Cerdo (mythology)

In Greek mythology, Cerdo (Ancient Greek: Κερδοῦς means "gain, profit" or "the wily one" or "weasel, vixen"[1]) was the nymph-wife of King Phoroneus of Argos and mother of Apis and Niobe.[2] Otherwise, the consort of Phoroneus was called either Cinna,[3] or Teledice (or Laodice) also a nymph,[4][5] or Perimede,[6] or Peitho and Europe.[7]

According to Graves, Cerdo (‘gain or ‘art’) is one of Demeter's titles; it was applied to her as weasel, or vixen, for both are considered prophetic animals.[8]

Notes

  1. Graves, Robert (1960). The Greek Myths. Harmondsworth, London, England: Penguin Books. pp. s.v. The Birth of Heracles. ISBN 978-0143106715.
  2. Pausanias, Graeciae Descriptio 2.21.1. Having descended thence, and having turned again to the market-place, we come to the tomb of Cerdo, the wife of Phoroneus, and to a temple of Asclepius.
  3. Hyginus, Fabulae, 145
  4. Pseudo-Apollodorus, Bibliotheca 2.1.1
  5. Tzetzes on Lycophron 177
  6. Scholia on Pindar, Olympian Ode 3.28
  7. Scholia on Euripides, Orestes 932
  8. Graves, Robert (1960). The Greek Myths. Harmondsworth, London, England: Penguin Books. pp. s.v. Phoroneus. ISBN 978-0143106715.
gollark: General-purpose user-reprogrammable computing is slowly dying out and it isn't possible to do very much about it.
gollark: Inb4 your eyes automatically filter out any content someone deems objectionable and you can't change it because something something "trusted computing".
gollark: Important internet infrastructure was designed and put into production last millennium when people assumed private networks and just ignored security concerns, and we still run it, sometimes with patches for the bigger problems which aren't actually anywhere near universally deployed.
gollark: Oh, and it's all a giant maze of interlocking abstraction layers which manage to somehow erase decades of Moore's law because someone wanted to ship an entire browser for their desktop app or something, and which nobody actually understands.
gollark: Even the lowest level hardware stuff is vulnerable to weird exotic side channels, there's unauditable proprietary code running lots of stuff, and even outside of that people just cannot seem to write consistently secure code.

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.