International Standard Bible Encyclopedia Vol. 4 F- Gymnasium

Total Page:16

File Type:pdf, Size:1020Kb

International Standard Bible Encyclopedia Vol. 4 F- Gymnasium THE AGES DIGITAL LIBRARY REFERENCE INTERNATIONAL STANDARD BIBLE ENCYCLOPEDIA VOL. 4 F- GYMNASIUM Books For The Ages AGES Software • Albany, OR USA Version 1.0 © 1997 2 F FABLE <fa’-b’-l> ([mu~qov, muthos]): (1) Primitive man conceives of the objects around him as possessing his own characteristics. Consequently in his stories, beasts, trees, rocks, etc., think, talk and act exactly as if they were human beings. Of course, but little advance in knowledge was needed to put an end to this mode of thought, but the form of story-telling developed by it persisted and is found in the folk-tales of all nations. More particularly, the archaic form of story was used for the purpose of moral instruction, and when so used is termed the fable. Modern definitions distinguish it from the parable (a) by its use of characters of lower intelligence than man (although reasoning and speaking like men), and (b) by its lesson for this life only. But, while these distinctions serve some practical purpose in distinguishing (say) the fables of Aesop from the parables of Christ, they are of little value to the student of folk-lore. For fable, parable, allegory, etc., are all evolutions from a common stock, and they tend to blend with each other. See ALLEGORY; PARABLE. (2) The Semitic mind is peculiarly prone to allegorical expression, and a modern Arabian storyteller will invent a fable or a parable as readily as he will talk. And we may be entirely certain that the very scanty appearance of fables in the Old Testament is due only to the character of its material and not at all to an absence of fables from the mouths of the Jews of old. Only two examples have reached us. In <070907>Judges 9:7 through 15 Jotham mocks the choice of AbimeItch as king with the fable of the trees that could find no tree that would accept the trouble of the kingship except the worthless bramble. And in <121409>2 Kings 14:9 Jehoash ridicules the pretensions of Amaziah with the story of the thistle that wished to make a royal alliance with the cedar. Yet that the distinction between fable and allegory, etc., is 3 artificial is seen in <230501>Isaiah 5:1,2, where the vineyard is assumed to possess a deliberate will to be perverse. (3) In the New Testament, “fable” is found in <540104>1 Timothy 1:4; 4:7; <550404>2 Timothy 4:4; <560114>Titus 1:14; <610116>2 Peter 1:16, as the translation of muthos (“myth”). The sense here differs entirely from that discussed above, and “fable” means a (religious) story that has no connection with reality — contrasted with the knowledge of an eyewitness in <610116>2 Peter 1:16. The exact nature of these “fables” is of course something out of our knowledge, but the mention in connection with them of “endless genealogies” in <540104>1 Timothy 1:4 points with high probability to some form of Gnostic speculation that interposed a chain of eons between God and the world. In some of the Gnostic systems that we know, these chains are described with a prolixity so interminable (the Pistis Sophia is the best example) as to justify well the phrase “old wives’ fables” in <540407>1 Timothy 4:7. But that these passages have Gnostic reference need not tell against the Pauline authorship of the Pastorals, as a fairly well developed “Gnosticism” is recognizable in a passage as early as Colossians 2, and as the description of the fables as Jewish in <560114>Titus 1:14 (compare 3:9) is against 2nd-century references. But for details the commentaries on the Pastoral Epistles must be consulted. It is worth noting that in <550404>2 Timothy 4:4 the adoption of these fables is said to be the result of dabbling in the dubious. This manner of losing one’s hold on reality is, unfortunately, something not confined to the apostolic age. Burton Scott Easton FACE <fas>: In Hebrew the translation of three expressions: (1) [µyniP;, panim] (2) [ˆyi[“, `ayin], literally, “eye” and (3) [ta”, ‘aph], literally, “nose,” “nostril,” already noted under the word COUNTENANCE, which see. The first and second of these words are used synonymously, even in metaphorical expressions, as, e.g. in the phrase “the face of the earth,” where panim is used (<050615>Deuteronomy 6:15 et passim) and `ayin (<042205>Numbers 22:5 et passim). The third expression preserves more clearly its original 4 meaning. It is generally used in the phrases “to bow one’s self to the earth,” “to fall on one’s face,” where the nose actually touched the ground. Often “my face,” “thy face” is mere oriental circumlocution