February 9, 2025

John Howland & Elizabeth Tilley


The Mayflower Pilgrims - John Howland & Elizabeth Tilley - Part One

Elizabeth Tilley

BAPTISM: 30 August 1607 at Henlow, co. Bedford, England, daughter of John and Joan (Hurst) (Rogers) Tilley.
MARRIAGE: John Howland, about 1625, at Plymouth.
CHILDREN: Desire, John, Hope, Elizabeth, Lydia, Hannah, Joseph, Jabez, Ruth, and Isaac.
DEATH: 21 December 1687 at Swansea.
mtDNA HAPLOGROUP:  H1a1

Elizabeth Tilley came on the Mayflower, at the age of about thirteen, with her parents John and Joan (Hurst) Tilley.  Her parents, and her aunt and uncle Edward and Agnes Tilley, all died the first winter, leaving her orphaned in the New World.  She soon married, about 1624 or 1625, to fellow Mayflower passenger John Howland, who had come as a manservant, or apprentice, to Governor John Carver who died in April 1621.

John Howland

When the Mayflower sailed for Plymouth on Sept. 6, 1620, there were 102 passengers aboard. John Howland (https://bit.ly/3HnZDLQ),
during a severe storm, was washed overboard, but by seizing the topsail halyards was rescued from drowning and was given commendation
later by William Bradford for being an outstanding member of the group.
Arriving in Plymouth, he built his house between that of Stephen Hopkins and the residence of Samuel Fuller, who died in 1633.

In addition to being a deacon of the church, Samuel Fuller was an outstanding surgeon of the period. He was known as a great help and
comfort to the Pilgrims for his ability as a doctor.

Howland's house was built on First Street, also known as Great Street and Broad Street, and changed to Leyden Street in 1823.

It is believed that John Howland witnessed the first execution in the Plymouth Colony. In 1630, after a bitter quarrel, John Billington, known
as one of the "profanest families amongst them" who "shuffled" into the Pilgrim company in some peculiar way, according to Bradford, blew
John Newcomen to pieces. Howland and others decided that Billington was guilty of "willful murder." Billington was sentenced and duly
hanged, drawn and quartered.

John Howland's gravestone, erected by the Hon. John Howland, president of the Rhode Island Historical Society, and a fifth generation
descendant, reads:

Here ended the Pilgrimage of JOHN HOWLAND and ELIZABETH his wife. She was the dau'tr of Gov. Carver. They arrived in the Mayflower
Dec. 1620; they had 4 Sons & 6 dau'trs from whom are descended a numerous posterity. "1672 Feb'y 23d JOHN HOWLAND of Plymouth
deceased, he lived to the age of 80 yr's. He was the last man that was left of those that came over in the Ship called the Mayflower that lived
in Plymouth." (Plymouth Records)

It is recorded above that Mr. Howland married a daughter of Governor Carver, but Bradford, in his History, states that John Howland
married Elizabeth, the daughter of John Tillie.
Mr. Howland was a distinguished man, and devoted to the interests of the colony, both in relation to its civil and religious institutions. He was
deputy and assistant for several years. His early residence was on Summer Street, but afterwards he moved to Rocky Nook, where he died.

John and Elizabeth Howland raised a large family with ten children, all of whom lived to adulthood and married.  As a result, they likely have more descendants living today than any other Mayflower passengers.  Some of their descendants include Franklin D. Roosevelt; both President Bush's; actors Alec and Stephen Baldwin, Humphrey Bogart, Christopher Lloyd; Mormon church founder Joseph Smith; poet Ralph Waldo Emerson; and Doctor Benjamin Spock.

Joan HURST Tilley (Elizabeth Tilley's Mother) is the 7th great granddaughter of King Edward III, 15th great granddaughter of William the Conqueror, the 30th great granddaughter of Emperor Charlemagne and the 54th great granddaughter of King Herod the Great.

June 11, 2024

What's the difference between IPv4 and IPv6?

The Difference Between IPv4 & IPv6


IPv4 (Internet Protocol version 4) and IPv6 (Internet Protocol version 6)
are both protocols used for addressing and routing data on the Internet. 

Here are the key differences between them: 

 1. Address Space 

  • IPv4: Uses 32-bit addresses, allowing for approximately 4.3 billion unique addresses. The format is written as four decimal numbers separated by dots (e.g., 192.168.0.1). 
  • IPv6: Uses 128-bit addresses, allowing for approximately 340 undecillion (3.4×10^38) unique addresses. The format is written as eight groups of four hexadecimal digits separated by colons (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334). 

2. Address Notation 

  • IPv4: Dotted-decimal format (e.g., 192.168.1.1). 
  • IPv6: Hexadecimal format with colons (e.g., 2001:0db8:85a3::8a2e:0370:7334). 

3. Header Complexity 

  • IPv4: The header is 20-60 bytes long, and it contains 12 fields. 
  • IPv6: The header is fixed at 40 bytes and contains 8 fields, making it simpler and more efficient for processing. 

4. Configuration 

  • IPv4: Supports both manual and DHCP (Dynamic Host Configuration Protocol) configuration. 
  • IPv6: Supports auto-configuration using Stateless Address Autoconfiguration (SLAAC) and DHCPv6. 

