id
stringlengths
3
8
url
stringlengths
32
207
title
stringlengths
1
114
text
stringlengths
93
492k
15718008
https://en.wikipedia.org/wiki/International%20Conference%20on%20Developments%20in%20Language%20Theory
International Conference on Developments in Language Theory
DLT, the International Conference on Developments in Language Theory is an academic conference in the field of computer science held annually under the auspices of the European Association for Theoretical Computer Science. Like most theoretical computer science conferences its contributions are strongly peer-reviewed; the articles appear in proceedings published in Springer Lecture Notes in Computer Science. Extended versions of selected papers of each year's conference appear in international journals, such as Theoretical Computer Science and International Journal of Foundations of Computer Science. Topics of the conference Typical topics include: grammars, acceptors and transducers for words, trees and graphs algebraic theories of automata algorithmic, combinatorial and algebraic properties of words and languages variable length codes symbolic dynamics cellular automata polyominoes and multidimensional patterns decidability questions image manipulation and compression efficient text algorithms relationships between formal language theory and cryptography, concurrency, complexity theory and logic bio-inspired computing and quantum computing History of the Conference The DLT conference series was established by Grzegorz Rozenberg and Arto Salomaa in 1993. Since 2010, the Steering Committee chairman is Juhani Karhumäki. 23rd DLT 2019 in Warsaw, Poland 22nd DLT 2018 in Tokyo, Japan 21st DLT 2017 in Liège, Belgium 20th DLT 2016 in Montreal, Canada 19th DLT 2015 in Liverpool, England 18th DLT 2014 in Ekaterinburg, Russia 17th DLT 2013 in Marne-la-Vallée, France 16th DLT 2012 in Taipei, Taiwan 15th DLT 2011 in Milan, Italy Special Issue: International Journal of Foundations of Computer Science 23(5), August 2012 14th DLT 2010 in London (Ontario), Canada Special Issue: International Journal of Foundations of Computer Science 22(7), November 2011 13th DLT 2009 in Stuttgart, Germany Special Issue: International Journal of Foundations of Computer Science 22(2), February 2011 12th DLT 2008 in Kyoto, Japan Special Issue: International Journal of Foundations of Computer Science 21(4), August 2010 11th DLT 2007 in Turku, Finland Special Issue: International Journal of Foundations of Computer Science 19(3), June 2008 10th DLT 2006 in Santa Barbara, CA, USA Special Issue: Theoretical Computer Science 376(1-2), May 2007 9th DLT 2005 in Palermo, Italy Special Issue: International Journal of Foundations of Computer Science 17(3), June 2006 8th DLT 2004 in Auckland, New Zealand Special Issue: International Journal of Foundations of Computer Science 16(4), August 2005 7th DLT 2003 in Szeged, Hungary Special Issue: Theoretical Computer Science, 327(3), 2004 6th DLT 2002 in Kyoto, Japan 5th DLT 2001 in Vienna, Austria 4th DLT 1999 in Aachen, Germany 3rd DLT 1997 in Thessaloniki, Greece 2nd DLT 1995 in Magdeburg, Germany 1st DLT 1993 in Turku, Finland See also List of computer science conferences contains other academic conferences in computer science Formal languages are the main subject of this conference References M. Kudlek. "Report on DLT 2004". Bulletin of the EATCS 85:207-215, February 2005. (available for download) M. Daley. "Report on DLT 2006". Bulletin of the EATCS 90:227-229, October 2006. (available for download) M. Kudlek. "Report on DLT 2008". Bulletin of the EATCS 97:171-174, February 2009. M. Kudlek. "Report on DLT 2009". Bulletin of the EATCS 100:155-159, February 2010. M. Kudlek. "Report on DLT 2010". Bulletin of the EATCS 102:227-232, October 2010. (available for download) External links DLT proceedings information from DBLP Theoretical computer science conferences Formal languages
1417355
https://en.wikipedia.org/wiki/MPQC
MPQC
MPQC (Massively Parallel Quantum Chemistry) is an ab initio computational chemistry software program. Three features distinguish it from other quantum chemistry programs such as Gaussian and GAMESS: it is open-source, has an object-oriented design, and is created from the beginning as a parallel processing program. It is available in Ubuntu and Debian. MPQC provides implementations for a number of important methods for calculating electronic structure, including Hartree–Fock, Møller–Plesset perturbation theory (including its explicitly correlated linear R12 versions), and density functional theory. See also List of quantum chemistry and solid state physics software References External links MPQC Homepage Computational chemistry software Free software programmed in C++ Free chemistry software Chemistry software for Linux
392874
https://en.wikipedia.org/wiki/Hidden%20node%20problem
Hidden node problem
In wireless networking, the hidden node problem or hidden terminal problem occurs when a node can communicate with a wireless access point (AP), but cannot directly communicate with other nodes that are communicating with that AP. This leads to difficulties in medium access control sublayer since multiple nodes can send data packets to the AP simultaneously, which creates interference at the AP resulting in no packet getting through. Although some loss of packets is normal in wireless networking, and the higher layers will resend them, if one of the nodes is transferring a lot of large packets over a long period, the other node may get very little goodput. Practical protocol solutions exist to the hidden node problem. For example, Request To Send/Clear To Send (RTS/CTS) mechanisms where nodes send short packets to request permission of the access point to send longer data packets. Because responses from the AP are seen by all the nodes, the nodes can synchronize their transmissions to not interfere. However, the mechanism introduces latency, and the overhead can often be greater than the cost, particularly for short data packets. Background Hidden nodes in a wireless network are nodes that are out of range of other nodes or a collection of nodes. Consider a physical star topology with an access point with many nodes surrounding it in a circular fashion: each node is within communication range of the AP, but the nodes cannot communicate with each other. For example, in a wireless network, it is likely that the node at the far edge of the access point's range, which is known as A, can see the access point, but it is unlikely that the same node can communicate with a node on the opposite end of the access point's range, C. These nodes are known as hidden. Another example would be where A and C are either side of an obstacle that reflects or strongly absorbs radio waves, but nevertheless they can both still see the same AP. The problem is when nodes A and C start to send packets simultaneously to the access point B. Because the nodes A and C cannot receive each other's signals, so they cannot detect the collision before or while transmitting, Carrier sense multiple access with collision detection (CSMA/CD) does not work, and collisions occur, which then corrupt the data received by the access point. To overcome the hidden node problem, request-to-send/clear-to-send (RTS/CTS) handshaking (IEEE 802.11 RTS/CTS) is implemented at the Access Point in conjunction with the Carrier sense multiple access with collision avoidance (CSMA/CA) scheme. The same problem exists in a mobile ad hoc network (MANET). IEEE 802.11 uses 802.11 RTS/CTS acknowledgment and handshake packets to partly overcome the hidden node problem. RTS/CTS is not a complete solution and may decrease throughput even further, but adaptive acknowledgements from the base station can help too. The comparison with hidden stations shows that RTS/CTS packages in each traffic class are profitable (even with short audio frames, which cause a high overhead on RTS/CTS frames). In the experimental environment following traffic classes are included: data (not time critical), data (time critical), video, audio. Examples for notations: (0|0|0|2) means 2 audio stations; (1|1|2|0) means 1 data station (not time critical), 1 data station (time critical), 2 video stations. The other methods that can be employed to solve hidden node problem are : Increase Transmitting Power From the Nodes Use omnidirectional antennas Remove obstacles Move the node Use protocol enhancement software Use antenna diversity Solutions Increasing transmitting power Increasing the transmission power of the nodes can solve the hidden node problem by allowing the cell around each node to increase in size, encompassing all of the other nodes. This configuration enables the non-hidden nodes to detect, or hear, the hidden node. If the non-hidden nodes can hear the hidden node, the hidden node is no longer hidden. Because wireless LANs use the CSMA/CA protocol, nodes will wait their turn before communicating with the access point. This solution only works if one increases the transmission power on nodes that are hidden. In the typical case of a WiFi network, increasing transmission power on the access point only will not solve the problem because typically the hidden nodes are the clients (e.g. laptops, mobile devices), not the access point itself, and the clients will still not be able to hear each other. Increasing transmission power on the access point is actually likely to make the problem worse, because it will put new clients in range of the access point and thus add new nodes to the network that are hidden from other clients. Omnidirectional antennas Since nodes using directional antennas are nearly invisible to nodes that are not positioned in the direction the antenna is aimed at, directional antennas should be used only for very small networks (e.g., dedicated point-to-point connections). Use omnidirectional antennas for widespread networks consisting of more than two nodes. Removing obstacles Increasing the power on mobile nodes may not work if, for example, the reason one node is hidden is that there is a concrete or steel wall preventing communication with other nodes. It is doubtful that one would be able to remove such an obstacle, but removal of the obstacle is another method of remedy for the hidden node problem. Moving the node Another method of solving the hidden node problem is moving the nodes so that they can all hear each other. If it is found that the hidden node problem is the result of a user moving his computer to an area that is hidden from the other wireless nodes, it may be necessary to have that user move again. The alternative to forcing users to move is extending the wireless LAN to add proper coverage to the hidden area, perhaps using additional access points. Protocol enhancement There are several software implementations of additional protocols that essentially implement a polling or token passing strategy. Then, a master (typically the access point) dynamically polls clients for data. Clients are not allowed to send data without the master's invitation. This eliminates the hidden node problem at the cost of increased latency and less maximum throughput. The Wi-Fi IEEE 802.11 RTS/CTS is one handshake protocol that is used. Clients that wish to send data send an RTS packet. The access point then sends a CTS packet when it is ready for that particular node. For short packets the overhead is quite large, so short packets do not usually use it, the minimum size is generally configurable. Cell network With cellular networks the hidden node problem has practical solutions by time domain multiplexing for each given client for a mast, and using spatially diverse transmitters, so that each node is potentially served by any of three masts to greatly minimise issues with obstacles interfering with radio propagation. See also Exposed node problem Hybrid coordination function Point coordination function Wireless LAN References External links Wireless Central Coordinated Protocol (WiCCP), a software solution of the hidden node problem Frottle, a client/server software solution Benchmarks comparing pure CSMA/CA with RTS/CTS and Polling NetEqualizer, a throttling system addressing the hidden node problem Wireless networking H de:Carrier Sense Multiple Access/Collision Avoidance#Hidden-Station-Problem
57656158
https://en.wikipedia.org/wiki/Strohmandeln
Strohmandeln
Strohmandeln, also called Strohmandel, Strohmanntarock, Strohmanntarok, Zweiertarock, Strawman Tarock or Straw Man Tarock, is an old, two-hand card game from the Austrian branch of the Tarock family. It takes its name from the three-packet talon of four cards, the Strohmänner ("strawmen"), each player has at the start of the game. While the original game has been described as jejune, it was eventually superseded by an attractive successor which is both challenging and very exciting. History The forerunner to Strohmandeln was a two-hand variant of the 78-card Tarock game recorded as early as early as 1800 in a Viennese games compendium, Neuestes Spielbuch, where it was called "Taroc en deux" in which a face-down dummy of 25 cards was dealt but never used during the game. The 54-card version first appeared in 1829, when it was described as "Tarok-Tappen between two players or the so-called Strohmandel". However, in these rules the dummy or 'straw man' was actually used; the winner of a trick picking up the top card of the straw man pile and adding it to his trick cards. This game was easy to win if the straw man yields a lot of Kings and other court cards, leaving an opponent with just tarocks or Skartindels (low-counting cards). But, according to an 1839 Austrian games compendium, because the game depends more on luck than skill, it "would probably only be chosen by people who are completely unaware of the noble game of Piquet." Fortunately by no later than 1890, this "rather jejune game was ousted by a much better and quite different one"; a genuine two-player game in which the 'straw men' comprise three packets of four cards that form the initially unseen part of a player's hand. This later variant has been described as a "very attractive" game for two which is both challenging and very exciting. The only other two-handed Tarock game is the more complex Kosakeln or Kosaken ("Cossack"), which was introduced in the 1950s, but was more based on Illustrated Tarock than Tapp Tarock. Cards The game is played with the usual Industrie und Glück card deck of 54 cards used for other Tarock games in Austria and other areas of the former Habsburg Empire (for more details, see Königrufen). This pack contains 22 tarocks as trumps and 32 cards in the four French suits. The card ranking is K Q C V 10 9 8 7 in the black suits and in the red suits. The cards are widely available online. Rules The description of the rules largely follows that of Beck. Tricks Higher-value plain cards beat lower value plain cards in their own suit, tarocks beat suit cards and lower tarocks. Players must follow suit (Farbzwang), but there is no pressure to win the trick (no Stichzwang). If the lead suit cannot be followed, a Tarock must be played (Tarockzwang). Dealing The deck is cut to decide which of the two players deals first, then dealing alternates with each hand of cards. After shuffling and cutting, the dealer deals three packets of five cards each, beginning with forehand. The players then assess their cards. After assessing her hand, forehand has the right to decide first whether to "play" (Ich nehme auf) or to "pass" (Weiter or Ich passe). If she passes, this right passes to the dealer. If he passes as well, the cards are thrown in and a new hand dealt by the player who was forehand. Alternatively, they can agree to play regardless, but at a lower game value. Once a player has elected to "play", he or she becomes the declarer. The dealer then deals three packets of four cards to each player as talons, beginning with forehand again. These form the 'strawmen' (Strohmänner). Strawmen When the game begins and the strawmen have been placed, the top card of the first (left-hand) one is flipped. Tarocks and kings are set aside, face up, for the player in question, other suit cards remain face up as the top card of the strawman. The process of uncovering and setting aside is repeated for the other strawmen, from left to right. The last card of each strawman packet, regardless of its value, is added to the player's hand without being revealed. Then the cards set aside are also added to the respective players' hands after the process of uncovering is over and the opponent has viewed these cards. The now face-up top cards of the strawmen form an extension of the player's hand and may either be discarded, played or used to take tricks at their owner's discretion. Then the next card is flipped, tarocks and kings are revealed and added to the hand of the respective player; other suit cards remain on the packet and, finally, the bottom cards are added to the player's hand without being revealed. Playing and declaring Forehand always plays to the first trick. Subsequently, the player who took the last trick leads, until all the cards are played. If a player has the Trull in his hand (Tarock I, XXI, Sküs) or the Royal Trull (Königstrull, i.e. all four kings), under some rules (e.g. Beck) he can announce this when playing the first card of the Trull or Royal Trull and earn a bonus of one game point. It is possible to use the Tarock I, the Pagat, and play it as the last card. This will (depending on whether it is tricked or not) win or lose one game point. Some rules allow other cards, such as the Tarock II, the Uhu, to score in a similar way (see "Scoring" below). Card values and scoring After the last trick is played, card points are added up using the usual Tarock scoring scheme whereby the basic card values are: 5 Points: Kings and Honours (I – Pagat, XXI – Mond, Sküs) 4 Points: Queens 3 Points: Knights or Cavaliers 2 Points: Jacks or Valets 1 Point: other tarocks and suit cards Cards are grouped in threes; the score for each group is added up and 2 points deducted, e.g. King + Knight + XIII = 9 – 2 = 7 card points. If there are fewer than three cards remaining, 2/3 points must be deducted from each card. Any resulting fractions are rounded up or down. Deciding the winner To win the game the declarer needs 36 points (out of 70). If both players have 35 points (if necessary after rounding up or down), the game is considered a draw, only announcements are recorded or paid out for such a game (there is also a variant whereby in such a case the recorded game is considered lost for the declarer). In this case the next game counts double. Scoring Scoring systems vary and three examples are given below. Beck has a relatively austere scoring system. Bamberger (2011) follows Beck except that there is no point for winning after both pass, since his rule is that they throw the cards in and deal again. Mayr and Sedlaczek opt for a more extensive scoring system. Furr follows them, but omits the Quapil and adds the bonuses for major wins and for the Rostopschin. Note that it is normal for bonuses for playing the 'birds' to their respective tricks go to the opponent if they fail to win. For example, if the Pagat is played to the last trick and lost, the winner of the trick gets the Pagat ultimo bonus. Further scoring options 1 game point: for a Mondfang, i.e. for the player who captures the Mond with the Sküs Other games with straw men Officers' Skat. This two-hand, card game of the Skat family also employs the method of playing from stacks of cards with the top one flipped. However, it uses a normal 32-card German- or French-suited card deck, and all the cards are placed on the table; there are no hand cards. Officers' Schafkopf. This is a two-hander of the Schafkopf family which is played in a very similar way to Officers Skat. French Tarot. A two-hand variant of French Tarot called La Découverte uses six straw men per player with two cards in each stack, the upper one being faced before play starts. The upcards may only be played and not taken into the hand. References Literature _ (1800). Neuestes Spielbuch. Johann Georg Edlen von Mößler, Vienna. _ (1829). Neuestes Allgemeines Spielbuch. C. Haas, Vienna. _ (1839). Neuestes Spielbuch, 2nd revised and expanded edition. C. Haas, Vienna. Bamberger, Johannes (2011), Tarock: Die schönsten Varianten. 22nd edn. Perlen-Reihe 640. Vienna: Perlen-Reihe. Beck, Fritz (1972). Tarock komplett. Alle Spiele, Perlen-Reihe No. 640, Vienna. Dummett, Michael (1980). The Game of Tarot. Duckworth, London. Furr, Jerry Neill (2009). Tarocchi: An introduction to the many games played with tarot cards. Philebus. Löw, Hans (1956). Tarock komplett, 2nd edn. Pechan; Vienna. Mayr, Wolfgang and Robert Sedlaczek (2008). Die Strategie des Tarock Spiels, Atelier, Vienna. Ulmann, S. (1890). Das Buch der Familienspiele. A. Hartleben, Vienna, Munich and Pest. External links This is how the ideal rules look, In: Wiener Zeitung dated 25 September 2007. Straw Man Tarock at tarocchino.com. Austrian card games Tarock card games Two-player card games 19th-century card games Card games introduced in the 1820s
60600466
https://en.wikipedia.org/wiki/Cybercrime%20in%20Ghana
Cybercrime in Ghana
Ghana has one of the highest rates of cybercrime in the world, ranking 7th in a 2008 Internet Crime Survey. The most popular form of cybercrime in Ghana is cyberfraud and is typically achieved via credit card fraud. However, recent decreases in universal credit card usage has seen the expansion of other cybercrimes such as blackmail and hacking. This growth in crime has warranted a government response, with policies specifically addressing the cyberspace being developed. This has necessitated various studies including a cyber security maturity study which was inaugurated by the Ministry of Communications and conducted by the Global Cyber Security Capacity Center (GCSCC) of the University of Oxford in collaboration with the World Bank. History Cybercrime in Ghana can be traced back to the "419 schemes" in Nigeria, also known as "advance-fee scams" prior to the internet. These scams were a form of credit card fraud whereby the perpetrator would offer a monetary incentive, usually in the form of an international money transfer, in exchange for several down payments from the victim. This form of scamming became especially popular during the oil crisis of the 1980s, as Nigeria's oil dependent economy made a large portion of the workforce redundant. Within this demographic was a large quantity of Ghanaian workers, who had migrated due to employment opportunities in the oil sector. Subsequently, the scammers imported the trade upon their return to Ghana, however, it remained relatively inconsequential in terms of scale. The proliferation of cybercrime in Ghana really began in the early 21st century when the Information and Communications Technology (ICT) sector became liberalized via a 5-year accelerated development program, helping to expand and improve telecommunications infrastructure. This led to a five percentage point increase in internet users from 2000 to 2011, with home internet subscribers reaching 3 million nationwide. This growth in internet usage, along with technological devices made available via e-waste, led to a significant increase in cybercrime due to relative ease of access to the cyberweb. Initially, credit card fraud was by far the most common cybercrime. However, since 2004, other types of both cyberfraud and other cybercrimes have become more popular. Common Types of Cybercrime in Ghana Types of Cyberfraud Identity Fraud This form of fraud involves the perpetrator assuming a fake online activity and will contact victims via social networking and dating websites. The most common form of this is "romance fraud", which involves fake profiles being generated in order to attract victims. Typically, older men and women are targeted and are manipulated into sending gifts and money either for romantic purposes or because of a promise of reciprical gain. These frauds have the ability to be relatively sophisticated through the use of doctored photos, diplomas and other identification documents. Fake Gold Dealers This form of fraud is similar to identity fraud insofar as both assume fake online personas to attract primarily Westerners. However, fake gold dealers target investors looking for short-term monetary gain by offering co-ownership of lucrative gold mines in the south of Ghana. Typically, the scammers will show real gold bars as well as offer tours of mining facilities in order to gain the trust of the investors, however, upon the receipt of downpayments from the victims, will close their business. Estate Fraud Unlike both identity fraud and fake gold dealers, estate fraud targets Ghanaians rather than Westerners. Quite often, Ghanaians will migrate abroad for employment opportunities, typically due to higher wages abroad, and come back to Ghana for retirement. These fraudsters set up fake websites offering luxury housing for those returning, and will offer to construct housing for them. The scammers sell blueprints, land and materials in progression to the victims, with the ultimate goal of maximizing wealth extraction. Other Types of Cybercrime Blackmail Ghana is home to the largest collection of e-waste dumpsites in the world. These sites consist of old electronic items including computers, laptops and mobile phones. Culprits will rummage through these items in search of sensitive hardrives, that may contain information to blackmail victims. An example of this was an attempt by Ghanaian cybercriminals to blackmail U.S. Congressmen Robert Wexler upon finding his old hardrive in an e-waste dumpsite. Hacking The greater availability of technology and internet services has allowed for the sophistication of hacking techniques in Ghana. Like elsewhere in the world, the hackers operate for-profit, mostly via the creation of fake websites aimed at tricking victims into inputting credit card information. Alternatively, Ghana has also seen the creation of pro-justice hacking groups or "ethical hackers", who have mostly targeted government websites with the goal of exposing corruption. Most cybercrime in Ghana is cyberfraud, through which perpetrators partake in fraudulent activities via the internet with the goal of financial gain. However, this may take many forms, with different tactics used depending on the culprit and the victim. Additionally, hacking and blackmail type scams have become more and more popular in recent years. Most Ghanaians do buy credentials elsewhere to perform criminal activities on the web such as; using victims credentials(SSN or Credit Card) for their personal stuffs online. VASCO VESTER is one young man from the VOLTA REGION of GHANA but currently living in the US, he does a lot of criminal activities on the internet such as; PENTESTING, using USA victim cards online for his rent(apartment and car) and other criminal activities. The GHANA gov't might be at risk if he land their....9GHANA0 Sakawa As cybercrime has increased in Ghana, it has seen the development of "sakawa", or the combination of internet based crime and West African traditionalist religion. Those who practice sakawa seek blessings from priests in order to improve cyber-scamming yields. In exchange, the perpetrators must perform specific rituals or activities in order to appease the spirits to which they pray. The popularity of this mixture between theology and cybercrime has led to the creation of the "sakawa boys" subset, which often flaunt jewelry and clothing as part of their aesthetic. Furthermore, sakawa boys also produce media such as film and music, which led to their mainstream breakthrough in 2007. Typically, sakawa boys tend to be male, under the age of 30, live near urban centres in slums, and are unemployed or underemployed, making the lifestyle available to them via cybercriminality appealing. E-Waste E-waste, or electronic waste, has presented significant security and health concerns in Ghana, as the country currently boasts the largest e-waste dumpsites in the world. The growth in e-waste is due to two main factors; the booming ICT industry within Ghana, and the lack of cheap domestic e-waste disposal sites within more economically developed countries. This has been facilitated by the necessity for cheap electronics in Ghana, as many are not able to afford new technology. The issue has only grown in severity as infrastructure in Ghana has not been able to coop with increased waste. Consequently, e-waste sites have had both significant security and health impacts, on both a domestic and international level. E-waste has, to some extent, allowed for the proliferation of cybercrime within Ghana, due to sensitive information not being properly wiped from hard-drives. For instance, in 2008, UK environmental agencies found computers belonging to the National Health Services and local councils, in the Agbogbloshie dumpsite in Accra. Although no crime was committed using the information on the technology, it raised significant security concerns internationally. Statistics Between 2016 and 2018, the country lost over US$200 million to recorded cyber crime cases. According to the Ghana Police Service, more than half of these reported cases were linked to fraud. Police also recorded an increase in cyber crimes in the country from 116 in 2016 to 412 in 2017 and further to 558 in 2018. Government Response Legislation The Ghanaian government saw cybercrime as an increasingly real threat by the mid-2000s. Up until the first major piece of legislation in response to the issue, the 2008 Electronic Transactions Act (Act 772), most convicted of internet fraud, a form of cybercrime, were charged in the criminal Code Act 20/60 Section 131. Critics argued that the lack of severity of punishment under this code, as well as a lack of relevance to the facts of some cases, meant that it served as a weak deterrent for cybercrime. Since Act 772 however, the Ghanaian parliament has continued to pass legislation specific to cybercrime, including the National Information Technology Agency Act, 2008 (Act 771) and the Data Protection Act, 2012 (Act 843). Despite this, some limitations with current legislation do exist, such as a lack of adaptibility to new forms of cybercrime and difficulty in collecting evidence to persecute under the new Acts. Other Policies National Cyber Security Awareness Month One of the major interventions by government was the launch of a cyber security awareness month to improve knowledge of the Ghanaian populace on cyber security. The National Cyber Security awareness month was launched in October 2018 on the sidelines of the launch of the National Cyber Security Awareness Program. The following are the themes for previous years: 2018: A safer digital Ghana 2019: Demonstrating Ghana's Cyber Security Readiness Cyber security policy and strategy Ghana has adopted a cyber security policy and strategy to increase security of its citizens and the state from cyber attacks. The document is divided into three sections highlighting the common cyber challenges in the country, the existing local and global initiatives to prevent cyber fraud and ways in which laws on cyber crime can be enforced. It also defines the role relevant government agencies can play in ensuring a secure cyber space. The policy also reviews what is classified as Critical National Information Infrastructure (CNII) – "assets, systems and functions" whose destruction or ineffectiveness could affect the country's national economic strength, national image, national defense and security, public health and safety and government's ability to function effectively. References Ghana Crime in Ghana by type
27565282
https://en.wikipedia.org/wiki/Justin%20Rosenstein
Justin Rosenstein
Justin Michael Rosenstein (born May 13, 1983) is an American software programmer and entrepreneur. He co-founded the collaboration software company Asana in 2008. Early life Rosenstein grew up in San Francisco Bay Area and attended The College Preparatory School in Oakland, California. He was a successful high school Lincoln–Douglas debater. He matriculated to Stanford University, and graduated with a Bachelor of Science degree in mathematics at age 20. As an undergraduate, he served as a member of the Mayfield Fellows Program. Career Rosenstein dropped out of a graduate program in computer science at Stanford in 2004 to join Google as a product manager. At Google, Rosenstein led projects in Google's communication and collaboration division. His projects initially included Google Page Creator, the precursor to Google Sites, and a project internally codenamed “Platypus,” which eventually became Google Drive. He also created and wrote the original prototype for Gmail Chat and many of the features in Google’s rich text editor. In May 2007, Rosenstein left Google to become an engineering lead at Facebook, working closely with Mark Zuckerberg and Dustin Moskovitz. He was technical lead in charge of Facebook's Pages, the Facebook Like button, and Facebook Beacon. In October 2008, Rosenstein left Facebook to co-found the collaborative software company Asana along with Moskovitz. On its website, Asana states its mission is to “help humanity thrive by enabling all teams to work together effortlessly.” He is a frequent speaker on issues of business and technology. He has published opinions on building effective collaborative software in Wired, leadership strategy and enterprise software design in Fast Company, and entrepreneurship in TechCrunch, and productivity in TIME. One Project Rosenstein is the founder of a nonprofit organization called One Project. In 2014, he delivered the keynote address at the TechCrunch Disrupt conference in New York, about using technology for social good as part of “one human project for global thriving.” The Social Dilemma Rosenstein starred in the documentary drama The Social Dilemma, which examines the impact of extended time spent on social networking platforms and raises the alarm on the importance of tackling problems such as addiction, fake news, and global warming. In the documentary, Rosenstein writes: "We live in a world in which a tree is worth more, financially, dead than alive, in a world in which a whale is worth more dead than alive. For so long as our economy works in that way and corporations go unregulated, they're going to continue to destroy trees, to kill whales, to mine the earth, and to continue to pull oil out of the ground, even though we know it is destroying the planet and we know that it's going to leave a worse world for future generations. This is short-term thinking based on this religion of profit at all costs, as if somehow, magically, each corporation acting in its selfish interest is going to produce the best result. This has been affecting the environment for a long time. What's frightening, and what hopefully is the last straw that will make us wake up as a civilization to how flawed this theory has been in the first place, is to see that now we're the tree, we're the whale. Our attention can be mined. We are more profitable to a corporation if we're spending time staring at a screen, staring at an ad, than if we're spending that time living our life in a rich way. And so, we're seeing the results of that. We're seeing corporations using powerful artificial intelligence to outsmart us and figure out how to pull our attention toward the things they want us to look at, rather than the things that are most consistent with our goals and our values and our lives." Personal life Rosenstein lives in a cooperative living space in San Francisco's Mission District, called Agape. He is vegan. While working at Facebook, Rosenstein was compensated with about 4.863 million Class B shares, worth about $1.46 billion at $300/share. Additionally, he owns about 16.2% of Asana, valued around $680 million based on a $4 billion valuation for the company. Rosenstein has committed to giving away most of his wealth to philanthropic causes in his lifetime, inspired by The Giving Pledge. References External links http://justinrosenstein.com http://oneproject.org Living people Stanford University alumni Web developers Computer programmers Businesspeople from Oakland, California 20th-century American Jews Businesspeople from the San Francisco Bay Area Google employees Facebook employees American software engineers 1983 births American technology company founders Engineers from California 21st-century American Jews
3111698
https://en.wikipedia.org/wiki/Timbuktu%20%28software%29
Timbuktu (software)
Timbuktu is a discontinued remote control software product originally developed by WOS Datasystems. Remote control software allows a user to control another computer across the local network or the Internet, viewing its screen and using its keyboard and mouse as though sitting in front of it. Timbuktu is compatible with computers running both Mac OS X and Windows. Timbuktu was first developed in the late 1980s as a Macintosh product by WOS Datasystems and a version was later developed to run on Microsoft Windows. WOS Data Systems was purchased by Farallon Computing in July 1988. Farallon was renamed Netopia in 1999 and the company was acquired by Motorola in February 2007. Timbuktu's primary function is remote control, and the application has support for various remote-control features such as multiple displays, screen-scaling, remote screen and keyboard lockout, clipboard synchronization and "on the fly" color-depth reduction for enhanced speed. In addition to the remote control features (screen-sharing), Timbuktu also allows for file transfers, system profiling, voice and text chat, and remote activity notifications. Timbuktu versions 5.1 and earlier initiate connections over UDP port 407, though versions 5.2 and later use TCP port 407. The program has integrated support for Secure Shell (SSH) tunneling for those who require additional security. Both the Mac and Windows versions can use a standalone user database or integrate with the respective platform's "standard" user database (OpenDirectory on the Mac, and Active Directory or NT Users on Windows). The 8.6 version, released in March 2006, added an optional integration with Skype to enable a user to remote-control any of their Skype contacts who have Timbuktu installed. Starting with the 8.6 version, Timbuktu has been released as a Universal Binary supporting both Intel and PowerPC-based Macs. The 8.8 version, released in September 2009, added support for Mac OS X v10.6, although the ability to receive clicks with modifier keys broke with the release of Mac OS X v10.6.3 (March 2010). Version 8.8.2, released November 2010, resolved the Control session mouse-click modifier key issues as well as Exchange connection performance issues. Version 8.8.3, released in 2011, made Timbuktu compatible with Mac OS X Lion. Version 8.8.4, released in 2012, made Timbuktu compatible with Mac OS X Mountain Lion, resolving a screen rendering issue. Version 8.8.5 for Mac, released in October 2013, made Timbuktu compatible with Mac OS X 10.9 "Mavericks". Timbuktu for Windows v8.x is not compatible with Windows Vista, Windows 7 or Windows Server 2008, and feature-wise it lags well behind the Mac client from the standpoint of acting as a remote client (host-wise, it is identical). Motorola announced in mid-2009 that Timbuktu v9.0 would be released for "early preview" in Q4 2009, featuring full Windows Vista/Windows 7/Windows Server 2008 compatibility for selected customers and v9.0 was released in early 2011, with minor bugfix updates since. Version 9.1 for Windows apparently made it to pre-beta testing but was never released. On April 28, 2015, Arris, the current vendor of the Timbuktu line, announced in an email to customers that development of Timbuktu was ending, and sales would be ended in 90 days. Technical support would be provided for five more years. The software is now listed among the company's discontinued products, in the "Remote Access Software" category. See also Comparison of remote desktop software References External links Timbuktu home page Macworld review of Timbuktu Timbuktu helps catch a computer thief - Wired News Classic Mac OS software MacOS remote administration software Windows remote administration software Remote desktop
5891486
https://en.wikipedia.org/wiki/Peter%20Lovesey
Peter Lovesey
Peter (Harmer) Lovesey (born 1936), also known by his pen name Peter Lear, is a British writer of historical and contemporary detective novels and short stories. His best-known series characters are Sergeant Cribb, a Victorian-era police detective based in London, and Peter Diamond, a modern-day police detective in Bath. Early life Lovesey was born in Middlesex, England, and attended Hampton Grammar School. He went to Reading University in 1955 but since he did not have the requisite Latin qualification, he chose a degree in Fine Art which included History and English as elective subjects. Two of his English tutors, John Wain (1925–94) and Frank Kermode (1919–2010), thought well enough of Lovesey's essays to get him into the English course after all. He graduated from Reading with an honours degree in 1958; he then did three years of National Service in the Royal Air Force. Signing up for the third year – National Service was ordinarily for two years – enabled him to train, and obtain better pay, as an Education Officer. When he left the Air Force it also gave him an edge in starting his teaching career. He married Jacqueline (Jax) Lewis, whom he had met at Reading, in 1959. Teaching and writing career Lovesey's career in education lasted fourteen years. He started as a Lecturer in English at Thurrock Technical College in Essex, 1961; he then became Head of the General Education Department at London’s Hammersmith College for Further Education (now West London College). He quit teaching to become a full-time writer in 1975. Lovesey has written that he entered into writing detective fiction by way of his interest in British sports history. His first detective novel, Wobble to Death (1970), was set within a historically accurate depiction of a 19th century foot race. Lovesey has also authored non-fiction works on the history of British athletics. His first novel was followed by seven others in the Sergeant Cribb series set in Victorian England with the stories often placed in sport or entertainment events such as boxing, rowing, and music hall. After the Cribb series concluded, Lovesey continued with standalone and series mysteries, mostly set in various historical periods. From 1991, he switched to contemporary crime fiction with the Peter Diamond series set in modern-day Bath and consisting of nineteen titles as of 2021. Peter Lovesey lives near Chichester. His son Phil Lovesey also writes crime novels. His son was born in 1963 and worked as an English teacher at Wolverhampton Grammar School until the end of the autumn 2012. His daughter, Kathy Lovesey, was born in 1960, and now lives with her family in Greenwich, Connecticut. Awards Peter Lovesey has won awards for his fiction, including Gold and Silver Daggers from the British Crime Writers' Association, the Cartier Diamond Dagger for Lifetime Achievement, the French Grand Prix de Littérature Policière and first place in the Mystery Writers of America's 50th Anniversary Short Story Contest. In 2016, the UK's Detection Club published Motives for Murder (US: Crippen & Landru, UK: Sphere) to recognise Lovesey's 80th birthday. In 2019, he was recognised by the Bouchercon Convention in Dallas for Lifetime Achievement. Bibliography Lovesey's novels and stories mainly fall into the category of entertaining puzzlers in the "Golden Age" tradition of mystery writing. Most of Peter Lovesey's writing has been done under his own name. However, he did write three novels under the pen name Peter Lear. Sergeant Cribb novels Novels featuring Victorian era detective Sergeant Daniel Cribb and his assistant Constable Thackeray. Wobble to Death (1970), The Detective Wore Silk Drawers (1971), Abracadaver (1972), Mad Hatter's Holiday (1973), Invitation to a Dynamite Party (1974), (published in the US as The Tick of Death) A Case of Spirits (1975), Swing, Swing Together (1976), Waxwork (1978), (Silver Dagger Award) Adaptations The novels were adapted into a Granada TV Series simply entitled Cribb (1979–81). The Series starred Alan Dobie as Cribb, with William Simons as Thackeray. The series is available on DVD in the UK, the US, and Canada. BBC Radio's Saturday Night Theatre adapted six of the novels: Abracadaver (1975), with Frank Windsor as Cribb & John Hollis as Thackeray. Wobble to Death (1975), with Timothy Bateson as Cribb & William Eedle as Thackeray. The Detective Wore Silk Drawers (1977), with John Rye as Cribb & John Hollis as Thackeray. A Case of Spirits (1985), with Barry Foster as Cribb & John Cater as Thackeray. Swing, Swing Together (1987), with Barry Foster as Cribb & John Cater as Thackeray. Waxwork (1987), with Brian Cox as Cribb & John Cater as Thackeray. Peter Diamond novels The Last Detective (1991), (Anthony Award) Diamond Solitaire (1992), The Summons (1995), (Silver Dagger Award) Bloodhounds (1996), (Silver Dagger Award, Macavity Award, Barry Award) Upon a Dark Night (1997), The Vault (1999), Diamond Dust (2002), The House Sitter (2003), (with Inspector Henrietta Mallin) (Macavity Award) The Secret Hangman (2007), Skeleton Hill (2009), Stagestruck (2011), Cop to Corpse (2012), The Tooth Tattoo (2013), The Stone Wife (2014), Down Among the Dead Men (2015), Another One Goes Tonight (2016), Beau Death (2017), Killing With Confetti (2019), The Finisher (2020), Diamond and the Eye (2021), Albert Edward, Prince of Wales novels Bertie and the Tinman (1987), Bertie and the Seven Bodies (1990), Bertie and the Crime of Passion (1993), Novels as Peter Lear Goldengirl (1977), Spider Girl (1980), (republished as In Suspense) The Secret of Spandau (1986), Other novels The False Inspector Dew (1982), (Gold Dagger Award) Keystone (1983), Rough Cider (1986), On the Edge (1989), (adapted for television as Dead Gorgeous in 2002) The Reaper (2000), The Circle (2005), (Inspector Hen Mallin, appearance by Peter Diamond) The Headhunters (2008), (Inspector Hen Mallin) Short story collections Butchers (1985), The Crime of Miss Oyster Brown (1994), Do Not Exceed the Stated Dose (Crippen & Landru,1998), The Sedgemoor Strangler (Crippen & Landru, 2001), Murder on the Short List (Crippen & Landru, 2008), "Showman" in Past Poisons (1998) "Lovesey's New Shorts" to be published in 2021 Anthology The Black Cabinet (1989), (ed.) The Verdict of Us All (2006), (ed.) Non-fiction The Kings of Distance (1968) The Guide to British Track and Field Literature, 1275–1968 (1969), (with Tom McNab) The Official Centenary History of the Amateur Athletic Association (1979), An Athletics Compendium (2001), (with Tom McNab and Andrew Huxtable) References External links SOHO Press Author Page Interview with Peter Lovesey, Speaking of Mysteries TV Series (2001) 1936 births Living people People educated at Hampton School English crime fiction writers English short story writers Cartier Diamond Dagger winners Members of the Detection Club People from Whitton, London Anthony Award winners Macavity Award winners Barry Award winners 20th-century English novelists 21st-century British novelists Writers of historical mysteries English male short story writers English male novelists 20th-century British short story writers 21st-century British short story writers 20th-century English male writers 21st-century English male writers