for the personal pronoun “I,” “me,” “thou,” “thee.” “In thy face” means “in thy presence;” and is often so translated. A very large number of idiomatic Hebrew expressions have been introduced into our language through the medium of the Bible translation. We notice the most important of these phrases. “To seek the face” is to seek an audience with a prince or with God, to seek favor (<192406>Psalm 24:6; 27:8 bis; 105:4; <200715>Proverbs 7:15; <280515>Hosea 5:15; compare <202926>Proverbs 29:26, where the Revised Version (British and American) translates “Many seek the ruler’s favor,” literally, many seek the face (Hebrew pene) of a ruler). If God “hides his face” He withdraws His presence, His favor (<053220>Deuteronomy 32:20; <183429>Job 34:29; <191301>Psalm 13:1; 30:7; 143:7; <235408>Isaiah 54:8; <243305>Jeremiah 33:5; <263923>Ezekiel 39:23,14; <330304>Micah 3:4). Such withdrawal of the presence of God is to be understood as a consequence of man’s personal disobedience, not as a wrathful denial of God’s favor (<235902>Isaiah 59:2). God is asked to “hide his face,” i.e. to disregard or overlook (<195109>Psalm 51:9; compare 10:11). This is also the idea of the prayer: “Cast me not away from thy presence” (literally, “face,” <195111>Psalm 51:11), and of the promise: “The upright shall dwell in thy presence” (literally, “face,” <19E013>Psalm 140:13). If used of men, “to hide the face” expresses humility and reverence before an exalted presence (<020306>Exodus 3:6; <230602>Isaiah 6:2); similarly Elijah “wrapped his face in his mantle” when God passed by (<111913>1 Kings 19:13). The “covering of the face” is a sign of mourning (<101904>2 Samuel 19:4 = <261206>Ezekiel 12:6,12); a “face covered with fatness” is synonymous with prosperity and arrogance (<181527>Job 15:27); to have one’s face covered by another person is a sign of hopeless doom, as if one were already dead. This was done to Human, when judgment had been pronounced over him (<160708>Nehemiah 7:8). “To turn away one’s face” is a sign of insulting indifference or contempt (<142906>2 Chronicles 29:6; <261406>Ezekiel 14:6; Sirach 4:4; compare <240227>Jeremiah 2:27; 18:17; 32:33); on the part of God an averted face is synonymous with rejection (<191301>Psalm 13:1; 27:9; 88:14). 5 “To harden the face” means to harden one’s self against any sort of appeal (<202129>Proverbs 21:29; <235007>Isaiah 50:7; <240503>Jeremiah 5:3; compare <260309>Ezekiel 3:9). See also SPIT. In this connection we also mention the phrase “to respect persons,” literally, to “recognize the face” (Leviticus19:15, or, slightly different in expression, <050117>Deuteronomy 1:17; 16:19; Proverbs 24; 23; 28:21), in the sense of unjustly favoring a person, or requiting him with undue evil. Compare also the Hebrew hadhar (<022303>Exodus 23:3 the King James Version), “to countenance” (see under the word). The “showbread” meant literally, “bread of the face,” “of the presence,” Hebrew lechem panim; Greek artoi enopioi, artoi tes protheseos. H. L. E. Luering FACT Lit. “a deed.” The word occurs only in the heading of the chapter, 2 Kings 10 the King James Version, “Jehu excuseth the fact by the prophecy of Elijah,” and in 2 Macc 4:36, with reference to the murder of Onias, “certain of the Greeks that abhorred the fact (the deed) also” (summisoponerounton, literally, “hating wickedness together with (others),” the Revised Version (British and American) “the Greeks also joining with them in hatred of the wickedness.” FADE <fad> ([lben;, nabhel]; [marai>nw, maraino]): “To fade” is in the Old Testament the translation of nabhel, “to droop or wither,” figuratively, “to fade,” or “pass way” (<191845>Psalm 18:45; <230130>Isaiah 1:30; 24:4; 28:1,4; 40:7,8); once it is the translation of balal “to well up,” “to overflow”; perhaps from nabhal (<236406>Isaiah 64:6, “We all do fade as a leaf”); in the New Testament of maraino, “to come to wither or to fade away” (Jas 1:11, “So also shall the rich man fade away in his ways,” the Revised Version (British and American) “in his goings”); compare The Wisdom of Solomon 28, “Let us crown ourselves with rosebuds, before they be withered” (maraino); amarantinos (amaranth), “unfading,” occurs in <600504>1 Peter 5:4, “the crown of glory that fadeth not away,” and amarantos (<600104>1 Peter 1:4), “an inheritance .... that fadeth not away”; compare The Wisdom 6 of Solomon 6:12, “Wisdom is glorious (the Revised Version (British and American) “radiant”), and fadeth not away.” For “fade” (<264712>Ezekiel 47:12), the Revised Version (British and American) has “wither”; for “fall” “falleth” “falling” (<233404>Isaiah 34:4), “fade,” “fadeth,” “fading.
