March 14 » Battle of Ivry: Henry of Navarre and the Huguenots defeat the forces of the Catholic League under Charles, Duke of Mayenne, during the French Wars of Religion.
May 17 » Anne of Denmark is crowned Queen of Scotland.
August 18 » John White, the governor of the Roanoke Colony, returns from a supply trip to England and finds his settlement deserted.
August 30 » Tokugawa Ieyasu enters Edo Castle. (Traditional Japanese date: August 1, 1590)
October 16 » Prince Gesualdo of Venosa murders his wife and her lover.
October 24 » John White, the governor of the second Roanoke Colony, returns to England after an unsuccessful search for the "lost" colonists.
February 29 » Abel Tasman's second Pacific voyage begins.
May 27 » Manchu regent Dorgon defeats rebel leader Li Zicheng of the Shun dynasty at the Battle of Shanhai Pass, allowing the Manchus to enter and conquer the capital city of Beijing.
May 28 » English Civil War: Bolton Massacre by Royalist troops under the command of James Stanley, 7th Earl of Derby.
July 2 » English Civil War: Battle of Marston Moor.
October 13 » A Swedish–Dutch fleet defeats the Danish fleet at Fehmarn and captures about 1,000 prisoners.
November 8 » The Shunzhi Emperor, the third emperor of the Qing dynasty, is enthroned in Beijing after the collapse of the Ming dynasty as the first Qing emperor to rule over China.
When copying data from this family tree, please include a reference to the origin: Murphy Torn, "Family tree Torn", database, Genealogy Online (https://www.genealogieonline.nl/torn-stamboom/P4050.php : accessed February 20, 2026), "Joan Carlo Smissaert (1590-1644)".
Copy warning
Genealogical publications are copyright protected. Although data is often retrieved from public archives, the searching, interpreting, collecting, selecting and sorting of the data results in a unique product. Copyright protected work may not simply be copied or republished.
Please stick to the following rules
Request permission to copy data or at least inform the author, chances are that the author gives permission, often the contact also leads to more exchange of data.
Do not use this data until you have checked it, preferably at the source (the archives).
State from whom you have copied the data and ideally also his/her original source.