383728
https://en.wikipedia.org/wiki/Electronic%20art
Electronic art
Electronic art is a form of art that makes use of electronic media. More broadly, it refers to technology and/or electronic media. It is related to information art, new media art, video art, digital art, interactive art, internet art, and electronic music. It is considered an outgrowth of conceptual art and systems art. Background The term electronic art is almost synonymous to computer art and digital art. The latter two terms, and especially the term computer-generated art are mostly used for visual artworks generated by computers. However, electronic art has a much broader connotation, referring to artworks that include any type of electronic component, such as works in music, dance, architecture and performance. It is an interdisciplinary field and so artists often collaborate with scientists and engineers when creating their works. The art historian of electronic art Edward A. Shanken works to document current and past experimental art with a focus on the intersection of art, science, and technology. Other writers on the topic of electronic art include Frank Popper, Dominique Moulon, Sarah Cook, and Christiane Paul. Electronic art often features components of interactivity. Artists make use of technologies like the Internet, computer networks, robotics, wearable technology, digital painting, wireless technology and immersive virtual reality. As the technologies used to deliver works of electronic art become obsolete, electronic art faces serious issues around the challenge to preserve artwork beyond the time of its contemporary production. Currently, research projects are underway to improve the preservation and documentation of the fragile electronic arts heritage (see DOCAM - Documentation and Conservation of the Media Arts Heritage). Art festivals that use the term "electronic art" in their name International Symposium for Electronic Art (ISEA), organized annually since 1988, international Ars Electronica Symposium, organized yearly since 1979 by Ars Electronica in Linz, Austria Dutch Electronic Art Festival (DEAF), organized yearly since 1994 by V2 Institute for the Unstable Media in Rotterdam, the Netherlands Electronic Language International Festival (FILE) organized yearly since 2000 in São Paulo, Brazil The Prix Ars Electronica, a major yearly award for several categories of electronic art Artists Notable artists working in electronic art include: Laurie Anderson Roy Ascott Maurice Benayoun Maurizio Bolognini Angie Bonino Mez Breeze Miguel Chevalier Heiko Daxl Elizabeth Diller David Em Ken Feingold Ingeborg Fülepp Peter Gabriel Pietro Grossi Genco Gulan Garnet Hertz Perry Hoberman Jodi (art collective) Eduardo Kac Knowbotic Research Marc Lee George Legrady Golan Levin Liu Dao Rafael Lozano-Hemmer Chico MacMurtrie Sergio Maltagliati Jennifer & Kevin McCoy Yucef Merhi Joseph Nechvatal Yves Netzhammer Graham Nicholls Simon Penny Melinda Rackham Martin Rev Ken Rinaldo David Rokeby Stefan Roloff Lillian Schwartz Ricardo Scofidio Paul Sermon Scott Snibbe Michael Snow Stelarc Survival Research Laboratories Gianni Toti Tamás Waliczky Norman White See also Algorithm art Artificial intelligence art Artmedia Computer art Computer art scene Computer graphics Computer music Cybernetic art Demoscene Digital art Digital illustration Digital painting Digital poetry EVA Conferences (Electronic Visualisation and the Arts) Evolutionary art Fractal art Generative art Image development Interactive art Intermedia Multimedia Music visualization New media art Systems art Tradigital art Notes References Sarah J. Rogers (ed), Body Mécanique: Artistic Explorations of Digital Realms, Columbus, Ohio, Wexner Center for the Arts, The Ohio State University, 1998 Christine Buci-Glucksmann, "L’art à l’époque du virtuel", in Frontières esthétiques de l’art, Arts 8, Paris: L’Harmattan, 2004 Frank Popper, Art of the Electronic Age, Thames & Hudson, 1997 Joline Blais and Jon Ippolito, At the Edge of Art, Thames & Hudson, 2006 Oliver Grau (2003). Virtual Art: From Illusion to Immersion (Leonardo Book Series). Cambridge, Massachusetts: MIT Press/Leonardo Books. . Oliver Grau (Ed.): Media Art Histories, MIT Press/Leonardo Books, 2007. Christiane Paul, Digital Art, Thames & Hudson Donald Kuspit "Del Atre Analogico al Arte Digital" in Arte Digital Y Videoarte, Kuspit, D. ed., Consorcio del Circulo de Bellas Artes, Madrid, pp. 33–34 & 3 color images Lopes, Dominic McIver. (2009). A Philosophy of Computer Art. London: Routledge Robert C. Morgan Digital Hybrids, art press volume #255 Frank Popper, From Technological to Virtual Art, MIT Press/Leonardo Books, 2007 Alan Liu The Laws of Cool, Chicago Press, pp. 331–336 & 485-486 Bruce Wands Art of the Digital Age, London: Thames & Hudson Donald Kuspit The Matrix of Sensations VI: Digital Artists and the New Creative Renaissance Frank Popper, Origins and Development of Kinetic Art, Studio Vista and New York Graphic Society, 1968 Frank Popper, Die Kinetische Kunst-Licht und Bewegung, Umweltkunst und Aktion, Dumont Schauberg, 1975 Frank Popper, Le Déclin de l'objet, Le Chêne, 1975 Lev Manovich (2001). [Leonardo Books, The Language of New Media] Cambridge, Massachusetts: The MIT Press/Leonardo Books. Dick Higgins, ‘Intermedia’ (1966), reprinted in Donna De Salvo (ed.), Open Systems Rethinking Art c. 1970, London: Tate Publishing, 2005 Nicolas Bourriaud, (1997) Relational Aesthetics, Dijon: Les Presses du Réel, 2002, orig. 1997 Rainer Usselmann, (2003) "The Dilemma of Media Art: Cybernetic Serendipity at the ICA London" , Cambridge, Massachusetts: The MIT Press/Leonardo Journal - Volume 36, Number 5, October 2003, pp. 389–396 Charlie Gere, (2002) Digital Culture, Reaktion Lev Manovich, Ten Key Texts on Digital Art: 1970-2000 Leonardo - Volume 35, Number 5, October 2002, pp. 567–569 Paul Brown, Charlie Gere, Nicholas Lambert, Catherine Mason (editors) (2006) White Heat Cold Logic: British Computer Art 1960–1980, Cambridge, MA: MIT Press Mark Hansen, (2004) New Philosophy for New Media, Cambridge, MA: MIT Press Frank Popper, Art—Action and Participation, New York University Press, 1975 Frank Popper, Origins and Development of Kinetic Art, New York Graphic Society/Studio Vista, 1968 Frank Popper, Réflexions sur l'exil, l'art et l'Europe : Entretiens avec Aline Dallier, Klincksieck, 1998 Yucef Merhi, Artists' Fellowship - 2009 Digital/Electronic Arts, New York Foundation for the Arts, 2009 Margot Lovejoy Digital Currents: Art in the Electronic Age, Routledge, 2004 Frank Popper Ecrire sur l'art : De l'art optique a l'art virtuel, L'Harmattan, 2007 Fred Forest Art et Internet, Editions Cercle D'Art / Imaginaire Mode d'Emploi Edward A. Shanken Selected Writings on Art and Technology http://artexetra.com Edward A. Shanken Art and Electronic Media. London: Phaidon, 2009. Norman M. Klein, "Spaces Between: Traveling Through Bleeds, Apertures, and Wormholes Inside the Database Novel," in Third Person: Authoring and Exploring Vast Narratives, Pat Harrigan and Noah Wardip-Fruin (eds), Cambridge, A: MIT Press, 2009. External links Stephen Wilson: extensive list of "information arts" links newArteest, list of prominent digital artists New Media Art book (wiki edition) Computer art Electronics and society Robotic art Visual arts genres Contemporary art Digital art Postmodern art Conceptual art
47015802
https://en.wikipedia.org/wiki/Miriam%20Shlesinger
Miriam Shlesinger
Miriam Shlesinger (Miami Beach, 20 May 1947 - 10 November 2012) was a US-Israeli linguist and interpreter. Biography Miriam Shlesinger was born in 1947 in Florida. In 1964 she moved to Israel in order to study. She completed her BA at the Hebrew University of Jerusalem in Musicology and English Linguistics. At the beginning of the 1970s Shlesinger took up Translation Studies at the Bar-Ilan University in Ramat Gan. From 1978 she taught at the Institute for Translation Studies at the same university. She completed her MA in Poetics and Literary Studies in 1990 at the Tel Aviv University with a thesis on "Simultaneous interpretation as a factor in effecting shifts in the position of texts in the oral-literate continuum". She completed her PhD at Bar-Ilan University, where she was head of the Institute for Translation Studies from 2003 to 2007. Shlesinger was head of the Language Policy Research Center at Bar-Ilan University. She developed a course in Translation in the Community at the Language Policy Research Center in order to give basic interpreting skills to students who spoke minority languages (such as Arabic, Russian or Amharic) so that they could work with recent immigrants. On 10 November 2012 Shlesinger died of lung cancer. Research interests Cognitive processes in translation and interpreting Community Interpreting Corpus-based Translation Studies Court interpreting Language policy Awards In 2001 the Copenhagen Business School made Shlesinger a Doctor honoris causa. In 2007 she was CETRA Professor at KU Leuven in Belgium. In 2010 she was awarded the Danica Seleskovitch Prize. In 2011 she was granted the Lifetime Achievement Award of the Israel Translators Association. Main publications With Franz Pöchhacker (eds): The Interpreting Studies Reader. Routledge, London 2002. With Anthony Pym and Zuzana Jettmarova (eds): Sociocultural aspects of translating and interpreting. John Benjamins, Amsterdam and Philadelphia 2006. With Franz Pöchhacker (ed.): Healthcare Interpreting: Discourse and Interaction. John Benjamins, Amsterdam and Philadelphia 2007. With Anthony Pym and Daniel Simeoni (eds). Descriptive translation studies and beyond: Investigations in homage to Gideon Toury. John Benjamins, Amsterdam and Philadelphia 2008. With Rodica Dimitriu (eds): Translators and their readers – in homage to Eugene A. Nida. Les Éditions du Hasard, Brussels 2009. With Franz Pöchhacker (eds): Doing justice to court interpreting. Benjamins Current Topics, Volume 26. John Benjamins, Amsterdam and Philadelphia, 2010. Co-editing of the journal Interpreting: International journal of research and practice in interpreting. Amsterdam, John Benjamins, from 2003. Franz Pöchhacker, Arnt L. Jakobsen, Inger Mees (eds): Interpreting Studies and Beyond: A Tribute to Miriam Shlesinger. Samfundslitteratur Press, Copenhagen 2007. References External links Tributes to Miriam Shlesinger on the Homepage of the European Society for Translation Studies, visited 18 June 2015 Article on Miriam Shlesinger in the newspaper Haaretz, visited 18 June 2015 Miriam Shlesinger on the Homepage of Words Without Borders, visited 18 June 2015 Interview with Miriam Shlesinger, August 8, 2007, European Society for Translation Studies, visited 22 June 2015 People from Tel Aviv 1947 births Tel Aviv University alumni Linguists from Israel Israeli translation scholars 2012 deaths
31925
https://en.wikipedia.org/wiki/UCSD%20Pascal
UCSD Pascal
UCSD Pascal is a Pascal programming language system that runs on the UCSD p-System, a portable, highly machine-independent operating system. UCSD Pascal was first released in 1977. It was developed at the University of California, San Diego (UCSD). UCSD Pascal and the p-System In 1977, the University of California, San Diego (UCSD) Institute for Information Systems developed UCSD Pascal to provide students with a common environment that could run on any of the then available microcomputers as well as campus DEC PDP-11 minicomputers. The operating system became known as UCSD p-System. There were three operating systems that IBM offered for its original IBM PC. The first was UCSD p-System, with PC DOS and CP/M-86 as the other two. Vendor SofTech Microsystems emphasized p-System's application portability, with virtual machines for 20 CPUs as of the IBM PC's release. It predicted that users would be able to use applications they purchased on future computers running p-System; advertisements called it "the Universal Operating System". PC Magazine denounced UCSD p-System on the IBM PC, stating in a review of Context MBA, written in the language, that it "simply does not produce good code". The p-System did not sell very well for the IBM PC, because of a lack of applications and because it was more expensive than the other choices. Previously, IBM had offered the UCSD p-System as an option for Displaywriter, an 8086-based dedicated word processing machine (not to be confused with IBM's DisplayWrite word processing software). (The Displaywriter's native operating system had been developed completely internally and was not opened for end-user programming.) Notable extensions to standard Pascal include separately compilable Units and a String type. Some intrinsics were provided to accelerate string processing (e.g. scanning in an array for a particular search pattern); other language extensions were provided to allow the UCSD p-System to be self-compiling and self-hosted. UCSD Pascal was based on a p-code machine architecture. Its contribution to these early virtual machines was to extend p-code away from its roots as a compiler intermediate language into a full execution environment. The UCSD Pascal p-Machine was optimized for the new small microcomputers with addressing restricted to 16-bit (only 64 KB of memory). James Gosling cites UCSD Pascal as a key influence (along with the Smalltalk virtual machine) on the design of the Java virtual machine. UCSD p-System achieved machine independence by defining a virtual machine, called the p-Machine (or pseudo-machine, which many users began to call the "Pascal-machine" like the OS—although UCSD documentation always used "pseudo-machine") with its own instruction set called p-code (or pseudo-code). Urs Ammann, a student of Niklaus Wirth, originally presented a p-code in his PhD thesis, from which the UCSD implementation was derived, the Zurich Pascal-P implementation. The UCSD implementation changed the Zurich implementation to be "byte oriented". The UCSD p-code was optimized for execution of the Pascal programming language. Each hardware platform then only needed a p-code interpreter program written for it to port the entire p-System and all the tools to run on it. Later versions also included additional languages that compiled to the p-code base. For example, Apple Computer offered a Fortran Compiler (written by Silicon Valley Software, Sunnyvale California) producing p-code that ran on the Apple version of the p-system. Later, TeleSoft (also located in San Diego) offered an early Ada development environment that used p-code and was therefore able to run on a number of hardware platforms including the Motorola 68000, the System/370, and the Pascal MicroEngine. UCSD p-System shares some concepts with the later Java platform. Both use a virtual machine to hide operating system and hardware differences, and both use programs written to that virtual machine to provide cross-platform support. Likewise both systems allow the virtual machine to be used either as the complete operating system of the target computer or to run in a "box" under another operating system. The UCSD Pascal compiler was distributed as part of a portable operating system, the p-System. History UCSD p-System began around 1974 as the idea of UCSD's Kenneth Bowles, who believed that the number of new computing platforms coming out at the time would make it difficult for new programming languages to gain acceptance. He based UCSD Pascal on the Pascal-P2 release of the portable compiler from Zurich. He was particularly interested in Pascal as a language to teach programming. UCSD introduced two features that were important improvements on the original Pascal: variable length strings, and "units" of independently compiled code (an idea included into the then-evolving Ada programming language). Niklaus Wirth credits the p-System, and UCSD Pascal in particular, with popularizing Pascal. It was not until the release of Turbo Pascal that UCSD's version started to slip from first place among Pascal users. The Pascal dialect of UCSD Pascal came from the subset of Pascal implemented in Pascal-P2, which was not designed to be a full implementation of the language, but rather "the minimum subset that would self-compile", to fit its function as a bootstrap kit for Pascal compilers. UCSD added strings from BASIC, and several other implementation dependent features. Although UCSD Pascal later obtained many of the other features of the full Pascal language, the Pascal-P2 subset persisted in other dialects, notably Borland Pascal, which copied much of the UCSD dialect. Versions There were four versions of UCSD p-code engine, each with several revisions of the p-System and UCSD Pascal. A revision of the p-code engine (i.e., the p-Machine) meant a change to the p-code language, and therefore compiled code is not portable between different p-Machine versions. Each revision was represented with a leading Roman Numeral, while operating system revisions were enumerated as the "dot" number following the p-code Roman Numeral. For example, II.3 represented the third revision of the p-System running on the second revision of the p-Machine. Version I Original version, never officially distributed outside of the University of California, San Diego. However, the Pascal sources for both Versions I.3 and I.5 were freely exchanged between interested users. Specifically, the patch revision I.5a was known to be one of the most stable. Version II Widely distributed, available on many early microcomputers. Numerous versions included Apple II, DEC PDP-11, Zilog Z80 and MOS 6502 based machines, Motorola 68000 and the IBM PC (Version II on the PC was restricted to one 64K code segment and one 64K stack/heap data segment; Version IV removed the code segment limit but cost a lot more). Project members from this era include Dr Kenneth L Bowles, Mark Allen, Richard Gleaves, Richard Kaufmann, Pete Lawrence, Joel McCormack, Mark Overgaard, Keith Shillington, Roger Sumner, John Van Zandt Version III Custom version written for Western Digital to run on their Pascal MicroEngine microcomputer. Included support for parallel processes for the first time. Version IV Commercial version, developed and sold by SofTech. Based on Version II; did not include changes from Version III. Did not sell well due to combination of their pricing structure, performance problems due to p-code interpreter, and competition with native operating systems (on top of which it often ran). After SofTech dropped the product, it was picked up by Pecan Systems, a relatively small company formed of p-System users and fans. Sales revived somewhat, due mostly to Pecan's reasonable pricing structure, but the p-System and UCSD Pascal gradually lost the market to native operating systems and compilers. Available for the TI-99/4A equipped with p-code card, Commodore CBM 8096, and Sage IV. Further use The Corvus Systems computer used UCSD Pascal for all its user software. The "innovative concept" of the Constellation OS was to run Pascal (interpretively or compiled) and include all common software in the manual, so users could modify as needed. See also P-code machine Notes Further reading External links , UCSD has released portions of the p-System written before June 1, 1979, for non-commercial use. (Note: Webpage resizes browser window.) UCSD Pascal Reunion, Presentations and Videos from a UCSD Pascal Reunion held at UCSD on October 22, 2004 PowerPoint and Video of "What the Heck was UCSD Pascal?," presented at the 2004 reunion PPT and Video ucsd-psystem-os, cross-compilable source code for the UCSD p-System version II.0 ucsd-psystem-vm, a portable virtual machine for UCSD p-System p-code A reconstruction of the UCSD Pascal System II.0 User Manual Softech P-System disassembler UCSD P-System Museum within the Jefferson Computer Museum UCSD P-System at Pascal for Small Machines UCSD Pascal Yahoo Group Pascal (programming language) compilers Discontinued operating systems Virtual machines
6242579
https://en.wikipedia.org/wiki/Hot%20Potatoes
Hot Potatoes
The Hot Potatoes software suite includes five applications that can create exercises for the World Wide Web. The applications are JCloze, JCross, JMatch, JMix and JQuiz. There is also a sixth application called The Masher, that will compile all the Hot Potatoes exercises into one unit. Hot Potatoes was created by the Research and Development team at the University of Victoria Humanities Computing and Media Centre. Commercial aspects of the software are handled by Half-Baked Software Inc. Hot Potatoes has been freeware since October 2009. Hot Potatoes was first released in version 2.0 in September 1998, at the EuroCALL conference in Leuven, Belgium. References Stewart Arneil and Martin Holmes (1998). "Hot Potatoes: Free Tools for Creating Interactive Language Exercises for the World Wide Web". Presentation, EuroCALL 1998 conference, Leuven. September 1998. Stewart Arneil and Martin Holmes (1999). "Juggling hot potatoes: Decisions and compromises in creating authoring tools for the Web". ReCALL Journal, Vol. 11 No. 2 (Web edition) and College and University Media Review, Vol. 6 No. 1. CUP; CCUMC. http://www.eurocall-languages.org/recall/pdf/rvol11no2.pdf. September 1999. Stewart Arneil and Martin Holmes (2001). "Hot Potatoes, History and Future". Presentation, EuroCALL 2001 Conference, Nijmegen. http://web.uvic.ca/hrd/eurocall2001/HotPotPastFuture/PastFutureHome.htm. August 2001. Stewart Arneil and Martin Holmes (2003). "Unicode and Software Development: Hot Potatoes Goes Multilingual". Presentation, WorldCALL 2003 Conference, Banff, Canada, May 2003; also IALLT 2003 Conference June 2003. http://web.uvic.ca/hrd/iallt2003/unicode/presentation.xml. May 2003. Stewart Arneil and Martin Holmes (2004). "Hacking in Hot Potatoes: A little knowledge brings a lot of power". In TEL & CAL. CALL-Austria Assn. . January 2004. Stewart Arneil and Martin Holmes (2008). "Hot Potatoes: Taking an academic software project into the commercial domain". In Aprendizaje de Lenguas Asistido por Ordenador: Herramientas de Autor para el Desarrollo de Cursos a Través de la Web, ed. Ana Gimeno Sanz, pp. 5–33. Editorial Universidad Politécnica de Valencia. http://www.upv.es/pls/obib/est_publ.FichPublica?P_ESTILO=200&P_IDIOMA=i&P_ARM=2154. https://books.google.com/books?id=kYF1QwAACAAJ&dq=Aprendizaje+de+Lenguas+Asistido+por+Ordenador:+Herramientas+de+Autor+para+el+Desarrollo+de+Cursos+a+Trav%C3%A9s+de+la+Web&hl=en&ei=JhrpTtw0yJSIAsfP7KcM&sa=X&oi=book_result&ct=result&resnum=1&ved=0CDcQ6AEwAA. 2008. External links Hot Potatoes Home Page Half-Baked Software Home Page Software for teachers
631145
https://en.wikipedia.org/wiki/Dave%20Kingman
Dave Kingman
David Arthur Kingman (born December 21, 1948), nicknamed "Kong," "King Kong," and "Sky King", is a former Major League Baseball left fielder, first baseman, third baseman, and designated hitter who was a three-time MLB All-Star with 442 career home runs and 1,210 runs batted in (RBI) in 16 seasons. In his career, Kingman averaged a home run every 15.11 at bats, tied for 14th best all-time. The 6' 6" Kingman was a power hitter, who twice led the National League in home runs. Known for his long home runs, Kingman hit one measured at over 530 feet. Kingman struck out frequently, and posted a low batting average and on-base percentage. His 1,816 strikeouts was the fourth-highest total in MLB history at the time of his retirement. As a result of the increase in frequency of strikeouts in the intervening period, he currently ranks 21st as of July 2021. Kingman finished in the top 25 voting for National League Most Valuable Player four times (1972, 1975, 1976, and 1979) and American League Most Valuable Player once (1984). Upon retiring, Dave Kingman was 16th on the all-time home run list and tied for 4th on the all-time Grand Slam list with 16 (tied with Aaron and Ruth). Early life Born in Pendleton, Oregon in 1948, Kingman moved with his family to Denver, Colorado in 1951, to Los Angeles, California in 1954 and finally to Mount Prospect, Illinois, as Kingman's father worked for United Airlines and moved the family as needed for his career. Kingman attended Prospect High School, where he was a center and a forward on the basketball team, being named All-Area, a wide receiver and safety on the football team, and a star pitcher on the baseball team. Kingman threw a no-hitter against Niles North High School on April 6, 1967. In his final high school game, he hit four home runs and pitched a two-hit shutout. Amateur career He was drafted by the California Angels out of high school in the second round of the 1967 Major League Baseball draft, and by the Baltimore Orioles in the first round of the 1968 draft, but chose, instead, to attend the University of Southern California (USC) to play college baseball for the USC Trojans under coach Rod Dedeaux, after a year at Harper Junior College in Palatine, Illinois. Kingman began as a pitcher before being converted to an outfielder. In 1969, Kingman had a 11–4 win–loss record with a 1.38 earned run average (ERA) and batted .250 with four home runs and 16 runs batted in (RBIs) as a part-time hitter for USC. In the 1970 USC NCAA Championship Season, Kingman hit .355 with nine home runs and 25 RBIs, exclusively as a hitter, despite missing time mid-season due to injury. In , Kingman was named an All-American and led the Trojans to the College World Series championship, along with teammates, pitchers Steve Busby, Jim Barr and Brent Strom. Kingman was then selected by the San Francisco Giants with the first pick of the secondary phase draft. Professional career Minor leagues (1970–1971) After signing with the Giants, Kingman played for the Class AA Amarillo Giants in 1970 after the College World Series victory. He hit .295 with 15 home runs and 45 RBIs in 60 games. Moving to the Class AAA Phoenix Giants in 1971, he hit .278 with 26 home runs and 99 RBIs in 105 games before being called up by the San Francisco Giants. San Francisco Giants (1971–1974) Kingman came up as an outfielder and first baseman with the San Francisco Giants. He made his major league debut on July 30, , pinch running for Willie McCovey, and finishing the game at first base. He hit a home run in his next game, a grand slam, and hit two more a day later. He finished his rookie season with a .278 average with 6 home runs and 24 RBI in 41 games. Kingman appeared in the postseason when the Giants won the National League West and advanced to the National League Championship Series. Kingman went 1-for-10 with three strikeouts as the Giants lost in four games. It would be his only career postseason appearance. On April 16, , the second day of the season, Kingman hit for the cycle in the Giants' 10–6 victory over the Houston Astros. A day earlier, he made his debut at third base, a position he would play off and on for the remainder of his Giants career. Kingman also made his major league debut on the mound with the Giants, pitching two innings of "mop up duty" in an 11–0 loss to the Cincinnati Reds on April 15, . He pitched again in the mop up role on May 13 in a 15–3 loss to the Los Angeles Dodgers. In both games, he pitched the final two innings and gave up two earned runs. In , he committed twelve errors in 59 chances at third, and lost his starting job to Steve Ontiveros. Following the season, the Giants sold their rights to him to the New York Mets. In four seasons and 409 games with the Giants, Kingman hit .224 with 77 home runs and 217 RBI. New York Mets (1975–1977) On February 28, 1975, Kingman was purchased by the New York Mets from the San Francisco Giants for $150,000. Kingman played twelve games at third with the Mets; however, the Mets eventually abandoned the idea of Kingman as a third baseman and kept him primarily in the outfield. He emerged as a slugger upon his arrival in New York City, setting a club record with 36 home runs in . Kingman also scored 65 runs, the highest percentage of runs scored on homers for any player who hit more than 30 in a season. A year later, he broke his own record with 37 homers, and was elected to start in right field for the 1976 National League All-Star team. Kingman's single season home run record for the Mets stood until 1987, when it was broken by Darryl Strawberry. New York Mets/San Diego Padres/California Angels/New York Yankees (1977) Kingman was batting .209 with nine home runs when he became one of the three players traded in the infamous "Midnight Massacre" by the New York Mets. On June 15, , the Mets traded Kingman to the San Diego Padres for minor league pitcher Paul Siebert and Bobby Valentine; Tom Seaver was traded to the Cincinnati Reds for Pat Zachry, Doug Flynn, Steve Henderson and Dan Norman; and Mike Phillips was traded to the St. Louis Cardinals for Joel Youngblood. Kingman was waived by the Padres on September 6, 1977, and immediately claimed by the California Angels. On September 15, Kingman became one of only a handful of players to play for four major league teams in the same season (and the only one to play in each division in baseball in a single year since the establishment of divisional play in 1969) when he was traded by the Angels to the New York Yankees, for Randy Stein and cash. Although Kingman's four home runs and seven RBI in eight games helped propel the Yankees into the post-season over the second place Boston Red Sox and Baltimore Orioles, he could not participate in the team's push to a World Series crown as he was added to the roster after the August 31 cutoff date for postseason eligibility. Overall, Kingman hit .221 with 26 home runs and 78 RBI in 132 games for the four teams in 1977. Chicago Cubs (1978–1980) On November 30, 1977, Kingman signed as a free agent with the Chicago Cubs. He signed a five-year contract for $240,000 per year. In 1978, Kingman hit .266 with 28 home runs and 78 RBI in 119 games with the Cubs. Kingman had an excellent performance in Los Angeles on May 14, , when he again hit three home runs against the Dodgers, including a three-run shot in the top of the 15th inning that gave the Cubs a 10–7 victory. Eight of the Cubs' ten runs were driven in by Kingman. Following the game, radio reporter Paul Olden asked Dodgers' manager Tommy Lasorda his opinion of Kingman's performance that day, inspiring an oft-replayed (and censored) obscenity-laced tirade. 1979 season/550 foot home run The best season of Kingman's career came with the Cubs, in . Kingman batted .288 with a National League-leading 48 homers, as well as 115 runs batted in (second to San Diego's Dave Winfield's 118) and 97 runs scored. He hit three home runs in a game twice that season, both coming in Cubs losses. The first was a slugging duel with Mike Schmidt on May 17 at Wrigley Field; Kingman hit three home runs and drove in six while Schmidt hit two in the game, with Schmidt delivering his second in the top of the tenth inning to give the Phillies a 23–22 victory. Kingman's third home run during this game is likely the longest home run of his career, and believed to be the longest in the history of Wrigley Field. There is a street called Kenmore Avenue that T's into Waveland Avenue behind left-center field. Kenmore is lined with houses, and the ball Kingman launched landed on the third porch roof on the east side of Kenmore, a shot estimated at 550 feet. The second three-homer game for Kingman that year came against his former team on July 28 at Shea Stadium in a 6–4 loss to the Mets. His .613 slugging percentage in 1979 was almost 50 points higher than that of his next closest National League competitor, Schmidt. Kingman finished eleventh in NL MVP balloting that year and led the league in strikeouts for the first time in his career (131). In , Kingman (whose personality former Mets teammate John Stearns had once compared to a tree trunk) dumped a bucket of ice water on Daily Herald reporter Don Friske's head late in spring training. Kingman regularly insisted he was misquoted, and he began appearing regularly in the Chicago Tribune, as the nominal author of a column ghostwritten by Chicago Park District employee Gerald Pfeiffer. Mike Royko, then writing for the rival Chicago Sun-Times, parodied Kingman's column with a series using the byline "Dave Dingdong." The Cubs held a Dave Kingman T-shirt Day promotion in conjunction with its game with the Pittsburgh Pirates on August 7, but Kingman instead spent the afternoon at Navy Pier promoting Kawasaki Jet Skis at ChicagoFest. Injured, Kingman played in 81 games in 1980, hitting .278 with 18 home runs and 57 RBI. Overall, in his three seasons with the Cubs, Kingman hit .278 with 94 home runs and 251 RBI and a .907 OPS in 345 games. New York Mets II (1981–1983) In January 1980, the Payson heirs sold the Mets franchise to the Doubleday publishing company for $21.1 million. Nelson Doubleday, Jr. was named chairman of the board while minority shareholder Fred Wilpon took the role of club president. On February 28, , the Mets reacquired Kingman from the Cubs for Steve Henderson and cash. In separate deals, the new organization also reacquired Rusty Staub, and two seasons later, Tom Seaver. Kingman primarily played first base upon his return to the Mets in 1981, and exclusively there in his second season back in New York. In , he tied his own Mets' single-season home run record while hitting .204, the lowest batting average for a first baseman with enough plate appearances to qualify for the batting title. Leading the league in home runs that year, it is also the lowest batting average for any season's home run leader, and he drove in 99 runners that season. Kingman led the NL in strike outs both of the first two seasons of his return to the Mets (105 in 1981 & 156 in 1982). On June 15, , the sixth anniversary of the Midnight Massacre, the Mets acquired first baseman Keith Hernandez from the St. Louis Cardinals for pitchers Neil Allen and Rick Ownbey. Kingman remained with the team for the remainder of the season in a limited role. He was released at the end of the season, and signed as a free agent with the Oakland Athletics. In six total seasons with the Mets, Kingman hit .219 with 154 home runs and 389 RBI in 664 games. Oakland Athletics (1984–1986) On April 16, 1984, Kingman collected his fifth and final three-homer game, in a 9–6 win over the Seattle Mariners. Kingman made just nine appearances at first base in , and was the A's regular designated hitter the remainder of the time. For the 1984 season, Kingman hit .268 with 35 home runs and 118 RBI. He was named the American League's Comeback Player of the Year, and finished 13th in MVP balloting. After hitting 30 home runs in 1985, Kingman's 35 homers in 1986 were a record for a player in his final season, until the mark was surpassed by David Ortiz in 2016. In three seasons as a DH in Oakland, he collected at least 30 home runs and 90 RBIs in each season. He also had two at-bats in this period which did not result in home runs, but nonetheless were noteworthy: in the Metrodome against the Minnesota Twins, on May 4, 1984, he hit a pop-up that flew into a hole in the roof and got stuck for a ground rule double. In a game in Seattle on April 11, , he hit a hard drive to left field which struck a speaker hanging from the roof of the Kingdome, bounced back and was caught for an out. During his final year in Oakland in 1986, Kingman sent a live rat in a pink box to Sue Fornoff, a sportswriter for The Sacramento Bee. The rat had a tag attached to it that read, "My name is Sue." Fornoff claimed that Kingman had told her that women do not belong in the clubhouse, and that he harassed her several times since she began covering the team the year before. Kingman himself said it was intended as a harmless practical joke. The A's fined Kingman $3,500 and warned that he would be released if a similar incident occurred again. When Kingman's contract expired after the 1986 season, Oakland did not renew his contract and he became a free agent. Oakland signed former Athletic and future Hall of Famer Reggie Jackson to play his final season as the team's designated hitter for the 1987 season to play alongside the new blood in homerun hitting in Jose Canseco and rookie Mark McGwire. In three seasons with Oakland, under managers Steve Boros, Jackie Moore, and Tony LaRussa, Kingman hit .230 with 100 home runs and 303 RBI. Overall, in his career, Kingman hit .236 with 442 home runs and 1210 RBI. He had an .302 OB%, a 780 OPS with 608 walks and 1816 strikeouts in 1941 career games. Kingman averaged a home run every 15.11 at bats, tied with Juan González for 14th best all-time. Dave Kingman was awarded over $829,000 in damages for collusion by MLB owners against him (and other MLB players who were free agents). Retirement On July 11, 1987, Kingman signed a minor league deal with the San Francisco Giants during the season. After twenty games at AAA Phoenix in which he batted .203 with two home runs and 11 RBI, he retired from baseball. In 1989, Kingman played for the West Palm Beach Tropics of the Senior Professional Baseball Association, alongside other former major league players. He hit .271 with 8 HR and 40 RBI, as the Tropics had the best record in the Senior League. The league folded in 1990. In , his first year of eligibility for the Baseball Hall of Fame, he appeared on just three ballots, excluding him from future Baseball Writers' Association of America voting. He was the first player to hit 400 or more home runs without being eventually inducted into the Hall of Fame. Personal Kingman lives in the Lake Tahoe area. He has three children, Adam, Abby and Anna and operates a local tennis club. His son Adam won season 3 of Making It and was crowned Master Maker. See also List of Major League Baseball career home run leaders List of Major League Baseball players to hit for the cycle List of Major League Baseball annual home run leaders References Further reading External links Official website Dave Kingman Award Winners Major League Baseball first basemen Major League Baseball left fielders Major League Baseball designated hitters National League All-Stars National League home run champions California Angels players Chicago Cubs players New York Mets players New York Yankees players Oakland Athletics players San Diego Padres players San Francisco Giants players USC Trojans baseball players Baseball players from Oregon People from Pendleton, Oregon 1948 births Living people West Palm Beach Tropics players Harper Hawks baseball players
41156779
https://en.wikipedia.org/wiki/Nexenta%20Systems
Nexenta Systems
Nexenta Systems, Inc. is a company that markets computer software for data storage and backup, headquartered in San Jose, California. Nexenta develops the products NexentaStor, NexentaCloud, NexentaFusion, and NexentaEdge. History Origins In 2005, Nexenta was founded by Alex Aizman and Dmitry Yusupov, software developers and former executives at network vendor Silverback (later acquired by Brocade). Aizman and Yusupov previously worked together as the authors of the open source iSCSI initiator software in the Linux kernel. The company was created to support the open source Nexenta OS project after Sun Microsystems released the bulk of its Solaris operating system under free software licenses as OpenSolaris. Nexenta OS was an operating system that integrated Sun's Solaris kernel and core technologies with applications from the popular Debian and Ubuntu operating systems. Nexenta has been acquired by DataDirect Networks, "a developer of high-performance storage for modern workloads including artificial intelligence and big data", in May 2019. Data storage The company's entry into the data storage included use at Stanford University in 2012 and 2013. The field had been dominated by companies such as EMC Corporation, DataDirect Networks and NetApp, who sold hardware storage appliances. Nexenta intended to compete by creating a storage system that did not require specialized hardware. Instead of producing hardware, the company would provide software to run on lower-costing commodity computing hardware, a model later marketed as software defined storage. Partnerships and open source Much of Nexenta's business comes from partners that provide hardware and services alongside Nexenta software. The company's software is pre-installed on storage systems from vendors including Supermicro, Cisco Systems and Dell. Nexenta continued to contribute to free and open source software used in its products. When Oracle Corporation discontinued OpenSolaris in 2010, the company became a founding member of the illumos open source project that would replace it. Products Nexenta's product NexentaStor is software for network-attached storage (NAS) and storage area network (SAN) services. NexentaStor was derived from the Nexenta OS based on the illumos operating system. The software runs on commodity hardware and creates storage virtualization pools consisting of multiple hard disk drives and solid-state drives. Data can be organized in a flexible number of filesystems and block storage, and files can be accessed over the widely used Network File System (NFS) and CIFS protocols, while block storage uses iSCSI or Fibre Channel protocols. NexentaStor allows online snapshots to be taken of data and replicated to other systems. For high availability Nexenta uses RSF-1 cluster to build a HA storage. References Companies based in Santa Clara, California Companies established in 2005 Free software companies Computer storage companies Computer companies of the United States Sun Microsystems
26047354
https://en.wikipedia.org/wiki/HipHop%20for%20PHP
HipHop for PHP