5. Fragmentation 

  • IPv4: Routers and the sending host can fragment packets. 
  • IPv6: Only the sending host can fragment packets; routers do not perform fragmentation. 

6. Security 

  • IPv4: Security is optional and relies on additional protocols like IPSec (Internet Protocol Security). 
  • IPv6: IPSec support is mandatory, providing more robust security features natively. 

7. Broadcast vs. Multicast 

  • IPv4: Uses broadcast addresses to send data to all devices on a subnet. 
  • IPv6: Eliminates broadcast; uses multicast and anycast addresses for more efficient routing. 

8. Address Lifespan 

  • IPv4: Often static or long-lived addresses. 
  • IPv6: Supports temporary addresses to enhance privacy. 

9. Transition Mechanisms 

  • IPv4: The predominant protocol for the internet since its inception, but facing exhaustion of address space. 
  • IPv6: Developed to replace IPv4, various transition mechanisms exist such as dual-stack (running IPv4 and IPv6 simultaneously), tunneling (encapsulating IPv6 packets within IPv4), and translation (converting between IPv4 and IPv6). 

10. Adoption 

  • IPv4: Widely used and still dominant, but limited by address exhaustion. 
  • IPv6: Adoption is growing, driven by the need for more addresses and improved features, though full transition is ongoing and gradual. 

Summary 

IPv4: 

  • Limited address space, 
  • more complex headers, 
  • relies on additional security protocols, 
  • uses broadcasts, 
  • and has simpler configuration mechanisms. 

IPv6: 

  • Vast address space, 
  • simpler headers, 
  • built-in security, 
  • uses multicast/anycast, 
  • and supports advanced auto-configuration. 

Both protocols are designed to handle the core task of delivering packets from a source to a destination, but IPv6 addresses many limitations inherent in IPv4, especially the limited address space and the need for improved efficiency and security.

More [Category] Posts

Aimee Mann "Voices Carry" 6-30-17 at North Church (Portsmouth, NH)

July 5, 2023

Top Four Free WordPress Plugins To Automatically Minify JavaScript Files

Top 4 WordPress Minify Plugins

There are several popular and highly regarded free WordPress plugins available for automatically minifying JavaScript files. Here are a few of the best options:

Autoptimize: Autoptimize is a widely used plugin that can optimize your website's performance by minifying and concatenating JavaScript, CSS, and HTML files. It also offers options for optimizing images and enabling lazy loading. It has an intuitive interface and provides various customization settings to fine-tune the minification process.

June 30, 2023

Python Basics That Will Get You Up and Running

What is Python?

Python Syntax and Basics: Understand the basics of how Python code is structured. This includes learning about different data types (strings, integers, floats, booleans), variables, whitespace significance, and Python's use of indentation for block structuring.

May 27, 2023

Can Blockchain Save "Our Democracy" by Combating Election Fraud?

Blockchain-Based Voting Systems Can Save Democracy by Combating Election Fraud

In this article, we will explore how blockchain technology can be used in voting systems to combat fraud and manipulation. We will also look at some of the challenges associated with designing a secure voting system using blockchain technology. Finally, we will discuss how these technologies can be used to ensure fair and accurate election results around the world.

What is Blockchain Technology and How Can it Help Secure Voting Systems?

Blockchain technology is a revolutionary technology that has the potential to revolutionize many industries, including the voting system. It is a distributed ledger system that allows for secure and transparent transactions without the need for a third-party intermediary. By using blockchain, it is possible to create an immutable record of all votes cast, which can then be used to ensure accurate election results. Furthermore, blockchain technology can also help protect against fraud and manipulation by making it virtually impossible to alter or delete vote records. In this way, blockchain technology can be used to make voting systems more secure and reliable than ever before.

What Does “Begging the question” Mean? - A Conversation With ChatGTP

What Does “Begging the question” Mean?

A Fireside Chat With ChatGTP

"Begging the question" is a term that originated from logic and philosophy, particularly from the field of rhetoric. The phrase is a translation of the Latin term "petitio principii," which roughly translates to "assuming the initial point."

In its traditional usage, "begging the question" refers to a type of logical fallacy where the conclusion of an argument is assumed in one of the premises. It's a form of circular reasoning because the proof of the argument is already accepted as fact within the argument itself.

For example, consider the argument, "God must exist because the Bible says so, and the Bible is the word of God." This argument begs the question because it assumes the existence of God (which is the conclusion it aims to prove) in one of its premises, i.e., that the Bible is the word of God.

In recent times, however, the phrase "begging the question" has been commonly (and mistakenly) used as a synonym for "raising the question." For instance, someone might say, "Given the increasing frequency of wildfires, it begs the question: Are we doing enough to combat climate change?" This usage is considered incorrect by purists, although it has become widespread in casual conversation and even in journalistic writing.

To put it in clear terms

Correct usage: "His argument that I should trust him because he's very trustworthy begs the question."

Incorrect (but common) usage: "The growing income disparity begs the question: is capitalism working for everyone?"

While the second usage is prevalent, it's worth noting that it doesn't align with the original philosophical meaning of the term.

More Conversations with ChatGPT

Top Featured Post

John Howland & Elizabeth Tilley

The Mayflower Pilgrims - John Howland & Elizabeth Tilley - Part One Elizabeth Tilley BAPTISM: 30 August 1607 at Henlow, co. Bedford, En...

Most Popular Posts