Friday, September 6, 2013

Archaeological proof proposes King Solomon's excavation subsists

Archaeologists performing excavations in the south of Israel say they've exposed copper mines old-fashioned to the days of King Solomon.
Copper mines formerly thinking to have been built by early Egyptians in the 13th century B.C. really instigated three centuries later through the control of the legendary King Solomon, they said.
Intellectual study and investigation of materials found in the area -- the Timna Valley in Israel's Aravah Desert -- advocate the mines were operated by the Edomites, a semi-nomadic ethnic amalgamation mentioned in the Bible as warring regularly with Israel, a liberate from the American Friends of Tel Aviv University reported Tuesday.
"The mines are definitely from the period of King Solomon," Tel Aviv archaeology Professor Erez Ben-Yosef said. "They may help us understand the local society, which would have been invisible to us otherwise."
Excavation revealed a massive smelting camp containing the remnants of hundreds of furnaces and layers of copper slag, the waste created during the smelting process.
Cooperation among thousands of people would have been required to operate the mines in the middle of the desert, the researchers said.
"In Timna Valley, we unearthed a society with undoubtedly significant development, organization, and power," Ben-Yosef said. "And yet because the people were living in tents, they would have been transparent to us as archaeologists if they had been engaged in an industry other than mining and smelting, which is very visible archaeologically."

For more interesting topics related to archaeology, visit archaeology excavations.


5 comments:

  1. What kind of equipment would they need for an excavation. I imagine that they would need to move a lot of dirt in the beginning. I would love to visit an excavation site someday. http://www.maudsleyexcavations.com.au/about-us

    ReplyDelete
  2. Man oh Man…
    Thank you so much Admin, I came to this post and knowing about value of this post because your explaining way is awesome and you have shared everything. I appreciate your work and like it very much. Doing great work and keep it continue dear. Post new things related to 2019 updates. B2B Marketing Online Marketplace in India Website Designing Company India Top Web Development Company download mp3 song download mp3 song online mp3 song download mp3 song

    ReplyDelete
  3. Do not use all of these Private Money Lender here.They are located in Nigeria, Ghana Turkey, France and Israel.My name is Mrs.Emily Michael, I am from Canada. Have you been looking for a loan?Do you need an urgent personal or business loan?contact Fast Legitimate Loan Approval he help me with a loan of $95,000 some days ago after been scammed of $12,000 from a woman claiming to be a loan lender from Nigeria but i thank God today that i got my loan worth $95,000.Feel free to contact the company for a genuine financial contact Email:(creditloan11@gmail.com)

    ReplyDelete
  4. Awesome post, and incredible site. A debt of gratitude is in order for the data. Explore photo and video images on Instagram, latest posts and popular posts about Pikdo.

    ReplyDelete
  5. ��ARE YOU ABSOLUTELY IN NEED OF THE SERVICES OF A PROFESSIONAL HACKER?(CATCHING A CHEATING SPOUSE[Phone Hack], RECOVERY OF LOST FUNDS, CREDIT SCORE UPGRADE, WEBSITE HACK...)
    High prolific information and Priviledges comes rare as i would be sharing with you magnificent insight you wish you heard years before now. As it's been understood that what people don't see, they will never know.
    When you wonder “which hacking company should I hire, the first aspect that should concern you is quality. Clearly, you want to embark for services that povides swift response, Thanks to our talented and Astonish Hackers , you are rest assured that your expectations will always be met. You’ll be glad to find out that our services Implies precisions and actions.
    This post is definitely for those who are willing to turn their lives around for the better, either financial-wise, relationship-wise or businesses.
    Welcome to the Global KOS hacking agency where every request on hacking related issues are met within a short period of time.
    If your shoe fits in any of the required services below, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web V-link protocol.
    The manual Operation of this hackers is to potentially deploy a distinguished hacking techniques to penetrating computers and various type of database system to meet your request.
    Penetration of computing systems are achieved using core software tools like Ransomeware, SQL/Keylogger injection. botnet, trojan and DDOS attacks.
    Providing value added services to clients as a hacker has been our sustaining goal.
    Are you faced with cyber challenges like
    ��Recovery of lost funds:✅It saddens our mind when client expresses annoyance or dissatisfaction of unethical behaviours of scammers. We have striven to make tenacious efforts to help those who are victims of this flees get off their traumatic feeling of loss. The cyber security technique used to retrieving back the victims stolen funds is the application of a diverse intercall XX breacher software enables you track the data location of a scammer. Extracting every informations on the con database, every requested information required by the Global KOS would be used to tracking every transaction, time and location of the scammer using this systematic courier tracking base method.
    �� Hacking into the mobile phone of a cheating spouse.✅ This type of hack helps you track every movement of your cheater as we are bent on helping you gain full remote access into the cheater's mobile phone using a Trojan breach cracking system to penetrate their social media platforms like Facebook, whatsapp, snapchat etc. This spy processing is used via an HDSI folder which synchronizes the target mobile operating system into a clone S-Drive unit.
    ��Credit Score Upgrade:✅Due to our transformed changes on Equifax tracking , upgrading of credit score are backed by our cyber tech breaching licence, This hacking process drastically generates you an undestructive higher credit score which correlates to a higher level of creditworthiness. The time frame for upgrading a credit score requires eighteen(18) hours
    ��️ BITCOIN GENERATOR:✅ (Higher job profile). This involves using the ANTPOOL Sysytem drifting a specialized hardware and software implementing tool in slot even-algorithms to incentivize more coins into your wallet which in turn generates more coins exponentially like a dream at specified intervals.
    The company is large enough to provide comprehensive range of services such as.
    • Email hacks��
    • Hacking of websites.��
    • Uber free payment hacks.��
    • website hack.��
    Our strength is based on the ability to help you fix cyber problems by bringing together active cyber hacking professionals in the GlobalkOS to work with.
    Contact:
    ✉️Email: clarksoncoleman(at)gmail • com.
    Theglobalkos(at)gmail •com.
    ©Global KOS™
    2030.•√

    ReplyDelete