HipHop for PHP (HPHPc) is a discontinued PHP transpiler created by Facebook. By using HPHPc as a source-to-source compiler, PHP code is translated into C++, compiled into a binary and run as an executable, as opposed to the PHP's usual execution path of PHP code being transformed into opcodes and interpreted. HPHPc consists mainly of C++, C and PHP source codes, and it is free and open-source software distributed under the PHP License. The original motivation behind HipHop was to save resources on Facebook servers, given the large PHP codebase of facebook.com. As the development of HipHop progressed, it was realised that HipHop could substantially increase the speed of PHP applications in general. Increases in web page generation throughput by factors of up to six have been observed over the Zend PHP. A stated goal of HPHPc was to provide a high level of compatibility for Zend PHP, where most Zend-based PHP programs run unmodified on HPHPc. HPHPc was originally open sourced in early 2010. As an addition to HPHPc, Facebook engineers also created a "developer mode" of HipHop (interpreted version of a PHP execution engine, known as HPHPi) and the HipHop debugger (known as HPHPd). These additions allow developers to run PHP code through the same logic provided by HPHPc while making it possible to interactively debug PHP code by defining watches, breakpoints, etc. Running the code through HPHPi yields lower performance when compared to HPHPc, but the developer benefits were, at the time, worth having to maintain these two execution engines for production and development. HPHPi and HPHPd were also open sourced in 2010. By many accounts HPHPc fulfilled its goals, especially within Facebook as it allowed facebook.com to run much faster while using fewer resources. However, in early 2013 Facebook deprecated HPHPc in favor of the HipHop Virtual Machine (HHVM), which is a just-in-time (JIT) compilation-based execution engine for PHP, also developed by Facebook. There were many reasons for this; one of them was HPHPc's flattened curve for further performance improvements. Also, HPHPc did not fully support the PHP language, including the create_function() and eval() constructs, and it involved a specific time- and resource-consuming deployment process that required a bigger than 1 GB binary to be compiled and distributed to many servers in short order. In addition, maintaining HPHPc and HPHPi in parallel (as they needed to be, for the consistency of production and development environments) was becoming cumbersome. Finally, HPHPc was not a drop-in replacement for Zend, requiring external customers to change their whole development and deployment processes to use HPHPc. See also Parrot virtual machine Phalanger References External links , by Haiping Zhao The HipHop Compiler for PHP, OOPSLA 2012, by Guilherme Ottoni et al. , PHP UK Conference 2013, by Sara Goleman 2010 software C (programming language) software C++ software Facebook software Free compilers and interpreters PHP software Software using the PHP license Source-to-source compilers
58635703
https://en.wikipedia.org/wiki/Oculus%20Quest
Oculus Quest
Oculus Quest is a virtual reality (VR) headset developed by Oculus, a division of Facebook Inc., released on May 21, 2019. Similar to its predecessor, Oculus Go, it is a standalone device that can run games and software wirelessly under an Android-based operating system. It supports positional tracking with six degrees of freedom, using internal sensors and an array of cameras in the front of the headset rather than external sensors. The cameras are also used as part of the safety feature "Passthrough", which shows a view from the cameras when the user exits their designated boundary area. A later software update added "Oculus Link", a feature that allows the Quest to be connected to a computer via USB, enabling use with Oculus Rift-compatible software and games. The Oculus Quest received praise for its price and convenience, and for having improved graphical fidelity and tracking over Oculus Go, but was panned for its front-heavy build and downgraded graphics quality over PC-based VR games. At launch, it also faced criticism for being limited to software available on the Oculus Store, and not having backwards compatibility with Oculus Go software. The later introduction of Oculus Link led to reappraisals of the Quest, with critics praising the device's increased flexibility, and indicating that devices like the Quest would likely supplant the PC-only Rift headsets moving forward. History At Oculus Connect 3 in 2016, Facebook CEO Mark Zuckerberg revealed that Oculus was working on a standalone virtual reality headset codenamed "Santa Cruz". At Oculus Connect 4 the following year, it was announced that Oculus planned to issue software development kits for the new model in 2018. They also revealed the accompanying controllers, which would be similar to the Oculus Rift's touch controllers. In 2018 at Connect 5, it was announced that the new headset would be known as the Oculus Quest and would be priced at US$399. At F8 2019 it was announced that the Quest would ship on May 21, 2019. At launch, the device was priced at US$399 for the 64 GB version, and US$499 for the 128 GB version. A successor model, the Oculus Quest 2, was announced on September 16, 2020. It was released on October 13 starting at $299 for the 64GB version and $399 for the 128 GB version. Specifications The Oculus Quest uses a Qualcomm Snapdragon 835 system-on-chip (SoC) with 4 GB of RAM. Three of the four 2.3 GHz CPU cores of the chip are reserved for software, while the remaining core and its four lower-power cores are reserved for motion tracking and other background functions. It runs an Android-based operating system, with modifications to enhance performance in VR applications. A smartphone running the Oculus app in order to conduct first-time setup. A diamond Pentile OLED display is used for each eye, with an individual resolution of 1440 × 1600 and a refresh rate of 72 Hz. The headset uses the "next generation" lens technology originally introduced in Oculus Go, which helps to enlarge the sweet spot of the lens. Visual artifacts such as God rays are less prominent but still visible in scenes with high contrast. It also features physical interpupillary distance (IPD) adjustment. Tracking Unlike the Oculus Go, which used a limited handheld remote that only supported limited motion tracking, the Quest supports positional tracking with six degrees of freedom (compared to the Go's three). Rather than use external sensor cameras in the play area to spatially track the headset and controllers (as was the case with the original Oculus Rift CV1), Oculus Quest utilizes an "inside-out" tracking system known as "Oculus Insight". Based on the concept of simultaneous localization and mapping (SLAM), infrared diodes on the Oculus Touch controllers are tracked via four wide-angle cameras built into the front of the headset. This is combined with accelerometer input from the controllers and headset, as well as AI algorithms to predict the path of motion when the controllers are outside of the cameras' field of view. The cameras are also used as part of a safety feature known as "Passthrough", which displays a grayscale view from the cameras when the player exits their defined playing area. At Oculus Connect 6, it was announced that the feature would be upgraded to "Passthrough+" as on the Oculus Rift S (which also uses Insight), making it stereoscopic and stereo-correct. A "Passthrough on Demand" feature was added in Quest system software version 15, allowing the user to quickly access the Passthrough view by double-tapping the left or right side of the headset. Hand tracking During Oculus Connect 6, it was announced that hand tracking would be added to the Quest in early-2020, utilizing machine learning, Oculus Insight, and "model-based tracking" to recognize the position and gesture of the user's hands without additional hardware. Hand tracking was initially introduced as an experimental feature in December 2019, as part of Quest system software version 12. It was limited to the main user interface and selected built-in apps, such as the web browser. It was also announced that the Oculus Quest SDK would be updated to add support for the feature. In May 2020, hand tracking exited beta, and became available for use in third-party software beginning May 28. Controllers The Oculus Quest uses second generation Oculus Touch controllers. Their designs were modified to accommodate Oculus Insight, with their tracking rings moved from the back of the controllers to their tops so that they can be tracked by the headset's cameras. Audio The Quest has embedded speakers, as well as a pair of 3.5 mm audio jacks on each side for use with external headphones. Accessories Though the Oculus Quest has built-in audio, it is possible to purchase official in-ear headphones from Facebook. There is also an official travel case. Following the release of the Oculus Link feature, Facebook released an official -long USB-C cable designed for use with the feature. As the reliability of non-powered USB cables with copper-based wires diminishes at , the cable is fiber optic instead. Software Facebook enforces stricter content and quality standards for software distributed on Oculus Quest in comparison to Oculus Go and Gear VR, including requiring developers to undergo a pre-screening of their concepts to demonstrate "quality and probable market success". In 2021, Facebook introduced "App Lab", a new section within the storefront allowing developers to upload and distribute Quest apps without going through the formal review process. App Lab is designed primarily to support early access models, and can support public and invite-based distribution. Facebook launched the headset with over 50 titles consisting of a mix of new and ported games, including titles such as Beat Saber, Moss, Robo Recall, Superhot VR, and VRChat. Some games support cross-play with their PC versions. At Oculus Connect 6 in September 2019, it was announced that backward compatibility with over 50 Oculus Go applications and games would be added to the Quest. In addition, users who had purchased Oculus Go apps would be eligible to download Oculus Quest-specific versions of them for free through the end of 2019. Use with PC software At Oculus Connect 6, Facebook announced Oculus Link, a function which allows the Quest to be used with Oculus Rift-compatible software on a PC over USB. It became available in beta on November 12, 2019, as part of system software version 11. Initially, Link only supported USB 3.0 connections. In May 2020, support for USB 2.0 was added, although Facebook still recommends use of USB 3.0 cables. On June 13, 2021, Zuckerberg stated that Oculus Air Link, a feature from the Quest 2 that allows Link to be used over a local Wi-Fi connection, was coming soon to the original Quest. Reception Scott Stein of CNET considered the Quest to be "improbably amazing for its size and $399 price tag", and compared it to Nintendo Switch in terms of convenience. Stein praised its camera system and motion controls, and its graphics quality for being nearer to PC-quality than Oculus Go (albeit still limited in detail due to its use of mobile computing hardware). The Quest was panned for being a closed platform at launch — with software limited to the Oculus Store, and not being backwards compatible with software released for Oculus Go. Adi Robertson of The Verge shared similar opinions, noting that the Quest was heavier and not as comfortable as Rift S, and that its launch titles were not at the same caliber as the PC Oculus Rift in terms of size or graphical fidelity, but that the Quest still included a physical IPD slider unlike the Rift S. In May 2020, The Verge acknowledged that the Quest had improved since its launch to become "the closest thing that exists to a sleek, almost mainstream VR headset", citing an expanding software library, and the ability to use the headset with a PC over USB via the Oculus Link feature (and over Wi-Fi using the sideloaded third-party software Virtual Desktop, which was not "noticeably worse" than doing so over USB in their experience). It was argued that the Quest "works so well by itself that it's a great system in its own right", while Oculus Link allowed it to double as a "credible" PC VR headset as well. Again, it was noted that the Rift S was less front-heavy and that its display "trades contrast for slightly higher resolution and refresh rate" — but that neither it or the Valve Index "works as a perfectly good standalone wireless VR headset" like Oculus Quest. VentureBeat felt that Oculus was likely "setting the stage" for discontinuing the Rift line in favor of Quest, arguing "if Link performs as expected, most users will have little to no idea of what they're missing — Rift S' extra camera, FPS, and resolution differences won't matter much." Sales Two weeks after launch, Oculus announced that it had sold $5 million worth of content for the Oculus Quest. At Oculus Connect 6, it was announced that the Quest had created over 20% of the generated revenue from all platforms at Oculus, totaling at $20 million. It was also reported during the same event that the Quest has by far the highest retention rate of all their headsets. 317,000 units were sold over the 4th quarter of 2019, and was sold out at times. References External links Products introduced in 2019 Virtual reality headsets American inventions Wearable devices
18268608
https://en.wikipedia.org/wiki/Ntractive
Ntractive
Ntractive was a privately held software development company based in Grand Forks, North Dakota that marketed business software to small to medium-sized companies. Established in 2006, the company's main product was Elements CRM, a Mac CRM (Customer Relationship Management) application aimed at small business that use Mac OS X computers, iPads and iPhones., Elements CRM was a cloud computing web application that employed a unique site-specific browser to merge desktop and web application functionality. The product was first introduced to the public at a keynote address during Apple's 2007 World Wide Developer's Conference. The official launch of Elements SBM (the products original name) 1.0 took place at Macworld 2009. The product was then renamed to Elements CRM and with its 2.0 release was awarded the honor of Apple "Staff Pick" in July, 2009. History Origins The architecture and overall development of the Elements CRM product line initially began in 2003 by the company's founder, Justin Bartak. The company later founded in January 2006 by Justin Bartak and Dale Jensen as a company specializing in a cloud computing Mac CRM (Customer Relationship Management) for Apple hardware and devices. The company's Elements CRM Platform is part desktop and part cloud and is powered by Webkit. Current Status The company ceased operations at the end of 2016. Methodology Mac CRM Mac Customer Relationship Management (Mac CRM) is an approach to managing a company’s interaction with current and future customers on Apple Inc Desktop computers and iOS devices only. Mac CRM solutions are not web-based only applications that use a web browser for interaction. Instead, a Mac CRM is a combination of a cloud based app built with Apple's programming language Objective-C or Swift (programming language). Mac CRMs involve using Apple only devices and technology to organize, automate, and synchronize sales, marketing, customer service, and technical support. Products and Services Elements CRM Elements CRM is a Mac Customer Relationship Management (Mac CRM) solution for Apple business. Offered as a subscription-based service, Elements CRM is part desktop and part cloud. Its main functions include managing leads and contact information, tracking communication history, managing tasks and follow ups, tracking email communication, creating estimates and invoices and managing projects. Elements CRM iOS Elements CRM iOS is a universal mobile app for the iPhone, iPad and iPad mini. Elements CRM iOS is an add-on to the Elements CRM desktop app. The iPad CRM version of Elements CRM iOS looks, works and feels like the desktop app. The iPhone CRM app is a limited version of the most important functions of the desktop app. Elements CRM Mail Elements CRM Mail is an email tracking tool that works in conjunction with Elements CRM. It monitors the user's email server for communication between leads and clients stored in Elements CRM. When a match is found, a copy of the email is stored in Elements CRM within the client's record. References Cloud computing MacOS software IOS software Macintosh software companies Business software companies CRM software companies Customer relationship management software Cloud applications ERP software companies ERP software Software companies based in North Dakota Companies established in 2006 Software companies of the United States
30054
https://en.wikipedia.org/wiki/The%20Qt%20Company
The Qt Company
The Qt Company (pronounced "cute"; formerly Trolltech) is a software company based in Espoo, Finland. It oversees the development of its Qt application framework within the Qt Project. It was formed following the acquisition of Qt by Digia, but was later spun off into a separate, publicly traded company. It has core R&D in Oslo, Norway, as well as large engineering teams in Berlin, Germany, and Oulu, Finland. The Qt Group operates in China, Finland, Germany, Japan, South Korea, Norway, Russia, the US, France, UK, Italy and India. Products The company provides software development platforms and frameworks, as well as expert consulting services. Its flagship product is Qt, a multi-platform Graphical User Interface (GUI) framework written in C++. Qt is popular with application developers using C++ but is supported by bindings for other programming languages too, such as Python. Qt also includes packages such as data structures and a networking library. The popular free and cross-platform KDE Plasma desktop environment and software compilation uses the Qt library. The company also employs several KDE developers. In 2001 Trolltech introduced Qtopia which is based on Qt. Qtopia is an application platform for Linux-based devices such as mobile phones, portable media players, and home media. It is also used in many non-consumer products such as medical instruments and industrial devices. Qtopia Phone Edition was released in 2004, and their Greenphone smartphone is based on this platform. History Trolltech was founded by Eirik Chambe-Eng and Haavard Nord on 4 March 1994. They started writing Qt in 1991, and since then Qt has steadily expanded and improved. Trolltech completed an initial public offering (IPO) on the Oslo Stock Exchange in July, 2006. On 28 January 2008, Nokia Corporation announced that they had entered into an agreement that Nokia would make a public voluntary tender offer to acquire Trolltech. The total cost for Nokia was approximately €104 million. On 5 June 2008 Nokia's voluntary tender offer was approved for all the shares in Trolltech. By 17 June 2008, Nokia had completed its acquisition of Trolltech. On 30 September 2008, Trolltech was renamed as Qt Software, and Qtopia was renamed as Qt Extended. On 11 August 2009, the company's name was changed to Qt Development Frameworks. Nokia sold the commercial licensing business of Qt to Digia in March 2011. The remainder of the assets were subsequently acquired by Digia in 2012. In September 2014, Digia formed The Qt Company, a wholly owned subsidiary dedicated to the development and governance of the Qt platform. In May 2016, the company went public on NASDAQ Helsinki as QTCOM. References External links Qt Marketplace Companies formerly listed on the Oslo Stock Exchange Companies listed on Nasdaq Helsinki Computer companies of Finland Finnish brands Free software companies Nokia assets Qt (software) Software companies of Finland
11683699
https://en.wikipedia.org/wiki/Indian%20Institute%20of%20Information%20Technology%2C%20Design%20and%20Manufacturing%2C%20Jabalpur
Indian Institute of Information Technology, Design and Manufacturing, Jabalpur
Indian Institute of Information Technology, Design and Manufacturing, Jabalpur (IIITDM Jabalpur), also known as Pandit Dwarka Prasad Mishra Indian Institute of Information Technology, Design and Manufacturing, is an Indian Institute of Information Technology in Jabalpur, Madhya Pradesh, India that focuses on Information Technology enabled Design and Manufacturing. It was declared to be Institute of National Importance by Government of India under IIIT Act. Campus The institute started functioning from the Jabalpur Engineering College's campus in 2005 until its permanent campus was constructed. The institute has been allotted a campus space of , which is located in close proximity to the Domestic Airport and Dumna Nature Reserve Park, in 2006 following the appointment of Dr. Sanjeev Bhargava as director. Construction of the Core lab Complex and Hostels started thereafter and was completed in June 2009. The campus also includes three hostels. Two of them (Hall-3 and Hall-4) have triple seated rooms and one (Hall of Residence-1) is single seated. Several Hall of Residences are still under construction. The institute also has its own cricket, football, volleyball, basketball ground, badminton court and tennis court. Academics Admissions Undergraduate Students are admitted to these courses on the basis of the All India Rank in the Joint Entrance Examination (Main) (JEE MAIN) and the UCEED. The JEE results are used for admitting students into the BTech program for computer science engineering, mechanical engineering and electronics and communications engineering. UCEED results are used to admit students into the B.Des program. For admissions to PG level courses, the GATE (for MTech programs)/CEED (Common Entrance Examination for Design) scores of candidates are considered along with the CPI (or Equivalent Grading System, e.g. CGPA) maintained throughout the Graduate course undertaken by the student. Counseling service The counseling Service provides logistics in improving student's difficulties in various ways from academic to social life. It is an integral part of the Institute that closely works with the faculty members and the administration along with the student community. Rankings Indian Institute of Information Technology, Design and Manufacturing, Jabalpur was ranked 80 among all engineering colleges in India by the National Institutional Ranking Framework (NIRF) in 2021. Research The institute also focuses on proficient R&D skills through the efficient use of technology. The institute carries out active research in the fields of Innovative Design and Manufacturing (Embedded System Design, Design of Control Systems, VLSI, CAD/CAM, Design of Smart Structures, MEMS, Intelligent Product Design, Design of Energy Systems); Graphics, Vision and Image Processing (Computer Graphics, Image Processing, Geometric Modelling, Computer Vision, Pattern Recognition, Biometrics, Simulation, Computer Animation); Advanced Manufacturing (Rapid Prototyping, Micro-Nano Fabrication, Manufacturing Culture); Data and Knowledge Engineering (Computational Linguistics, Data Engineering, Data Engineering, Natural Language Processing, Artificial Intelligence, Parallel Algorithms, Human-Computer Interaction, Software Engineering), Wireless Networks (Wireless Sensor Networks, Vehicular Ad hoc Networks, and IoT), and Biomedical Signal Processing. The Institute carries out research in the form of thesis pursued by its postgraduate students in these areas along with sponsored projects by organisations like the Indian Ordnance Factories carried out by faculty members in some of these areas. Student life Fests The students have been organizing annual festivals Tarang (Cultural Festival), Abhikalpan (Science & Technology festival) and Gusto (Sports festival) in the campus regularly ever since the inception of the institute. References External links Education in Jabalpur Jabalpur Design schools in India 2005 establishments in Madhya Pradesh Educational institutions established in 2005
27509675
https://en.wikipedia.org/wiki/GNOME%20Calculator
GNOME Calculator
GNOME Calculator, formerly known as gcalctool, is the software calculator integrated with the GNOME desktop environment. It is programmed in C and Vala and part of the GNOME Core Applications. Views Basic – interface for basic arithmetic, resembling a desk calculator. Advanced – an interface with scientific functions, and support for custom variables. Financial – financial calculation and currency conversion. Programming – a view with bit manipulation operators and radix conversion. Keyboard – most of the space is taken up by the output, with no on-screen buttons. Supports currency and unit conversion. Notation The GNOME calculator uses the common infix notation for binary functions, such as the four basic arithmetic operations. Unlike many other calculators, it uses prefix notation, not postfix notation for unary functions. So to calculate e.g. the sine of one, the user must push the keys "sin", "1", "=" - not "1", "sin" as on many other calculators. The decimal separator on the number pad is based on the general keyboard layout since version 3.12.3. Variable handling Advanced, Financial, and Programming modes present features for storing and retrieving values labeled as variables. R is the symbol for variable, used on GUI buttons ←R (insert variable) and →R (assign variable). Variable names are case-sensitive alphabetical string without spaces. Variable values are numerical strings. Values are assigned to variable names by entering in the GUI text input/result field a variable name followed by 0 or more spaces, followed by the = character, followed by 0 or more spaces, followed by either a numeric value or an existing variable name, e.g. "x = 2" or "result = subtotal" (if subtotal was already assigned a numeric value). A numeric value is assigned to the first variable name. If the value was entered as an existing variable name rather than as a numeric value, the existing variable's value is assigned to the first variable name. Assignment to a variable name that does not exist creates the new variable by name with the assigned value. The →R (assign variable) GUI button shows a popup menu of existing variables (and the current value of each), to which selected variable is assigned the current numeric value displayed in the calculator, just as if that variable name were entered in the GUI text field followed by a = followed by the numeric value. Entering a variable name into the GUI text field substitutes the variable value for the variable name when the expression in the GUI text field is evaluated (e.g. when the keyboard <Enter> button or the = GUI button is pressed). The ←R (insert variable) GUI button shows a popup menu of existing variables (and the current value of each); the selected variable name is inserted (appended) into the GUI text field. Two predefined variables are available from the ←R (insert variable) GUI button: ans and rand. ans contains the last "answer" value calculated by the calculator as a result. rand contains a random value between 0.0 and 1.0 (the value is not displayed; a rand variable is evaluated in an expression when calculating a result). Variable names and values persist between launch and quit of the application. See also Comparison of software calculators KCalc References External links Software calculators GNOME Core Applications Software that uses GTK Software that uses Meson Free software programmed in C Free software programmed in Vala
51396023
https://en.wikipedia.org/wiki/Dynamic%20Graphics%20Project
Dynamic Graphics Project
The Dynamic Graphics Project (commonly referred to as dgp) is an interdisciplinary research laboratory at the University of Toronto devoted to projects involving Computer Graphics, Computer Vision, Human Computer Interaction, and Visualization. The lab began as the computer graphics research group of Computer Science Professor in 1967. Mezei invited Bill Buxton, a pioneer of human–computer interaction to join. In 1972, Ronald Baecker, another HCI pioneer joined dgp, establishing dgp as the first Canadian university group focused on computer graphics and human-computer interaction. According to csrankings.org, for the combined subfields of computer graphics, HCI, and visualization the dgp is the number one research institution in the world. Since then, dgp has hosted many well known faculty and students in computer graphics, computer vision and HCI (e.g., Alain Fournier, Bill Reeves, Jos Stam, Demetri Terzopoulos, Marilyn Tremaine). dgp also occasionally hosts artists in residence (e.g., Oscar-winner Chris Landreth). Many past and current researchers at Autodesk (and before that Alias Wavefront) graduated after working at dgp. dgp is located in the St. George Campus of University of Toronto in the Bahen Centre for Information Technology. dgp researchers regularly publish at ACM SIGGRAPH, ACM SIGCHI and ICCV. dgp hosts the Toronto User Experience (TUX) Speaker Series and the Sanders Series Lectures. Notable alumni Bill Buxton (MS 1978) James McCrae (PhD 2013) Dimitris Metaxas (PhD 1992) Bill Reeves (MS 1976, Ph.D. 1980) Jos Stam (MS 1991, Ph.D. 1995) References Computer graphics Computer vision Human–computer interaction University of Toronto
598590
https://en.wikipedia.org/wiki/Wings%203D
Wings 3D
Wings 3D is a free and open-source subdivision modeler inspired by Nendo and Mirai from Izware. Wings 3D is named after the winged-edge data structure it uses internally to store coordinate and adjacency data, and is commonly referred to by its users simply as Wings. Wings 3D is available for Windows, Linux, and Mac OS X, using the Erlang environment. Overview Wings 3D can be used to model and texture low to mid-range polygon models. Wings does not support animations and has only basic OpenGL rendering facilities, although it can export to external rendering software such as POV-Ray and YafRay. Wings is often used in combination with other software, whereby models made in Wings are exported to applications more specialized in rendering and animation such as Blender. Interface Wings 3D uses context-sensitive menus as opposed to a highly graphical, icon-oriented interface. Modeling is done using the mouse and keyboard to select and modify different aspects of a model's geometry in four different selection modes: Vertex, Edge, Face and Body. Because of Wings's context-sensitive design, each selection mode has its own set of mesh tools. Many of these tools offer both basic and advanced uses, allowing users to specify vectors and points to change how a tool will affect their model. Wings also allows users to add textures and materials to models, and has built-in AutoUV mapping facilities. Features A wide variety of Selection and Modeling Tools Modeling Tool support for Magnets and Vector Operations Customizable Hotkeys and Interface Tweak Mode lets you make quick adjustments to a mesh Assign and edit Lighting, Materials, Textures, and Vertex Colours AutoUV Mapping Ngon mesh support A Plugin Manager for adding and removing plugins Import and Export in many popular formats Supported file formats Wings loads and saves models in its own format (.wings), but also supports several standard 3D formats. Import Nendo (.ndo) 3D Studio (.3ds) Adobe Illustrator (.ai) Lightwave/Modo (.lwo/.lxo) Wavefront (.obj) PostScript (Inkscape) (.ps) Encapsulated PostScript (.eps) Stereolithography (.stl) Paths (.svg) Export Nendo (.ndo) 3D Studio (.3ds) Adobe Illustrator (.ai) BZFlag (.bzw) Kerkythea (.xml) Lightwave/Modo (.lwo/.lxo) Wavefront (.obj) POV-Ray (.pov) Cartoon Edges (.eps/.svg) Stereolithography (.stl) Renderware (.rwx) VRML 2.0 (.wrl) DirectX (.x) Collada (.dae) See also Blender (software) 3D modelling References External links (The old Wings 3D source code repository) The Wings 3D Official Development Forum (The best place to get help with Wings 3D) The OLD Wings 3D Forum Wings3d.es | The Spanish language Wings 3D Community Wings3d.de | The German language Wings 3D Community The Brazilian Portuguese language Wings 3D Community Wings 3D on the BeyondUnreal.com Wiki Video Tutorials in the YouTube wings3dchannel 3D graphics software Free 3D graphics software 3D modeling software for Linux Free computer-aided design software Computer-aided design software for Linux Erlang (programming language) Free software that uses SDL Free software programmed in Erlang
31833279
https://en.wikipedia.org/wiki/Open%20Cascade
Open Cascade
Open Cascade is an Information Technology Company of Capgemini,. Open Cascade provides services in the domain of scientific and technical computing and simulation tools. Open Cascade is primarily known to public for its Open Source platforms the company has been maintaining, improving and distributing free of charge for many years: Open Cascade Technology (OCCT) for 3D surface and solid modeling, visualization, data exchange, and rapid application development Salome (software) - free software that provides a generic platform for Pre- and Post-Processing for numerical simulation Open Cascade builds its business model on using its Open Source software in the development of commercial software for various customers worldwide. The company’s head office is located in Guyancourt, France and there are production sites in Lyon and Nizhny Novgorod, Russia. Open Cascade employs around 150 engineers and developers in France and Russia. Shareholders Open Cascade is a subsidiary of Capgemini. Capgemini employed 180,000 people in 2015. Historical background The history of Open Cascade company starts in the 1980s. 1980: Matra Datavision, a French company, released the Euclid CAD system. 1987: Euclid-IS, the first integrated CAD/CAM system, appeared. 1993: Euclid 3 was released. This was a completely new and unique system that supported concurrent engineering. Euclid software made Matra Datavision a true market leader in the field of CAD/CAM. Euclid was employed in the widest variety of engineering domains, from general mechanical and automotive engineering to the complex robotics and aerospace industries. 1993: a development platform called CAS.CADE (Computer Aided Software for Computer Aided Design and Engineering) created by Matra Datavision was released. CAS.CADE had been used by Matra Datavision as a platform to develop Euclid Quantum. 1996: Matra Datavision released Euclid Quantum, a new generation of Euclid. 1998: Matra Datavision changed its strategy and became a software service provider. That year the company signed an agreement with Dassault Systèmes that acquired some products from the Quantum product line - Euclid Styler, Euclid Machinist, Strim, etc. Since the primary focus was made on services, Matra Datavision established a new business model around CAS.CADE. 1999: Matra Datavision published CAS.CADE in open source on the Internet as Open Cascade, while focusing on rendering services around it. 2000: On December 7 Matra Datavision announced the foundation of Open Cascade SAS, its subsidiary for support and development of the Open Cascade platform as well as for carrying out numerous custom development projects for its customers. 2003: Matra Datavision, the parent company, was purchased by IBM, while Open Cascade was acquired by Principia Research & Development – a French editor of finite-element solvers and provider of engineering services. 2004: Open Cascade platform was renamed to Open Cascade Technology to avoid name confusion with the company itself (Open Cascade). 2007: Open Cascade SAS became a subsidiary of Euriware, which was a subsidiary of Areva group. 2014: Euriware, the mother company of Open Cascade SAS was purchased by Capgemini. 2015: Euriware was merged with Capgemini, Open Cascade SAS became a direct subsidiary of Capgemini. See also Open Cascade Technology Salome (software) References External links Official website Open Cascade Technology website Information technology companies of France Companies based in Île-de-France
218232
https://en.wikipedia.org/wiki/ITunes%20Store
ITunes Store
The iTunes Store is a digital media store operated by Apple Inc. It opened on April 28, 2003, as a result of Steve Jobs' push to open a digital marketplace for music. As of April 2020, iTunes offers 60 million songs, 2.2 million apps, 25,000 TV shows, and 65,000 films. When it opened, it was the only legal digital catalog of music to offer songs from all five major record labels. The iTunes Store is available on most Apple devices, including the Mac (inside the Music app), the iPhone, the iPad, the iPod touch, and the Apple TV, as well as on Windows (inside iTunes). Video purchases from the iTunes Store are viewable on the Apple TV app on Roku and Amazon Fire TV devices and certain smart televisions. While initially a dominant player in digital media, by the mid-2010s, streaming media services were generating more revenue than the buy-to-own model used by the iTunes Store. Apple now operates its own subscription-based streaming music service, Apple Music alongside the iTunes Store. History Steve Jobs saw the opportunity to open a digital marketplace for music due to the rising popularity of easily downloadable tracks. In 2002, Jobs made an agreement with the five major record labels to offer their content through iTunes. The iTunes Store was introduced by Jobs at the company's Worldwide Developers Conference in April 2003. It was initially available on Mac computers and the iPod, and was later expanded to Microsoft Windows in October 2003. In April 2008, the iTunes Store was the largest music vendor in the United States, and in February 2010, it was the largest music vendor in the world. The iTunes Store's revenues in the first quarter of 2011 totaled nearly US$1.4 billion. By May 28, 2014, the store had sold 35 billion songs worldwide. In 2016, it was reported that music streaming services had overtaken digital downloads in sales. It was reported that iTunes-style digital download sales had dropped 24% as streaming sales continued to increase. In April 2018, the iTunes app was added to the Microsoft Windows 10 app store. Beginning in the spring of 2019, the iTunes app became available on Samsung Smart TVs. In October 2019, with the release of macOS Catalina, iTunes was split into separate Music, TV, and Podcasts apps. Apple's storefront for movies and television shows moved inside the TV app. Any music in users' iTunes library would transfer to the Music app, which would still offer access to the iTunes Store. Features and restrictions Pricing model History Following the introduction of the iTunes Store, individual songs were all sold for the same price, though Apple introduced multiple prices in 2007. Music in the store is in the Advanced Audio Coding (AAC) format, which is the MPEG-4-specified successor to MP3. Originally, songs were only available with DRM and were encoded at 128 kbit/s. At the January 2009 Macworld Expo, Apple announced that all iTunes music would be made available without DRM, and encoded at the higher-quality rate of 256 kbit/s. Previously, this model, known as "iTunes Plus", had been available only for music from EMI and some independent labels. Users can sample songs by listening to previews, ninety seconds in length, or thirty seconds for short tracks. In addition, the iTunes Store offers apps, which are applications used for various purposes (games, productivity, news, etc.) that are compatible with the iPod Touch, iPhone, and iPad, although some apps are specifically for the iPhone or iPad only. Some Apps cost money (called "Paid Apps") and some are free (called "Free Apps"). Developers can decide which prices they want to charge for apps, from a pre-set list of pricing tiers, from free to several hundred dollars. When someone downloads an App, 70 percent of the purchase goes to the developer(s), and 30 percent goes to Apple. At the Macworld 2008 keynote, Steve Jobs, who was Apple's CEO at the time, announced iTunes movie rentals. Movies are available for rent in the iTunes Store on the same day they are released on DVD, though the iTunes Store also offers for rental some movies that are still in theaters. Movie rentals are only viewable for 24 hours (in the US) or 48 hours (in other countries) after users begin viewing them. The iTunes Store also offers one low-priced movie rental a week: in the United States, this rental costs 99 cents. Movie rentals are still not available in all countries but they are available in many countries including the United States, Mexico, the United Kingdom, Canada, Australia, India and New Zealand. There is a weekly promotion in which one to three songs are available to download for free to logged-in users. Free downloads are available on Tuesdays, and remain free until the following Tuesday, when the store gets refreshed with new content. Some artists choose to have select songs available for no charge. This is not available at all iTunes Stores. Some iTunes television programs have begun the same technique to encourage brand loyalty; although those stay longer. In fact, the iTunes Store has a "Free TV Episodes" page where free episodes are organized by length, either as "featurettes" (shorter than 15 minutes) or full length episodes (longer than 15 minutes). Free content can vary from a preview of a show to bonus content to pilot episodes and entire seasons of TV shows (examples of free seasons include HBO's The Weight of the Nation and ABC's Pan-Am). Some networks, such as ABC and NBC, have their own pages of "Free Season Premieres". While previously the US iTunes Store has offered as many as three free songs each week (the single of the week, Discovery Download, and Canción de la Semana) in recent years, the store has instead replaced the three aforementioned categories with a unified "Single of the Week" banner, with the week's single being from a new up and coming artist. In 2015, Apple discontinued the "Single of the Week" program. Current model Music A song usually costs 99¢; however, for songs with high popularity, the price is usually raised to $1.29. By default, songs that are more than 10 minutes are considered "Album Only"; distributors also have the power to make a song "Album Only." For special offers, song prices can be dropped to 69¢ or free. By default, music albums cost $9.99 or the price of all the songs combined if it is less than $9.99. However, the music album's distributor can set a higher price for the album (as long as it is some amount of dollars and 99 cents), which usually happens on popular music albums. For special offers, prices of music albums can be dropped to $4.99, $5.99, $6.99, or $7.99. On June 30, 2015, Apple launched Apple Music as a subscription service, initially available in 110 countries. New subscribers are offered a three-month free trial with ongoing subscriptions priced from $9.99/month in the US and £9.99 in the UK or €9,99 for countries in the Eurozone. TV shows By default, HD television episodes cost $2.99, while standard definition television episodes cost $1.99. However, distributors can make a television episode "Season Only." A television season costs either an amount of dollars (determined by number of episodes and definition) and 99 cents with the number in the one's place being a 4, 7, or 9, or the price of all episodes combined. Movies Unpopular movies cost $7.99 to buy in standard definition and $13.99 or $14.99 to buy in HD. Popular movies or new releases cost $13.99 or $14.99 to buy in standard definition and $17.99 or $19.99 to buy in HD. Unpopular movies cost $2.99 to rent in standard definition and $3.99 to rent in HD. Popular movies cost $3.99 to rent in standard definition and $4.99 to rent in HD. For recent releases, this price is increased by $1. Movies that are available in 4K and HDR (either HDR10 or Dolby Vision with an HDR10 profile) cost the same price as HD, and are automatically upgraded from HD to 4K and HDR at no additional cost. Movies can be played back in 4K and HDR on an Apple TV 4K or a Mac released in 2018 or later running macOS Catalina when hooked up to a compatible display, and can be played back in HDR on an iPhone 8/X or later, a 10.5" or 11" iPad Pro, and a 2nd gen or later 12.9" iPad Pro running iOS 11 or later, or a MacBook released in 2018 or later running macOS Catalina or later. Movies that are available with a Dolby Atmos audio track requires an Apple TV 4K running tvOS 12 or later hooked up to a Dolby Atmos soundbar or receiver, a MacBook released in 2018 or later running macOS Catalina, an iPhone XS/XR running iOS 13 or later, or an 11"/3-gen 12.9" iPad Pro running iPadOS or later. Apps App prices are set by