Recommended publications
  • Maps of First Century Palestine
    Fellowship Home Page The Map of First Century Palestine Index to Geographic Place Names Urantia Papers' First Century Palestine The grid upon which the map is constructed is the standard MR grid system used in many archaeological reports and other descriptive literature of the region, such as the Anchor Bible Dictionary. In this grid system, the first three digits designate a position on the north-south axis of the map while the second three digits designate a position on the east-west axis, the intersection of the two lines being the location of the index item on the map. On the map itself, the north-south coordinates read vertically while the east-west coordinates read horizontally. The map shows the location of all the villages and towns mentioned in Part IV of The Urantia Book. The index lists these as well as other towns and villages which were known to have existed at the time of Jesus, but which do not appear on the map. Look up the name of any first-century place location. Letters below are linked to corresponding sections of the index: | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | Z | A ABEL 236-183 ABELA 139-211 ABELIM 248-167 ABILA 232-234 ACHZIB; ECDIPPA 271-159 ACRABETA 170-182 ADAM 167-202 ADAMAH 238-193 ADIDA 152-145 ADORAIM; DURA 101-153 AENON 138-203 AGRIPPINA? 192-218 AILABO 249-187 AIN 236-212 ALEXANDRIUM 166-193 ALMA 273-196 AMATHUS 183-208 AMMATHUS 240-202 AMMUDIM 247-188 AMUDIYYA 266-216 ANABTAH 191-162 ANATHOTH 135-174 ANIM 84-156 ANTHEDON 105- 98 ANTIPATRIS 168-143 ANUATHU
    [Show full text]
  • Trade and Commerce at Sepphoris, Israel
    Illinois Wesleyan University Digital Commons @ IWU Honors Projects Sociology and Anthropology 1998 Trade and Commerce at Sepphoris, Israel Sarah VanSickle '98 Illinois Wesleyan University Follow this and additional works at: https://digitalcommons.iwu.edu/socanth_honproj Part of the Anthropology Commons Recommended Citation VanSickle '98, Sarah, "Trade and Commerce at Sepphoris, Israel" (1998). Honors Projects. 19. https://digitalcommons.iwu.edu/socanth_honproj/19 This Article is protected by copyright and/or related rights. It has been brought to you by Digital Commons @ IWU with permission from the rights-holder(s). You are free to use this material in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/ or on the work itself. This material has been accepted for inclusion by Faculty at Illinois Wesleyan University. For more information, please contact [email protected]. ©Copyright is owned by the author of this document. Trade and Commerce At Sepphoris, Israel Sarah VanSickle 1998 Honors Research Dr. Dennis E. Groh, Advisor I Introduction Trade patterns in the Near East are the subject of conflicting interpretations. Researchers debate whether Galilean cities utilized trade routes along the Sea of Galilee and the Mediterranean or were self-sufficient, with little access to trade. An analysis of material culture found at specific sites can most efficiently determine the extent of trade in the region. If commerce is extensive, a significant assemblage of foreign goods will be found; an overwhelming majority of provincial artifacts will suggest minimal trade.
