Although it is popularly touted, particularly amongst the punt tour guides, that Trinity Hall was founded primarily to train new priests to replace those who died during the Black Death, but in reality, Bishop Bateman had most likely been planning his foundation before the outbreak of 1349.
The College’s Book of Remembrance in the Chapel contains the names of Trinity Hall members who have died serving their country, including 134 names of members who died during the First World War. Here are some of their stories.
A day in my life at Trinity Hall consists of the usual: reading, prepping my lecture notes and hanging out with friends but there is also a large part of my day that is dedicated to access work, either through mentoring or thinking of initiatives to demolish glass ceilings.
The diminutive Pekingese dog was first reported to have arrived on English shores after the Second Opium War in 1862. Queen Victoria herself was even given one such dog, named Looty, in 1865, giving rise to a surge in popularity for the breed among upper-class English women.
In the 2019 Milestone Lecture, Dr Rachel Clement Tolley argues that we must reject a purely biological definition of the ‘body’ so that the criminal law appropriately recognises, respects and protects all bodies, including those of people with disabilities.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.