the developer; they can be free of charge or charged at 99 cents plus any number of dollars. iTunes Store for iOS The iTunes Store allows users to purchase and download items directly to portable Apple devices, such as the iPhone, iPad, Apple TV and iPod Touch. Apple offers three apps, each of which provides access to certain types of content. The App Store app sells apps for iOS, and also provides updates to these apps. The iTunes Store app sells music and videos. The iBooks app sells ebooks. Other, free content available from the iTunes Store can be accessed from two other iOS apps: The Podcasts apps lets users download, subscribe to and sync podcasts. The iTunes U app gives access to iTunes U educational material. Originally, mobile users had to be connected to a Wi-Fi network in order to enter the store, hence its original name: iTunes Wi-Fi Music Store. However, at Macworld 2009, Apple issued a software update which automatically allowed 3G and EDGE users to access the store's full functionality for files smaller than 10 megabytes (MB). The iOS 3.0 update added the ability to download movies, TV shows, audiobooks, iTunes U, and ringtones on mobile devices, in addition to the previously available songs and podcasts. On February 18, 2010, Apple increased the 10 MB 3G download limit to 20 MB. In March 2012, Apple increased the 3G download limit to 50 MB, and, in late 2013, Apple increased the limit to 100 MB when they released the final version of iOS 7 for their new iPhones. Customer support In the United States, Apple provides technical support for the iTunes Store via email, there is no phone number for issues with iTunes purchases. Most customer service inquiries are handled online, via the Report a Problem link in iTunes. Charitable donations In response to major natural disasters, Apple provides the facility for donations to be made through the iTunes Store. Unlike other iTunes purchases, donations made to charitable organizations through this system are not subject to the 30% handling fee Apple usually charges. iTunes donation pages were set up following the 2010 Haiti earthquake, the 2011 Japanese earthquake and ensuing tsunami, and 2012's Hurricane Sandy. In all of these cases, donations were redirected to the Red Cross. Music The store began operations after Apple signed deals with five major record companies: EMI, Universal Music Group, Warner Music Group, Sony Music Entertainment, and Bertelsmann Music Group. Songs from more than 2,000 independent labels were added later, the first being from The Orchard on June 24, 2003. As of April 2020, iTunes offers 60 million songs, including exclusive tracks from numerous artists. Not all artists are available on iTunes, but many holdouts, such as Led Zeppelin and Radiohead, have allowed their music to be sold on the iTunes Store in recent years. New songs are added to iTunes catalog on a daily basis, and the iTunes Store is updated each Tuesday. Downloaded songs come with song information (name, artist, album) already filled out, though iTunes provides a free service by Gracenote to do this for songs not purchased from the store, although they must be imported with iTunes. Songs that have an entry in the iTunes Store also come with album artwork (Artwork is embedded in the metadata). Artwork can be obtained for songs not purchased from the store for free if the user has an iTunes Store account. Purchased songs do not come with lyrics, nor does iTunes provide a service for acquiring the missing lyrics. However, several third-party applications exist to locate and automatically add lyrics to the user's music. "Album Only" songs Some songs are available from the store by "Album Only", meaning the song can only be acquired through the purchase of the entire album, whereas most songs can be downloaded separately from the album they belong to. Songs above 10 minutes in length are by default Album Only songs. However, this is not universally true; for example, Living in the Heart of the Beast by Henry Cow is 16 minutes and 18 seconds, yet is available for individual purchase as of December 24, 2013. Soundtracks also often have many Album Only tracks. Sometimes, the 10-minute restriction works in an artist's favor. Examples of this include Prince's Lovesexy and the deluxe version of Phoenix's Bankrupt!, which both have an album as a single track instead of being separate, (in Prince's case, the track was the album, while in Phoenix's case, it was a collection of demos and outtakes) forcing the buyer to buy the album itself. Movie soundtracks normally include songs owned by many different labels, making licensing more complex. For example, Forrest Gump: The Soundtrack includes songs from Peacock Records, Argo Records, and Capitol Records, among many others. Greatest Hits by Red Hot Chili Peppers has only one song, "Higher Ground", that is not available for download on a per song basis, whilst Circus (Britney Spears' 2008 album) has two songs that are available for album download only, Rock Me In and Phonography. Partial Albums Some albums on the iTunes store are available only as a "Partial Album" meaning that one or more of the songs on an album's CD release aren't available on its iTunes equivalent, often due to differing copyright holders between songs. "Work Only" songs Some tracks are listed as "Work Only", which means they can only be obtained by purchasing the entire piece of work (within the album); the tracks cannot be bought as singles. Works are generally pieces of classical music: symphonies, string quartets, etc., in multiple movements. "LP" format In September 2009, Apple introduced the iTunes LP format (known pre-launch by the code name "Cocktail") which features visual, interactive content alongside album tracks and lyrics. Store Sections When entering the US music store, there are multiple sections one can visit. Music is divided into genres (Alternative, Classical, Jazz, Soundtrack, etc.), and there are a number of links to other sections of the store under the Quick Links header. These include Recommended for You, Complete My Album, iTunes LP, as well as thematic sections, such as iTunes Festival sections. On November 1, 2006, Apple created a category for Latino and Hispanic content, "iTunes Latino". Telemundo and Mun2 made some of their popular programs available for purchase, becoming the first Hispanic television content in the store. It offers music, music videos, audiobooks, podcasts and television shows in Spanish in a single concentrated area. The brief descriptions given to the content are in Spanish as well as several subcategories. Gibraltarian Flamenco Metal band Breed 77, released an exclusive album called Un Encuentro to coincide with the launch of "iTunes Latino". It features 11 songs, all from previous albums, but all sung in Spanish. In 2012, Apple created Mastered for iTunes. When iTunes launched, the decision was made to standardize on AAC instead of the more popular MP3 format on the supposition that it offers better quality compared to other codecs at similar bit rates. Mastered for iTunes (MFiT) is a procedure developed by Apple specifically for Mastering Engineers to follow. This set of tools allows Mastering Engineers to audition Apple's proprietary encoding during the mastering process to take into account how music will eventually interact with Apple's encoding. In addition to auditioning the encoder, there is also a tool (called afclip) that processes the audio file and creates a text file for audio clips. Because of this special encoding process, extra attention must be paid to headroom and inter-sample peaking while mastering. In August 2019 it was announced that the Mastered for iTunes program would be rebranded as Apple Digital Masters. With the rebranding the high resolution masters are now available with Apple Music through streaming. It is speculated that the rebranding came because the functionality of iTunes would be changing in macOS Catalina and therefore the Mastered for iTunes name no longer made sense. Censorship There is a policy of censoring profanity in titles on iTunes. This has resulted in a Scunthorpe glitch, by which inoffensive titles are censored due to a coincidental string of letters. If the song has an explicit label, it will be marked "explicit" next to the song title. If a song is marked "explicit" it is unavailable for purchase if "restrict explicit content" is checked under the parental controls preference. Often there will be a "clean" mark next to the title of some songs, meaning the lyrics have been censored, and is available to purchase on all accounts. Generally if a song is marked "clean" there is an explicit version available as well. Reception and commercial success In the first 18 hours, the iTunes store sold about 275,000 tracks, and more than 1 million tracks were sold in its first 5 days. When released for Windows in October 2003, iTunes was downloaded more than 1 million times in the first 3 days, selling more than 1 million songs in that period. On December 15, 2003, Apple announced that it had sold 25 million songs. In January 2004 at the Macworld Conference & Expo in San Francisco, Steve Jobs announced (Sellers, 2004) that an unnamed person had purchased US$29,500 worth of music. On March 15, 2004, Apple announced that iTunes Music Store customers had purchased and downloaded 50 million songs from iTunes Music Store. A song sold on iTunes gives the artist 9 cents in profit. They also reported that customers were purchasing 2.5 million songs a week which translates to a projected annual run rate of 130 million songs a year. The 50 millionth song was "The Path of Thorns" by Sarah McLachlan. On April 28, 2004, iTunes Music Store marked its first anniversary with 70 million songs sold, clear dominance in the paid online music market and a slight profit. The store also offers hundreds of movie trailers and music videos, in an attempt to boost soundtrack sales. In the conference, Steve Jobs reiterated that a subscription service is still not in the interest of customers and reported that only 5 million of the 100 million songs offered in the Pepsi giveaway campaign were redeemed, which he blamed on technical problems in Pepsi distribution. According to an Apple press release dated August 10, 2004, iTunes Music Store was the first store to have a catalog of more than one million songs. Also, iTunes Music Store at that point maintained a 70 percent market share of legal music downloads. The emerging monopoly of the store was criticized in 2011 by Mike Lang of Miramax for "effectively strangling the industry". He says that because the music industry has allowed too few content providers, it is now suffering. Lang views the issue as being more of a threat than music piracy. Sales milestones Music 100 million songs sold: July 11, 2004 (Kevin Britten of Hays, Kansas, bought the 100 millionth song, and the twenty-year-old received a call from Steve Jobs congratulating him.) 125 million songs sold: September 1, 2004 150 million songs sold: October 14, 2004 200 million songs sold: December 16, 2004 (Ryan Alekman of Belchertown, Massachusetts, bought the 200 millionth song, which was one of the tracks on U2's digital box set The Complete U2.) 250 million songs sold: January 24, 2005 300 million songs sold: March 2, 2005 400 million songs sold: May 10, 2005 On July 5, 2005, Apple announced a promotion counting down to half a billion songs sold. 500 million songs sold: July 18, 2005 (Amy Greer of Lafayette, Indiana, bought the 500 millionth song, "Mississippi Girl" by Faith Hill.) 850 million songs sold: January 10, 2006 1 billion songs sold: February 23, 2006 (Alex Ostrovsky of West Bloomfield, Michigan, bought the billionth song, "Speed of Sound" by Coldplay. He later got a call from Steve Jobs with the news that the sixteen-year-old was getting ten iPods, an iMac, a $10,000 music gift certificate, and a scholarship established in his name at the Juilliard School.) 1.5 billion songs sold: September 12, 2006 2 billion songs sold: January 10, 2007 2.5 billion songs sold: April 9, 2007 3 billion songs sold: July 31, 2007 4 billion songs sold: January 15, 2008 5 billion songs sold: June 19, 2008 6 billion songs sold: January 6, 2009 8 billion songs sold: July 21, 2009 8.6 billion songs sold: September 9, 2009 10 billion songs sold: February 24, 2010 (Louie Sulcer of Woodstock, Georgia, downloaded "Guess Things Happen That Way" by Johnny Cash. At 71 years old, he was the oldest milestone winner to that date. He received a call from Steve Jobs and a $10,000 iTunes gift card.) 15 billion songs sold: June 6, 2011 20 billion songs sold: September 12, 2012 25 billion songs sold: February 6, 2013 35 billion songs sold: May 28, 2014 Video 1 million videos sold: October 31, 2005 3+ million videos sold: December 6, 2005 8 million videos sold: January 10, 2006 15 million videos sold: February 23, 2006 45 million videos sold: September 12, 2006 50 million television episodes sold: January 10, 2007 1.3 million feature-length films sold: January 10, 2007 2 million feature-length films sold: July 31, 2007 200 million television episodes sold: October 16, 2008 1+ million HD episodes sold: October 16, 2008 Applications 10 million apps downloaded: July 14, 2008 100 million apps downloaded: September 9, 2008 200 million apps downloaded: October 22, 2008 300 million apps downloaded: December 5, 2008 500 million apps downloaded: January 16, 2009 800 million apps downloaded: March 17, 2009 1 billion apps downloaded: April 23, 2009 1.5 billion apps downloaded: July 14, 2009 1.8 billion apps downloaded: September 9, 2009 2 billion apps downloaded: September 28, 2009 3 billion apps downloaded: January 5, 2010 7 billion apps downloaded: October 20, 2010 10 billion apps downloaded: January 22, 2011 15 billion apps downloaded: July 7, 2011 25 billion apps downloaded: March 5, 2012 30 billion apps downloaded: June 11, 2012 35 billion apps downloaded: October 23, 2012 40 billion apps downloaded: January 7, 2013 50 billion apps downloaded: May 16, 2013 60 billion apps downloaded: October 22, 2013 75 billion apps downloaded: June 2, 2014 100 billion apps downloaded: June 8, 2015 250 billion apps downloaded: December 2016 Market share On September 12, 2006, Steve Jobs announced in his "It's Showtime" keynote that Apple had 88% of the legal US music download market. On April 11, 2007, Apple announced that the iTunes Store had sold more than two million movies, making it the world's most popular online movie store. On February 26, 2008, the iTunes Store surpassed Best Buy to become the second-largest music vendor in the US behind Walmart, and became number one on April 3, 2008. On October 10, 2012, the iTunes Store was reported to have a 64% share of the online music market, and a 29% share of all music sales worldwide. Internationalization Originally only Mac OS X users who had a US billing address could buy songs with the service, but Steve Jobs announced plans to support both Windows and non-American users. The Windows version of iTunes and support for the Windows platform from iTunes Music Store were announced on October 16, 2003, with immediate availability. Beginning in 2004, the service has become available in a number of countries other than the United States: To buy files through the store, a user must install the proprietary digital media player iTunes to access the store. This software is available only for certain versions of the Macintosh or Windows operating systems. According to an Apple press release, the European iTunes Music Stores sold a combined total of 800,000 songs in one week, with 450,000 of those songs sold in the UK. The Italian, Portuguese, Dutch, Greek stores have been localized. On December 3, 2004, the British Office of Fair Trading referred iTunes Music Store to the European Commission because it prevents consumers in one EU country from buying music from stores in other EU countries, in violation of EU free-trade legislation; the immediate cause of the referral was because the €0.99 price charged in the Eurozone equates to GB£0.68 in sterling, rather than the GB£0.79 actually charged there. iTunes Music Store in Japan had 1 million songs available at start. In the next four days the store had sold one million songs – the pace faster than that of the US store. In addition to a long delay, Apple failed to have one set price for singles. Pundits speculated that this may have indicated the introduction of new price structure to the rest of the stores in future, in favor of record labels who would like to see higher prices for new songs. This extension to other countries was announced in January 2009. The release of video-capable iPods also saw the store launch in Australia with music videos and short films by Pixar. iTunes Gift Cards (as they are now known) are now also available in many more stores such as JB Hi-Fi, David Jones, and the Woolworths chain of stores. Access was inadvertently given to some people in New Zealand, too. Failed negotiations with the Sony BMG label meant that none of that label's artists were available at the time of launch; they were later added on January 17, 2006. New Zealand users had briefly been able to buy from the Australian store when it first opened until that loophole was closed. On November 1, 2006, the store started offering a range of Latino content including television shows and music for its Hispanic American, Mexican and Puerto Rican clients. The Spanish used on the Mexican store has been modified to Mexican Spanish. As of the 2009 Macworld Conference & Expo, Apple had given no new information of the (possible; future) inclusion and expansion of music videos, TV-shows and movies in other European countries. The stores of the UK, Germany and France currently remain the only European Stores with local and/or localized selections of TV-shows, movies and music videos. Payment options A user must also pay with an iTunes gift card or a credit card with a billing address in Australia, Austria, Belgium, Brunei, Bulgaria, Brazil, Cambodia, Canada, Colombia, the Czech Republic, Cyprus, Denmark, Estonia, Finland, France, Germany, Greece, Hong Kong, Hungary, India, Indonesia, the Republic of Ireland, Italy, Japan, Laos, Latvia, Lithuania, Luxembourg, Macau, Malaysia, Malta, Mexico, the Netherlands, New Zealand, Norway, Philippines, Poland, Portugal, Puerto Rico, Romania, Russia, Singapore, Slovakia, Slovenia, Spain, Sri Lanka, Sweden, Switzerland, Taiwan, Thailand, Turkey, United Kingdom, the United States or Vietnam. Apple also offers other payment methods (like PayPal), which differ from country to country. Residents in other countries can only buy a gift card from a merchant or download free podcasts and previews. Digital rights management The iTunes Store used in the past Apple's FairPlay digital rights management (DRM) technology. FairPlay is built into the MP4 multimedia file format as an encrypted AAC audio layer, and is used by the company to protect copyrighted works sold through the store, allowing only authorized devices to play the content. The restrictions imposed by FairPlay, mainly limited device compatibility, have sparked criticism, with a lawsuit alleging antitrust violation that was eventually closed in Apple's favor, and various successful efforts to remove the DRM protection from files, with Apple continually updating its software to counteract such projects. In February 2007, an open letter by Steve Jobs, Apple's then-CEO, discussed the use of DRM on music, raising points about the future of the protection and announcing the company's support for ending the use of DRM. Although the open letter initially caused mixed industry reactions, Apple signed a deal with a major record label the following month to offer iTunes customers a purchase option for a higher-quality, DRM-free version of the label's tracks. In January 2009, Apple signed deals with all major record labels as well as a large number of independent labels to offer all iTunes music in the DRM-free option. On January 6, 2009, Apple announced that DRM had been removed from 80% of its music catalog in the US. Full iTunes Plus availability was achieved in the US on April 7, 2009, coinciding with the introduction of a three-tiered pricing model. This does not apply to songs downloaded while using Apple Music, Apple's subscription-based music streaming service. Television episodes, many books, and films are still FairPlay-protected. Promotions On Super Bowl Sunday, February 1, 2004, Apple launched a promotion with Pepsi in which they gave away 100 million songs, through tokens on selected soft drink bottle caps. Unfortunately for Apple, Pepsi failed to properly distribute the bottles to major metropolitan areas until only weeks before the promotion ended, despite a one-month extension of the deadline by Apple. The promotion was repeated beginning January 31, 2005, with 200 million songs available, and an iPod Mini given away every hour. On July 1, 2004, Apple announced that, starting with the sale of the 95 millionth song, an iPod would be given away to the buyer of each 100 thousandth song, for a total of 50 iPods. The buyer of the 100 millionth song would receive a PowerBook, iPod, and US$10,000 gift certificate to iTunes Music Store. Ten days later, on July 11, Apple announced that 100 million songs had been sold through iTunes Music Store. The 100 millionth song was titled "Somersault (Dangermouse Remix)" by Zero 7, purchased by Kevin Britten of Hays, Kansas. He then received a phone call from Apple CEO Steve Jobs, who offered his congratulations, as well as a 40 GB 3rd Generation iPod laser-engraved with a message of thanks. Inspired by Pepsi's marketing success with iTunes giveaways, Coca-Cola partnered with 7-Eleven to give away a free iTunes song with every . Slurpee frozen beverage until July 31, 2005. Songs could be redeemed until August 31, 2005, by entering a code printed on the Slurpee cup into iTunes Music Store application. Coca-Cola did this in spite of having its own music store, myCokeMusic.com, that competed with iTunes Music Store in Europe. myCokeMusic.com ceased business on July 31, 2006. On July 5, 2005, Apple announced that they were counting down to half a billion songs. The buyer of every 100 thousandth song up to 500 million would receive an iPod Mini and a 50-song gift card. The grand prize for the person who downloads the 500 millionth song was 10 iPods of their choice, a 10,000-song gift card, 10 50-song gift cards or 4 tickets to the Coldplay world tour. Twelve days later, on July 17, Apple announced that 500 million songs had been sold through iTunes Music Store. The 500 millionth song, purchased by Amy Greer of Lafayette, Indiana, was "Mississippi Girl" by Faith Hill. On July 28, 2005, Apple and The Gap announced a promotion to award iTunes music downloads to Gap customers who tried on a pair of Gap jeans. From August 8 to 31, 2005, each customer who tried on any pair of Gap jeans could receive a free download for a song of their choice from iTunes Music Store. On February 7, 2006, Apple announced that they were counting down to the billionth song download and began a promotion similar to the previous 100 million and 500 million countdown. Whoever downloaded the billionth song would receive a 20" iMac, ten 60 GB iPods, and a US$10,000 iTunes Music Card. The billionth song was purchased on February 23, 2006, by Alex Ostrovsky of West Bloomfield, Michigan. The purchased song was "Speed of Sound" as part of Coldplay's X&Y album. On July 25, 2006, Facebook and iTunes began offering a promotion where members of the Apple Students group would receive a free 25 song sampler each week until September 30 in various music genres. The idea behind the promotion was to get students more familiar and enthusiastic with each service as Autumn classes approached. However, in order to prevent abuse of the promotion, the weekly code that Facebook provided stopped working after it was redeemed one million times. In addition, the promotion caused discontent among international students, as the code was only valid in the US iTunes Music Store. On April 10, 2009, Apple announced that it will be counting down to the billionth app (apps being the applications for iPod Touch and iPhone). Apple launched a continuous counter to the billionth app on Good Friday. Connor Mulcahey, age 13 of Weston, CT, downloaded the billionth app, "Bump" by Bump Technologies, and received a 17" MacBook Pro, a 32GB iPod Touch, a Time Capsule, and a $10,000 Gift Card for the iTunes Store. On February 11, 2010, Apple announced that it would be counting down to 10 billion songs downloaded. A $10,000 gift card was offered as a prize. On February 24, 2010, the 10 billionth song, "Guess Things Happen That Way" by Johnny Cash, was purchased by Louie Sulcer of Woodstock, Georgia. Other platforms Currently, iTunes is supported on the macOS (Leopard and above) and Microsoft Windows operating systems. iTunes was known to run passably well in Linux on x86-based computers using the Wine compatibility layer; however, by December 2011, this was no longer the case. Users without iTunes installed can see a content database (but not hear or view the content itself) using the iTunes Preview service, which runs inside their internet browser. This service also allows users to watch trailers for upcoming film releases. Should they choose to purchase any media, they will be redirected to iTunes. Technical details Store pages are delivered using standard HTML with a special header. This change was made when iTunes 9.0 was released. iTunes uses WebKit to render these pages on the screen. These pages are also accessible on the Web, at iTunes.apple.com, allowing pages from the iTunes Store to show up in search engine search results. Prior to iTunes 9.0, the iTunes Store was delivered using a custom XML format that describes the position of all of the elements, boxes, album art and all of their properties – including whether a reference link can be dragged out of iTunes and into another document. The store's back-end software uses WebObjects – Apple's own application server it acquired from NeXT. Content is uploaded to iTunes data store using an internal Apple program called iTunes Producer, which automatically encodes and adds metadata to uploaded files. Legal disputes Apple records For three years, The Beatles' record company Apple Records were in a legal dispute, Apple Corps v Apple Computer, with Apple Computer over the name "Apple." On May 8, 2006, a ruling was declared in favor of Apple Computer, but Apple Records said it would appeal the ruling. Despite this, plans were announced by Neil Aspinall in April 2006 to remaster completely and release the entire Beatles catalog on an unspecified online music service, as well as release some previously unheard work by the band. No date was set at that time. It has also been reported that the Beatles' music catalog might initially be appearing on iTunes only, as Apple is reported to be negotiating with Britain's EMI group over an online distribution deal that might be exclusive for a limited time. During his January 9, 2007 Macworld Keynote address, Apple CEO Steve Jobs used the band's song "Lovely Rita" to introduce the music-playing capabilities of the company's new iPhone. This was regarded by industry observers as further evidence that the Beatles catalog would be introduced to iTunes Music Store catalog in the near future. On February 5, 2007, Apple Corps and Apple Inc. announced they had reached a settlement in their legal dispute. In a related development, Apple announced on August 14, 2007, that the entire solo catalog of John Lennon would be available on iTunes. The solo catalogs of the other three Beatles, Paul McCartney, Ringo Starr, and George Harrison, are also available on iTunes. On November 16, 2010, the entire Beatles catalog was officially made available on the iTunes Store. The Consumer Council of Norway EULA challenge On June 6, 2006, The Consumer Ombudsmen in Norway, Sweden and Denmark launched a common open letter to Apple regarding the EULA of iTunes through the Norwegian Consumer Ombudsman Bjørn Erik Thon. The iTunes case is based upon an official complaint filed by The Consumer Council of Norway on January 25, 2006. The main allegations were that: The EULA is unbalanced to disfavor the customer. Scandinavian law requires any written agreement to favor both parties. The weak party also enjoys protection from exploitation according to Norwegian consumer laws. The iTunes Store's use of Digital rights management limits the number of devices purchased songs can be played on. iTunes' contract entitles the company to at any time change the terms of the contract without notice, including the selection of players or software that must be used for iTunes files, and also the number of times a customer can change or copy already purchased files. The EULA is both vague and hard to understand for the customers. The EULA states that the legal relationship between the company and customers is regulated by English contract law. It is unreasonable to expect Norwegian consumers to have comprehensive knowledge of English law. Products marketed to Norwegian consumers in Norway are subject to Norwegian law—a right that cannot be waived by a clause in a company's standard customer contract. The EULA removes iTunes' responsibility regarding damage to the consumer's computer caused by software errors even though responsibility cannot be waived in Scandinavian Law. Apple responded July 31, 2006. On January 22, 2007, German and French consumer groups joined forces with Norway and Finland. Their goal is to create a united European front against iTunes (Germany and France have each had their own negotiation process with iTunes). According to the press statement Apple is in favor of this. The key points in the negotiations were: Interoperability: the consumer should have the right and ability to play his or her music on any device of his or her own choice. Change of conditions: iTunes must revoke their right to change the terms and conditions (EULA) at any time without the consent of the consumer. Liability: iTunes should change its clause limiting its liability to recover consumer damages if they are caused by content sold by iTunes. Applicable Law: Consumers entering into a contract with iTunes should be able to rely on the consumer protection rules according to the law of the country in which they live. EU antitrust case In 2004, Which? magazine complained to the European Commission about the higher prices in the UK for the same songs sold in other parts of the European Union: typically €0.99 in the rest of the EU and £0.79 in the UK. In 2008, the Commission withdrew its investigation after Apple agreed to end the price disparity. Content disputes Universal Music Group On July 1, 2007, the New York Times reported that Universal (the world's largest music corporation at the time of writing) would not renew its annual contract to sell music through iTunes. Instead, Universal said that it would market music to Apple at will, allowing it to remove its songs from the iTunes service on short notice if the two sides did not agree on pricing or other terms. On August 9, 2007, UMG announced a plan to sell some songs in MP3 format, without Digital rights management, through a variety of online services such as Amazon Music and the newly created gBox. While these tracks continue to be available through the iTunes Store, Universal chose to license these songs in DRM-free formats only through other services. NBC Universal TV series On August 31, 2007, Apple announced that programs on NBC's 2007–08 television schedule would not be available on iTunes. NBC had informed Apple the previous day that it would not be renewing its contract. It was later clarified that this change only applied to series produced by NBC Universal-owned Universal Media Studios, including Universal-produced shows on other networks such as House. NBC programs produced by other studios, such as Chuck (Warner Bros.) and Journeyman (20th Century Fox), would remain available on iTunes. Apple has publicly asserted that NBC would only renew their contract if Apple agreed to a price increase of US$4.99 per episode, which they did not. NBC disputes that claim, claiming that Apple balked at NBC's request to package shows together and make wholesale pricing more flexible. NBC claims that they never asked to double the wholesale price and insisted that their shows would be sold by the iTunes Store through early December. Other networks who sold their shows via iTunes did not follow suit. On December 1, 2007, NBC shows were pulled from the iTunes Store. On September 9, 2008, Apple and NBC Universal announced that NBC's TV shows were once again available on the US iTunes Store. The UK iTunes Store has many shows from NBC available, although they are distributed by Universal Studios. The pricing for these seasons are higher than they were on the US store, an example being, Season 3 of The Office is priced at GB£43.47 (roughly US$72) vs. $52.99 (US Store HD). See also iTunes Apple Music iTunes Festival Apple Inc. Apple TV iBookstore Comparison of digital music stores References Store Apple Inc. services Video on demand services Internet properties established in 2003
8648325
https://en.wikipedia.org/wiki/SOBER
SOBER
In cryptography, SOBER is a family of stream ciphers initially designed by Greg Rose of QUALCOMM Australia starting in 1997. The name is a contrived acronym for Seventeen Octet Byte Enabled Register. Initially the cipher was intended as a replacement for broken ciphers in cellular telephony. The ciphers evolved, and other developers (primarily Phillip Hawkes) joined the project. SOBER was the first cipher, with a 17-byte linear-feedback shift register (LFSR), a form of decimation called stuttering, and a nonlinear output filter function. The particular configuration of the shift register turned out to be vulnerable to "guess and determine" attacks. SOBER-2 changed the position of the feedback and output taps to resist the above attacks. S16 was an expansion to 16-bit words rather than bytes, with an expected increase of security. Adaptions for and since NESSIE For the NESSIE call for new cryptographic primitives, three new versions called the t-class were developed; SOBER-t8 was virtually identical to SOBER-2 but did not have sufficient design strength for NESSIE submission; SOBER-t16 and SOBER-t32 were submitted. t32 was a further expansion to 32-bit words, while both ciphers had a more efficient method of computing the linear feedback. Subsequent to NESSIE, SOBER-128 was designed to take into account what had been learned. The stuttering was dropped because it added too little strength for the overhead, and the nonlinear output function was strengthened. As a stream cipher, SOBER-128 remains unbroken. The message authentication capability that was added at the same time was trivially broken. Mundja An integrated message authentication feature based on SHA-256 that was designed to be added to stream ciphers such as SOBER-128. Turing Named after Alan Turing, shares the LFSR design of SOBER-128, but has a block-cipher-like output filter function with key-dependent S-boxes, and remains unbroken subject to a minor usage constraint. NLS Short for Non-Linear SOBER, it was submitted to the European eSTREAM project. It uses nonlinearity for the shift register, and simplifies the output filter for increased performance, using Mundja for message authentication. SSS, for Self-Synchronizing SOBER, was also submitted but has very little relationship to the other SOBER ciphers, and was quickly broken. Shannon Named after Claude Shannon, shortens the register to 16 32-bit words, and has completely new feedback and output filter tap positions. It incorporates a new and more efficient message authentication mechanism. Boole Named after George Boole, is a family of combined hash functions and stream ciphers that were developed for submission to the NIST call for development of an advanced hash standard, but were withdrawn when a collision was discovered. References External links QUALCOMM Australia – info on the whole SOBER family NIST – NIST call for an Advanced Hash Standard Stream ciphers
46500121
https://en.wikipedia.org/wiki/UNETix
UNETix
uNETix is an early implementation of UNIX for IBM PC systems. It was not a "true" UNIX, but was written from scratch for the PC without using any code from System V. Overview uNETix only supported a single user. However, it maintained closer compatibility with standard versions of UNIX than early versions of QNX. uNETix' multiple windows capability was possibly the first implementation of windowing in a Unix-like operating system. Up to 10 windows were supported, which could each run independent tasks and could have individual foreground and background colors set with a special color command. Published by Lantech Systems, Inc, uNETix had a list price in 1984 of 130 USD, but was discounted and advertised at 99 USD ( USD today). The minimum RAM requirement was 256 kB, but a machine would only be able to support single-tasking; multitasking required 512 kB. It had an emulation environment for MS-DOS that could run DOS 1.1 programs in one window while UNIX programs ran in other windows. Its major weaknesses were slow speed and lack of hard disk support. uNETix came with a full assembly language programming environment, and a C compiler was optional. Lantech claimed that the C compiler was the first available for the x86 architecture. See also Xenix UNIX System V AT&T UNIX PC References Computing platforms Discontinued operating systems Unix variants Lightweight Unix-like systems
60602203
https://en.wikipedia.org/wiki/Leonid%20Boguslavsky
Leonid Boguslavsky
Leonid Boguslavsky (, born June 17, 1951, in Moscow, Russia) is an entrepreneur, scientist, and the founder of RTP Global. He was one of the first investors in Yandex, Ozon, Delivery Hero, Epam, DataDog as well as SnapDeal. In 2012 he was the Internet investor of the year (Forbes). Most successful investor of the year (RBC, 2017). He is in Forbes billionaires list. Early life Boguslavsky studied physics-mathematics at school in Moscow, USSR. In sixth grade he won the Moscow University Biology Olympiad and went on a year later to win the USSR TV Mathematics Olympiad. Boguslavsky graduated from the Moscow Institute of Transport Engineering (MIIT) in 1973, majoring in Computer Science and Applied Mathematics. From 1973 to 1990, he conducted scientific research at the Institute of Control Sciences of the USSR Academy of Sciences in mathematics for computer systems and networks. Upon receiving his Doctorate of Science (Engineering), Boguslavsky wrote more than 100 articles, 3 scientific books and made several inventions while spearheading his own laboratory. He was the first scientist from USSR who published his results on new algorithms for virtual memory management in IEEE Transactions on Computers in the United States Scientific Journal that covers aspects of Computer Science. In 1985, together with a team of developers from the Academy of Science of Moldova, Boguslavsky launched a project to create a software system to connect IBM mainframes with Digital minicomputers and personal computers into an integrated computer network. As a result, he was awarded two significant contracts to implement these networks in 1987, one in a Czech coal mining company and another at the Polytechnic University in Slovakia. Career Beginnings 1989 to 1990 In 1989 started his work on the LogoVAZ. Boguslavsky became a deputy director and a shareholder, first organizing the computer business of LogoVAZ and then completing several other business projects. In 1990, Boguslavsky was offered by Oracle Corporation to distribute Oracle software products in the USSR and he concluded the exclusive distribution agreement with Oracle for the territory of the USSR. He founded LogoVAZ Systems (LVS) in 1990. From 1991 to 1992, he served as a visiting professor at the Department of Computer Science of the University of Toronto, Canada. He returned to Moscow to work for Oracle and was introduced to Boris Berezovsky by one of his former colleagues at the Institute of Control Problems. Berezovsky and Boguslavsky had previously worked in laboratories which were very nearby each other. Berezovsky gave Boguslavsky, Vladimir Kadannikov (), who was the general director of VAZ (), and others who were top managers at the LogoVAZ plant () a stake in AvtoVAZ () which at that time was implementing Oracle and other global systems integrators at VAZ. In 1992, Boguslavsky used his shareholding stake in LogoVAZ to redeem the computer business from the company and its shareholders in order to concentrate on his own business – the company LVS (LogoVAZ Systems) which is a systems integration business. LVS became the first or one of the first Russian business partners of many well-known software, computer, and network vendors. In 1993, LVS developed the Oracle-based information system for the apartment privatization of Moscow. The system was awarded the Computer World Smithsonian Award in the United States and was featured in the Oracle Annual Report. In 1994, LVS was awarded a contract to provide the whole IT infrastructure for the State Duma of Russia and successfully carried out the project. Also, in 1994, LVS became so dominant as the producer of electronic voting machine equipment and its software that by 1997 Pricewaterhouse chose LVS and its software and equipment as system integrator with Boguslavsky becoming a senior partner and receiving $10 million from Pricewaterhouse's buyout of LVS. In 1995, LVS became the prime contractor to develop the Uzbekistan national automated passport control system. In late 1996 Boguslavsky sold LVS to Price Waterhouse (currently known as PwC) and then became a Managing Partner at PwC, in charge of its Management Consulting Services (MCS) practice in Russia in early 1997. As Partner, Boguslavsky was the lead negotiator and client partner dealing with Gazprom over the largest system integration and SAP implementation contracts at the time. In December 1999, Boguslavsky met investment bankers Charles Ryan (UFG), Michael Calvey (Baring Vostok) and David Mixer (Rex Capital), who were planning to set up an Internet investment company at that time. Investor, 2000 until today Beginning in 2000, Boguslavsky learned investment principles from Baring Vostok employees Michael Calvey and especially Elena Ivashentseva (), a Baring Vostok managing partner, and, as of March 2020, Boguslavsky has six joint projects with Baring Vostok. In 2000, ru-Net Holdings Limited, an investment company with startup capital of $20 million, was jointly founded by Boguslavsky, Charles Ryan of UFG, Michael Calvey of Baring Vostok and David Mixer of Rex Capital. Boguslavsky invested a substantial amount of the total holdings and became chairman of the board of directors. In the same year, ru-Net Holdings Limited invested in Yandex, paying $5.27 million for a 35% stake, and in the online retailer Ozon.ru, buying a controlling stake for $3 million. Both projects were part of big IT companies – Comptek and Reksoft as non-core businesses; thus, they became two independent companies due to the investments. After Boguslavsky decided to leave PwC and focus on investing in Internet companies. However, he still had his position in PwC for one more year to look for a successor and arrange the formalities of the handover. Boguslavsky left PwC in 2001 and became CEO and chairman of the board of directors of ru-Net Holdings. During 2000 and 2001, ru-Net Holdings survived the dot-com crisis, although some investors intended to exit the business and distribute the remaining funds. Some investors were especially concerned about the future of Yandex, whose revenues were low at the time. ru-Net Holdings made its first investments in a couple of system integration and software development companies in 2002, buying stakes in TopS (Russia-based enterprise management systems integrator) and VDI (offshore programming). Later, VDI merged with Epam to become the largest offshore programming and software outsourcing company in Central and Eastern Europe and launched an IPO on NASDAQ. ru-Net Holdings restructured its business in 2006 with only Yandex shares left and the company changed its name to Internet Search Investment Limited (ISIL). Other assets (including shares of Ozon.ru, TopS, and VDI) were distributed among the shareholders of ru-Net Holdings. As a result, Boguslavsky was still a significant shareholder of ISIL and, accordingly, a beneficiary of shareholding in Yandex (he had also invested additional funds) on one hand and obtained corresponding stakes in all other assets on the other hand. In 2006 he set up his own investment company ru-Net Limited that took control of his assets and made new investments in IT and Internet technologies and services. VDI merged with Epam, and TopS joined Systematica () and the AND Project companies transforming into Systematica Group. Boguslavsky became Chairman of its board of directors. Later a large stake in the Group was bought by A1, the investment subdivision of Alfa Group (). Later Systematica Group acquired a large distributor, Landata. ru-Net Limited also owned Energodata, a big IT outsourcing company supporting SAP systems in Russia's federal electric grid sector. Additionally, ru-Net established PSI Energo, a joint venture with the German software company PSI AG, to introduce dispatching information systems into electric grids. The former head of Microsoft in Russia, Olga Dergunova (), will be an independent director. In 2007 Boguslavsky invested in HeadHunter and iContext. Boguslavsky left the board of directors in Yandex in 2008 as he started investing in companies that could potentially create a conflict of interest with Yandex. He purchases the Digital Access Company from Leonard Blavatnik and his partners, international music majors and together with Oleg Tumanov set up Russia's online video service ivi.ru. In 2010 Boguslavsky invested in Biglion. Yandex floated 17.6% of its shares on NASDAQ for $1.3 billion on the 24th of May 2011. Boguslavsky sold a small portion of his shares during the IPO. He partly used the funds (about $60 million) to invest in the purchase of new shares in Ozon, leading to the largest investment ($100 million) in an Internet company in Russian history. In 2011 and 2012, ru-Net sold its shareholdings in the system integration and IT service companies EPAM, Systematica, Energodata, and PSI Energo. ru-Net continues to invest in Russian internet companies. It purchased a stake in 2GIS and increases its investments in existing portfolio companies. In 2011 he set up a US-based subsidiary, the venture capital company - ru-Net Technology Partners (RTP Ventures). Headed by Kirill Sheynkman, RTP actively invests in early-stage companies in the US market with investments in Big Data, SaaS, cloud computing, Fintech, Health Care, IoT and Information Security. ru-Net started investing in Europe and India. Among some of the early investments was German startup Delivery Hero that later in 2017 was valuated at €4.5 billion at IPO. In India, Boguslavsky invested in Practo, Faasos, Snapdeal and other companies. In the United States his investments include RingCentral, which had a successful IPO in 2013. RTP was among the first investors in Datadog, which had successful IPO in 2019. In 2016, Boguslavsky invested in the coaching company Iloverunning Family (that now is known as I Love SuperSport holding company), and in European internet company Urban Sport Club, that sells passes to sport and fitness clubs. He also co-founded the first professional international league in triathlon - Super League Triathlon (SLT). His partners are the triathlon legend Chris McCormack and Michael D’Hulst. In October 2018, ru-Net rebranded to RTP Global. In 2020 he set up RTP Global III fund of $650 million. RTP Global manages assets of $3 billion. In March 2020, Boguslavsky explained in an interview that he has two companies focusing on artificial intelligence (AI): one in Russia and one in Germany. His Russian AI company Dasha () employs persons from Novosibirsk and has very advanced chatbots which replace call centers with very natural voices and can cold call a potential customer to sell them items but the customer does not know the customer is talking to a machine. His German AI company uses deep learning through a photograph of a plant from a smart phone to identify which herbicides and pesticides are needed to fight an agricultural disease. He received an investment return of 400 or 500 times from his original stake of $11 million in 2012 with his American company Datadog after its IPO which has a capitalization of $32 billion at the end of 2020. Datadog was developed from his New York office under the auspices of the software entrepreneur Kirill Sheinkman (). In January 2021, VEON appointed Boguslavsky to the Group's board of directors. Personal life Boguslavsky is married and has four children. His hobbies include kitesurfing, skiing, triathlon, bicycle racing and extreme travelling. In 2013, he started his first triathlon training and took part in several Ironman races. He managed to get his first podium spot after only six months of training. A year and a half later, being a prizewinner of several races in his age category, he qualified for the 2015 Ironman World Championship in Kona, Hawaii. He is the founder of Super League Triathlon, having established it in 2017 and has stakes in Zwift which provides equipment for virtual running and virtual cycling. In 2013, Boguslavsky together with his mother, Zoya Boguslavskaya, established the Andrei Voznesensky Fund in memory of Zoya's late husband, Russian Poet, Andrei Voznesensky. In 2016, Boguslavsky created the Andrei Voznesensky Center of Culture. Boguslavsky has Russian and Canadian citizenship. Notes References Living people Russian businesspeople People from Moscow 1951 births
