readers with insight on innovative technologies and inventions that shaped ubiquitous computing and many other technologies. In an article entitled “In the Future, Computing is (Cunningly) Constant”, the details of ubiquitous computing are outlined. It also features contributing components and the effect of such an evolution in lifestyles and business. Ubiquitous computing has been “under construction” for more than two decades. According to the article, it originated in a Xerox PARC research lab where the father of ubicomp (Weiser) worked. Innovation news refers to it as a state in which mobile devices such as the IPAD combine forces with high speed internet connections, Google docs, and cloud computing to reduce the need for the computer in the computing process. Along with eliminating the...

Words: 635 - Pages: 3

Free Essay

Ubiquitous Dbms Reading

...DBMS is a high-level query language because it is used for real work data stored in relational data model, it evaluate queries very efficiently. In this way, users can manage large amount of structured data by DBMS. Users don’t have to write low level language to realize some specific functions, don’t need to debug or testing the application functions, therefore DBMS reduces development time.In DBMS, the data model, which is called schema, for example relational, we can have entities and attributes, indexing and statistics and so on. We can think DBMS is working as a data dictionary because it is a relation that has all the relations and all the relations has all the attributes. DBMS has an efficient way to store and retrieve related data. There are many ways to compute the query, however, there must be a best way to do it. DBMS has unique techniques to read and return data users need. The insert, delete and modify operations of DBMS is very convenient for users to use. DBMS can help to find the best way to minimize the cost of computing. That’s why DBMS is considered query optimizing.DBMS is integrity constraints because it defines rules to describe the how data stored in the database system. If there is some data that does not obey the rule, it is not belong tothis database. Each set of data item is independent (there is a primary key for each item), and the relations are dependent.When there are multiple users using the same database, they are interrupting the execution...

Words: 387 - Pages: 2

Free Essay

Web Services

...org/en/news/2012/07/17/mobile-phone-access-reaches-three-quarters-planets-population accessed on 1st November 2012) #5 Kushchu, I., Kuscu, M., H., 2004. From e-Government to m-Government: Facing the Inevitable. URL http://www.mgovernment.org/resurces/mgovlab_ikhk.pdf. (2009-03-15) Karunamurthy R, Khendek F, Glitho RH. A novel architecture for Web service composition, Journal of Network and Computer Applications 35 (2012) 787–802. Chen, G., & Kotz, D. (2000). A survey of context-aware mobile computing research. Dartmouth College. http://www.cs.dartmouth.edu/reports/TR2000-381.pdf Chen, H., Finin, T., & Joshi, A. (2003). An ontology for context-aware pervasive computing environments. Knowl. Eng. Rev. , 18 (3), 197--207. Chen, I. Y., Yang, S. J., & Zhang, J. (2006). Ubiquitous Provision of Context Aware Web Services. Proceedings of the IEEE international Conference on Services Computing (pp. 60-68). Washington: IEEE Computer Society. Layne, K. & J. Lee (2001) Developing fully functional E-government: A four stage model Government Information Quarterly, 18, pp. 122-136 Karan, K. (Ed.) (2004) Cyber communities in rural Asia: A study of seven countries. Singapore: AMIC/ Marshall Cavendish. Rameesh Kailasam (2010). Government Programs, IBM India/SA, presentation can be retrieved from http://www.trai.gov.in/NFCNPrts/session2/4-Rameesh.pdf Extending the Web services model to IT services Stern, A.; Davis, J.;Web Services, 2004....

Words: 300 - Pages: 2

Free Essay

Internet of Things

...efficient, and easily interpretable form. This model will consist of services that are commodities and delivered in a manner similar to traditional commodities. Cloud computing can provide the virtual infrastructure for such utility computing which integrates monitoring devices, storage devices, analytics tools, visualization platforms and client delivery. The cost based model that Cloud computing offers will enable end-to-end service provisioning for businesses and users to access applications on demand from anywhere. Smart connectivity with existing networks and context-aware computation using network resources is an indispensable part of IoT. With the growing presence of WiFi and 4G-LTE wireless Internet access, the evolution towards ubiquitous information and communication networks is already evident. However, for the Internet of Things vision to successfully emerge, the computing paradigm will need to go beyond traditional mobile computing scenarios that use smart phones and portables, and evolve into connecting everyday existing objects and embedding intelligence into our environment. For technology to disappear from the consciousness of the user, the Internet of Things demands: (1) a shared understanding of the situation of its users and their...