    [Show full text]
  • (SMC) MODULE of RC4 STREAM CIPHER ALGORITHM for Wi-Fi ENCRYPTION
    InternationalINTERNATIONAL Journal of Electronics and JOURNAL Communication OF Engineering ELECTRONICS & Technology (IJECET),AND ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) IJECET ISSN 0976 – 6472(Online) Volume 6, Issue 1, January (2015), pp. 79-85 © IAEME: http://www.iaeme.com/IJECET.asp © I A E M E Journal Impact Factor (2015): 7.9817 (Calculated by GISI) www.jifactor.com VHDL MODELING OF THE SRAM MODULE AND STATE MACHINE CONTROLLER (SMC) MODULE OF RC4 STREAM CIPHER ALGORITHM FOR Wi-Fi ENCRYPTION Dr.A.M. Bhavikatti 1 Mallikarjun.Mugali 2 1,2Dept of CSE, BKIT, Bhalki, Karnataka State, India ABSTRACT In this paper, VHDL modeling of the SRAM module and State Machine Controller (SMC) module of RC4 stream cipher algorithm for Wi-Fi encryption is proposed. Various individual modules of Wi-Fi security have been designed, verified functionally using VHDL-simulator. In cryptography RC4 is the most widely used software stream cipher and is used in popular protocols such as Transport Layer Security (TLS) (to protect Internet traffic) and WEP (to secure wireless networks). While remarkable for its simplicity and speed in software, RC4 has weaknesses that argue against its use in new systems. It is especially vulnerable when the beginning of the output key stream is not discarded, or when nonrandom or related keys are used; some ways of using RC4 can lead to very insecure cryptosystems such as WEP . Many stream ciphers are based on linear feedback shift registers (LFSRs), which, while efficient in hardware, are less so in software.
    [Show full text]
  • Most Popular ■ CORN STALK RUNNER at Flock Together This 2017 TROY TURKEY TROT
    COVERING FREE! UPSTATE NY NOVEMBER SINCE 2000 2018 Flock Together this Thanksgiving ■ 5K START AT 2013 TROY TURKEY TROT. JOIN THE CONTENTS 1 Running & Walking Most Popular ■ CORN STALK RUNNER AT Flock Together this 2017 TROY TURKEY TROT. Thanksgiving! 3 Alpine Skiing & Boarding Strutting Day! Ready for Ski Season! By Laura Clark 5 News Briefs 5 From the Publishers hat I enjoy most about Thanksgiving is that it is a teams are encouraged and die-hards relaxed, all-American holiday. And what is more are invited to try for the individual 50K option. 6-9 CALENDAR OF EVENTS WAmerican than our plucky, ungainly turkey? Granted, Proceeds benefit the Regional Food Bank of Northeastern New although Ben Franklin lost his bid to elevate our native species to November to January York, enabling them to ensure a bountiful Thanksgiving for every- national symbol status, the turkey gets the last cackle. For when one. (fleetfeetalbany.com) Things to Do was the last time you celebrated eagle day? On Thanksgiving Day, Thursday, November 22, get ready for 11 Hiking, Snowshoeing In a wishbone world, Thanksgiving gives the least offense. the most popular running day of the whole year. Sample one of Sure, it is a worry for turkeys but a trade-off if you consider all the these six races in our area. & Camping free publicity. While slightly distasteful for vegetarians, there are While most trots cater to the 5K crowd, perfect for strollers, West Stony Creek: Well-Suited all those yummy sides and desserts to consider. Best of all is the aspiring turklings and elders, the premiere 71st annual Troy emphasis on family members, from toms to hens to the littlest Turkey Trot is the only area race where it is still possible to double for Late Fall/Early Winter turklings (think ducklings).