12113803
https://en.wikipedia.org/wiki/Open%20Dental
Open Dental
Open Dental, previously known as Free Dental, is a dental practice management software licensed under the GNU General Public License. It is written in the C# programming language compatible with Microsoft .NET Framework and was first released in 2003. Current versions of the software require Microsoft Windows. Earlier versions of the software had supported other operating systems, but Linux support has been dropped. The full function version is only available under the commercial license because it includes royalty bearing, licensed materials from the American Dental Association (ADA), the Code on Dental Procedures and Nomenclature (CDT). Open Dental is owned and sponsored by Open Dental Software, Inc., which is incorporated in the State of Oregon in the United States of America. Being an open source software, any programmer has the freedom to develop and support Open Dental. The company makes money through its monthly technical support fees, which are required for the first 6 months of use. The first open dental customer bought the technical support services on July 22, 2003. Database The database uses the dual licensed MySQL database program. Both local preferences and those which apply to every computer in the office are stored in the mySQL database. The database schema is published and publicly viewable. Relational database benefits to dental practice There are documented benefits to using a relational database when storing and retrieving data: the relational model offers "advantages over the hierarchical and network models through its simpler data representation, superior data independence and easy to use query language". Availability Relational databases like Oracle and MySQL have mechanisms that can be used to keep the availability (of the database) very high. For instance, with MySQL replication, "the active primary database ships transactions to one or more standby databases. These standby databases apply the transactions to their own copies of the data. Should the primary database fail, one of these standby databases can be activated to become the new primary database". Mobility Mobile dental programs have special needs including offline data collection, central data availability and public health reporting. All of these needs are met with Open Dental. An example of a mobile dental program that has published their experience using Open Dental is the St. David's Dental Program. Retrievability/Reporting Structured Query Language (SQL) allows the user to pull data from the database for analysis. Open Dental provides over 1,100 user queries that have been requested by users, and advanced users may write their own queries to get specialized information from the database. Scalability Open Dental can be scaled from a single, one-computer user in a small office to dozens of computers per server over multiple physical locations. Features Appointment Create unlimited operatories and unlimited providers. Edit views, colors, default values. Schedule and modify appointments. Show pop-up alerts, financial and medical notes. Recall scheduling. Contact all patients on the days schedule from the appointment view. See production by operatory. Family View patient records (HIPAA compliant). When possible, fields are filled automatically or checked for potential errors. Save billing type and insurance information. Sign Procedure Notes: Digital Signatures. Sign or initial procedure notes using a Topaz signature pad or by using a stylus on a touchscreen. Patient Info Terminal (Kiosk): A way for a new patient to enter their own information from the waiting room. The receptionist controls the terminal from another computer. Can also be used to let patient update their info if it has changed. New patients can check off items in list of conditions. Track student status and referrals. Track credit and contact notes. Account Send communication to patients. Email, text, or mail appointment or recare reminders. Patient and Insurance billing system with e-claim functionality E-claims: go through a clearinghouse to submit all e-claims or submit directly to carries that support the X12 files/claims. The X12 EDI Format is the standard defined by ASC (ex-ANSI) and specified by HIPAA. Track referrals and lab cases. Lab Cases: set up turnaround times on each procedure type for due dates to be calculated automatically. Create and track payment plans. View patient and family balances. Credit Card Processing Integrated credit card processor with swipe terminal. Treatment Plan View/Edit/Save treatment plans. Prioritize treatment. Create multiple treatment plans. Create planned appointments for treatment planned care. Print or send electronically insurance preauthorization forms. Chart Enter and organize patient clinical information. 3D tooth charting with timeline to show treatment over time. Track progress and treatment notes. Supports paper and electronic prescribing. Rx Alerts: Crosslink Diseases to Rx definitions so that an alert is triggered for allergies, etc. when writing an Rx. Procedure codes: Currently, the following sets of procedure codes are available as separate databases: blank, usa, canada, uk. Perio Charting: chart manually or using voice commands. Images Add and manage patient images. Integrate with Radiography, scanner, digital camera devices. Images can be zoomed in and out, rotated. Import Word, PDF, and Excel files or scanned images. Manage Create and send e-claims or paper claims. Billing automation. Audio and visual office intercom. Critical data backup. User-defined queries and reports. Track employee hours and breaks. Daily, weekly & monthly task lists. Built-in accounting intended to replace QuickBooks for small offices. Secure remote access. Language support: The code is all written to automatically adapt to the user's computer settings. The translations are specific to the culture (country), not just the language. Time Cards: User defined pay periods. Tracks 40-hour workweek, computes overtime, allows adjustments, and prints. Multiple Server/Location Support. eServices eClipboard eService and App (iOS and Android): patient check-in, patient forms, and patient picture using the practice's mobile device. eConfirmations: Send automated text message and/or email confirmations to remind patients about an upcoming appointment and allow the patient to e-confirm. eReminders: Send automated text message and/or email reminders about upcoming appointments. Integrated Texting: Send SMS text messages directly to patient's mobile devices and receive unlimited inbound text messages from patients. Mobile Web: Connect to the Open Dental database using a mobile device. Patient Portal: Give patients electronic access to their health information and use Secure Web Mail to send and receive patient information. Web Forms: Allow patients to complete forms online using any browser. Mobile Web Forms allow patients to complete forms using a mobile device. Web Sched New Patient: Allow new patients to schedule their first appointment online. Web Sched Recall: Automatically or manually email recall reminders that include a clickable link to schedule the appointment online. eRx: Write and transmit electronic prescriptions (only available in the United States and its territories, including Puerto Rico). Awards Best Dental Practice Management Software Provider 2018, Global Health & Pharma (GHP) DrBicuspid.com 2017 Dental excellence Awards: Best New/Updated Software/Service See also List of FLOSS healthcare programs References External links Open Dental Website MySQL Website Sourceforge Website ConvergedComm CRM plugin for OpenDental FLOSS health care resources Free software programmed in C Sharp Dental practice management software Healthcare software for Windows Healthcare software for Linux
41061529
https://en.wikipedia.org/wiki/Intel%20Galileo
Intel Galileo
Intel Galileo is the first in a line of Arduino-certified development boards based on Intel x86 architecture and is designed for the maker and education communities. Intel released two versions of Galileo, referred to as Gen 1 and Gen 2. These development boards are sometimes called "Breakout boards". The board was discontinued on June 19, 2017. Technical specifications Intel Galileo combines Intel technology with support for Arduino ready-made hardware expansion cards (called "shields") and the Arduino software development environment and libraries. The development board runs an open source Linux operating system with the Arduino software libraries, enabling re-use of existing software, called "sketches". The sketch runs every time the board is powered. Intel Galileo can be programmed through OS X, Microsoft Windows and Linux host operating software. The board is also designed to be hardware and software compatible with the Arduino shield ecosystem. Intel Galileo features the Intel Quark SoC X1000, the first product from the Intel Quark technology family of low-power, small-core products. Intel Quark represents Intel's attempt to compete within markets such as the Internet of Things and wearable computing. Designed in Ireland, the Quark SoC X1000 is a 32-bit, single core, single-thread, Pentium (P54C/i586) instruction set architecture (ISA)-compatible CPU, operating at speeds up to 400 MHz. The Quark is seen by some as Intel's answer to ARM, the processor design featured in smartphones and other single-board computers. At a clock speed of 400 MHz, together with 256 Mb of DDR3 RAM and 8 Mb flash memory, the Galileo is much more powerful than competing Arduino boards. The Mega 2560, for example, has a clock speed of 16 MHz, 8 Kb RAM and 256 Kb flash memory. It would be more appropriate to compare the Galileo to another single-board computer, such as the Raspberry Pi. The latest iteration, the Pi 3 Model B, replaced the Pi 2 Model B in February 2016. It is more powerful than the older Galileo Gen 2, featuring a 1.2 GHz CPU and 1 Gb RAM. The Pi, however, does not have any flash memory. Both Galileo boards support the Arduino shield ecosystem. Unlike most Arduino boards, the Intel boards support both 3.3V and 5V shields. The Intel development board comes with several computing industry standard I/O interfaces. The support for PCI Express means that Wifi, Bluetooth or GSM cards can be plugged in to the board. It also enables usage of solid state drives with the Galileo. The 10/100 Mbit Ethernet support enables the board to be connected to a LAN. It also enables accessing the Linux shell. The boards further support Micro SD, which means the available storage can be extended by up to 32 Gb. Other I/O interfaces include ACPI, USB 2.0 device and EHCI/OHCI USB host ports, high-speed UART, RS-232 serial port, programmable 8 MB NOR flash, and a JTAG port for easy debug. Although the Galileo shipped with Linux, it was possible to have a custom version of Windows on both the Gen 1 and the Gen 2. This support was, however, suspended by Microsoft on 30 November 2015. Microsoft cited hardware concerns, with some specifically attributing it to the low clock speed of the Galileo. The Galileo supports the Arduino IDE running atop an unmodified Linux software stack, supported by a common open source tool chain. The board comes pre-loaded with an SPI image of Linux. Although this version (Yocto 1.4 Poky Linux) has very limited features (e.g. it does not include a Wi-Fi module), it does not require any storage devices to be added. Intel also provides more functional versions of Linux for the boards. The "SD-Card" image can be downloaded and loaded onto the board via a Micro SD card. It includes, among a multitude of modules, a Wi-Fi module, support for OpenCV to enable computer vision, ALSA for sound processing and Node.js for JavaScript capabilities. A more advanced IoT DevKit version is also available to enable complex IoT projects, adding for example support for OpenCV-Python. The Raspberry Pi, as well as most boards from Arduino, does not have an onboard real time clock. The Galileo boards have a real time clock, requiring only a 3V coin cell battery. The boards can therefore keep accurate time without being connected to either a power source or internet. The Galileo can be seen as truly open source, as both the schematics and the source code are freely available for download without a software license agreement. However, some argued that the hardware shouldn't be designated open source if the processor core isn't also made open-source. Arduino ecosystem The Arduino ecosystem has three "levels": "Arduino" is manufactured and distributed by Arduino. "AtHeart" identifies any board which is manufactured using an Arduino-supported processor. "Certified" means that the board is supported by the Arduino platform, but does not use an Arduino-supported processor. The Galileo falls into the third category. Although it is the lowest level in the Arduino ecosystem, it still means that Galileo boards can be programmed using the official Arduino IDE, bought on the Arduino online shop and is compatible with Arduino peripherals such as shields. Usage The essential feature of development boards like the Galileo is the ability to create custom projects. Thanks to the open source nature of the Galileo (and the Arduino ecosystem in general), instructions to various projects can be found online. Some examples are: A burglar alarm, which requires a Galileo, a buzzer and a proximity sensor. A simple weather station using a Galileo and a DHT11 sensor (which measures temperature and humidity). The Sigma Reading Watch. This advanced project combines a Galileo Gen 2, e-ink and 3-D printing to create a wearable e-reader. Greeny the Smart Greenhouse is also a more advanced project. A Galileo Gen 2, an Arduino Uno, various electronic components, lamps, a water pump and an acrylic box are used to build an automated, remotely monitored mini greenhouse. Sales and adoption Intel does not publish sales data on its products. In an effort to boost the ecosystem of their Quark architecture, Intel gave away 50,000 Galileo Gen 1's when it was launched. In 2014, Microsoft also handed out Galileo boards to people who signed up for its IoT program. On 30 November 2015, Microsoft suspended support for Galileo. While it is unclear what effect this had on the sales numbers of the boards, it meant that developers creating projects for Microsoft's Windows 10 IoT Core had to move to Raspberry Pi 2 or 3. On 16 June 2017 Intel announced that the 'End of Life' and last shipment date for the Galileo range is 16 December 2017 Difference between Gen 1 and Gen 2 Intel Galileo Gen 2 Is similar to Gen 1 with the following changes: Replaces the RS-232 console port (audio jack) with a 1x6-pin 3.3V USB TTL UART header Adds 12-bit pulse-width modulation (PWM) Console UART1 redirection to Arduino* headers Power over Ethernet (PoE) capability (Requires installation of Silvertel Ag9712-2BR/FL power module) A power regulation system that accepts power supplies from 7V to 15V. Improved PWM control line means finer resolution for movement control. See also Intel Edison References External links Developer Zone, Get Started with Galileo Technology FreeRTOS running on a Galileo Intel Galileo Product Specifications Arduino Intel products Single-board computers
69477
https://en.wikipedia.org/wiki/Timeline%20of%20historic%20inventions
Timeline of historic inventions
The timeline of historic inventions is a chronological list of particularly important or significant technological inventions and their inventors, where known. A proportion of all discoveries within the United States made during the 20th (after 1943) and 21st centuries were made within skunk work enterprises. Paleolithic The dates listed in this section refer to the earliest evidence of an invention found and dated by archaeologists (or in a few cases, suggested by indirect evidence). Dates are often approximate and change as more research is done, reported and seen. Older examples of any given technology are found often. The locations listed are for the site where the earliest solid evidence has been found, but especially for the earlier inventions, there is little certainty how close that may be to where the invention took place. Lower Paleolithic The Lower Paleolithic period lasted over 3 million years, and corresponds to the human species prior to the emergence of Homo sapiens. The original divergence between humans and chimpanzees occurred 13 (Mya), however interbreeding continued until as recently as 4 Ma, with the first species clearly belonging to the human (and not chimpanzee) lineage being Australopithecus anamensis. This time period is characterized as an ice age with regular periodic warmer periods – interglacial episodes. 3.3-2.6 Mya: Stone tools – found in present-day Kenya, they are so old that only a pre-human species could have invented them. The otherwise earliest known stone tools (Oldowan) were found in Ethiopia developed perhaps by Australopithecus garhi or Homo habilis 2.3 Mya: Earliest likely control of fire and cooking, by Homo habilis 1.76 Mya: Advanced (Acheulean) stone tools in Kenya by Homo erectus 1.5 Mya: Bone tools in Africa. 900-40 kya: Boats. 500 kya: Hafting in South Africa. 400 kya: Pigments in Zambia 400-300 kya: Spears in Germany likely by Homo heidelbergensis 350-150 kya: Estimated origin of language Middle Paleolithic The dawn of Homo sapiens around 300 kya coincides with the start of the Middle Paleolithic period. Towards the middle of this 250,000-year period, humans begin to migrate out of Africa, and the later part of the period shows the beginning of long-distance trade, religious rites and other behavior associated with Behavioral modernity. c. 320 kya: The trade and long-distance transportation of resources (e.g. obsidian), use of pigments, and possible making of projectile points in Kenya 279 kya: Early stone-tipped projectile weapons in Ethiopia c. 200 kya: Glue in Central Italy by Neanderthals. More complicated compound adhesives developed by Homo sapiens have been found from c. 70 ka Sibudu, South Africa and have been regarded as a sign of cognitive advancement. 170-83 kya: Clothing (among anatomically modern humans in Africa). Some other evidence suggests that humans may have begun wearing clothing as far back as 100,000 to 500,000 years ago. 164-47 kya: Heat treating of stone blades in South Africa. 135-100 kya: Beads in Israel and Algeria 100 kya: Compound paints made in South Africa 100 kya: Funerals (in the form of burial) in Israel 90 kya: Harpoons in the Democratic Republic of the Congo. 77 kya: Beds in South Africa 70-60 kya: Oldest arrows (and evidence of bow-and-arrow technology), and oldest needle, at Sibudu, South Africa Upper Paleolithic to Early Mesolithic 50 ka has been regarded by some as the beginning of behavioral modernity, defining the Upper Paleolithic period, which lasted nearly 40,000 years (though some research dates the beginning of behavioral modernity earlier to the Middle Paleolithic). This is characterized by the widespread observation of religious rites, artistic expression and the appearance of tools made for purely intellectual or artistic pursuits. 49-30 ka: Ground stone tools – fragments of an axe in Australia date to 49-45 ka, more appear in Japan closer to 30 ka, and elsewhere closer to the Neolithic. 47 ka: The oldest-known mines in the world are from Swaziland, and extracted hematite for the production of the red pigment ochre. 45 ka: Shoes, as evidenced by changes in foot bone morphology in Eurasia Bark sandals), dated to 10 to 9 ka were found in Fort Rock Cave in the US state of Oregon in 1938. Oldest leather shoe (Areni-1 shoe), 5.5 ka. 44–42 ka: Tally sticks (see Lebombo bone) in Swaziland 43.7 ka: Cave painting in Indonesia 37 ka: Mortar and pestle in Southwest Asia 36 ka: Weaving – Indirect evidence from Czechia, Georgia and Moravia. The earliest actual piece of woven cloth was found in Çatalhöyük, Turkey. 35 ka: Flute in Germany 33-10 ka: Star chart in France and Spain 28 ka: Rope 26 ka: Ceramics in Europe 23 ka: Domestication of the dog in Siberia. 19 ka: Bullroarer in Ukraine 16 ka: Pottery in China 14.5 ka: Bread in Jordan Agricultural and proto-agricultural eras The end of the Last Glacial Period ("ice age") and the beginning of the Holocene around 11.7 ka coincide with the Agricultural Revolution, marking the beginning of the agricultural era, which persisted until the industrial revolution. Neolithic and Late Mesolithic During the Neolithic period, lasting 8400 years, stone remained the predominant material for toolmaking, although copper and arsenic bronze were developed towards the end of this period. 12-11 ka: Agriculture in the Fertile Crescent 12–11 ka: Domestication of sheep in Southwest Asia (followed shortly by pigs, goats and cattle) 11-8 ka: Domestication of rice in China 11 ka: Constructed stone monument – Göbekli Tepe, in Turkey 9000 BC: Mudbricks, and clay mortar in Jericho. 8000–7500 BC: Proto-city – large permanent settlements, such as Tell es-Sultan (Jericho) and Çatalhöyük, Turkey. 7000 BC: Alcohol fermentation – specifically mead, in China 7000 BC: Sled dog and Dog sled, in Siberia. 7000 BC: Tanned leather in Mehrgarh, Pakistan. 6500 BC: Evidence of lead smelting in Çatalhöyük, Turkey 6000 BC: Kiln in Mesopotamia (Iraq) 6th millennium BC: Irrigation in Khuzistan, Iran 6000-3200 BC: Proto-writing in present day Egypt, Iraq, Serbia, China and Pakistan. c. 5500 BC: Sailing pottery depictions of sail boats, in Mesopotamia, and later ancient Egypt 5000 BC: Copper smelting in Serbia 5000 BC: Seawall in Israel 5th millennium BC: Lacquer in China 5000 BC: Cotton thread, in Mehrgarh, Pakistan, connecting the copper beads of a bracelet. 5000–4500 BC: Rowing oars in China 4500–3500 BC: Lost-wax casting in Israel or the Indus Valley 4400 BC: Fired bricks in China. 4000 BC: Probable time period of the first diamond-mines in the world, in Southern India. Around 4000 BC: Paved roads, in and around the Mesopotamian city of Ur, Iraq. 4000 BC: Plumbing. The earliest pipes were made of clay, and are found at the Temple of Bel at Nippur in Babylonia. 4000–3500 BC: Wheel: potter's wheels in Mesopotamia and wheeled vehicles in Mesopotamia (Sumerian civilization), the Northern Caucasus (Maykop culture) and Central Europe (Cucuteni–Trypillia culture). 3630 BC: Silk garments (sericulture) in China 3500 BC: Domestication of the horse in the Eurasian Steppes. 3500 BC: Wine as general anesthesia in Sumer. 3500 BC: Seal (emblem) invented around in the Near East, at the contemporary sites of Uruk in southern Mesopotamia and slightly later at Susa in south-western Iran during the Proto-Elamite period, and they follow the development of stamp seals in the Halaf culture or slightly earlier. 3400-3100 BC: Tattoos in southern Europe Bronze Age The beginning of bronze-smelting coincides with the emergence of the first cities and of writing in the Ancient Near East and the Indus Valley. The Bronze Age starting in Eurasia in the 4th millennia BC and ended, in Eurasia, c.1300 BC. c. 4650 BC: Copper-tin bronze found at the Pločnik(Serbia) site, and belonging to the Vinča culture, believed to be produced from smelting a natural tin baring copper ore, Stannite. c. 3300 BC: City in Uruk, Sumer, Mesopotamia (modern-day Iraq). c. 3300 BC: Writing – Cuneiform in Sumer. bef. 3200 BC: dry Latrines in the city of Uruk, Iraq, with later dry squat Toilets, that added raised fired brick foot platforms, and pedestal toilets, all over clay pipe constructed drains. bef. 3000 BC: Devices functionally equivalent to dice, in the form of flat two-sided throwsticks, are seen in the Egyptian game of Senet. Later, terracotta dice resembling modern ones were used at the Indus Valley site of Mohenjo-Daro (modern-day Pakistan). c. 3000 BC: Tin extraction in Central Asia 3000 - 2560 BC: Papyrus in Egypt c. 3000 BC: Reservoir in Girnar, Indus Valley (modern-day India). c. 3000 BC: Sea-going ships by Austronesians (modern-day Southern China, Taiwan) c. 3000 BC: Receipt in Ancient Mesopotamia (Iraq) by 2800 BC: ploughing, Kalibangan, Indus Valley (modern-day India). c. 2600 BC: Planned city in Indus Valley (modern-day: India, Pakistan). By 2650 BC: The Ruler, or Measuring rod, in the subdivided Nippur, copper rod, of the Sumerian Civilisation (modern-day Iraq). c. 2600 BC: Public sewage and sanitation systems in Indus Valley sites such as Mohenjo-Daro and Rakhigarhi (modern-day: India, Pakistan). c. 2600 BC: Public bath in Mohenjo-daro, Indus Valley (modern-day Pakistan). c. 2600 BC: Levee in Indus Valley. by 2556 BC: Docks A harbor structure has been excavated in Wadi al-Jarf, Egypt, which was developed by the reign of the Pharaoh Khufu (2589–2566 B.C). 3000 - 2500 BC: Rhinoplasty in Egypt. c. 2600 BC: balance weights and scales, from the Fourth Dynasty of Egypt; examples of Deben (unit) balance weights, from reign of Sneferu (c. 2600 BC) have been attributed. 2500 BC: Puppetry in the Indus Valley. 2500 BC: Dictionary in Mesopotamia. c. 2400 BC: Copper pipes, the Pyramid of Sahure, and adjoining temple complex at Abusir, was discovered to have a network of copper drainage pipes. aft. 2400 BC: Touchstone in the Indus Valley site of Banawali (modern-day India). c. 2200 BC: Protractor, Phase IV, Lothal, Indus Valley (modern-day India), a Xancus shell cylindar with sawn groves, at right angles, in its top and bottom surfaces, has been proposed as an angle marking tool. c. 2200 BC: Domestication of the modern Horse (Equus ferus caballus), Don-Volga region or Russia. c. 2000 BC: Water clock by at least the old Babylonian period (c. 2000 – c. 1600 BC), but possibly earlier from Mohenjo-Daro in the Indus Valley. c. 2000 BC: Musical notation in Sumer c. 2000 BC: Chariot in Russia and Kazakhstan c. 2000 BC: Fountain in Lagash, Sumer bef. 2000 BC: Scissors, in Mesopotamia. c. 1850 BC: Proto-alphabet (Proto-Sinaitic script) in Egypt. by 1500 BC: Sundial in Ancient Egypt or Babylonia (modern-day Iraq). c. 1500 BC: Glass manufacture in either Mesopotamia or Ancient Egypt by 1600 BC: Surgical treatise appeared in Egypt. c. 1500 BC: Seed drill in Babylonia bef. 1400 BC: Rubber, Mesoamerican ballgame. c. 1300 BC: Lathe in Ancient Egypt 1400 - 1200 BC: Concrete in Tiryns (Mycenaean Greece). Waterproof concrete was later developed by the Assyrians in 688 BC, and the Romans developed concretes that could set underwater. The Romans later used concrete extensively for construction from 300 BC to 476 AD. Iron Age The Late Bronze Age collapse occurs around 1300-1175 BC, extinguishing most Bronze-Age Near Eastern cultures, and significantly weakening the rest. This is coincident with the complete collapse of the Indus Valley Civilisation. This event is followed by the beginning of the Iron Age. We define the Iron Age as ending in 510 BC for the purposes of this article, even though the typical definition is region-dependent (e.g. 510 BC in Greece, 322 BC in India, 200 BC in China), thus being an 800-year period. 1300 BC: Iron smelting in the Hittite Empire of the Middle East. 1200 BC: Distillation is discribed on Akkadian tablets documenting perfumery operations. 700 BC: Saddle (fringed cloths or pads used by Assyrian cavalry) 650 BC: Crossbow in China. 600 BC: Coins in Phoenicia (Modern Lebanon) or Lydia Late 7th or early 6th century BC: Wagonway called Diolkos across the Isthmus of Corinth in Ancient Greece 6th century BC to 10th century AD: High Carbon Steel, produced by the Closed Crucible method, later known as Wootz steel, of South India. 6th century BC: University in Taxila, of the Indus Valley, then part of the kingdom of Gandhara, of the Achaemenid Empire (modern-day Pakistan). 6th century to 2nd centuries BC: Systematization of medicine and surgery in the Sushruta Samhita in Vedic Northern India. Documented procedures to: Perform Cataract surgery (Couching). Babylonian and Egyptian texts, a millennia before, depict and mention oculists, but not the procedure itself. Perform Caesarean section. Construct Prosthetic limbs. Perform Plastic surgery, though reconstructive nasal surgery is described in millennia older Egyptian papyri. Late 6th century BC: Crank motion (rotary quern) in Carthage or 5th century BC Celtiberian Spain Later during the Roman empire, a mechanism appeared that incorporated a connecting rod. Before 5th century BC: Loan deeds in Upanishadic India. c. 515 BC: Crane in Ancient Greece 500 BC Lighthouse in Greece Classical antiquity and medieval era 5th century BC 500 to 200 BC: Toe stirrup, depicted in 2nd century Buddhist art, of the Sanchi and Bhaja Caves, of the Deccan Satavahana empire (modern day India) although may have originated as early as 500 BC. 485 BC: Catapult by Ajatashatru in Magadha, India. 485 BC: Scythed chariot by Ajatashatru in Magadha, India. 5th century BC: Cast iron in Ancient China: Confirmed by archaeological evidence, the earliest cast iron is developed in China by the early 5th century BC during the Zhou Dynasty (1122–256 BC), the oldest specimens found in a tomb of Luhe County in Jiangsu province. c. 480 BC: Spiral stairs (Temple A) in Selinunte, Sicily (see also List of ancient spiral stairs) By 407 BC: Wheelbarrow in Greece. By 400 BC: Camera obscura by Mo-tzu (or Mozi) in China. 4th century BC 4th century BC: Traction trebuchet in Ancient China. 4th century BC: Gears in Ancient China 4th century BC: Reed pens, utilising a split nib, were used to write, with ink, on Papyrus, in Egypt. 4th century BC: nailed Horseshoe, with 4 bronze shoes found in an Etruscan tomb. 375–350 BC: Animal-driven rotary mill in Carthage. By the late 4th century BC: Corporations in either the Maurya Empire of India or in Ancient Rome (Collegium). Late 4th century BC: Cheque in the Maurya Empire of India. Late 4th century BC: Potassium nitrate manufacturing and military use in the Seleucid Empire. Late 4th century BC: Formal systems by Pāṇini in India, possibly during the reign of Chandragupta Maurya. 4th to 3rd century BC: Zinc production in North-Western India during the Maurya Empire. The earliest known zinc mines and smelting sites are from Zawar, near Udaipur, in Rajasthan. 3rd century BC 3rd century BC: Analog computers in the Hellenistic world (see e.g. the Antikythera mechanism), possibly in Rhodes. By at least the 3rd century BC: Archimedes screw in Ancient Greece Early 3rd century BC: Canal lock in Ancient Suez Canal under Ptolemy II (283–246 BC) in Hellenistic Egypt 3rd century BC: Cam during the Hellenistic period, used in water-driven automata. By the 3rd century BC: Water wheel. The origin is unclear: Indian Pali texts dating to the 4th century BCE refer to the cakkavattaka, which later commentaries describe as arahatta-ghati-yanta (machine with wheel-pots attached). Helaine Selin suggests that the device existed in Persia before 350 BC. The clearest description of the water wheel and Liquid-driven escapement is provided by Philo of Byzantium (c. 280 – 220 BC) in the Hellenistic kingdoms. 3rd century BC: Gimbal described Philo of Byzantium Late 3rd century BC: Dry dock under Ptolemy IV (221–205 BC) in Hellenistic Egypt 3rd–2nd century BC: Blast furnace in Ancient China: The earliest discovered blast furnaces in China date to the 3rd and 2nd centuries BC, although most sites are from the later Han Dynasty. 2nd century BC 2nd century BC: Paper in Han Dynasty China 1st century BC 1st century BC: Segmental arch bridge (e.g. Pont-Saint-Martin or Ponte San Lorenzo) in Italy, Roman Republic 1st century BC: News bulletin during the reign of Julius Caesar. A paper form, i.e. the earliest newspaper, later appeared during the late Han dynasty in the form of the Dibao. 1st century BC: Arch dam (Glanum Dam) in Gallia Narbonensis, Roman Republic (see also List of Roman dams) Before 40 BC: Trip hammer in China 38 BC: an empty shell Glyph for zero, is found on a Maya numerals Stela, from Chiapa de Corzo, Chiapas. Independently invented by Claudius Ptolemy, in the second century CE Egypt, and appearing in the calculations of the Almagest. Before 25 BC: Reverse overshot water-wheel by Roman engineers in Rio Tinto, Spain 37-14: Glass blowing developed in Jerusalem. 1st century 1st century: The Aeolipile, a simple steam turbine is recorded by Hero of Alexandria. 1st century: Vending machines invented by Hero of Alexandria. By the 1st century: The double-entry bookkeeping system in the Roman Empire. By 50 AD: Flamethrowers by the Early Cholas of Southern India (according to the Periplus of the Erythrean Sea). 2nd century 132: Seismometer and pendulum in Han Dynasty China, built by Zhang Heng. It is a large metal urn-shaped instrument which employed either a suspended pendulum or inverted pendulum acting on inertia, like the ground tremors from earthquakes, to dislodge a metal ball by a lever trip device. 2nd century: Carding in India. 3rd century By at least the 3rd century: Crystallized sugar in India. Early 3rd century: Woodblock printing is invented in Han Dynasty China at sometime before 220 AD. This made China become the world's first print culture. Late 3rd–early 4th century: Water turbine in the Roman Empire in modern-day Tunisia. 4th century 280-550 AD: Chess in India during the Gupta Empire. 4th century: Roman Dichroic glass, which displays one of two different colors depending on lighting conditions. 4th century: Mariner's compass in Tamil Southern India: the first mention of the use of a compass for navigational purposes is found in Tamil nautical texts as the macchayantra. However, the theoretical notion of magnets pointing North predates the device by several centuries. 4th century: Simple suspension bridge, independently invented in Pre-Columbian South America, and the Hindu Kush range, of present day Afghanistan and Pakistan. With Han dynasty travellers noting bridges being constructed from 3 or more vines or 3 ropes. Later bridges constructed utilising cables of iron chains appeared in Tibet. 4th century: Fishing reel in Ancient China: In literary records, the earliest evidence of the fishing reel comes from a 4th-century AD work entitled Lives of Famous Immortals. 347 AD: Oil Wells and Borehole drilling in China. Such wells could reach depths of up to 240 m (790 ft). 4th–5th century: Paddle wheel boat (in De rebus bellicis) in Roman Empire 5th century 400 AD: The construction of the Iron pillar of Delhi in Mathura by the Gupta Empire shows the development of rust-resistant ferrous metallurgy in Ancient India, although original texts do not survive to detail the specific processes invented in this period. 5th century: Horse collar in Southern and Northern Dynasties China: The horse collar as a fully developed collar harness is developed in Southern and Northern Dynasties China during the 5th century AD. The earliest depiction of it is a Dunhuang cave mural from the Chinese Northern Wei Dynasty, the painting dated to 477–499. 5th/6th century: Pointed arch bridge (Karamagara Bridge) in Cappadocia, Eastern Roman Empire 6th century By the 6th century: Incense clock in India and China. after 500 AD: Charkha (spinning wheel/cotton gin): invented in India (probably during the Vakataka dynasty of Maharashtra), between 500 and 1000 A.D. 563 AD: Pendentive dome (Hagia Sophia) in Constantinople, Eastern Roman Empire 577 AD: Sulfur matches exist in China. 589 AD: Toilet paper in Sui Dynasty China, first mentioned by the official Yan Zhitui (531–591), with full evidence of continual use in subsequent dynasties. 7th century 650 AD Windmill in Persia 672 AD: Greek fire in Constantinople, Byzantine Empire: Greek fire, an incendiary weapon likely based on petroleum or naphtha, is invented by Kallinikos, a Lebanese Greek refugee from Baalbek, as described by Theophanes. However, the historicity and exact chronology of this account is dubious, and it could be that Kallinikos merely introduced an improved version of an established weapon. 7th century: Banknote in Tang Dynasty China: The banknote is first developed in China during the Tang and Song dynasties, starting in the 7th century. Its roots are in merchant receipts of deposit during the Tang Dynasty (618–907), as merchants and wholesalers desire to avoid the heavy bulk of copper coinage in large commercial transactions. 7th century: Porcelain in Tang Dynasty China: True porcelain is manufactured in northern China from roughly the beginning of the Tang Dynasty in the 7th century, while true porcelain was not manufactured in southern China until about 300 years later, during the early 10th century. 8th century 9th century 9th century: Gunpowder in Tang Dynasty China: Gunpowder is, according to prevailing academic consensus, discovered in the 9th century by Chinese alchemists searching for an elixir of immortality. Evidence of gunpowder's first use in China comes from the Five Dynasties and Ten Kingdoms period (618–907). The earliest known recorded recipes for gunpowder are written by Zeng Gongliang, Ding Du, and Yang Weide in the Wujing Zongyao, a military manuscript compiled in 1044 during the Song Dynasty (960–1279). 9th century: Degree-granting university in Morocco 10th century 10th century: Fire lance in Song Dynasty China, developed in the 10th century with a tube of first bamboo and later on metal that shot a weak gunpowder blast of flame and shrapnel, its earliest depiction is a painting found at Dunhuang. Fire lance is the earliest firearm in the world and one of the earliest gunpowder weapons. 10th century: Fireworks in Song Dynasty China: Fireworks first appear in China during the Song Dynasty (960–1279), in the early age of gunpowder. Fireworks could be purchased from market vendors; these were made of sticks of bamboo packed with gunpowder. 11th century 11th century: Ambulance by Crusaders in Palestine and Lebanon 11th century: Early versions of the Bessemer process are developed in China. 11th century: Endless power-transmitting chain drive by Su Song for the development an astronomical clock (the Cosmic Engine) 1088: Movable type in Song Dynasty China: The first record of a movable type system is in the Dream Pool Essays, which attributes the invention of the movable type to Bi Sheng. 12th century 12th century: Bond trading in France. 13th century 13th century: Rocket for military and recreational uses date back to at least 13th-century China. 13th century: The earliest form of mechanical escapement, the verge escapement in Europe. 13th century: Buttons (combined with buttonholes) as a functional fastening or closing clothes appear first in Germany. 1277: Land mine in Song Dynasty China: Textual evidence suggests that the first use of a land mine in history is by a Song Dynasty brigadier general known as Lou Qianxia, who uses an 'enormous bomb' (huo pao) to kill Mongol soldiers invading Guangxi in 1277. 1286: Eyeglasses in Italy 13th century: Explosive bomb in Jin dynasty Manchuria: Explosive bombs are used in 1221 by the Jin dynasty against a Song Dynasty city. The first accounts of bombs made of cast iron shells packed with explosive gunpowder are documented in the 13th century in China and are called "thunder-crash bombs", coined during a Jin dynasty naval battle in 1231. 