Words: 858 - Pages: 4

Premium Essay

Human Resources

...Human resources has been my career choice for the last twelve years. An environment that once used to be manually driven is now dominated by the advances in technology. The essay that follows will showcase how many work environments have evolved with the new wave of technology. Many employers have had to retrain their employees because of the new technological advances, therefore enabling a less manually dominant driven work space. Currently most companies across the world function are technologically driven. Whether it be submitting a report via a sky drive or on-boarding a new employee, almost 85% of one’s job has evolved due to the changes in technology. Being a Human resources professional for the last twelve years, I have seen firsthand the changes that came as technology evolved. Examples: payroll used to be outsourced; a telegram would be the only way to communicate with another division of your company located at different site. Picking up the phone would be the only way to communicate with department within your organization, now you can email that person to communicate a message. Recently my organization upgraded our database and installed a Applicant Tracking System along with a more sophisticated payroll system. This system has allowed the employees to manage three very key work functions that once used to function separately and added extra work mileage to each function. The new software greatly improved these three key components: tracking new employees,...

Words: 504 - Pages: 3

Free Essay

Management Information System

...Mobile computing is human–computer interaction by which a computer is expected to be transported during normal usage. Mobile computing involves mobile communication, mobile hardware, and mobile software. It is also is a generic term used to refer to a variety of devices that allow people to access data and information from where ever they are. It is the technology that allows transmission of data, via a computer, without having to be connected to a fixed physical link. It is the discipline for creating an information management platform, which is free from spatial and temporal constraints. The freedom from these constraints allows its users to access and process desired information from anywhere in the space. The state of the user, static or mobile, does not affect the information management capability of the mobile platform being constrained to a single location. Mobile computing is accomplished using a combination of computer hardware, system and applications software and some form of communications medium. Some of the characteristics of mobile computing is based on following: 1. Hardware : characteristics of mobile computing hardware are defined by the size and form factor, weight, microprocessor, primary storage, secondary storage, screen size and type, means of input, means of output, battery life, communications capabilities, expandability and durability of the device. 2. Software: Mobile computers make use of a wide variety of system and application software...

Words: 602 - Pages: 3

Free Essay

Records Management

...Current Trends Grace D. Buencamino BSIT-S7C 1.) E1 – World’s smallest 4K interchangeable lens camera The E1, two years in the making, is currently running a Kickstarter campaign not to raise funds for manufacturing, but to promote the company (Z Camera), as it is still an unknown startup. The company launched the campaign in advance of its official announcement, and has already shattered its $42,000 goal (as of this writing, it’s currently at more than $147,000). And unlike many Kickstarter projects, the E1 is real and we’ve played with one; its engineer and creator, Jason Zhang, told us that manufacturing has already started and first deliveries are scheduled for later this year. Zhang was a former engineer with Ambarella, the chipset maker that supplies hardware to GoPro. After branching out on his own, Zhang and a few colleagues saw an “opportunity gap” for a camera that fits between an action cam and a DSLR – small and light enough to fit onto a drone, but more powerful and flexible than an action cam. Built around an Ambarella 4K-capable A9 chipset, Zhang went with a Micro Four Thirds sensor (made by Panasonic) for the E1 because it’s the only open standard option in interchangeable lenses, Zhang says. The E1’s mount works with most Micro Four Thirds lenses from Olympus and Panasonic, as well as some third-party makers like Sigma. The camera doesn’t have any built-in image stabilization, but you could use one of Panasonic’s O.I.S. lenses. The E1 will autofocus any attached...