    [Show full text]
  • The Moral Character of Cryptographic Work⋆
    The Moral Character of Cryptographic Work? Phillip Rogaway Department of Computer Science University of California, Davis, USA [email protected] December 2015 (minor revisions March 2016) Abstract. Cryptography rearranges power: it configures who can do what, from what. This makes cryptography an inherently political tool, and it confers on the field an intrinsically moral dimension. The Snowden revelations motivate a reassessment of the political and moral positioning of cryptography. They lead one to ask if our inability to effectively address mass surveillance constitutes a failure of our field. I believe that it does. I call for a community-wide effort to develop more effective means to resist mass surveillance. I plead for a reinvention of our disciplinary culture to attend not only to puzzles and math, but, also, to the societal implications of our work. Keywords: cryptography · ethics · mass surveillance · privacy · Snowden · social responsibility Preamble. Most academic cryptographers seem to think that our field is a fun, deep, and politically neutral game|a set of puzzles involving communicating parties and notional adversaries. This vision of who we are animates a field whose work is intellectually impressive and rapidly produced, but also quite inbred and divorced from real-world concerns. Is this what cryptography should be like? Is it how we should expend the bulk of our intellectual capital? For me, these questions came to a head with the Snowden disclosures of 2013. If cryptography's most basic aim is to enable secure communications, how could it not be a colossal failure of our field when ordinary people lack even a modicum of communication privacy when interacting electronically? Yet I soon realized that most cryptographers didn't see it this way.
    [Show full text]
  • An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext
    An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext By Isaac Quinn DuPont A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by Isaac Quinn DuPont 2017 ii An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext Isaac Quinn DuPont Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract Tis dissertation is an archeological study of cryptography. It questions the validity of thinking about cryptography in familiar, instrumentalist terms, and instead reveals the ways that cryptography can been understood as writing, media, and computation. In this dissertation, I ofer a critique of the prevailing views of cryptography by tracing a number of long overlooked themes in its history, including the development of artifcial languages, machine translation, media, code, notation, silence, and order. Using an archeological method, I detail historical conditions of possibility and the technical a priori of cryptography. Te conditions of possibility are explored in three parts, where I rhetorically rewrite the conventional terms of art, namely, plaintext, encryption, and ciphertext. I argue that plaintext has historically been understood as kind of inscription or form of writing, and has been associated with the development of artifcial languages, and used to analyze and investigate the natural world. I argue that the technical a priori of plaintext, encryption, and ciphertext is constitutive of the syntactic iii and semantic properties detailed in Nelson Goodman’s theory of notation, as described in his Languages of Art. I argue that encryption (and its reverse, decryption) are deterministic modes of transcription, which have historically been thought of as the medium between plaintext and ciphertext.
    [Show full text]
  • Solutions Manual
    SOLUTIONS MANUAL CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE FOURTH EDITION WILLIAM STALLINGS Copyright 2006: William Stallings -2- © 2006 by William Stallings All rights reserved. No part of this document may be reproduced, in any form or by any means, or posted on the Internet, without permission in writing from the author. -3- NOTICE This manual contains solutions to all of the review questions and homework problems in Cryptography and Network Security, Fourth Edition. If you spot an error in a solution or in the wording of a problem, I would greatly appreciate it if you would forward the information via email to [email protected]. An errata sheet for this manual, if needed, is available at ftp://shell.shore.net/members/w/s/ws/S. W.S. -4- TABLE OF CONTENTS Chapter 1: Introduction..............................................................................................5 Chapter 2: Classical Encryption Techniques ............................................................7 Chapter 3: Block Ciphers and the Date Encryption Standard .............................. 13 Chapter 4: Finite Fields ............................................................................................ 21 Chapter 5: Advanced Encryption Standard ........................................................... 28 Chapter 6: More on Symmetric Ciphers ................................................................. 33 Chapter 7: Confidentiality Using Symmetric Encryption..................................... 38 Chapter 8: Introduction to Number Theory..........................................................
    [Show full text]
  • Bias in the LEVIATHAN Stream Cipher
    Bias in the LEVIATHAN Stream Cipher Paul Crowley1? and Stefan Lucks2?? 1 cryptolabs Amsterdam [email protected] 2 University of Mannheim [email protected] Abstract. We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 236 bytes of output and pro- portional effort; both arise from compression within the cipher. The first models the cipher as two random functions in sequence, and shows that the probability of a collision in 64-bit output blocks is doubled as a re- sult; the second shows artifacts where the same inputs are presented to the key-dependent S-boxes in the final stage of the cipher for two suc- cessive outputs. Both distinguishers are demonstrated with experiments on a reduced variant of the cipher. 1 Introduction LEVIATHAN [5] is a stream cipher proposed by David McGrew and Scott Fluhrer for the NESSIE project [6]. Like most stream ciphers, it maps a key onto a pseudorandom keystream that can be XORed with the plaintext to generate the ciphertext. But it is unusual in that the keystream need not be generated in strict order from byte 0 onwards; arbitrary ranges of the keystream may be generated efficiently without the cost of generating and discarding all prior val- ues. In other words, the keystream is “seekable”. This property allows data from any part of a large encrypted file to be retrieved efficiently, without decrypting the whole file prior to the desired point; it is also useful for applications such as IPsec [2]. Other stream ciphers with this property include block ciphers in CTR mode [3].