13th century: Hand cannon in Yuan Dynasty China: The earliest hand cannon dates to the 13th century based on archaeological evidence from a Heilongjiang excavation. There is also written evidence in the Yuanshi (1370) on Li Tang, an ethnic Jurchen commander under the Yuan Dynasty who in 1288 suppresses the rebellion of the Christian prince Nayan with his "gun-soldiers" or chongzu, this being the earliest known event where this phrase is used. 13th or 14th century: worm gear cotton gin in Peninsular India (i.e. probably under the Yadava dynasty although may also be the Vijayanagara Empire or Bahmani Sultanate). 14th century Early to Mid 1300s: Multistage rocket in Ming Dynasty China described in Huolongjing by Jiao Yu. By at least 1326: Cannon in Ming Dynasty China 14th century: Jacob's staff described by Levi ben Gerson 14th century: Naval mine in Ming Dynasty China: Mentioned in the Huolongjing military manuscript written by Jiao Yu (fl. 14th to early 15th century) and Liu Bowen (1311–1375), describing naval mines used at sea or on rivers and lakes, made of wrought iron and enclosed in an ox bladder. A later model is documented in Song Yingxing's encyclopedia written in 1637. 15th century Early 15th century: Coil spring in Europe 15th century: Mainspring in Europe 15th century: Rifle in Europe 1420s: Brace in Flandres, Holy Roman Empire 1439: Printing press in Mainz, Germany: The printing press is invented in the Holy Roman Empire by Johannes Gutenberg before 1440, based on existing screw presses. The first confirmed record of a press appeared in a 1439 lawsuit against Gutenberg. Mid 15th Century: The Arquebus (also spelled Harquebus) is invented, possibly in Spain. 1451: Caravel, a small, highly-maneuverable sailing ship developed by the Portuguese 1480s: Mariner's astrolabe in Portuguese circumnavigation of Africa 16th century 1560: Floating Dry Dock in Venice, Venetian Republic 1569: Mercator Projection map created by Gerardus Mercator 1589: Stocking frame: Invented by William Lee. 1594: Backstaff: Invented by Captain John Davis. By at least 1597: Revolver: Invented by Hans Stopler. Modern era 17th century 1605: Newspaper (Relation): Johann Carolus in Strassburg, Holy Roman Empire of the German Nation (see also List of the oldest newspapers) 1608: Telescope: Patent applied for by Hans Lippershey in the Netherlands. Actual inventor unknown since it seemed to already be a common item being offered by the spectacle makers in the Netherlands with Jacob Metius also applying for patent and the son of Zacharias Janssen making a claim 47 years later that his father invented it. c. 1620: Compound microscopes, which combine an objective lens with an eyepiece to view a real image, first appear in Europe. Apparently derived from the telescope, actual inventor unknown, variously attributed to Zacharias Janssen (his son claiming it was invented in 1590), Cornelis Drebbel, and Galileo Galilei. 1630: Slide rule: invented by William Oughtred 1642: Mechanical calculator. The Pascaline is built by Blaise Pascal 1643: Barometer: invented by Evangelista Torricelli, or possibly up to three years earlier by Gasparo Berti. 1650: Vacuum pump: Invented by Otto von Guericke. 1656: Pendulum clock: Invented by Christiaan Huygens. It was first conceptualized in 1637 by Galileo Galilei but he was unable to create a working model. 1663: Friction machine: Invented by Otto von Guericke. 1680: Christiaan Huygens provides the first known description of a piston engine. 18th century 1700s c. 1709: Bartolomeo Cristofori crafts the first piano. 1709: Daniel Gabriel Fahrenheit invents the alcohol thermometer. 1710s 1712: Thomas Newcomen builds the first commercial steam engine to pump water out of mines. Newcomen's engine, unlike Thomas Savery's, uses a piston. 1730s c. 1730: Thomas Godfrey and John Hadley independently develop the octant 1733: John Kay enables one person to operate a loom with the flying shuttle 1736: John Harrison tests his first Sea Clock, H1. 1738: Lewis Paul and John Wyatt invent the first mechanized cotton spinning machine. 1740s 1742: Benjamin Franklin invents the Franklin Stove. 1745: Musschenbroek and Kleist independently develop the Leyden jar, an early form of capacitor. 1746: John Roebuck invents the lead chamber process. 1750s 1752: Benjamin Franklin invents the lighting rod. 1755: William Cullen invents the first artificial refrigeration machine. 1760s 1764: James Hargreaves invents the spinning jenny. 1765: James Watt invents the improved steam engine utilizing a separate condenser. 1767: Joseph Priestley invents a method for the production of carbonated water. 1769: Nicolas-Joseph Cugnot invents the first steam-powered vehicle capable of carrying passengers, an early car. 1770s 1770: Richard Salter invents the earliest known design for a weighing scale. 1774: John Wilkinson invents his boring machine, considered by some to be the first machine tool. 1775: Jesse Ramsden invents the modern screw-cutting lathe. 1776: John Wilkinson invents a mechanical air compressor that would become the prototype for all later mechanical compressors. 1780s 1783: Claude de Jouffroy builds the first steamboat. 1783: Joseph-Ralf and Jacques-Étienne Montgolfier build the first manned hot air balloon. 1783: Louis-Sébastien Lenormand invents and uses the first modern parachute. 1785: Martinus van Marum is the first to use the electrolysis technique. 1786: Andrew Meikle invents the threshing machine. 1789: Edmund Cartwright invents the power loom. 1790s 1790: Thomas Saint invents the sewing machine. 1792: Claude Chappe invents the modern semaphore telegraph. 1793: Eli Whitney invents the modern cotton gin. 1795: Joseph Bramah invents the hydraulic press. 1796: Alois Senefelder invents the lithography printing technique. 1797: Samuel Bentham invents plywood. 1798: Edward Jenner develops the first vaccine, the smallpox vaccine. 1799: George Medhurst invents the first motorized air compressor. 1799: The first paper machine is invented by Louis-Nicolas Robert. 19th century 1800s 1800: Alessandro Volta invents the voltaic pile, an early form of battery in Italy, based on previous works by Luigi Galvani. 1802: Humphry Davy invents the arc lamp (exact date unclear; not practical as a light source until the invention of efficient electric generators). 1804: Friedrich Sertürner discovers morphine as the first active alkaloid extracted from the opium poppy plant. 1804: Richard Trevithick invents the steam locomotive. 1804: Hanaoka Seishū creates tsūsensan, the first modern general anesthetic. 1807: Nicéphore Niépce invents the first internal combustion engine capable of doing useful work. 1807: François Isaac de Rivaz designs the first automobile powered by an internal combustion engine fuelled by hydrogen. 1807: Robert Fulton expands water transportation and trade with the workable steamboat. 1810s 1810: Nicolas Appert invents the canning process for food. 1810: Abraham-Louis Breguet creates the first wristwatch. 1811: Friedrich Koenig invents the first powered printing press, which was also the first to use a cylinder. 1812: William Reid Clanny pioneered the invention of the safety lamp which he improved in later years. Safety lamps based on Clanny's improved design were used until the adoption of electric lamps. 1814: James Fox invents the modern planing machine, though Matthew Murray of Leeds and Richard Roberts of Manchester have also been credited at times with its invention. 1816: Francis Ronalds builds the first working electric telegraph using electrostatic means. 1816: Robert Stirling invents the Stirling engine. 1817: Baron Karl von Drais invents the dandy horse, an early velocipede and precursor to the modern bicycle. 1818: Marc Isambard Brunel invents the tunnelling shield. 1820s 1822: Thomas Blanchard invents the pattern-tracing lathe (actually more like a shaper) and was completed by for the U.S. Ordnance Dept. The lathe can copy symmetrical shapes and is used for making gun stocks, and later, ax handles. The lathe's patent is in force for 42 years, the record for any U.S. patent. 1822: Nicéphore Niépce invents Heliography, the first photographic process. 1822: Charles Babbage, considered the "father of the computer", begins building the first programmable mechanical computer. 1823: Johann Wolfgang Döbereiner invents the first lighter. 1824: Johann Nikolaus von Dreyse invents the bolt-action rifle. 1825: William Sturgeon invents the electromagnet. 1826: John Walker invents the friction match. 1826: James Sharp invents and goes on to manufacture the first practical Gas stove. 1828: James Beaumont Neilson develops the hot blast process. 1828: Patrick Bell invents the reaping machine. 1828: Hungarian physicist Ányos Jedlik invents the first commutated rotary electromechanical machine with electromagnets. 1829: William Mann invents the compound air compressor. 1830s 1830: Edwin Budding invents the lawn mower. 1831: Michael Faraday invents a method of electromagnetic induction. It would be independently invented by Joseph Henry the following year. 1834: Moritz von Jacobi, a German-born Russian, invents the first practical electric motor. 1835: Joseph Henry invents the electromechanical relay. 1837: Samuel Morse invents Morse code. 1838: Moritz von Jacobi invents Electrotyping. 1839: William Otis invents the steam shovel. 1839: James Nasmyth invents the steam hammer. 1839: Edmond Becquerel invents a method for the photovoltaic effect, effectively producing the first solar cell. 1840s 1841: Alexander Bain devises a printing telegraph. 1842: William Robert Grove invents the first fuel cell. 1842: John Bennet Lawes invents superphosphate, the first man-made fertilizer. 1844: Friedrich Gottlob Keller and, independently, Charles Fenerty come up with the wood pulp method of paper production. 1845: Isaac Charles Johnson invents Modern Portland cement. 1846: Henri-Joseph Maus invents the Tunnel boring machine. 1847: Ascanio Sobrero invents Nitroglycerin, the first explosive made that was stronger than black powder. 1848: Jonathan J. Couch invents the pneumatic drill. 1849: Walter Hunt invents the first repeating rifle to use metallic cartridges (of his own design) and a spring-fed magazine. 1849: James B. Francis invents the Francis turbine. 1850s 1850: Sir William Armstrong invents the hydraulic accumulator. 1852: Robert Bunsen is the first to use a chemical vapor deposition technique. 1852: Elisha Otis invents the safety brake elevator. 1852: Henri Giffard becomes the first person to make a manned, controlled and powered flight using a dirigible. 1853: François Coignet invents reinforced concrete. 1855: James Clerk Maxwell invents the first practical method for color photography, whether chemical or electronic. 1855: Sir. Henry Bessemer patents the Bessemer process for making steel, with improvements made by others over the following years. 1856: Alexander Parkes invents parkesine, also known as celluloid, the first man-made plastic. 1856: James Harrison produces the world's first practical ice making machine and refrigerator using the principle of vapour compression in Geelong, Australia. 1856: William Henry Perkin invents Mauveine, the first synthetic dye. 1857: Heinrich Geissler invents the Geissler tube. 1859: Gaston Planté invents the lead acid battery, the first rechargeable battery. 1860s 1860: Joseph Swan produces carbon fibers. 1864: Louis Pasteur invents the pasteurization process. 1865: Carl Wilhelm Siemens and Pierre-Émile Martin invented the Siemens-Martin process for making steel. 1867: Alfred Nobel invents Dynamite, the first safely manageable explosive stronger than black powder. 1867: Lucien B. Smith invents barbed wire, which Joseph F. Glidden will modify in 1874, leading to the taming of the West and the end of the cowboys. 1870s 1872: J.E.T. Woods and J. Clark invented Stainless steel. Harry Brearley was the first to commercialize it. 1873: Frederick Ransome invents the rotary kiln. 1873: Sir William Crookes, a chemist, invents the Crookes radiometer as the by-product of some chemical research. 1873: Zénobe Gramme invents the first commercial electrical generator, the Gramme machine. 1874: Gustave Trouvé invents the first metal detector. 1875: Fyodor Pirotsky invents the first electric tram near Saint Petersburg, Russia. 1876: Nicolaus August Otto invents the Four-stroke cycle. 1876: Alexander Graham Bell has a patent granted for the telephone. However, other inventors before Bell had worked on the development of the telephone and the invention had several pioneers. 1877: Thomas Edison invents the first working phonograph. 1878: Henry Fleuss is granted a patent for the first practical rebreather. 1878: Lester Allan Pelton invents the Pelton wheel. 1879: Joseph Swan and Thomas Edison both patent a functional Incandescent light bulb. Some two dozen inventors had experimented with electric incandescent lighting over the first three-quarters of the 19th century but never came up with a practical design. Swan's, which he had been working on since the 1860s, had a low resistance so was only suited for small installations. Edison designed a high-resistance bulb as part of a large-scale commercial electric lighting utility. 1880s 1881: Nikolay Benardos presents carbon arc welding, the first practical arc welding method. 1884: Hiram Maxim invents the recoil-operated Maxim gun, ushering in the age of semi- and fully automatic firearms. 1884: Paul Vieille invents Poudre B, the first smokeless powder for firearms. 1884: Sir Charles Parsons invents the modern steam turbine. 1884: Hungarian engineers Károly Zipernowsky, Ottó Bláthy and Miksa Déri invent the closed core high efficiency transformer and the AC parallel power distribution. 1885: John Kemp Starley invents the modern safety bicycle. 1886: Carl Gassner invents the zinc–carbon battery, the first dry cell battery, making portable electronics practical. 1886: Charles Martin Hall and independently Paul Héroult invent the Hall–Héroult process for economically producing aluminum in 1886. 1886: Karl Benz invents the first petrol or gasoline powered auto-mobile (car). 1887: Carl Josef Bayer invents the Bayer process for the production of alumina. 1887: James Blyth invents the first wind turbine used for generating electricity. 1887: John Stewart MacArthur, working in collaboration with brothers Dr. Robert and Dr. William Forrest develops the process of gold cyanidation. 1888: John J. Loud invents the ballpoint pen. 1888: Heinrich Hertz publishes a conclusive proof of James Clerk Maxwell's electromagnetic theory in experiments that also demonstrate the existence of radio waves. The effects of electromagnetic waves had been observed by many people before this but no usable theory explaining them existed until Maxwell. 1890s 1890s: Frédéric Swarts invents the first chlorofluorocarbons to be applied as refrigerant. 1890: Robert Gair would invent the pre-cut Cardboard box. 1890: Clément Ader invents the first aircraft, airplane, fly machine called Eole (aircraft) or Ader Éole 1891: Whitcomb Judson invents the zipper. 1892: Léon Bouly invents the cinematograph. 1892: Thomas Ahearn invents the Electric Oven. 1893: Rudolf Diesel invents the diesel engine (although Herbert Akroyd Stuart had experimented with compression ignition before Diesel). 1895: Guglielmo Marconi invents a system of wireless communication using radio waves. 1895: Wilhelm Conrad Röntgen invented the first radiograph (xrays). 1898: Hans von Pechmann synthesizes polyethylene, now the most common plastic in the world. 1899: Waldemar Jungner invents the rechargeable nickel-cadmium battery (NiCd) as well as the nickel-iron electric storage battery (NiFe) and the rechargeable alkaline silver-cadmium battery (AgCd) 20th century 1900s 1900: The first Zeppelin is designed by Theodor Kober. 1901: The first motorized cleaner using suction, a powered "vacuum cleaner", is patented independently by British engineer Hubert Cecil Booth and American inventor David T. Kenney. 1903: The first successful gas turbine is invented by Ægidius Elling. 1903: Édouard Bénédictus invents laminated glass. 1903: First manually controlled, fixed wing, motorized aircraft flies at Kitty Hawk, North Carolina by Orville and Wilbur Wright. See Claims to the first powered flight. 1904: The Fleming valve, the first vacuum tube and diode, is invented by John Ambrose Fleming. 1907: The first free flight of a rotary-wing aircraft is carried out by Paul Cornu. 1907: Leo Baekeland invents bakelite, the first plastic made from synthetic components. 1907 (at some time during the year), the tuyères thermopropulsives after 1945 (Maurice Roy (fr)) known as the statoreacteur a combustion subsonique (the ramjet) – R. Lorin 1908: Cellophane is invented by Jacques E. Brandenberger. 1909: Fritz Haber invents the Haber process. 1909: The first instantaneous transmission of images, or television broadcast, is carried out by Georges Rignoux and A. Fournier. 1910s 1911: The cloud chamber, the first particle detector, is invented by Charles Thomson Rees Wilson. 1912: The first commercial slot cars or more accurately model electric racing cars operating under constant power were made by Lionel (USA) and appeared in their catalogues in 1912. They drew power from a toy train rail sunk in a trough that was connected to a battery. 1912: Boston Elevated Railway first use of articulated trams. 1913: The Bergius process is developed by Friedrich Bergius. 1913: The Kaplan turbine is invented by Viktor Kaplan. 1915: Harry Brearley invents a process to create Martensitic stainless steel, initially labelled Rustless Steel, later marketed as Staybrite, and AISI Type 420. 1915: The first operational military tanks are designed, in Great Britain and France. They are used in battle from 1916 and 1917 respectively. In Britain the designers are Walter Wilson and William Tritton; in France, Eugène Brillié. (Although it is known that vehicles incorporating at least some of the features of the tank were designed in a number of countries from 1903 onwards, none reached a practical form.) 1916: The Czochralski process, widely used for the production of single crystal silicon, is invented by Jan Czochralski. 1917: The crystal oscillator is invented by Alexander M. Nicholson using a crystal of Rochelle Salt although his priority was disputed by Walter Guyton Cady 1920s 1925: The Fischer–Tropsch process is developed by Franz Fischer and Hans Tropsch at the Kaiser-Wilhelm-Institut für Kohlenforschung. 1926: The Yagi-Uda Antenna or simply Yagi Antenna is invented by Shintaro Uda of Tohoku Imperial University, Japan, assisted by his colleague Hidetsugu Yagi. The Yagi Antenna was widely used by the US, British, and Germans during World War II. After the war they saw extensive development as home television antennas. 1926: Robert H. Goddard launches the first liquid fueled rocket. 1926: Harry Ferguson, patents the Three-point hitch equipment linkage system for tractors. 1927: The quartz clock is invented by Warren Marrison and J.W. Horton at Bell Telephone Laboratories. 1928: Penicillin is first observed to exude antibiotic substances by Nobel laureate Alexander Fleming. Development of medicinal penicillin is attributed to a team of medics and scientists including Howard Walter Florey, Ernst Chain and Norman Heatley. 1928: Frank Whittle formally submitted his ideas for a turbo-jet engine. In October 1929, he developed his ideas further. On 16 January 1930 in England, Whittle submitted his first patent (granted in 1932). 1928: Philo Farnsworth demonstrates the first practical electronic television to the press. 1929: The ball screw is invented by Rudolph G. Boehm. 1930s 1930: The Supersonic combusting ramjet — Frank Whittle 1930: The Phase-contrast microscopy is invented by Frits Zernike. 1931: The electron microscope is invented by Ernst Ruska. 1933: FM radio is patented by inventor Edwin H. Armstrong. 1935: Nylon, the first fully synthetic fiber is produced by Wallace Carothers while working at DuPont. 1938: Z1 built by Konrad Zuse is the first freely programmable computer in the world. 1938, December: Nuclear fission discovered in experiment by Otto Hahn (Nazi Germany), coined by Lise Meitner (fled to Sweden from Nazi-occupied Austria) and Fritz Strassman (Sweden). The Manhattan Project, and consequently the Soviet atomic bomb project were begun based on this research, as well as the German nuclear energy project, although the latter one declined as its physicists were drafted into Germany's war effort. 1939: G. S. Yunyev or Naum Gurvich invented the electric current defibrillator 1940s 1940, February, Pu-239 isotope (isotope of plutonium) a form of matter existing with the capacity for use as a destructive element (because the isotope has an exponentially increasing spontaneous fissile decay) within nuclear devices — Glenn Seaborg 1940: John Randall and Harry Boot would develop the high power, microwave generating, Cavity magnetron, later applied to commercial Radar and Microwave oven appliances. 1941: Polyester is invented by British scientists John Whinfield and James Dickson. 1942: The V-2 rocket, the world's first long range ballistic missile, developed in Nazi Germany engineer Wernher von Braun during World War II. 1944: The non-infectious viral vaccine is perfected by Dr. Jonas Salk and Thomas Francis. July 1945: The atomic bomb is first successfully developed by the United States, the United Kingdom and Canada as a part of the Manhattan Project and swiftly deployed in August 1945 in the atomic bombings of Hiroshima and Nagasaki, effectively terminating World War II. 1945: Percy Spencer, while employed at Raytheon, would patent a magnetron based Microwave Oven. 1946: Sir James Martin invents the ejector seat, inspired by the death of his friend and test pilot Captain Valentine Baker in an aeroplane crash in 1942. 1947: Holography is invented by Dennis Gabor. 1947: Floyd Farris and J.B. Clark (Stanolind Oil and Gas Corporation) invents hydraulic fracturing technology. December 1947: The first transistor, a bipolar point-contact transistor, is invented by John Bardeen and Walter Brattain under the supervision of William Shockley at Bell Labs. 1948: The first atomic clock is developed at the United States's National Bureau of Standards. 1948: Basic oxygen steelmaking is developed by Robert Durrer. The vast majority of steel manufactured in the world is produced using the basic oxygen furnace; in 2000, it accounted for 60% of global steel output. 1950s 1950: Bertie the Brain, debatably the first video game, is displayed to the public at the Canadian National Exhibition. 1950: The Toroidal chamber with axial magnetic fields (the Tokamak) is developed by Igor E. Tamm and Andrei D. Sakharov 1952: The float glass process is developed by Alastair Pilkington. December 20, 1951: First use of nuclear power to produce electricity for households in Arco, Idaho 1952: The first thermonuclear weapon is developed by the United States of America. 1953: The first video tape recorder, a helical scan recorder, is invented by Norikazu Sawazaki. 1954: Invention of Solar Battery by Bell Telephone scientists, Calvin Souther Fuller, Daryl Chapin and Gerald Pearson capturing the sun's power. First practical means of collecting energy from the sun and turning it into a current of electricity. 1955: The hovercraft is patented by Christopher Cockerell. 1955: The intermodal container is developed by Malcom McLean. 1956: The hard disk drive is invented by IBM. 1957: The laser and optical amplifier are invented and named by Gordon Gould and Charles Townes. The laser and optical amplifier are foundational to powering the Internet. 1957: The first personal computer used by one person and controlled by a keyboard, the IBM 610, is invented in 1957 by IBM. 1957: The first artificial satellite, Sputnik 1, is built and launched by the Soviet Union. 1958–59: The integrated circuit is independently invented by Jack Kilby and Robert Noyce. 1959: The MOSFET (MOS transistor) is invented by the Egyptian Mohamed Atalla and the Korean Dawon Kahng at Bell Labs. It is used in almost all modern electronic products. It was smaller, faster, more reliable and cheaper to manufacture than earlier bipolar transistors, leading to a revolution in computers, controls and communication. 1960s 1960: The first functioning laser is invented by Theodore Maiman. 1961: The first crewed spaceflight is achieved by Vostok 1. 1963: The first electronic cigarette is created by Herbert A. Gilbert. Hon Lik is often credited with its invention as he developed the modern electronic cigarette and was the first to commercialize it. 1964: Shinkansen, the first high-speed rail commercial passenger service. 1965: Kevlar is invented by Stephanie Kwolek at DuPont. 1969: ARPANET first deployed via UCLA, SRI, UCSB, and The University of Utah. 1970s 1970s: Public-key cryptography is invented and developed by James H. Ellis, Clifford Cocks, Malcolm J. Williamson, Whitfield Diffie, Martin Hellman, Ralph Merkle, Ron Rivest, Adi Shamir, Leonard Adleman, et al. 1970: The pocket calculator is invented in Japan. 1971: Email is invented by Ray Tomlinson. 1971: The first single-chip microprocessor, the Intel 4004, is invented. Its development was led by Federico Faggin, using his silicon-gate MOS technology. This led to the personal computer (PC) revolution. 1971: The first space station, Salyut 1 is launched by the Soviet Union. 1972: The first video game console, used primarily for playing video games on a TV, is the Magnavox Odyssey. 1973 - The first fiber optic communication systems were delivered by Optelecom to the U.S. Army and Chevron. 1973: The first commercial graphical user interface is introduced in 1973 on the Xerox Alto. The modern GUI is later popularized by the Xerox Star and Apple Lisa. 1973: The first capacitive touchscreen is developed at CERN. 1973–74: The Internet protocol suite (TCP/IP) is proposed by Vinton Cerf and Robert E. Kahn for the Defense Advanced Research Projects Agency (DARPA) ARPANET, creating the basis for the modern Internet. 1975: Altair 8800 is the spark that ignited the microcomputer revolution. 1977: Dr. Walter Gilbert and Frederick Sanger invented a new DNA sequencing method for which they won the Nobel Prize. 1977: The first self-driving car that did not rely upon rails or wires under the road is designed by the Tsukuba Mechanical Engineering Laboratory in Japan. 1978: The Global Positioning System (GPS) enters service. While not the first Satellite navigation system, it is the first to enter widespread civilian use. 1979: The first handheld game console with interchangeable game cartridges, the Microvision is released. 1979: Public dialup information, messaging and e-commerce services, were pioneered through CompuServe and RadioShack's MicroNET, and the UK's Post Office Telecommunications Prestel services. 1980s 1980: Flash memory (both NOR and NAND types) is invented in Japan by Fujio Masuoka while working for Toshiba. It is formally introduced to the public in 1984. 1981: The first reusable spacecraft, the Space Shuttle undergoes test flights ahead of full operation in 1982. 1981: Kane Kramer develops the credit card sized, IXI Digital media player. 1982: A CD-ROM contains data accessible to, but not writable by, a computer for data storage and music playback. The 1985 Yellow Book standard developed by Sony and Philips adapted the format to hold any form of binary data. 1982: Direct to home Satellite television transmission, with the launch of Sky One service, in Europe. 1982: The first laptop computer is launched, the 8/16-bit Epson HX-20. 1983: Stereolithography is invented by Chuck Hull 1984: The first commercially available cell phone, the DynaTAC 8000X, is created by Motorola. 1983: DNA profiling is pioneered by Jeffrey Glassberg and Sir Alec Jeffreys. 1985: The lithium-ion battery is invented by John B. Goodenough, Rachid Yazami and Akira Yoshino. It has impacted modern consumer electronics and electric vehicles. 1989: Karlheinz Brandenburg would publish the audio compression algorithms that would be standardised as the: MPEG-1, layer 3 (mp3), and later the MPEG-2, layer 7 Advanced Audio Compression (AAC). 1990s 1990: The World Wide Web was first introduced to the public by English engineer and computer scientist Sir Tim Berners-Lee. 1991: The first commercial flash-based solid-state drive is launched by SunDisk. 1991: Wind-Up radio, would be patented by Trevor Baylis. 1993: Mosaic, the first popular web browser is introduced 1994: IBM Simon, World's first smart phone developed by IBM. 1994: First generation of Bluetooth is developed by Ericsson Mobile. A form of data communication on short distances between electronic devices. 1995: DVD is an optical disc storage format, invented and developed by Philips, Sony, Toshiba, and Panasonic in 1995. DVDs offer higher storage capacity than Compact Discs while having the same dimensions. 1995: Ward Cunningham creates the WikiWikiWeb, the first editable website or Wiki. 1996: Ciena deploys the first commercial wave division multiplexing system in partnership with Sprint. This created the massive capacity of the internet. 1998: The first portable MP3 player is released by SaeHan Information Systems. 21st century 2000s 2000: Sony develops the first prototypes for the Blu-ray optical disc format. The first prototype player was released in 2004. 2007: Apple releases the original iPhone. While not the first smartphone, it did popularise the touchscreen focused format. 2008: Satoshi Nakamoto develops the first blockchain. 2010s 2010: The first solar sail based spacecraft, IKAROS, is launched by Japan. 2010: The first synthetic organism, Mycoplasma laboratorium is created by the J. Craig Venter Institute. 2010: ASML releases the first prototype of an extreme ultraviolet lithography machine 2019: IBM launches IBM Q System One, its first integrated quantum computing system for commercial use. 2020s 2020: The first RNA vaccine to be approved by the FDA is co-developed by Pfizer and BioNTech for COVID-19. See also Accelerating change List of emerging technologies List of inventors List of years in science Outline of prehistoric technology Timeline of human prehistory By type History of communication Timeline of agriculture and food technology Timeline of electrical and electronic engineering Timeline of transportation technology Timeline of heat engine technology Timeline of rocket and missile technology Timeline of motor and engine technology Timeline of steam power Timeline of temperature and pressure measurement technology Timeline of mathematics Timeline of computing Notes Footnotes References Bourbaki, Nicolas (1998). Elements of the History of Mathematics. Berlin, Heidelberg, and New York: Springer-Verlag. . Bowman, John S. (2000). Columbia Chronologies of Asian History and Culture. New York: Columbia University Press. . Buisseret, David. (1998). Envisioning the City: Six Studies in Urban Cartography. Chicago: University Of Chicago Press. . Day, Lance and Ian McNeil. (1996). Biographical Dictionary of the History of Technology. New York: Routledge. . Ebrey, Patricia Buckley (1999). The Cambridge Illustrated History of China. Cambridge: Cambridge University Press. (paperback). Ebrey, Walthall, Palais, (2006). East Asia: A Cultural, Social, and Political History. Boston: Houghton Mifflin Company. Elisseeff, Vadime. (2000). The Silk Roads: Highways of Culture and Commerce. New York: Berghahn Books. . Hucker, Charles O. (1975). China's Imperial Past: An Introduction to Chinese History and Culture. Stanford, Calif. : Stanford University. . Hunter, Dard (1978). Papermaking: The History and Technique of an Ancient Craft. Mineola: Dover Publications, Inc. . Gernet, Jacques (1962). Daily Life in China on the Eve of the Mongol Invasion, 1250-1276. Translated by H.M. Wright. Stanford: Stanford University Press. . Gernet, Jacques. (1996). A History of Chinese Civilization. Translated by J.R. Foster and Charles Hartman. Cambridge: Cambridge University Press. . Kreutz, Barbara M. (1973) "Mediterranean Contributions to the Medieval Mariner's Compass", Technology and Culture, 14 (3: July), p. 367–383 Lo, Andrew. "The Game of Leaves: An Inquiry into the Origin of Chinese Playing Cards," Bulletin of the School of Oriental and African Studies, University of London, Vol. 63, No. 3 (2000): 389–406. Loewe, Michael. (1968). Everyday Life in Early Imperial China during the Han Period 202 BC–AD 220. London: B.T. Batsford Ltd.; New York: G.P. Putnam's Sons. Needham, Joseph, Science and Civilization in China: Volume 4, Physics and Physical Technology, Part 2, Mechanical Engineering. Taipei: Caves Books Ltd.,1986 Needham, Joseph (1962). Science and Civilization in China: Volume 4, Physics and Physical Technology; Part 1, Physics. Cambridge University Press., reprinted Taipei: Caves Books, Ltd. (1986) Needham, Joseph and Tsien Tsuen-Hsuin. (1985). Science and Civilization in China: Volume 5, Chemistry and Chemical Technology, Part 1, Paper and Printing. Cambridge University Press., reprinted Taipei: Caves Books, Ltd. (1986) Needham, Joseph. (1987). Science and Civilization in China: Volume 5, Chemistry and Chemical Technology, Part 7, Military Technology; the Gunpowder Epic. Cambridge University Press. Pigott, Vincent C. (1999). The Archaeometallurgy of the Asian Old World. Philadelphia: University of Pennsylvania Museum of Archaeology and Anthropology. . Ronan, Colin A. (1994). The Shorter Science and Civilisation in China: Volume 4. Cambridge : Cambridge University Press. . Sivin, Nathan (1995). Science in Ancient China: Researches and Reflections. Brookfield, Vermont: VARIORUM, Ashgate Publishing. Stark, Miriam T. (2005). Archaeology of Asia. Malden, MA : Blackwell Pub. . Wagner, Donald B. (1993). Iron and Steel in Ancient China: Second Impression, With Corrections. Leiden: E.J. Brill. . Wagner, Donald B. (2001). The State and the Iron Industry in Han China. Copenhagen: Nordic Institute of Asian Studies Publishing. . Wang, Zhongshu. (1982). Han Civilization. Translated by K.C. Chang and Collaborators. New Haven and London: Yale University Press. . Wood, Nigel. (1999). Chinese Glazes: Their Origins, Chemistry, and Recreation. Philadelphia: University of Pennsylvania Press. . External links U.S. National Academy of Engineering's Greatest Engineering Achievements of the 20th Century Timeline Historic Historic inventions Technology-related lists
445747
https://en.wikipedia.org/wiki/Child%20process
Child process
A child process in computing is a process created by another process (the parent process). This technique pertains to multitasking operating systems, and is sometimes called a subprocess or traditionally a subtask. There are two major procedures for creating a child process: the fork system call (preferred in Unix-like systems and the POSIX standard) and the spawn (preferred in the modern (NT) kernel of Microsoft Windows, as well as in some historical operating systems). History Child processes date to the late 1960s, with an early form in later revisions of the Multiprogramming with a Fixed number of Tasks Version II (MFT-II) form of the IBM OS/360 operating system, which introduced sub-tasking (see task). The current form in Unix draws on Multics (1969), while the Windows NT form draws on OpenVMS (1978), from RSX-11 (1972). Children created by fork A child process inherits most of its attributes, such as file descriptors, from its parent. In Unix, a child process is typically created as a copy of the parent, using the fork system call. The child process can then overlay itself with a different program (using ) as required. Each process may create many child processes but will have at most one parent process; if a process does not have a parent this usually indicates that it was created directly by the kernel. In some systems, including Linux-based systems, the very first process (called init) is started by the kernel at booting time and never terminates (see Linux startup process); other parentless processes may be launched to carry out various daemon tasks in userspace. Another way for a process to end up without a parent is if its parent dies, leaving an orphan process; but in this case it will shortly be adopted by init. The SIGCHLD signal is sent to the parent of a child process when it exits, is interrupted, or resumes after being interrupted. By default the signal is simply ignored. Children created by spawn End of life When a child process terminates, some information is returned to the parent process. When a child process terminates before the parent has called wait, the kernel retains some information about the process, such as its exit status, to enable its parent to call wait later. Because the child is still consuming system resources but not executing it is known as a zombie process. The wait system call is commonly invoked in the SIGCHLD handler. POSIX.1-2001 allows a parent process to elect for the kernel to automatically reap child processes that terminate by explicitly setting the disposition of SIGCHLD to SIG_IGN (although ignore is the default, automatic reaping only occurs if the disposition is set to ignore explicitly), or by setting the SA_NOCLDWAIT flag for the SIGCHLD signal. Linux 2.6 kernels adhere to this behavior, and FreeBSD supports both of these methods since version 5.0. However, because of historical differences between System V and BSD behaviors with regard to ignoring SIGCHLD, calling wait remains the most portable paradigm for cleaning up after forked child processes. See also exit pstree, for UNIX to find the child process (pstree PID, where PID is the process id of the process). References External links Process (computing)
2008939
https://en.wikipedia.org/wiki/Drive-by%20download
Drive-by download
Drive-by download is of two types, each concerning the unintended download of computer software from the Internet: Authorized Drive-by downloads are downloads which a person has authorized but without understanding the consequences (e.g. downloads which install an unknown or counterfeit executable program, ActiveX component, or Java applet). Unauthorized Drive-by downloads are downloads which happen without a person's knowledge, often a computer virus, spyware, malware, or crimeware. Drive-by downloads may happen when visiting a website, opening an e-mail attachment or clicking a link, or clicking on a deceptive pop-up window: by clicking on the window in the mistaken belief that, for example, an error report from the computer's operating system itself is being acknowledged or a seemingly innocuous advertisement pop-up is being dismissed. In such cases, the "supplier" may claim that the user "consented" to the download, although the user was in fact unaware of having started an unwanted or malicious software download. Similarly if a person is visiting a site with malicious content, the person may become victim to a drive-by download attack. That is, the malicious content may be able to exploit vulnerabilities in the browser or plugins to run malicious code without the user's knowledge. A drive-by install (or installation) is a similar event. It refers to installation rather than download (though sometimes the two terms are used interchangeably). Process When creating a drive-by download, an attacker must first create their malicious content to perform the attack. With the rise in exploit packs that contain the vulnerabilities needed to carry out Unauthorized drive-by download attacks, the skill level needed to perform this attack has been reduced. The next step is to host the malicious content that the attacker wishes to distribute. One option is for the attacker to host the malicious content on their own server. However, because of the difficulty in directing users to a new page, it may also be hosted on a compromised legitimate website, or a legitimate website unknowingly distributing the attackers content through a third party service (e.g. an advertisement). When the content is loaded by the client, the attacker will analyze the fingerprint of the client in order to tailor the code to exploit vulnerabilities specific to that client. Finally, the attacker exploits the necessary vulnerabilities to launch the drive-by download attack. Drive-by downloads usually use one of two strategies. The first strategy is exploiting API calls for various plugins. For example, the DownloadAndInstall API of the Sina ActiveX component did not properly check its parameters and allowed the downloading and execution of arbitrary files from the internet. The second strategy involves writing shellcode to memory, and then exploiting vulnerabilities in the web browser or plugin to divert the control flow of the program to the shell code. After the shellcode has been executed, the attacker can perform further malicious activities. This often involves downloading and installing malware, but can be anything, including stealing information to send back to the attacker. The attacker may also take measures to prevent detection throughout the attack. One method is to rely on the obfuscation of the malicious code. This can be done through the use of IFrames. Another method is to encrypt the malicious code to prevent detection. Generally the attacker encrypts the malicious code into a ciphertext, then includes the decryption method after the ciphertext. Detection and prevention Detection of drive-by download attacks is an active area of research. Some methods of detection involve anomaly detection, which tracks for state changes on a user's computer system while the user visits a webpage. This involves monitoring the user's computer system for anomalous changes when a web page is rendered. Other methods of detection include detecting when malicious code (shellcode) is written to memory by an attacker's exploit. Another detection method is to make run-time environments that allow JavaScript code to run and track its behavior while it runs. Other detection methods include examining contents of HTML pages to identify features that can be used to identify malicious web pages, and using characteristics of web servers to determine if a page is malicious. Some antivirus tools use static signatures to match patterns of malicious scripts, although these are not very effective because of obfuscation techniques. Detection is also possible by using low-interaction or high-interaction honeyclients. Drive-by downloads can also be prevented from occurring by using script-blockers such as NoScript, which can easily be added into browsers such as Firefox. Using such a script-blocker, the user can disable all the scripts on a given webpage, and then selectively re-enable individual scripts on a one-by-one basis in order to determine which ones are truly necessary for webpage functionality. In this way, a whitelist of acceptable scripts can quickly be developed, which in turn facilitates convenient, safe, and efficient browsing of other websites. Such script-blocking also saves time and bandwidth (hence money) for the user, because scripts that load advertising (especially targeted ads) and invade the user's privacy (via tracking and profiling) no longer constitute a personal drain on the user and their resources. See also Malvertising Phishing BLADE Mac Flashback Windows Metafile vulnerability Dropper (malware) References Computer security exploits Computer viruses
2673726
https://en.wikipedia.org/wiki/UTEC
UTEC
