Eugen Beyer

Eugen Beyer (* 18 February 1882 in Pohrlitz (Moravia), † 25 July 1940 in Salzburg) was an Austrian Feldmarschalleutnant in the 1930s and Wehrmacht General of the Infantry during the early years of the Second World War.

From 1935 to 1938, Beyer was commander of the Bundesheer's 6th Division (stationed in Innsbruck). After the Anschluss he was incorporated into the Wehrmacht where he was given command of XVIII Corps, a post he held until shortly before his death. He was the most senior Austrian officer to transfer to the German Army.

Promotions

18 August 1902Kadett
1 November 1903Leutnant
1 November 1909Oberleutnant
1 May 1913Hauptmann
1 November 1917Major
8 July 1921Oberstleutnant
1 June 1924Oberst (Title)
24 February 1926Oberst (Rank)
30 September 1931Generalmajor
22 December 1936Feldmarschalleutnant
1 April 1938General der Infanterie

Decorations & awards

  • Iron Cross (1914), 2nd class
  • Military Jubilee Cross 1848-1908
  • Military Merit Cross, 3rd class with war decoration and swords (Austria-Hungary)
  • Order of the Iron Crown, 3rd class with war decoration and swords (Austria)
  • Silver Military Merit Medal ("Signum Laudis") with swords (Austria-Hungary)
  • Bronze Military Merit Medal ("Signum Laudis") with swords (Austria-Hungary)
  • Austrian War Commemorative Medal with Swords
  • Honour Cross of the World War 1914/1918
  • Decoration of Honour in Gold for Services to the Republic of Austria


gollark: The chance is so ridiculously tiny that it is practically zero. If you can break SHA256 etc. you will be extremely rich.
gollark: Basically all cryptominers are burning huge amounts of ASIC time to generate slightly closer to 0 hashes. A collision is basically impossible unless the hash function gets broken somehow.
gollark: I like what Nim does. You can define AST→AST macros and simple substitution ones for common cases.
gollark: You can't really ensure they terminate *and* allow IO and the language's full power.
gollark: It does also seem to be a difficult problem to have large scale meshes without trusting everyone involved or manually configuring things.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.