    [Show full text]
  • RC4-2S: RC4 Stream Cipher with Two State Tables
    RC4-2S: RC4 Stream Cipher with Two State Tables Maytham M. Hammood, Kenji Yoshigoe and Ali M. Sagheer Abstract One of the most important symmetric cryptographic algorithms is Rivest Cipher 4 (RC4) stream cipher which can be applied to many security applications in real time security. However, RC4 cipher shows some weaknesses including a correlation problem between the public known outputs of the internal state. We propose RC4 stream cipher with two state tables (RC4-2S) as an enhancement to RC4. RC4-2S stream cipher system solves the correlation problem between the public known outputs of the internal state using permutation between state 1 (S1) and state 2 (S2). Furthermore, key generation time of the RC4-2S is faster than that of the original RC4 due to less number of operations per a key generation required by the former. The experimental results confirm that the output streams generated by the RC4-2S are more random than that generated by RC4 while requiring less time than RC4. Moreover, RC4-2S’s high resistivity protects against many attacks vulnerable to RC4 and solves several weaknesses of RC4 such as distinguishing attack. Keywords Stream cipher Á RC4 Á Pseudo-random number generator This work is based in part, upon research supported by the National Science Foundation (under Grant Nos. CNS-0855248 and EPS-0918970). Any opinions, findings and conclusions or recommendations expressed in this material are those of the author (s) and do not necessarily reflect the views of the funding agencies or those of the employers. M. M. Hammood Applied Science, University of Arkansas at Little Rock, Little Rock, USA e-mail: [email protected] K.
    [Show full text]
  • CYCLOPEDIA of BIBLICAL, THEOLOGICAL and ECCLESIASTICAL LITERATURE G- Goch, John of by James Strong & John Mcclintock
    THE AGES DIGITAL LIBRARY REFERENCE CYCLOPEDIA of BIBLICAL, THEOLOGICAL and ECCLESIASTICAL LITERATURE G- Goch, John of by James Strong & John McClintock To the Students of the Words, Works and Ways of God: Welcome to the AGES Digital Library. We trust your experience with this and other volumes in the Library fulfills our motto and vision which is our commitment to you: MAKING THE WORDS OF THE WISE AVAILABLE TO ALL — INEXPENSIVELY. AGES Software Rio, WI USA Version 1.0 © 2000 2 G Gaab Johann Friedrich, a German theologian, was born at Gdppingeme, in Wartemberg, October 10, 1761. In 1792 he became professor extraordinarius, in 1798 professor ordinarius of philosophy at Tubingen; in 1814, librarian of the university; in 1822, general superiatendent, in which office he remained till his death, March 2, 1832. He was a voluminous writer, chiefly in Biblical literature. Among his works are Observationes ad historiam Judaicam (Tub. 1787, 8vo): — Beitrage z. Erklarung des 1, 2, 3 buchen Mosis (Tub. 1776, 8vo): — Das Buch Hiob (Trib. 1809, 8vo): —Erklarung schwerer Stellen Jeremias (Tub. 1824, 8vo): — Handbuch sum philolog. Verstehen der Apocryph. Schriften des A .T. (1818-19, 5 parts): — Dogmengeschichte der alt. Griech. Kirche (Jena, 1790, 8vo): — Programma de Judaeo Immortali (Tub; 1815). — Migne, Biog. Chretienne, s.v. Ga'al (Heb. id. l[iGi, loathing; Sept. Gaa>l, Josephus Gaa>lhv), son of Ebed (<070926>Judges 9:26 sq.). He went to Shechem with his brothers when the inhabitants became discontented with Abimelech, and so engaged their confidence that they placed him at their head. He does not seem to have been a native of Shechem nor specially interested in the revolution, but rather one of a class of condottieri, who at such a period of anarchy would be willing to sell their services to the highest bidder (compare Josephus, Ant.