Words: 3595 - Pages: 15

Premium Essay

It Doesnt Matter

...Does IT matter or not? In a world where IT was perfectly ubiquitous Carr would be justified in his argument that IT does not matter. However, Carr’s argument is incomplete. Carr neglects to look at how the various companies manage and use their IT resources. In a world where IT was perfectly ubiquitous, IT would not matter, the management of that IT resource would however matter a great deal to determine its strategic advantages. It should also be noted that the development of IT and the creation of new IT have not reached its end and will not do so in any short period of time. IT, in its nature, allows for continual development as each new development opens new avenues of Research and Development. Each new development generally takes the form of proprietary technology, for a short while at least, allowing for strategic advantages. Carr’s belief that these new proprietary developments cannot sustain a strategic advantage for any company is true, but again it should be noted that the IT industry is in a constant state of change. It is the companies, like Microsoft, Hewlett Packard and Sun Microsystems with their ability to constantly make progress in the development of IT, which have the strategic advantage. The general sentiment amongst IT professionals is that IT matters a great deal. This statement is liable to a great deal of bias as to state otherwise is equal to asking IT professionals to concede that they, their jobs and livelihood, do not matter. In fact, however...

Words: 416 - Pages: 2

Free Essay

Qasd

..."I learned the history of that murderous monster against who i and all the others had taken out oaths of violence and revenge" (194). "Moby-Dick was ubiquitous; that he had actually been encountered in opposite latitudes at one and the same instance of time" (197). "Moby-Dick not only ubiquitous, but immortal" (198). “Every dismembering or death that he caused, was not wholly regarded as having been inflicted by an unintelligent agent” (199). “All evil, to crazy Ahab, were visibly personified, and made practically assailable in Moby-Dick” (200). Most sailors view Moby-Dick as a deity. Many rumors support this belief including, "Moby-Dick was ubiquitous; that he had actually been encountered in opposite latitudes at one and the same instance of time" (197), and, "Moby-Dick not only ubiquitous, but immortal" (198). They believe that he was so powerful he can be everywhere at once. He had control over his actions and he was intelligent and he knew he was killing men and did it on purpose, “Every dismembering or death that he caused, was not wholly regarded as having been inflicted by an unintelligent agent” (199). Sailors, especially Captain Ahab, believed that Moby-Dick was an evil monster, saying, "I learned the history of that murderous monster against who I and all the others had taken out oaths of violence and revenge" (194). Captain Ahab saw Moby-Dick as the ultimate evil, “All evil, to crazy Ahab, were visibly personified, and made practically assailable in...

Words: 254 - Pages: 2

Premium Essay

Secrets Are So 20th Century: Article Analysis

...“Secrets are so 20th century”. At least that’s what a Time Magazine headline proclaimed in a 2013 cover story on “The Surveillance Society.” The emergence of ubiquitous surveillance technology, best exemplified by CCTV, presents a pressing ethical dilemma, namely is increased security worth the loss of privacy? This ethical dilemma is difficult to resolve because it requires a balancing a fundamental need, the need for security, against the less tangible benefits of privacy. The value society attaches to security varies depending on how threatened people feel. The less tangible benefits of privacy are most appreciated when they are lost. The ethical dilemma is made even more difficult to resolve by issues related to control of surveillance...

Words: 1756 - Pages: 8

Premium Essay

Organization

...orgnThe research register for this journal is available at http://www.emeraldinsight.com/researchregisters The current issue and full text archive of this journal is available at http://www.emeraldinsight.com/1463-7154.htm BPMJ 8,3 218 Ubiquitous organization: organizational design for e-CRM M.F. Smith & Associates, Inc., Morristown, New Jersey, USA Keywords Information systems, Transaction costs, Organizational design, Teams, E-commerce Abstract In 1998 J.P. Morgan's analysts forecast that the market for e-CRM (customer relationship management) solutions would grow rapidly. Since then more than 700 e-CRM firms have emerged. The convergence of information technologies caused enterprise information systems providers to add e-CRM functionality to their systems, thus further increasing the number of e-CRM suppliers. The proliferation of e-CRM concepts, models and technologies causes significant confusion and uncertainty. Corporate executives question the economic benefits of investing in multimillion dollar e-CRM projects, ponder about the right business and organizational models for e-CRM, and are uncertain which e-CRM models and technologies will prove both profitable and sustainable over time. With so many failed e-CRM initiatives some executives wonder whether e-CRM is not simply a hype. In the present paper what e-CRM is, from where the economic benefits from investing in e-CRM derive, and the evolution of alternative e-CRM models are elaborated. It is also argued...

