A Selection of Fish
An assortment of fish: 1. sharp-nosed eel, 2. blunt-nosed eel, 3. burbot, 4. lamprey, 5. lampern, 6. chub, 7. perch, 8. roach, 9. bream, 10. rudd, 11. Prussian carp, 12. Crucian carp, 13. tench, 14. barbel, 15. carp, 16. pike, 17. ruff, 18. dace, 19. dudgeon, 20. powan, 21. sea trout, 22. vendace, 23. Loch Leven trout, 24. salmon trout, 25. gwyniad, 26. smelt, 27. minnow, 28. grayling, 29. salmon, 30. loach, 31. spined loach, 32. gillaroo trout, 33. common trout, 34. great lake trout, 35. bleak, 36. Gray's charr, 37. Welsh charr, 38. Windermere charr, 39. Alpine charr, 40. Cole's charr, 41. bullhead or Miller's thumb, 42. salmon parr, 43. three-spined stickleback, 44. ten-spined stickleback.
© Mary Evans Picture Library 2015 - https://copyrighthub.org/s0/hub1/creation/maryevans/MaryEvansPictureID/10020018
Coastguards and civilians of Leysdown, Isle of Sheppey
Commemorative postcard, Heroes All! Five brave coastguards and two civilians of Leysdown, Isle of Sheppey, Kent, who rescued 20 members of the 2nd Walworth Boy Scouts' Troop who got into difficulties when their training vessel, a 32 foot ex-naval cutter, was hit by a sudden squall and capsized. Sadly, nine Sea Scouts died. There were 23 Sea Scouts, the Scout Master and five helpers on board. The tragedy was widely reported in newspapers at the time. A Memorial was erected in 1914 in Nunhead Cemetery.
4 August 1912
© Mary Evans Picture Library 2015 - https://copyrighthub.org/s0/hub1/creation/maryevans/MaryEvansPictureID/10576968
Quantum cryptography equipment
Quantum cryptography. Eye of an observer reflected in a mirror in quantum cryptography apparatus. Quantum cryptography is based on the principle of entanglement, a property of a pair of particles in which a change to one has an instantaneous effect on the other, no matter how far apart they are. Cryptography in this case refers to the encoding of data so that only specified targets can access it. If the sender and the receiver of the data share entanglement then any data is only readable by them alone. This is more secure than existing encryption methods, most of which rely on mathematical algorithms. Photographed at the lab of Anton Zeilinger at Vienna University, Austria.
© VOLKER STEGER/SCIENCE PHOTO LIBRARY