UTEC (University of Toronto Electronic Computer Mark I) was a computer built at the University of Toronto (UofT) in the early 1950s. It was the first computer in Canada, one of the first working computers in the world, although only built in a prototype form while awaiting funding for expansion into a full-scale version. This funding was eventually used to purchase a surplus Manchester Mark 1 from Ferranti in the UK instead, and UTEC quickly disappeared. Background Immediately after the end of World War II several members of the UofT staff met informally as the Committee on Computing Machines to discuss their computation needs over the next few years. In 1946 a small $1,000 grant was used to send one of the group's members to tour several US research labs to see their progress on computers and try to see what was possible given UofT's likely funding. Due to UofT's preeminent position in the Canadian research world, the tour was also followed by members of the Canadian Research Council. In January 1947 the committee delivered a report suggesting the creation of a formal Computing Center, primarily as a service bureau to provide computing services both to the university and commercial interests, as well as the nucleus of a research group into computing machinery. Specifically they recommended the immediate renting of an IBM mechanical punched card-based calculator, building a simple differential analyzer, and the eventual purchase or construction of an electronic computer. The report noted that funding should be expected from both the National Research Council (NRC) and the Defense Research Board (DRB). The DRB soon provided a grant of $6,500 to set up the Computation Center, with the Committee eventually selecting Kelly Gotlieb to run it. Additional funding followed in February 1948 with a $20,000 a year grant from a combined pool set up by the DRB and NRC. Although this was less than was hoped for, the IBM machinery was soon in place and being used to calculate several tables for Atomic Energy of Canada Limited (AECL). Additionally a small version of the differential analyzer was completed by September 1948, although it appears to have seen little use. Preliminary work on an electronic computer also started about the same time with some experimental work in various circuit designs. However they also felt that in order to get a machine working quickly, a fully electronic design was simply too state of the art and had significant risk. Instead they considered building a copy of Bell Labs' Model 6 relay-based machine, which they had seen earlier. However, when they finally decided to go ahead with the project in August 1948, Northern Electric (Bell's arm in Canada) informed them they would charge $25,000 ($ in ) to license the Model 6 design. At a meeting with the NRC in March 1949, the NRC turned down their request for additional funding for the license, and instead suggested that the Center invest in a fully electronic computer, upping the yearly grants to $50,000 to that end. This turned out to be a major "win" - relay based computers quickly disappeared, and electronic systems proved themselves quickly. UTEC Beatrice Helen Worsley and Perham Stanley, two graduate students working at the Computation Center, were sent to Cambridge University to work with Maurice Wilkes who was in the process of completing the EDSAC. Worsley wrote the program that generated a table of squares, the first program to successfully run on EDSAC. Another two graduate students, Alf Ratz and Josef Kates had been studying circuitry for some time by this point, and turned their attention to computer memory systems. Their first attempts were with a novel system based on neon tubes, but a 1949 visit by Freddie Williams led to them abandoning this work and moving to Williams tubes instead. Given the current level of funding a full-scale machine was not possible, so it was decided to build a smaller machine to test out the various components. Williams tubes would store 256 12-bit words, with instructions using 3-bits of a word leaving 9-bits for addressing (allowing up to 512 words of memory). Parts of the machine were up and running quickly, with the math and logic units (the arithmetic logic unit in modern terminology) running by the autumn of 1950. Memory reliability proved to be a serious problem, as it was for all systems using the Williams tube concept, but Katz introduced shielding that improved things somewhat. The machine was declared fully operational on October 1, 1951. Over the next few months major efforts were made to increase reliability, as well as add a second bank of memory to bring it to the full 512 words. Libraries added math functions for 12-, 24-, 36- and 48-bit math. A basic 12-bit addition took about 240 microseconds, multiplication about 18 milliseconds. With the basic system up and running, attention turned to a "full sized" version. This machine would use a 44-bit word with 1,024 words of memory backed up with a 10,000 word magnetic drum to be supplied by Ferranti Canada. A new math unit would operate on an entire word in parallel, instead of bit-serial as with most machines of the era, dramatically improving performance so that an addition would take only 20 microseconds and a multiply about 200—faster than the prototype at addition even on its much smaller word size. Success of the UTEC created intense demand within the Canadian research establishment to start construction of the full scale follow-on. The funding pool was increased to $300,000 to cover development and construction. FERUT While UTEC was being built, a similar machine was under construction at Manchester University, known as the "Baby". Once it started working the university signed an agreement with Ferranti (in the UK) to build a full-scale machine eventually known as the Mark I. The new machine was delivered to the university in February 1951, making it the first commercial computer, about one month earlier than the UNIVAC I was handed over to the US Census Bureau. Ferranti had high hopes for further sales of the machine, and were happy when an order was placed by the British Atomic Energy Authority for delivery in autumn of 1952. However the government changed hands while the machine was being built, and all government contracts over £100,000 were cancelled outright. This left a partially completed Mark I sitting at Ferranti, who became interested in unloading it as soon as possible. Word of the machine quickly reached the AECL, who suggested that they use the $300,000 set aside for the "new" UTEC to purchase the Mark I instead. The Computation Center considered the Mark I to be inferior to their own design and rejected it, notably because it used a serial math unit like their prototype and would thus be much slower. The AECL was not terribly impressed but came up with a solution; if the Computation Center would buy the Mark I, another $150,000 would be made available to continue development of the UTEC, and an equal amount if they decided to actually build it. This sort of deal one does not refuse, and plans to ship the Mark I to Toronto were soon underway. The machine arrived on April 30, 1952, at the time it was major news. Named Ferut (Ferranti, University of Toronto) by Worsley shortly before it arrived, it took the Ferranti engineers several months to set it up. Even then it became one of the first "large" machines to start operation in North America. Ferut would go on to be a major research system in Canada, being used by Ontario Hydro to calculate changes in water levels due to the opening of the St. Lawrence Seaway, various development of the groundbreaking ReserVec system with Ferranti Canada for Trans Canada Airlines, and even rental of time for commercial seismic data processing. The arrival of the Ferut also spelled the death of the UTEC project. Even with the additional funding, most of the engineers quickly drifted to the Ferut machine. References UTEC and Ferut: the University of Toronto's computation centre FERUT.ca One-of-a-kind computers Atomic Energy of Canada Limited University of Toronto Vacuum tube computers
3172921
https://en.wikipedia.org/wiki/Commando%20Helicopter%20Force
Commando Helicopter Force
Commando Helicopter Force (CHF) is a unit of the Royal Navy Fleet Air Arm and an element of the Joint Helicopter Command of the British Armed Forces. Its primary role is to provide Rotary-Wing support to 3 Commando Brigade Royal Marines and other UK force elements in the amphibious environment. CHF uses a combination of transport helicopters based at Royal Naval Air Station Yeovilton in Somerset, England. History The Commando Helicopter Force was formed in 1997 to consolidate command and control of the various Fleet Air Arm and Royal Marines helicopter squadrons which supported 3 Commando Brigade under Flag Officer Naval Aviation. In 1999, CHF merged with various Royal Air Force (RAF) and Army Air Corps force elements under the Joint Helicopter Command, whilst maintaining its identity as a formed unit. Elements of the force have operated in Northern Ireland (until 2002), Sierra Leone in 2000 and Bosnia; and it was an element of the amphibious force for Operation Telic, the British involvement in the 2003 invasion of Iraq, notably supporting the landings to secure the Al-Faw Peninsula. CHF was also a major part of Joint Helicopter Command's contribution to Operation Herrick in Afghanistan. Following the Strategic Defence and Security Review of 2010, the decision was made to transfer all RAF Merlin HC3 helicopters to the Royal Navy under the command and control of Commando Helicopter Force. On 30 September 2014, the aircraft were formally handed over from the RAF to the Royal Navy; with the first Royal Navy Merlin squadron, 846 Naval Air Squadron, standing up concurrently and relocating from RAF Benson to RNAS Yeovilton on 26 March 2015. The Merlin HC3 replaced the ageing Sea King HC4 as CHF's medium-lift transport aircraft when the Sea King HC4 retired on 31 March 2016. As part of the transfer of service, the Merlin HC3 is undergoing an upgrade to the HC4 standard which includes a full mid-life upgrade of the airframe and avionics; and will 'marinise' or more accurately optimise the aircraft for ship-borne amphibious operations. Location It is based at Royal Naval Air Station Yeovilton in Somerset, England; aircraft are regularly deployed with 3 Commando Brigade, overseas and to the ships of the Joint Expeditionary Force (Maritime) (JEF(M)) which includes HMS Bulwark (Landing Platform Dock). Command and control CHF is a Fleet Air Arm asset and as such remains under the Operational Command (OPCOM) of Fleet Commander, while Operational Control (OPCON) is delegated to the Joint Helicopter Command, under Army Command, who will task assets in accordance with Permanent Joint Headquarters or Front Line Command requirements. Organisation The Commando Helicopter Force has three Naval Air Squadrons with separate roles: 845 Naval Air Squadron – Medium-lift front line operations – Merlin HC4/4A 846 Naval Air Squadron – Medium-lift Operational Conversion Unit and Maritime Counter Terrorism Air Group (MAG) – Merlin HC4 847 Naval Air Squadron – Light-lift and battlefield reconnaissance – Wildcat AH1 A Combat Service Support Squadron and Commando Mobile Air Operations Team also form part of CHF. 845 and 846 NAS received Merlin HC3s/HC3As to replace the retiring Sea Kings in 2014 and 2015. 846 NAS took their Merlin HC3s on 30 September 2014; 845 NAS followed on 9 July 2015. These are being upgraded to the Merlin HC4/4A as part of the Merlin Life Sustainment Programme (MLSP). The Merlin HC4 has a grey colour scheme, not the dark green colour of the "Junglie" Sea Kings. Concurrently, 847 NAS has come to the end of the process of upgrading to the AgustaWestland AW159 Wildcat. 845 Naval Air Squadron 845 NAS operated the Westland Sea King HC Mk4 helicopter; a variant that has been specially modified for medium-lift transport and flying in all sorts of weather conditions and terrains. 845 had at least two of it Sea Kings deployed to the Bosnian theatre since 1992. Besides Bosnia, they have operated in Albania, Egypt, Honduras, Nigeria, Sierra Leone, Iraq and Afghanistan. 845 NAS was temporarily stationed at RAF Benson in Oxfordshire as part of the Merlin transition until it relocated back to RNAS Yeovilton on 20 June 2016. 846 Naval Air Squadron 846 NAS operates with 845 NAS, but has not seen action in Bosnia, being more focused on the Northern flank of the NATO theatre. Until recently, 846 maintained a base in Northern Ireland that allowed it to become very proficient in cold weather and winter operations. However, squadron operations are not limited to northern flying conditions and it has operated in South East Asia, Australia, the United States, and Germany. Two of the squadron's aircraft were sent to Turkey following the major earthquake it suffered in November 1999. 846 NAS was temporarily stationed at RAF Benson in Oxfordshire as part of the Merlin transition until it relocated back to RNAS Yeovilton on 26 March 2015. In March 2016, 846 NAS was given the role of Maritime Counter Terrorism after the disbandment of 848 Naval Air Squadron and its Sea King HC4 helicopters. 847 Naval Air Squadron 847 NAS operates Wildcat AH1 helicopters, in light transport and reconnaissance roles. Decommissioned Unit 848 Naval Air Squadron 848 NAS was the Commando Sea King HC4 training unit for the CHF, and trained not only the aircrews but also the ground crews. In addition to the skills necessary to fly their missions, Commando Helicopter Force members are trained in small-arms use as well as tactics and survival fieldcraft. Being a naval unit that was directly tasked with supporting the Royal Marines, trainees are also schooled in shipboard and amphibious assault operations. A special unit within 848 Squadron, M Flight, was tasked with supporting the Special Boat Service (SBS) in their operations. 848 NAS disbanded in 2013 but then reformed on 1 May 2015 to continue operating the Sea Kings, maintaining operational capability within the CHF while 845 NAS converted to the Merlin, until the Sea King reached its planned out of service date on 31 March 2016. 848 NAS disbanded 24 March 2016. Personnel Aircrew, recruited from the Fleet Air Arm and Royal Marines, join the force having completed training in helicopter operations under No. 1 Flying Training School at RAF Shawbury. References External links Royal Navy – Commando Helicopter Force Fleet Air Arm Association – Commando Helicopter Force Royal Marine formations and units Naval aviation units and formations of the United Kingdom Military units and formations established in 1997
2368678
https://en.wikipedia.org/wiki/K%C5%8Djien
Kōjien
is a single-volume Japanese dictionary first published by Iwanami Shoten in 1955. It is widely regarded as the most authoritative dictionary of Japanese, and newspaper editorials frequently cite its definitions. As of 2007, it had sold 11 million copies. Izuru Shinmura Kōjien was the magnum opus of Shinmura Izuru, 1876–1967, a professor of linguistics and Japanese at Kyoto University. He was born in Yamaguchi Prefecture and graduated from the prestigious Tokyo University, where he was a student of . After studying in Germany, Ueda taught comparative linguistics and edited foreign-language dictionaries in the latter part of the Meiji era. Through his tutelage, Shinmura became involved in Japanese language lexicography. Even Kōjien editions published after his death credit Shinmura as the chief editor. History Jien The predecessor of Kōjien originated during the Great Depression in East Asia. In 1930, the publisher Shigeo Oka (岡茂雄, Oka Shigeo, 1894–1989) wanted to create a Japanese dictionary for high school students. He asked his friend Shinmura to be chief editor, and they chose the title Jien (辞苑 "Garden of words") in a classical allusion to the Ziyuan (字苑, "Garden of characters") Chinese dictionary. Shinmura appointed his son Takeshi Shinmura (新村猛, Shinmura Takeshi, 1905–1992) as an editor, and in 1935, Hakubunkan (博文館) published the Jien dictionary. It contained some 160,000 headword entries of old and new Japanese vocabulary, as well as encyclopedic content, and quickly became a bestseller. 1st edition The editors began working on a revised edition, but the 1945 Firebombing of Tokyo destroyed their work. After the war, Shinmura and his lexicographers began anew in September 1948. Iwanami Shoten published the first Kōjien in 1955. It included approximately 200,000 headwords, about 40,000 more than the Jien. 2nd edition The 2nd edition (1969) deleted about 20,000 old entries and added about 20,000 new ones, especially scientific terms. On December 1, 1976, a revised and expanded version () of the 2nd edition was published. 3rd edition The 3rd edition (1983) added 12,000 entries, and was published in CD-ROM format in 1987. 4th edition Three major Japanese publishers released new dictionaries specifically designed to compete with the Iwanami's popular and profitable Kōjien: Sanseidō's Daijirin (大辞林 "Great forest of words", 1988), Shōgakukan's Daijisen (大辞泉 "Great fountainhead of words", 1995), and Kōdansha's Nihongo Daijiten (日本語大辞典 "Great dictionary of Japanese" 1989). In response, the 4th edition Kōjien (1991) was a major revision that added some 15,000 entry words, bringing the total to over 220,000. The CD-ROM version was published in 1993 and revised with color illustrations (like the Nihongo daijiten) in 1996. In 1992, Iwanami published both an e-book format 4th edition and a useful Gyakubiki Kōjien (逆引き広辞苑 "Reverse dictionary Kōjien"). 5th edition The 5th edition (1998) includes over 230,000 headwords, and its 2996 pages contain an estimated total of 14 million characters. Iwanami Shoten currently publishes Kōjien in several printed and digital formats, and also sells dictionary subscription services for cell phone and Internet access. Various manufacturers of Japanese electronic dictionaries have licensed the digital Kōjien, and it is the core dictionary in many models. Shinmura's preface to the 1st edition stated his hope that the Kōjien would become regarded as the standard by which other dictionaries would be measured. This has largely been fulfilled; many people regard the Kōjien as the most authoritative Japanese language dictionary on the market. It remains a bestseller in Japan. According to Iwanami, the 1st edition Kōjien sold over one million copies, and the 5th edition brought cumulative total sales to over eleven million in 2000. 6th edition The sixth edition was released on January 11, 2008, includes more than 10,000 new entries, bringing the total to approximately 240,000. It also contains an additional 1,500 quotations. 7th edition The seventh edition was released on January 12, 2018. Changes include 10,000 new words were added from 100,000 words collected by its editors firstly, including "apuri"(app), "Isuramu-koku"(Islamic State), LGBT, "hanii torappu" (honey trap), "jidori" (selfie) and "diipu raningu" (deep learning). Other changes include citing available source literature for a given explanation of a term, listing changes of the usages of a term, addition of 140 pages without adding book thickness. However, the definition of LGBT in the edition was written as "individuals whose sexual orientation differs from the majority." Some criticized that the definition only describes the "LGB" portion of the acronym which refers to sexual orientation, while the "T" refers to gender identity. Publication Japanese dictionaries By Iwanami Shoten Jien (辞苑) ?th printing (1935-??-??) Kōjien 1st edition (広辞苑) ?th printing (1955-05-25) Kōjien 2nd edition (広辞苑 第二版) (ASIN B00GD6NHXM) ?th printing (1969-05-16) Kōjien 2nd revised edition (広辞苑 第二版補訂版) ?th printing (1976-12-01) Kōjien 3rd edition (広辞苑 第三版) (): ?th printing (1983-12-06) Kōjien 4th edition: Includes 220,000 entries, 2500 illustrations. regular edition (広辞苑 第四版 普通版) ( C0500/): ?th printing (1991-11-15) desktop edition (広辞苑 第四版 机上版) ( C0500/): B5 page size. ?th printing (1991-11-15) reverse index regular edition (逆引き広辞苑 普通版) () ?th printing (1992-11-17) reverse index desktop edition (逆引き広辞苑 机上版) (): B5 page size. ?th printing (1992-11-17) leather edition (広辞苑 第四版 総革装) ( C0500/): Regular page size in leather cover. ?th printing (1992-11-17) EPWING CD-ROM edition (広辞苑 第四版 CD‐ROM版 EPWING規約準拠) (): CD-ROM includes 84 bird sounds, 234 colour samples, search engine. ?th printing (1993-03-01) Electronic Kōjien 4th edition (電子広辞苑 第四版) (): Sold by NEC Home Electronics. Includes CD‐ROM dictionary, search software in 3.5 and 5.25-inch floppies. Supports PC‐9800 series MS-DOS CD‐ROM Extensions Ver. 2.0 and Japanese MS‐DOS 3.1. ?th printing (1993-03-20) Macintosh edition (マック広辞苑) (): Sold by Qualitas Japan. CD‐ROM includes index software, KanjiTalk 7.1 compatibility. ?th printing (1994-07-01) EPWING V2 CD-ROM edition (広辞苑 第四版 CD‐ROM(カラー)版 EPWING規約(第2版)準拠) (): CD-ROM includes 84 bird sounds, 234 colour samples, 650 new colour photos, search engine. ?th printing (1995-11-15) CD-ROM colour edition (広辞苑 第四版 CD-ROM(カラー)版 「こととい」パック) (): Includes Windows/Mac OS CD-ROM. ?th printing (1996-01-25) e-book edition (電子ブック 広辞苑 第四版 電子ブック(補訂)版) ( C0800/): Includes CD-ROM. CD-ROM includes 40 bird sounds, keyword search engine. ?th printing (1996-01-25/1996-12-16) EPWING V3 CD-ROM multimedia edition (広辞苑 CD-ROM マルチメディア版 EPWING規約第3版準拠) ( C0800/): Includes CD-ROM. CD-ROM includes 1800 colour illustrations, 15 animations, 84 bird sounds, 234 colour samples, 542 literature information. ?th printing (1996-12-16) EPWING V3 CD-ROM multimedia edition (広辞苑 第四版 CD-ROM(マルチメディア)版検索ソフト(「ことといV2」)付 EPWING規約(第3版)準拠) ( C0800/): Includes 2 CD-ROM. CD-ROM includes 1800 colour illustrations, 15 animations, 84 bird sounds, 234 colour samples, 542 literature information, Kototoi Ver.2 index software. ?th printing (1996-12-16) Kōjien 5th edition: Includes 230,000 entries. regular edition (広辞苑 第五版) ( C0500/) ?th printing (1998-11-11) desktop edition (広辞苑 第五版) (): B5 page size. ?th printing (1998-11-11) EPWING V5 CD-ROM edition (広辞苑 第五版 CD-ROM版 EPWING規約(第5版)準拠) ( C0800/): Includes CD-ROM. CD-ROM supports Windows 95-XP, KanjiTalk 7.5 with MacOS 9.2.2. ?th printing (1998-11-11) e-book edition (電子ブック 広辞苑 第五版 電子ブック版) ( C0800/): Includes mini CD-ROM. Supports EBXA, S-EBXA-compatible electronic dictionary readers. ?th printing (1999-04-26) reverse index (逆引き広辞苑 第五版対応) () ?th printing (1999-10-15) goat leather edition (広辞苑 第五版 総革装) () ?th printing (1999-10-15) iMode edition: It is a monthly subscription service. Version ? (2001-04-??) Version ? (2003-02-??, with poetry collection (折々のうた365日)) EZweb edition: It is a monthly subscription service. Version ? (2003-06-??) J-Sky edition: It is a monthly subscription service. Kōjien 6th edition: Includes 240,000 entries, 2800 illustrations. regular edition (広辞苑 第六版) (): 2 volumes (1+1 index). ?th printing (2008-01-11) desktop edition (広辞苑 第六版) (): B5 page size. 3 volumes (2+1 index). ?th printing (2008-01-11) EPWING V5 DVD-ROM edition (広辞苑 第六版 DVD-ROM版) (): B5 page size. Includes Windows Vista/MacOS X 10.3 DVD-ROM. DVD-ROM includes Kototoi Light Ver3.5. Windows Vista support requires an updated Kototoi installer. ?th printing (2008-01-11) goat leather edition (広辞苑 第六版 総革装) () ?th printing (2009-01-20) goat leather desktop edition (広辞苑 第六版 総革装 机上版) (): B5 page size. ?th printing (2009-01-20) Mobile edition: It is a monthly subscription service. Iwanami library 225 Kōjien wo 3 bai tanoshimu (岩波科学ライブラリー 225 広辞苑を3倍楽しむ) (/): An essay on science of authors active in various fields. ?th printing (2014-04-25) Kōjien 7th edition: Includes 10,000 new entries for total 250,000 entries. Dictionary book covers can also be personalized by the publisher. Preorder edition: Includes production booklet (広辞苑をつくるひと). 1st printing (2017-11-03) Regular edition (広辞苑 第七版(普通版)) (): 1+1(index) volumes. 1st printing (2018-01-12) Desktop edition (広辞苑 第七版(机上版)) (): B5 page size. 2+1(index) volumes. 1st printing (2018-01-12) 7th edition errata 1st printing (2018-01-25): Corrected 2 dictionary entries of the 1st printing of the dictionary (LGBT, Shimanami Kaidou). By Shanghai Foreign Language Education Press Kōjien 5th edition: regular edition (广辞苑 第五版) () ?th printing (2006-10-01) Kōjien 6th edition: regular edition (广辞苑 第六版) () ?th printing (2012-05-??) Electronic edition by Casio Kōjien 7th edition: Casio EX-word electronic dictionary editions: XD-Z4800, XD-Z6500, XD-Z8500 (2018-01-19) XD-Z20000 (2018-02-09) XD-C400 (2018-07-11) XD-SR6500 (2019-01-25) XD-SR20000 (2019-02-08) XD-SX6500 (2020-01-24) Electronic edition by Keisokugiken corporation Kōjien 6th edition: Based on 6th edition DVD-ROM version. Includes 7700 illustrations and graphs, 160 animations, 231 voice samples, 100 charts. iOS 2-3 edition Version 1.0.1 (2009-04-24) Version 1.0.2 (2009-06-25): Official iOS 3.0 support. Version 1.0.3 (2009-07-17) Version 2.0 (2010-04-16) iOS 2-4 edition Version 2.0.3 (2010-07-07) iOS 3-4.x edition Version 2.2.2 (2011-03-24) Version 2.2.3 (2011-06-01) iOS 3-5.x edition Version 2.3 (2011-09-22) Version 2.3.1 (2011-10-26) Version 2.3.4 (2012-03-14) iOS 4.2-6.0 edition Version 2.3.8 (2012-10-25) Version 2.3.9 (2012-11-19) iOS 5.0-7 edition Version 2.5 (2013-11-29) Version 2.5.1 (2014-02-07) Version 2.6 (2014-07-29) iOS 5.0-8 edition Version 2.6.2 (2014-10-06) Version 2.6.4 (2015-05-18) iOS 6.0-8, 32/64-bit edition Version 2.7 (2015-09-14) Version 2.7.2 (2015-11-17) iOS 7 and above edition Version 2.8 (2016-04-22) Version 2.8.3 (2017-04-07) iOS 7-11 edition (広辞苑第六版 for iOS) (WWANN001A) Version 2.8.5 (2017-10-13) Version 2.8.6 (2017-10-24) Kōjien 6th edition (7th migration edition): iOS 7-11 edition (広辞苑第六版〔第七版移行版〕): Automatically updated to 7th edition in 2017-01-08. Version 2.8.5 (2017-10-25 - 2018-01-12) Kōjien 7th edition: iOS 8-11 edition (広辞苑第七版 for iOS) (WWANN002A): It is an automatic upgrade from 6th edition (7th migration edition). Includes 4500 photographs, 2800 graphs, 100 charts. Voice sample was not included. Version 2.9 (2018-01-12) Version 2.9.1 (2018-01-29) Electronic edition by LogoVista Corporation Kōjien 7th edition: Android 4-8 edition (広辞苑 第七版) Version 1.0? (2018-01-22) Version 1.1 (2018-01-29) Version 1.2 (2018-01-30, Android 4.0.3) Version 1.4 (LogoVista dictionary browser Ver.2) Version 1.5 (2019-06-06): Android 9-10.0 support. iOS 9 edition (広辞苑 第七版): Uses Shuei Mincho font by Morisawa Inc. Contents are delivered via LogoVista dictionary browser. Version ? (2018-01-12?) Version 1.0.1 (LogoVista dictionary browser) (2018-03-07) Version 1.0.2 (LogoVista dictionary browser) (2018-04-25): Dictionary text update (from errata 1?). Version 1.0.5 (LogoVista dictionary browser) (2019-01-27) Version 2.0 (LogoVista dictionary browser) (2019-02-11) Version 2.0.8 (LogoVista dictionary browser) (2019-07-23): Dictionary contents update. Windows/Mac OS edition: Mac OS version supports Mac OS 10.9-10.13 for Intel Mac, Microsoft Office 2011. Windows version supports Windows 7-10, Internet Explorer 11, Microsoft Office 2007-2016, Ichitaro 2013-2017, .NET Framework 4 for Microsoft Office plugin. Uses LogoVista electronic dictionary browser. Windows/Mac OS DVD box edition (広辞苑 第七版) (ISBN 494802251192-9) Version ? (2018-01-12) Windows download version (広辞苑 第七版 for Win) Version 1? (2018-01-12) Version 3 (2018-01-29) Version 4 (2018-02-08) MacOS download version (広辞苑 第七版 for Mac) Version 1.0 (2018-01-11) Version 1.0.1 (2018-01-29): Includes the errata update from the print edition. Version 1.1 (2018-07-27): Dictionary contents update. Version 1.1.1 (2019-03-10): Partial image size fix. Version 1.2 (2019-05-29, Mac OS X 10.11 64-bit): Dictionary contents update. Electronic edition by So-net Entertainment Corporation Kōjien 5th edition: Demo edition: Only limited search options are available. Official version: It is a monthly subscription service. Japanese-Korean dictionaries By Amhbook/Amunhaksa Kōjien 6th edition (Kojien, 6th edition JAPANESE-KOREAN DICTIONARY/広辞苑 第六版 日韓辞典/고지엔 제6판 일한사전 전2권) (): B5 pages. 2 volumes. 1st printing (2012-11-09) By DaolSoft, Co., Ltd. Kōjien 6th edition Android version (広辞苑 第六版 日韓辞典 (고지엔 일한사전)) Version 1.0.3 Version 1.1.0 Version 1.1.2 Version 1.1.3 Version 1.1.4 Version 1.1.5 (2017-01-16, Android 2.2) iOS version (広辞苑 第六版 日韓辞典 (고지엔 일한사전)) Version 1.0 (2012-11-29) Version 1.1 (2013-02-06, iOS 5.1 or later) Version 1.2 (2014-10-07, iOS 5.1.1 or later) Version 1.3 (2018-10-26, iOS 8.0 or later) Version 1.3.1 (2019-07-07) Lexicographical characteristics The Kōjien, like most Japanese dictionaries, writes headwords in hiragana syllabary and collates them in gojūon ("50 sounds") order. Baroni and Bialock (2005) describe the Kōjien as "an old standard that gives extensive definitions, etymologies (as always take care with these), and variant usages for words, places, historical and literary figures, and furigana for difficult or old terms." This dictionary is notable for including current Japanese catchphrases and buzzwords. For instance, the 4th edition added furītā (フリーター "a part-time worker by choice"), which blends two loanwords: furī (フリー "free", from English, as in furīransu フリーランス "freelance") and arubaitā (アルバイター "part-time worker", from German Arbeiter "worker"). The Kōjien dictionary had a censorship policy before it became politically correct (see kotobagari), and omitted taboo words such as sexual slang or offensive terms. It includes encyclopedic information such as 2700 illustrations and maps, and mini-biographies of notable people (both living and dead foreigners, but only deceased Japanese). The appendices include Japanese grammar notes, kanji with difficult readings, Japanese calendar and Gregorian calendar charts, and lists of gairaigo acronyms. Gally (1999) says, "Koujien is a fine dictionary with a sterling reputation. Because it gives definitions in historical order, it is the best single-volume choice for people interested in how the meanings of words have changed over time." However, he notes, "In my experience as a translator of contemporary Japanese, though, I have found Koujien less useful than Daijirin." This criticism is based on his use of the fourth edition, though, and he concedes that later editions seem to have improved in this regard. Kojien University As part of the publication of Kojien 7th edition, Kojien University (広辞苑大学) seminars were held in 2018-01-12 and 2018-01-14. Second round of the seminars were planned in 2018-02-10. References Citations Sources Baroni, Helen; and Bialock, David (2005). Words: Japanese Dictionaries, Columbia University bibliography. Gally, Tom (1999). Kokugo Dictionaries 国語辞書, review article. External links Iwanami Shoten pages: 4th edition, 5th edition, 6th edition, 7th edition Japanese dictionaries
976568
https://en.wikipedia.org/wiki/SPARCstation%201
SPARCstation 1
The SPARCstation 1, or Sun 4/60, is the first of the SPARCstation series of SPARC-based computer workstations sold by Sun Microsystems. The design originated by a Sun spin-off company Unisun in 1987 which was soon re-acquired. The SPARCstation 1 has a distinctive slim enclosure (a square 3 inch high "pizza box") and was first sold in April 1989, with Sun's support ending in 1995. Based on a LSI Logic RISC CPU running at 20 MHz, with a Weitek 3170 (or 3172) FPU coprocessor, it was the fourth Sun computer (after the 4/260, 4/110 and 4/280) to use the SPARC architecture and the first of the sun4c architecture. The motherboard offered three SBus slots and had built-in AUI ethernet, 8 kHz audio, and a 5 MB/s SCSI-1 bus. The basic display ran at 1152×900 in 256 colours, and monitors shipped with the computer were 16 to 19 inch greyscale or colour. Designed for ease of production to compete with high-end PCs or Macs (its principal competitors were the IBM PS/2 Model 80, the NeXT Computer, and Sun's own 3/80), it sold for between about US$9,000 (with no hard disks), to US$20,000 — and in the first year around 35,000 units were sold. Design The SPARCstation 1 features several distinctive design and packaging elements driven internally by system designer Andy Bechtolsheim and externally by design house frogdesign. Bechtolsheim specified that the motherboard would be the size of a sheet of paper and the SBus expansion cards would be the size of index cards, resulting in an extremely compact footprint. The external design motif includes dot-patterned cooling vents on the side which are echoed by a "dimple" pattern on the front face, and "Sun purple" feet. Memory The SPARCstation 1 takes 30 pin SIMMs in groups of four. It can take either 1 MB or 4 MB SIMMs as long as the size is consistent within a bank. There are a total of four memory banks, which can give a total of 64 MB of memory. Memory bank 0 (composed of U0311, U0322, U0309, and U0307) should be filled first. If not, the OpenBoot firmware will hang while memory checking. Disk drives The SPARCstation 1 has space for up to two hard drives and one floppy drive internally. The machine will take any 50 pin SCSI-2 hard drive, but the OpenBoot firmware will not boot from any partition which starts or ends after 1024 MB. The floppy drive, like the Macintosh's, is unusual in that it has an electromechanical eject mechanism rather than the conventional eject button, and therefore must be ejected by the operating system or OpenBoot. The machine can connect to any SCSI CD drive, via either the SCSI connector on the back or by connecting it to any spare internal SCSI connector via a 50 pin cable. Network support The SPARCstation 1 comes with an on-board AMD Lance Ethernet chipset and a 15-pin AUI connector, which can connect to 10BASE2, 10BASE5 or 10BASE-T via an appropriate transceiver. The OpenBoot ROM is able to boot from network, using RARP and TFTP. Like all other SPARCstation systems, the SPARCstation 1 holds system information such as MAC address and host id (serial number) in NVRAM. If the battery on this chip dies, then the system will not be able to boot. NVRAM The SPARCstation 1 uses an M48T02 battery-backed RTC with RAM chip which handles the real time clock and boot parameter storage. The only problem with this chip is that the battery is internal, which means the entire chip must be replaced when its battery runs out. As all SPARCstation 1s made are now older than the battery life of this chip, a substantial number of these systems now refuse to boot. Additionally, the SPARCstation 1 design used the reserved bits in the M48T02's NVRAM in a non-standard way; since later revisions of the M48T02 chip exert stricter control over these bits, a current M48T02 will store the NVRAM data, but the RTC will not function correctly and the system may fail to auto-boot. Due to incompatibilities with modern M48T02s, it is common to modify failed NVRAMs by cutting into the encapsulation and patching in a new battery. It is also possible to replace the entire encapsulation, which also contains a 32.768 KHz clock crystal. Operating systems The SPARCstation 1, 1+, IPC and SLC can run the following operating systems: SunOS 4.0.3c through 5.7 (Solaris 7) Linux (Modern versions may have trouble with the limited amount of memory in these machines) NetBSD 1.0 onwards OpenBSD - All versions up to 5.9 (OpenBSD 5.9 was the last release to support SPARC32) Notable uses Four or five SPARCstation 1 units were used by Game Freak to develop Pokémon Red and Green. Related computers The SPARCstation 1+ (Sun 4/65) pushed the CPU to a 25 MHz LSI L64801, upgraded the coprocessor to a Weitek 3172 and installed a new SCSI controller. The SPARCstation IPC (Sun 4/40) is a version of the SPARCstation 1+ in a lunchbox style case and onboard video. The SPARCstation SLC (Sun 4/20) is a version of the SPARCstation 1+ built into a monitor cabinet. The SPARCstation 2 (Sun 4/75) is the machine's successor and was released in November 1990. References External links SUN NVRAM FAQ Sun workstations SPARC microprocessor products
31513219
https://en.wikipedia.org/wiki/Project%20Morpheus
Project Morpheus
Project Morpheus was a NASA project that began in 2010 to develop a vertical takeoff and vertical landing (VTVL) test vehicle called the Morpheus Lander. It is intended to demonstrate a new nontoxic spacecraft propellant system (methane and oxygen) and an autonomous landing and hazard detection technology. The prototype planetary lander is capable of autonomous flight, including vertical takeoff and landings. The vehicles are NASA-designed robotic landers that will be able to land and take off with of cargo on the Moon. The prospect is an engine that runs reliably on propellants that are not only cheaper and safer here on Earth, but could also be potentially manufactured on the Moon and Mars. (See: In-situ resource utilization.) The Alpha prototype lander was manufactured and assembled at NASA's Johnson Space Center (JSC) and Armadillo Aerospace's facility near Dallas. The prototype lander is a "spacecraft" that is about in diameter, weighs approximately and consists of four silver spherical propellant tanks topped by avionics boxes and a web of wires. The project is trying out cost and time saving "lean development" engineering practices. Other project activities include appropriate ground operations, flight operations, range safety and the instigation of software development procedures. Landing pads and control centers were also constructed. From the project start in July 2010, about $14 million was spent on materials in the following 4 years; so the Morpheus project is considered lean and low-cost for NASA. In 2012 the project employed 25 full-time team members, and 60 students. At any one time an average of 40 people worked on the project. Project Morpheus devised and used streamlined processes and practices. The Morpheus Lander's last flight was in December 2014. As there were no funds for further flights the lander was returned to JSC in February 2015. Six formal documents were produced by the project. At the end of project review on March 12, 2015 it was estimated that $50 million had been saved by the lean development methods, minimising documentation, 'Beg and Borrowing' items and buying parts from home depot shops. History Project Morpheus started in July 2010 and was named after Morpheus, the Greek god of dreams. The Morpheus spacecraft was derived from the experimental lander produced by Project M with the assistance of Armadillo Aerospace. Project M (NASA) was a NASA initiative to design, develop and land a humanoid robot on the lunar surface in 1000 days. Work on some of the landers systems began in 2006, when NASA's Constellation program planned a human return to the Moon. In the same year 2006, Armadillo Aerospace entered the first Pixel rocket lander into the Lunar Lander Challenge part of NASA's Centennial Challenges. The Morpheus #1 Unit A test vehicle was first hot-fired 15 April 2011. Morpheus's new engine permitted NASA to fly longer durations by lifting more propellant into the air. The engine was upgraded again in 2013 to finally reaching . A new design of landing gear was part of the Mechanical changes. NASA also replaced the avionics - this included power distribution and storage, instrumentation, the flight computer, communications and software. The enhanced landing system permits Morpheus, unlike the Pixels, to liftoff, fly, and land without help from a pilot. For Range Safety purposes the Morpheus#1 prototype falls into the category of guided suborbital reusable rocket. In July 2012 the prototype lander was sent to the Kennedy Space Center for free flight testing and the media invited to view the Morpheus Lander. On August 9, 2012 the prototype Morpheus #1 Unit A (Alpha) lander crashed on takeoff, whilst performing its second untethered flight at Kennedy Space Center. No one was injured and no property was damaged but the vehicle was damaged beyond repair. The project investigated the cause and continued by building unit B. In the second half of 2012 the Project Morpheus and ALHAT teams were combined. On February 7, 2013 the Project Morpheus team blogged that they have built the Morpheus 1.5B and 1.5C vehicles. The vehicles underwent a series of static hot fire and dynamic tethered flight tests at Johnson Space Center spring 2013 in preparation for a return to free-flight testing at Kennedy Space Center later that year. On May 1, 2013 the replacement Morpheus #1.5 Unit B testbed was Hot Fired at the Johnson Space Center. The replacement's enhancements include a thrust main engine and integrated oxygen/methane reaction control system (RCS), making it the first oxygen/methane vehicle with Main and RCS engines drawing propellant from the same tanks and first vehicle to use a cryogenic RCS system. On June 14, 2013 rapid re-usability was demonstrated by having two flights using the same lander on the same day. In July 2013 the ALHAT equipment was integrated into and tested with the lander. On September 26, 2013 the vehicles performed 20 short engine firings at a variety of conditions whilst fastened to the ground. In November 2013 the Bravo Lander was taken to Kennedy Space Center (KSC), Florida for free flight testing. $750,000 of parts were purchased to make the replacement lander. KSC limited the noise vibrations on the lander as it lifts off by designing a mobile launch pad with a built in flame trench. Free Flight 9 on March 11, 2014 was the final flight before integration of ALHAT sensors on Bravo vehicle. Free Flight 14 on May 28, 2014 was performed at night with the ALHAT acting as the prime guidance system. The hazards in the hazard field were automatically avoided. In May 2014 The NASA Project Morpheus formed part of the reference material for NASA's Lunar CATALYST initiative. A paper was published in 2013 revealing the lessons learnt during the development, which may be useful to future projects. In 2014 a paper describing the integrated test campaign, including the free flights, was published. An article giving a short history of the project was printed in RocketSTEM on July 11, 2014. In November 2014, the Morpheus Lander was fitted with additional ALHAT sensors. The new optics permit the Navigation Doppler Lidar to accurately measure the vehicle's velocity relative to the ground. Objectives The primary objectives of the Morpheus project were to demonstrate: the integrated system performance of the autonomous Guidance, Navigation and Control (GN&C) system, terrain hazard avoidance sensors, the coupling of the sensors with the GN&C, the utilization of an integrated Main/RCS engine liquid oxygen and liquid methane propulsion system. Specifically, the Morpheus project and the Autonomous Landing Hazard Avoidance Technology (ALHAT) project provide technological foundations for key components necessary to transport humans beyond low Earth orbit. The testbed can optionally be fitted with up to 1000 lb cargo, allowing fitting of the 400lb Autonomous Landing Hazard Avoidance Technology (ALHAT) equipment, which permits landings without operator interaction. ALHAT permits the lander to fly to a specified location with high accuracy and to automatically avoid hazards including slopes greater than 5 degrees and boulders taller than 30 cm. In June 2013 the team remarked on the potential to scale the 500 kg payload lander up to one able to land a habitable module with a crew on places such as the Moon. Hardware specifications The Project Morpheus vehicle 'Morpheus' is a full scale vehicle that NASA intends to be capable of landing Robonaut or a similar sized payload to the lunar surface. The spacecraft will perform all propellant burns after the trans lunar injection. Navigation is completely autonomous from Lunar Orbit to touchdown. Navigation updates come from TRN Laser altimetry and star trackers after deorbit burn. Deep space navigation relies on radiometric and star trackers. To save money and time the prototype Morpheus landers are "single-string" prototypes, this means that unlike a spacecraft rated for actual space flight they do not have redundant systems. The exceptions are stated below. Morpheus #1.5 Unit A Engine burns the environmentally friendly propellants methane and oxygen, pressurized by helium The Morpheus HD4 engine produced thrust compatible with the Altair ascent stage (Later up graded for Units B and C, see below) The engine has a maximum specific impulse (Isp) during space flight of 321 seconds. The pressure-fed cryogenic engine supports 4:1 throttling and uses an impinging element injector design. The engine is gimballed by two orthogonal electromechanical actuators (EMAs) to provide thrust vector control of lateral translation, and pitch and yaw attitudes. Has four diameter tanks, 2 for liquid methane and 2 for liquid oxygen - able to contain about of propellant The approximate dry mass is . Size about (). The Version 1.5 lander, with its HD5 engine, can land , this includes performing all propellant burns after the trans lunar injection. The primary Reaction Control System (RCS) thrusters, used to control the lander's roll, use methane and LOX from the main tanks. Thrust produced is . The backup RCS uses helium (He). The Main and RCS engines were designed and built at NASA/JSC and test fired at NASA/JSC, NASA/SSC, and NASA/KSC An Aitech S950 CompactPCI board with a PowerPC 750 processor is used as the main computer. Up to 16  GB of data can be stored on board. Data buses include RS-422, RS-232, Ethernet and MIL-STD-1553. In flight the avionics and power unit (APU) are cooled using liquid methane, any resulting vapour is then vented. On the ground liquid nitrogen is used for avionics cooling. Before flights the avionics is purged of water using gaseous nitrogen. Onboard cameras. Telemetry is returned using the spread spectrum wireless communications. Electrical power is supplied by 8 lithium polymer batteries. GN&C sensor suite including: Javad Global Positioning System (GPS) receiver International Space Station (ISS) version of Honeywell's Space Integrated GPS/INS (SIGI) Litton LN-200 