Words: 5942 - Pages: 24

Premium Essay

Electronic Commerce Research

...Electronic Commerce Research and Applications 3 (2004) 389–404 www.elsevier.com/locate/ecra Analysis of E-commerce innovation and impact: a hypercube model Jen-Her Wu a a,b,* , Tzyh-Lih Hisa a,c Department of Information Management, National Sun Yat-Sen University, 70 Lien-Hai Road, Kaohsiung 80424, Taiwan b Institute of Health Care Management, National Sun Yat-Sen University, Kaohsiung, Taiwan c Department of Information Management, Chinese Navel Academy, Kaohsiung, Taiwan Received 17 February 2004; received in revised form 19 April 2004; accepted 19 May 2004 Available online 2 July 2004 Abstract Electronic commerce (E-commerce) innovating applications have posed novel, technical, organizational and commercial challenges. This study uses a hypercube model to investigate these innovative changes and focuses on their impacts on E-commerce stakeholders: providers, E-commerce companies, customers, and complementors. The results indicate that mobile commerce (M-commerce) differs substantially from Web-based commerce in some technological components, yet both share common business model. However, from Web-based to M-commerce, innovation is architectural for customers and E-commerce companies, but a radical change for complementors. From M-commerce to Ucommerce, innovation is modular to customers, architectural to complementors and radical to E-commerce companies and providers. Thereafter, the critical impacts of E-commerce innovations on the stakeholders are identified...

Words: 8521 - Pages: 35

Premium Essay

Sydney Port

...University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Management Department Faculty Publications Management Department 8-1-2008 A Strategy for Third-Party Logistics Systems: A Case Analysis Using the Blue Ocean Strategy Changsu Kim Yeongnam University, Korea, c.kim@yumail.ac.kr Kyung Hoon Yang University of Wisconsin-La Crosse, kyang@uwlax.edu Jaekyung Kim University of Nebraska - Lincoln, jkim6@unl.edu Follow this and additional works at: http://digitalcommons.unl.edu/managementfacpub Part of the Management Sciences and Quantitative Methods Commons Kim, Changsu; Hoon Yang, Kyung; and Kim, Jaekyung, "A Strategy for Third-Party Logistics Systems: A Case Analysis Using the Blue Ocean Strategy" (2008). Management Department Faculty Publications. Paper 4. http://digitalcommons.unl.edu/managementfacpub/4 This Article is brought to you for free and open access by the Management Department at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Management Department Faculty Publications by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. Published in Omega 36:4 (August 2008), pp. 522–534; Special Issue on Logistics: New Perspectives and Challenges; doi 10.1016/j.omega.2006.11.011 Guest Editors — Angappa Gunasekaran and T.C. Edwin Cheng. Copyright © 2007 Elsevier Ltd. Used by permission. http://www.sciencedirect.com/science/journal/03050483 Submitted May 31, 2006;...

Words: 8124 - Pages: 33

Premium Essay

A Man-Machine Interface

...bonding to the past. A past imbued with fear, pain and hardship, a meta-ethnic past that some long for and believe to have been a simpler time. The Personal Computer will someday become an invisible extension of our minds with no peripherals nor external hardware to obstruct the users from achieving their creative goals. From its beginning mechanical computers have frightened Humans who believed that they would be replaced by these thinking machines. The human beings mechanical mobility has evolved out of our spirits need to interact with the universe and the next step, the one that frees mankind from physical limitations will be the use of machines that will be ubiquitous, in effect, working as natural extensions of the body. The continuous innovations in electronics are making more and more components ubiquitous. The convergence of man and machine requires that computers become an integral part of the human body. The hurdles are many and those in opposition of such a world are afraid that these changes can only come about with the sacrifice of the soul. The last huddle that will stand in mans way of a true Man-Machine interface may well be one of posed by the threat that others may seek to control the machine portion and enslave mankind as mindless cyber-men. How did these fears of mechanical computers, these thinking machines, replacing Humans get started and fears founded in reason? Human computers have been used by government and business since the dawn of the man...

Words: 1361 - Pages: 6