    [Show full text]
  • Population Density Is Held Brake on Growth Easter
    ESTABLISHED 1924 OFFICIAL NEWSPAPER JOF-THE TO WNSHIP AND SCHOOL DISTRICT OF HILLSIDE VOL. XLI, NO.-25 ■ THE HILLSIDE, TIMES, THURSDAY APRIL, 15, 1965 PRICE TEN CENTS PHONE 923-•9207 Progress In Cancer Fight Green Acres Aid For School Held Feasible - A special Greih-Acres Coni- Township. In- this respect, •mittee was formulated lastweek if certain arrangements as to By the Hillside Avenue School, the future' use of- th& Maplff’ '' w ............~ PTA, comprised of the follow- AVe, tract Were to be made"' tags - Mrs, Erwin Sehuman. whereby the Board of Eduoa. ■ principal; Dr, Wayne T, Bran- of the area for certain times om, Superintendent of Schools; of the day durlng- the year, Dr. HewyJ.Konzeiman, Chair-, This could' fall wlthtanto scope man , of the Home Owners Asso- of the Green Acres program.. clatldn; Mrs, Donald Glllmore, "Similar grants a re' being Mrs. Seymoqr'PollaA ansLMrs. arranged for nearby towns for. Richard Lacey. V property near a, school—and— A meeting Is s^meduled - successful arrangements are for Thursday April la at 8 P.M. being made for school use. at t o "Municipal Building when '"Currently,- -there - is' a ' tax-"-' t o eommittee will meet with :TeHef=hfli=pendtng=rhefsrezihjfc: M ayor Robe rt Di a mond, Mr. A1 - - -Assembly, recently passed by_ vin E. Gershen. Master t o Senate, grar.tlik municipal Planners representative, "and- ' tax rellef“ for -lands-taken by - Mr. Howard J. Wolf, Green the Green Acree program. The Acres Administrator, Depart- bill IS an- amendment to t o .nirmred are' workers forthe 1965 Hillside Cancer1 Crusade watching.Mflvnr Rnher-r Diamond sign ment of Goheegyattoh and '•Green Acres Act and It would a resolution marking the month of April Cancer.Month in hillside.
    [Show full text]
  • MS-603: Rabbi Marc H. Tanenbaum Collection, 1945-1992
    MS-603: Rabbi Marc H. Tanenbaum Collection, 1945-1992. Series C: lnterreligious Activities. 1952-1992 Box 19, Folder 4, Evangelism - Jewish reaction, 1972-1973. 3101 Clifton Ave, Cincinnati, Ohio 45220 (513) 221-1875 phone, (513) 221-7812 fax americanjewisharchives.org t . Saturday, Dec. 16, 1972 Philadelphia lnqi Jrer S I ' I Peril of Chri.stian Evangelism Cited by Jews Rabbi Says Conversions Can Destroy Existence of His People Christians seem to be get­ have the human effect or fate or America rests with the ting very possessive about destroying the existence of the success or failure of the cam­ Canada and the U. S. A. in Jewish people." paign. their Key 73 sloganeering The Nazis' massacre of the ANDREW WALLA CE . "Nothing in the Bible as· "Calling Our Continent to Jews and forced assimilation sures the U. S. of leadership Christ." of Jews in Russia have de­ On Religion in world affairs," he said. " A :'The part of the "continent" · strbyed two-thirds of the Jew­ nation unsure of who God is tii;ide up of those who would ish people, he said. soon gives itself over to raise ~~ther be called to Temple Jn view of that, "the whole gods and pays the penalty for are already more than a little Key 73, said "\ve have a question of efforts to convert that ambiguity." anxious about the implications commission to preach love to the Jewish ·people out of reli­ every creature. Our re­ cif· the massive evangelistic BOTH HE and Dr. Raedeke gious existence becomes (hrust of Christendom behind a sponsibility is to evangelize, said they felt the Jewish sen­ morally \mconscionable posi­ Ip bring the message to all .
    [Show full text]