Inertial Measurement Unit (IMU) Acuity laser altimeter. Goddard Space Flight Center's (GSFC) Core Flight Software (CFS) provides the architecture for the vehicle's software. Each of the 4 legs has a foot pad covered with fire resistant material to soften landings. The standalone accelerometer units were built using the Modular Instrumentation System (MIS) designed by Johnson Space Center Optional ALHAT hardware. The ALHAT equipment and its mass are considered part of the payload. Commands can be sent using separate Ultra High Frequency (UHF) radios to the thrust termination system (TTS). Use of the TTS by range safety will close two motorized valves which shut off the flow of liquid oxygen and methane to the engine - thereby terminating engine thrust. These TTS valves are completely independent from the rest of the vehicle systems. The TTS also stops the laser in the ALHAT's Hazard Detection System from firing - since Type IV lasers are not eye safe. For further details see the "Morpheus: Advancing Technologies for Human Exploration" paper. Morpheus #1.5 Unit B The prototype Morpheus #1 Unit B lander is using the same design as the prototype Morpheus #1.5 Unit A lander with the following changes: Backup systems for the Inertial Measurement Unit were added 70 different upgrades to the vehicle and ground systems to both address potential contributors to the test failure, and also to improve operability and maintainability. These include: advanced engine performance capability, enhanced communication protocols, redundant instrumentation where appropriate, increased structural margins, and mitigated launch vibroacoustic environments. The upgraded HD4 and HD5 Morpheus engines produce thrust. The project estimates that the new engine could lift the ascent stage of a manned lander containing 3-4 people to lunar orbit The connectors were replaced by military-specification versions. Rapid reuseability, permitting multiple flights in a day. The Lander can handle winds of about . To reduce vibroacoustic launch problems during tether testing the lander was lifted above the ground and a light weight cord that melts used to hold down the lander. Unit B is also called the Bravo vehicle. Morpheus #1.5 Unit C The prototype Morpheus #1 Unit C lander is using the same design as the prototype Morpheus #1.5 Unit A lander with the following changes: Enhancements as Unit B above. This vehicle was never flown. Autonomous Landing Hazard Avoidance Technology The optional Autonomous Landing Hazard Avoidance Technology (ALHAT) equipment permits landings without operator interaction. ALHAT permits the lander to fly to a specified location with high accuracy and to automatically avoid hazards including slopes greater than 5 degrees and boulders taller than 30 cm. The active sensors include a flash LIDAR, a lidar Doppler velocimeter and a laser altimeter. Software Project Morpheus lean development philosophy resulted in a mix of new and previously existing software being used. Software is used in: the vertical test bed (lander). The NASA-Goddard-Space-Flight-Center-developed Core Flight Software (CFS) has been enhanced with specific applications software and custom sensor and I/O applications. hardware development. Including using the OVERFLOW package (and wind tunnel tests). the ground environment, including mission control. Mission Control Technologies has been used to display propellant tank pressures and other parameters during test firing. the ALHAT system. flight simulation, both offline and connected to flight hardware. Packages used include JSC Trick Simulation Environment, the JSC Engineering Orbital Dynamics (JEOD) package and the JSC generic models Valkyrie package. The parameters have been tuned to reflect the Morpheus flight hardware such as actuators and data obtained from the tethered test flights. the Microsoft SharePoint package was used by the engineers and managers to plan, share documents and to provide a method of configuration change control. documents were frequently written using Microsoft Office. Test bed tests 2011 As of April 2011 the primary focus of the test bed is to demonstrate an integrated propulsion and inertial-based guidance, navigation, and control (GN&C) systems that can fly a lunar descent profile, thereby exercising the Autonomous Landing and Hazard Avoidance Technology (ALHAT), safe landing sensors and closed-loop flight control system. i Additional objectives include technology demonstrations such as tank material and manufacture, reaction control thrusters, main engine performance improvements, Helium pressurization systems, ground operations, flight operations, range safety, software and avionics architecture. The Vertical Test Bed (VTB) Flight Complex at JSC has been successfully using the Mission Control Technologies (MCT) software written at NASA Ames to control the test flights of the Morpheus lander. Parameters displayed include propellant tank pressures. A set of integrated vehicle test flights including hot-fire, tethered hover tests and untethered "free-flights" were devised for the Morpheus vehicle. To provide clearance for the vehicle's exhaust plume during hot-fire tests the lander was tethered above the ground. A height of was used for the tethered testing. The testing, test results and equipment modifications performed during 2011, up to and including Tethered Test 6, were published in the conference proceeding of the 2012 IEEE Aerospace Conference at Big Sky, MT 2012 Videos of the test flights have been posted on the Morpheus Lander Channel on YouTube. This includes the 2012 regression test flights with the more powerful V1.5 engine whilst the lander is tethered, and the problematic early test flight that shows "This is why we test". On May 10, 2012 the testbed passed its hover and soft abort tests, shown in video "Morpheus Tether Test 15". The lander was returned to the workshop to have the ALHAT equipment fitted. The Reaction Control System (RCS) thrusters were also fitted. During the Summer 2012, the Morpheus Lander V1.5 Unit A was transferred to the Kennedy Space Center in Florida for an untethered flight testing. Also, a "hazard field" was built containing hazards such as rocks and craters built at the end of the Space Shuttle's runway to test that the ALHAT system can automatically navigate to a clear landing site. As can be seen in the photograph, the Kennedy's wide open spaces permit the entire flight path including runway and hazard field to be surrounded by a fire break consisting of a moat filled with water. The hazard field included five potential landing pads, of rocks and that mimic an area on the Moon's south pole. On July 20, 2012, the 43rd anniversary of the Apollo 11 lunar landing, the Morpheus test vehicle arrived at Kennedy Space Center (KSC) for advanced testing. The high performance HD5 version of the Morpheus engine was performance tested at the Stennis Space Center in the summer of 2012. The testing and building of the hazard field were paid for by NASA's Advanced Exploration Systems Program (AES). 2013 During Autumn 2012 and early 2013 a fourth and a fifth generation Morpheus methane/LOX rocket engine were test fired at Stennis Space Center. A successful long duration burn lasted 123 seconds. Other tests verified capabilities and throttle levels. The ALHAT equipment was tested using a helicopter on the KSC hazard field. Multiple flights were made using Morpheus like trajectories, which had to take wind direction into account. Fuel tanks for the lander were put through a series of inspections and tests, including checking welds for defects and cycling tank pressure to establish a minimum cycle life expectancy of the tanks. The maximum pressure capability was verified by pressurizing a sacrificial tank until it burst. On May 1, 2013 at JSC the replacement Unit B Morpheus testbed was fired for 50 seconds whilst fully tethered. The integrated methane reaction control system (RCS) and thrust vector control (TVC) jets were also fired. Many enhancements had been incorporated into the vehicle and ground systems. On May 16, 2013 at JSC the testbed was fired whilst fastened to the ground, and later tethered above the ground, followed by some reaction control system tests. A small leak was repaired, allowing the testing of the effects of vibration to be nominal. In preparation for the tests, the fire break around the test area had been paved and a mini "flame trench" dug. On May 24, 2013 at JSC the V1.5B testbed was high tethered. There was a good ignition and climb. A soft abort terminated the flight when the vehicle exceeded an internally set boundary limit whilst attempting to stabilize itself. On June 6, 2013 at JSC in Tethered Test 22 a tethered testbed successfully flew for 74 seconds. The hover lasted 60 seconds and was smooth. Used the primary IMU. On June 11, 2013 in a tethered test at JSC the backup Inertial Measurement Unit (IMU) passed its flight test. The flight lasted 27 seconds including 17 seconds hovering. On June 14, 2013 two tethered flights were performed. The first firing was soft aborted when the vehicle exceed its safety zone due to an imbalance in the fuel load. The 2nd firing was successful. This counts as a restarting of the engine. During the second flight, the vehicle successfully switched from using its primary Inertial Measurement Unit (IMU) to the secondary IMU. On July 2, 2013 integration tests were performed with an ALHAT attached to the Morpheus Lander. These tests included "tilt" tests where the lander's legs were raised on different heights of blocks so the attitude is off vertical. On July 11, 2013 the first tethered flight test of Morpheus vehicle "Bravo" with Autonomous Landing & Hazard Avoidance Technology (ALHAT) laser sensors integrated on top was performed. On the second attempt there was a good ignition, but during ascent the vehicle translated downrange and exceeded the internally set range safety boundary limit (+/−4 m) for tether tests, triggering an automatic soft abort. On July 23, 2013 Tethered Test 26 was successfully performed. The lander and ALHAT flew to and hovered at two different heights. Both the primary RCS (methane/LOX) and the backup RCS (He) were used, producing a successful 'landing' at the end of the tether. Lateral excursion was a maximum of only ~0.2 m. The ALHAT's tracking and imaging were nominal, managing to identify the hazard target. On July 27, 2013 the combined Morpheus/ALHAT Tethered Test 27 worked. The lander took off, performed ALHAT imaging and then a lateral translation. On August 7, 2013 Tethered Test 28 was successfully performed. In a flight lasting ~80 seconds the vehicle executed an engine ignition, ascent, a 3-meter lateral translation over simulated Mars soil, 40 seconds of hover at the apex, and a slant descent to "landing" using free flight guidance. The Mars simulated soil was provided by Jet Propulsion Laboratory (JPL) as part of a plume study. On August 23, 2013 Bravo lander successfully performed Tethered Test 29 at JSC. During the ~50 second flight Bravo's actions included ignition, ascent and a 3-meter lateral translation. There was a 10 seconds hover at the apex, and a slant descent to the crane "landing" using free flight guidance. On August 29, 2013 Bravo lander successfully performed the ~63 second Tethered Test 30 flight at JSC. After an ascent of 5 meters with 15 seconds of hover at the apex, a 3-meter backwards lateral translation was performed. Followed by another 15 seconds of hover, and a forward slant descent. On September 18, 2013 in strong winds, the Bravo lander successfully performed Tether Test 31. This flight was a quick turnaround after the previous day's testing had been scrubbed. Various problems were solved by the team. On September 24, 2013 the Lander was launched from the ground. Several problems were detected resulting in an abort. The problems included a false "engine nozzle burn-through" alert and engine startup instability. On September 26, 2013 test HF10 was performed. This involved 20 short firings of the engine on the same day at a variety of pressures, temperatures and power levels. The investigation aimed to probe the instability boundaries of the engine during startup. On October 29, 2013 the lander and its rocket engine methane/LOX performed six off 600 ms burns whilst on top of the trench at JSC. There were no instabilities. On November 1, 2013 with all the software and hardware enhancements included, the lander successfully performed a tethered flight test. The vehicle performed an air start whilst being supported by the tether. On November 7, 2013 the project completed testing the lander at JSC with a Ground Test Takeoff and Landing (GTAL). The vehicle flew nominally and landed within cross range and downrange of its intended target. The GTAL test characterized the performance of the vehicle in lifting off from launch stands on the ground, flying to a height of , hover and descent profile, and landing back on the ground at a separate pad from its launch point. This suggests that the faults revealed by Incident 2 below on August 9, 2012 have now been found and fixed. On December 6, 2013 the integrated vehicle passed Tether Test 33 at Kennedy Space Center in Florida. This was a repeat of Tethered Test 29. The test was primary performed to verify that the Bravo lander was OK after being transported from Texas. On December 10, 2013 the first free flight of a Morpheus prototype lander was successfully conducted at Kennedy Space Center's Shuttle Landing Facility. The 54-second test began with the Morpheus lander launching from the ground over a flame trench and ascending approximately 50 feet, then hovering for about 15 seconds. The lander then flew forward and landed on its pad about 23 feet from the launch point and about 6 inches from the target point. On December 17, 2013 the Morpheus Lander successfully performed Free Flight 4. The preplanned trajectory was flown flawlessly, landing within of its intended target. Morpheus ascended from the ground over the flame trench to an altitude of about (), after pausing briefly at () to maintain the target ascent velocities. The vehicle then flew forward, covering about () in , before descending and landing on a dedicated landing pad inside the ALHAT hazard field. 2014 On January 16, 2014 Free Flight 5 was successfully performed at the KSC Shuttle Landing Facility. The Bravo vehicle flew higher and faster than in all of its previous flights. The preplanned trajectory involved ascending quickly to (), traversing () while descending, then landing approximately 11 inches from intended target in the Hazard Field about a minute after launch. On January 21, 2014 Bravo performed Free Flight 6. In a flight lasting 64 seconds the vehicle ascended to and then flew forward in 25 seconds. As planned, Bravo landed in the Hazard Field, () from the target. The maximum ascent velocity was (). On February 10, 2014 Free Flight 7 was flown at KSC. Bravo flew to () altitude and then traversed () in before landing in the hazard field. The vehicle flew its pre-planned trajectory flawlessly, reaching a maximum ascent velocity of , and landing an on its intended target after launch. The engineers state the altitude during tests is not the important part, but the flight experience gained, including all phases of the check-out, ground loading, flight, and recovery operations. On February 14, 2014 and March 3, 2014 hot fire testing of the lander's Roll Control System (RCS) using a variety of short and long pulses was performed at KSC. The multi-center Morpheus Team successfully completed Free Flight 8 at the Kennedy Space Center (KSC) Shuttle Landing Facility (SLF) on Wednesday, March 5, 2014. Bravo vehicle flew to an altitude of and then traversed in 36 seconds, including diverting course mid-flight, before landing in the hazard field from its original target (simulating hazard avoidance). The vehicle reached a maximum ascent velocity of 13 m/s, and landed approximately 10 inches from its intended target 79 seconds after launch. On Tuesday, March 11, 2014 the Morpheus team successfully completed Free Flight 9 (FF9) at the KSC SLF. This was Morpheus' highest (, higher than the VAB & Washington Monument), fastest ( vertical & horizontal) and farthest () flight to date. During the rest of March 2014 the ALHAT hardware was inserted again permitting a successful tethered test of the assembly on March 27, 2014. Tether Test 34 flight trajectory was similar to TT33 and TT29 with two hovers and a translation during a ascent. Free Flight 10 (FF10) took place on April 2, 2014 with the ALHAT in open loop mode. The ALHAT imaged the Hazard Field and calculating navigation solutions in real time. Morpheus ascended to a maximum altitude of about 804 feet (245 m), then flew forward and downward initially at a 30-degree glideslope, then levelling out, covering a total of about 1334 feet (406.5 m) horizontally in 50 seconds while diverting to a landing site location 78 feet (23.8 m) from its initial target, before descending and landing on a dedicated landing pad at the front (south) of the ALHAT Hazard Field. The total flight time was ~96 sec, the longest flight to date. Free Flight 11 on April 24, 2014 was a repeat of Free Flight 10 with some changes to the ALHAT. April 30, 2014 Free Flight 12 was a repeat of FF10 but with the ALHAT choosing the landing location. On May 22. 2014 in Free Flight the ALHAT determined a safe location in the hazard field the landing location and flew the lander to it. The Morpheus/ALHAT team successfully completed Free Flight 14 (FF14) at the KSC SLF on Wednesday, May 28, 2014, Bravo's 12th and ALHAT's 5th free flight—and the first ever night flight. Initial data indicated nominal performance of all vehicle systems. The ALHAT Hazard Detection System (HDS) performed well, but identified a safe site just outside the conservatively established limits around the center of the landing pad. ALHAT then navigated the vehicle in closed-loop mode through the entire approach, with the vehicle taking over navigation during the descent phase of the trajectory when ALHAT was already dead-reckoning. Had less conservative position error limits allowed ALHAT to continue to navigate to landing, the vehicle still would have landed safely on the pad. The team overcame a few preflight issues, including a failed ignition due to a non-critical temperature exceeding its limit, which was corrected for the successful second attempt. On November 19, 2014 tested the Morpheus Lander at KSC. The ALHAT hardware had been enhanced with new optics that permit the Navigation Doppler Lidar to accurately measure the vehicle's velocity relative to the ground. The test was aborted due to a fault in the remote control system. So far the engine has burnt for a total of 1,134 seconds. Tether Test 36 (TT36) at the KSC SLF on Tuesday December 2, 2014 was a regression test. The Bravo vehicle followed its planned 40 sec trajectory flawlessly, although a handful of discrepancies were identified. The data was reviewed to assess these anomalies and ensure the vehicle and ground systems were ready to support a free flight test. On December 15, 2014 the prototype lander soared 800 feet above the north end of the Shuttle Landing Facility at Kennedy Space Center in Florida on free flight test No. 15. During the 97-second test, ALHAT, surveyed the hazard field for safe landing sites, then guided the lander forward and downward to a successful landing. Conclusion planned testing has been completed. The lander was taken back to JSC. The project review, including testing, was held on March 12, 2015. Test equipment and ground operations In addition to the normal engineering tools several items of test equipment was made or procured. These include cranes wrapped in shielding against heat and debris, a tether, a bungee to control the tether and an energy absorber. The energy absorber was a metal tube filled with a fire proof aluminium honeycomb. Concrete launch and landing pads were built. At Kennedy Space Centre a small flame trench for ground launches was dug near the hazard field (constructed to test the ALHAT). Cameras and recording equipment were installed. Computers and radio communications equipment used. Trolleys to move the lander, batteries and consumables were used. Safety clothing and eye protection against Category IV LASERS were issued. On a typical test day the ground operations staff work about 10 hours from roll-out until Morpheus is back in the hangar. The different portions of the day are Safety Brief & Vehicle Rollout, Pre-Fill Checkout, Propellant Load (Liquid Oxygen and Liquid Methane), Leak Check, Final Preparation, Flight, and Post Test. Activities are divided between the Pad Crew and the Control Centre. As well as the lander electrical batteries for ground power, cranes, load cells and propellant tankers need rolling out to the launch stands.\\ Collaborations NASA's Johnson Space Center collaborated with several firms, academic installations and other NASA centers whilst building and testing the Alpha and Bravo prototype Morpheus landers. For Morpheus and ALHAT, JSC has partnerships with Kennedy Space Center (KSC) for flight-testing; Stennis Space Center (SSC) for engine testing; Marshall Space Flight Center (MSFC) for engine development and lander expertise; Goddard Space Flight Center (GSFC) for core flight software development; and Langley Research Center (LaRC) and the Jet Propulsion Laboratory (JPL) for ALHAT development. Commercial partnerships with enterprises such as Jacobs Engineering, Armadillo Aerospace, Draper Labs, and others have augmented the development and operation of many aspects of the project." Purdue University's Zucrow Labs assisted in the design of an early Morpheus engine. Tests were conducted at Zucrow Labs in West Lafayette, Indiana in 2014 including multiple successful hotfires of the engine. This work was done under the guidance of Dr. William Anderson and multiple masters and PhD students. Health and safety issues Although the liquid oxygen/liquid methane bipropellant mix is considerably easier and safer to handle than hydrazine, the propellants can catch fire and cryogenic fuel tanks and Dewars can explode. Incidents On June 1, 2011, a test of the Morpheus lander caused a large grass fire on the grounds of the Johnson Space Center. A minor incident: no one was injured and the Lander was fine. Subsequently, a wide fire break was dug around the test area to prevent the spread of any possible grass fires. On August 9, 2012, the lander tipped over, crashed, caught fire, and exploded twice during its initial free-flight test at the Kennedy Space Center. The fire was extinguished after the tanks had exploded. No one was injured but the vehicle was not in a recoverable condition. Following the accident about 70 different upgrades to the vehicle design and ground systems were made including adding some redundant instrumentation and mitigating the launch vibroacoustic environment. Military-grade cable connectors and bus couplers have been fitted to the replacement vehicles as well as creating a flame trench on the launch-pad to reduce vibration. A paper acting as an investigation report was published at the American Institute of Aeronautics and Astronautics: SPACE 2013 conference. Status The Morpheus prototype liquid oxygen and methane (LOx/Methane) propulsion system demonstrated advantages in performance, simplicity, reliability, and reusability. LOx/Methane provides new capabilities to use propellants that are manufactured on the Mars surface for ascent return and to integrate with power and life support systems. It was determined that Lox/Methane is extensible to human spacecraft for many transportation elements of a Mars architecture. The propellants provide significant advantages for reliable ignition in a space vacuum, and for reliable safing or purging of spacecraft. "Through this test, NASA obtained Level 6 of Technology Readiness Level (TRL) related to the planet landing technology" The Morpheus lander flight demonstrations led to the proposal to use LOx/Methane for a Discovery Program mission, named Moon Aging Regolith Experiment (MARE) to land a science payload for the Southwest Research Institute on the lunar surface. This mission's lander is called NAVIS (NASA Autonomous Vehicle for In-situ Science). The technology developed is also being applied to the Nova-C lunar lander, proposed to land on the Moon in early 2022. See also Green Propellant Infusion Mission Lunar CATALYST Mighty Eagle Nova-C Quad (rocket) Raptor (rocket engine family) VTVL Notes a. Methane is an environmentally friendly (i.e. non-toxic) propellant that NASA hopes will reduce transportation costs by being made in-situ (ISRU). For instance, the Sabatier reaction could be used to convert carbon dioxide (CO2) found on Mars' atmosphere into methane, using either Hydrogen found or transported Hydrogen from Earth, a catalyst, and a source of heat. Hydrogen can be made from water ice, which occurs on both the Earth's Moon and Mars. References External links Project Morpheus home page Autonomous Landing and Hazard Avoidance Technology (ALHAT) home page Detailed spherical panoramas of the vehicle, launch/landing area and launch control center NASA space launch vehicles Rocket engines using methane propellant Rocket fuels Rocket propellants Missions to the Moon Spacecraft propulsion VTVL rockets
49827
https://en.wikipedia.org/wiki/Arcade%20video%20game
Arcade video game
An arcade video game takes player input from its controls, processes it through electrical or computerized components, and displays output to an electronic monitor or similar display. Most arcade video games are coin-operated, housed in an arcade cabinet, and located in amusement arcades alongside other kinds of arcade games. Until the late 1990s, arcade video games were the largest and most technologically advanced segment of the video game industry. Early prototypical entries Galaxy Game and Computer Space in 1971 established the principle operations for arcade games, and Atari's Pong in 1972 is recognized as the first successful commercial arcade video game. Improvements in computer technology and gameplay design led to a golden age of arcade video games, the exact dates of which are debated but range from the late 1970s to mid-1980s. This golden age includes Space Invaders, Pac-Man, and Donkey Kong. The arcade industry had a resurgence from the early 1990s to mid-2000s, including Street Fighter II, Mortal Kombat, and Dance Dance Revolution, but ultimately declined in the Western world as competing home video game consoles such as the Sony PlayStation and Microsoft Xbox increased in their graphics and gameplay capability and decreased in cost. Nevertheless, Japan, China, and Korea retain a strong arcade industry in the present day. History Games of skill had been popular amusement park midway attractions since the 19th century. With the introduction of electricity and coin-operated machines, they facilitated a viable business. When pinball machines with electric lights and displays were introduced in 1933, but without the user-controller flippers which would not be invented until 1947, these machines were seen as games of luck. Numerous states and cities treated them as amoral playthings for rebellious young people, and banned them into the 1960s and 1970s. Electro-mechanical games (EM games) appeared in arcades in the mid-20th century. Following Sega's EM game Periscope (1966), the arcade industry experienced a "technological renaissance" driven by "audio-visual" EM novelty games, establishing the arcades as a healthy environment for the introduction of commercial video games in the early 1970s. In the late 1960s, college student Nolan Bushnell had a part-time job at an arcade where he became familiar with EM games such as Chicago Coin's racing game Speedway (1969), watching customers play and helping to maintain the machinery, while learning the game business. The early mainframe game Spacewar! (1962) inspired the first commercial arcade video game, Computer Space (1971), created by Nolan Bushnell and Ted Dabney and released by Nutting Associates. It was demonstrated at the Amusement & Music Operators Association (AMOA) show in October 1971. Another Spacewar-inspired coin-operated video game, Galaxy Game, was demonstrated at Stanford University in November 1971. Bushnell and Dabney followed their success of Computer Space with the help of Allan Alcorn to create a table tennis game Pong, released in 1972. Pong was a commercial success, leading numerous other coin-op manufacturers to enter the market. The video game industry transitioned from discrete integrated circuitry to programmable microprocessors in the mid-1970s, starting with Gun Fight in 1975. The arcade industry entered a "Golden Age" in 1978 with the release of Taito's Space Invaders, which introduced many novel gameplay features including a scoreboard. From 1978 to 1982, several other major arcade games from Namco, Atari, Williams Electronics, Stern Electronics, and Nintendo were all considered blockbusters, particularly with Namco's Pac-Man in 1980 which became a fixture in popular culture. Across North America and Japan, dedicated video game arcades appeared and arcade game cabinets appeared in many smaller storefronts. By 1981, the arcade video game industry was worth in the US. The novelty of the arcade game waned sharply after 1982 from several factors, including market saturation of arcades and arcade games, a moral panic created over video games due to similar fears that had been raised over pinball machines in the decades prior, and the 1983 video game crash in the home console market that impacted arcades. The arcade market had recovered by 1986, with the help of software conversion kits, the arrival of popular beat 'em up games (such as Kung-Fu Master and Renegade), and advanced motion simulator games (such as Sega's "taikan" games including Hang-On, Space Harrier, and Out Run). However, the growth of home video game systems such as the Nintendo Entertainment System led to another brief arcade decline toward the end of the 1980s. Arcade games continued to improve with technology and gameplay evolutions. In the early 1990s, the release of Capcom's Street Fighter II established the modern style of fighting games and led to a number of similar games such as Mortal Kombat, Fatal Fury, Killer Instinct, Virtua Fighter, and Tekken, creating a new renaissance in the arcades. Another factor was realism, including the "3D Revolution" from 2D and pseudo-3D graphics to true real-time 3D polygon graphics. This was largely driven by a technological arms race between Sega and Namco. 3D polygons were popularized in arcades during the early 1990s with games such as Sega's Virtua Racing and Virtua Fighter. 3D graphics later became popular in console and computer games by the mid-1990s, though arcade systems such as the Sega Model 3 remained considerably more advanced than home systems in the late 1990s. Until about 1996, arcade video games had remained the largest segment of the global video game industry. Arcades declined in the late 1990s, surpassed by the console market for the first time around 1997-1998. Since the 2000s, arcade games have taken different routes globally. In the United States, arcades have become niche markets as they compete with the home console market, and they adapted other business models, such as providing other entertainment options or adding prize redemptions. In Japan and China, arcades continue to flourish, where games like Dance Dance Revolution and The House of the Dead are tailored to experiences that players cannot easily have at home. Technology Virtually all modern arcade games (other than the very traditional fair midway) make extensive use of solid state electronics, integrated circuits, and monitor screens, all installed inside an arcade cabinet. With the exception of Galaxy Game and Computer Space, which were built around small form-factor mainframe computers, the first arcade games are based on combinations of multiple discrete logic chips, such as transistor–transistor logic (TTL) chips. Designing an arcade game was more about the combination of these TTL chips and other electronic components to achieve the desired effect on screen. More complex gameplay required significantly more TTL components to achieve this result. By the mid-1970s, the first inexpensive programmable microprocessors had arrived on the market. The first microprocessor-based video game is Midway's Gun Fight in 1975 (a conversion of Taito's Western Gun), and with the advent of Space Invaders and the golden era, microprocessor-based games became typical. Early arcade games were also designed around raster graphics displayed on a cathode ray tube (CRT) display. Many games of the late 1970s and early 1980s use special displays that rendered vector graphics, though these waned by the mid-1980s as display technology on CRTs improved. Prior to the availability of color CRT or vector displays, some arcade cabinets have a combination of angled monitor positioning, one-way mirrors, and clear overlays to simulate colors and other graphics onto the gameplay field. Coin-operated arcade video games from the 1990s to the 2000s generally use custom hardware often with multiple CPUs, highly specialized sound and graphics chips, and the latest in expensive computer graphics display technology. This allows more complex graphics and sound than contemporary video game consoles or personal computers. Many arcade games since the 2000s run on modified video game console hardware (such as the Sega NAOMI or Triforce) or gaming PC components (such as the Taito Type X). Many arcade games have more immersive and realistic game controls than PC or console games. This includes specialized ambiance or control accessories such as fully enclosed dynamic cabinets with force feedback controls, dedicated lightguns, rear-projection displays, reproductions of automobile or airplane cockpits, motorcycle or horse-shaped controllers, or highly dedicated controllers such as dancing mats and fishing rods. These accessories are usually too bulky, expensive, and specialized to be used with typical home PCs and consoles. Arcade makers experiment with virtual reality technology. Arcades have progressed from using coins as credits to smart cards that hold the virtual currency of credits. Modern arcade cabinets use flat panel displays instead of cathode-ray tubes. Internet services such as ALL.Net, NESiCAxLive, e-Amusement and NESYS, allow the cabinets to download updates or new games, do online multiplayer gameplay, save progress, unlock content, or earn credits. Genres Many arcade games have short levels, simple and intuitive control schemes, and rapidly increasing difficulty. The classic formula for a successful arcade video game is "easy to learn, difficult to master" along with a "multiple life, progressively difficult level" paradigm. This is due to the environment of the arcade, where the player is essentially renting the game for as long as their in-game avatar can stay alive or until they run out of tokens. Games on consoles or PCs can be referred to as "arcade games" if they share these qualities, or are direct ports of arcade games. Arcade racing games often have sophisticated motion simulator arcade cabinets, a simplified physics engine, and short learning time when compared with more realistic racing simulations. Cars can turn sharply without braking or understeer, and the AI rivals are sometimes programmed so they are always near the player with a rubberband effect. Other types of arcade-style games include music games (particularly rhythm games), and mobile and casual games with intuitive controls and short sessions. Action The term "arcade game" can refer to an action video game designed to play similarly to an arcade game with frantic, addictive gameplay. The focus of arcade action games is on the user's reflexes, and many feature very little puzzle-solving, complex thinking, or strategy skills. These include fighting games often played with an arcade controller, beat 'em up games including fast-paced hack and slash games, and light gun rail shooters and "bullet hell" shooters with intuitive controls and rapidly increasing difficulty. Many arcade combat flight simulators have sophisticated hydraulic motion simulator cabinets, and simplified physics and handling. Arcade flight games are meant to have an easy learning curve, in order to preserve their action component. Increasing numbers of console flight video games, such as Crimson Skies, Ace Combat, and Secret Weapons Over Normandy indicate the falling of manual-heavy flight sim popularity in favor of instant arcade flight action. A modern subgenre of action games called "hack and slash" or "character action games" represent an evolution of traditional arcade action games, and are sometimes considered a subgenre of beat 'em up brawlers. This subgenre of games was largely defined by Hideki Kamiya, creator of the Devil May Cry and Bayonetta franchises. Industry Arcade games are found in restaurants, bowling alleys, college campuses, video rental shops, dormitories, laundromats, movie theaters, supermarkets, shopping malls, airports, and other retail environments. They are popular in public places where people are likely to have free time. Their profitability is expanded by the popularity of conversions of arcade games for home-based platforms. In 1997, WMS Industries (parent company of Midway Games) reported that if more than 5,000 arcade units are sold, at least 100,000 home version units will be sold. The American Amusement Machine Association (AAMA) is a trade association established in 1981 that represents the American coin-operated amusement machine industry, including 120 arcade game distributors and manufacturers. The Japan Amusement Machine and Marketing Association (JAMMA) represents the Japanese arcade industry. Conversions, emulators, and recreations Prior to the 2000s, successful video games were often converted to a home video game console or home computer. Many of the initial Atari VCS games, for example, were conversions of Atari's success arcade games. Arcade game manufacturers that were not in the home console or computer business found licensing of their games to console manufacturers to be a successful business model, as console manufacturer competitors would vie for rights to more popular games. Coleco famously bested Atari to secure the rights to convert Nintendo's Donkey Kong, which it subsequently included as a pack-in game for the ColecoVision to challenge the VCS. Arcade conversions typically had to make concessions for the lower computational power and capabilities of the home console, such as limited graphics or alterations in gameplay. Such conversions had mixed results. The Atari VCS conversion of Space Invaders was considered the VCS's killer application, helping to quadruple the VCS sales in 1980. In contrast, the VCS conversion of Pac-Man in 1982 was highly criticized for technical flaws due to VCS limitations such as flickering ghosts and simplified gameplay. Though Pac-Man was the best-selling game on the VCS, it eroded consumer confidence in Atari's games and partially contributed to the 1983 crash. The need for arcade conversions began to wane as arcade game manufacturers like Nintendo, Sega, and SNK entered the home console market and used similar technology within their home consoles as found at the arcade, negating the need to simplify the game. Concessions still may be made for a home release; notably, the Super Nintendo Entertainment System conversion of Mortal Kombat removed much of the gore from the arcade version to meet Nintendo's quality control standards. Exact copies of arcade video games can be run through emulators such as MAME on modern devices. An emulator is an application that translates foreign software onto a modern system, in real-time. Emulated games appeared legally and commercially on the Macintosh in 1994 with Williams floppy disks, Sony PlayStation in 1996, and Sega Saturn in 1997 with CD-ROM compilations such as Williams Arcade's Greatest Hits and Arcade's Greatest Hits: The Atari Collection 1, and on the PlayStation 2 and GameCube with DVD-ROM compilations such as Midway Arcade Treasures. Arcade games are downloaded and emulated through the Nintendo Wii Virtual Console service starting in 2009. Using emulation, companies like Arcade1Up have produced at-scale or reduced-scale recreations of arcade cabinets using modern technology, such as LCD monitors and lightweight construction. These cabinets are typically designed to resemble the original arcade game cabinets, but may also support multiple related games. These cabinets can be offered in diverse and miniaturized styles, such as table-mounted and wall-mounted versions. Highest-grossing For arcade games, success is usually judged by either the number of arcade hardware units sold to operators, or the amount of revenue generated. The revenue can include the coin drop earnings from coins (such as quarters, dollars, or 100 yen coins) inserted into machines, and/or the earnings from hardware sales with each unit costing thousands of dollars. Most of the revenue figures listed below are incomplete as they only include hardware sales revenue, due to a lack of available data for coin drop earnings which typically account for the majority of a hit arcade game's gross revenue. This list only includes arcade games that either sold more than 10,000 hardware units or generated a revenue of more than . Most of the games listed were released between the golden age of arcade video games (1978–1984) and the 1990s. Franchises These are the combined hardware sales of at least two or more arcade games that are part of the same franchise. This list only includes franchises that have sold at least 5,000 hardware units or grossed at least $10 million revenues. See also Claw crane JAMMA List of arcade video games Medal game Money booth Neo-Geo Winners Don't Use Drugs Notes References External links The Video Arcade Preservation Society Online collection of Automatic Age trade journals, 1925–1945 System 16 – The Arcade Museum Arcade History (Coin-Op Database) The Museum of Soviet Arcade Games (blog article) Video game platforms Video game terminology Children's entertainment
8624486
https://en.wikipedia.org/wiki/T-Square%20%28software%29
T-Square (software)
T-Square is an early drafting program written by Peter Samson assisted by Alan Kotok and possibly Robert A. Saunders while they were students at the Massachusetts Institute of Technology and members of the Tech Model Railroad Club. T-Square was written for the PDP-1 computer and its Type 30 precision CRT that Digital Equipment Corporation donated to MIT in 1961. It is unlikely that many people have had the opportunity to use T-Square although Samson has said the group drew some schematics. Authors Students of Jack Dennis and John McCarthy discovered a stunning array of uses for the very expensive room-sized computers that were given to MIT. They were privileged to be enrolled when the school's first programming courses were taught. They negotiated with their advisors and the operations manager John McKenzie for time and became single-users long before personal computers were available. About 1959 or 1960, some of this group of students became support staff and wrote software for about $1.75 USD per hour. They wrote the programming software which is used to build application software. Later Samson and Kotok became architects of DEC computers. CAD During this period Samson created other "firsts" in application software for music, games and page layout so it is perhaps not surprising he wrote what may be the first drafting program. Based on this experience, later in life Samson worked on an electronic drafting program with 80,000 lines of code. He received a patent in virtual reality at Autodesk, a vendor of CAD and CAM software. Input device To move the cursor, T-Square used a Spacewar! game controller built by Kotok and Saunders in 1962. It is not known if Saunders was involved in repurposing it for T-Square. Kotok, who was about 20 years old, did participate. He was known for doing what needed to be done and for taking an interest in "all things ingenious or intriguing." Ivan Sutherland used a light pen in his programs as did Jack Gilmore and others before him. The pens allow fine detail but drawing on a vertical surface like a CRT tires the hand quickly. There is no evidence they studied ergonomics but T-Square used an input device more like a mouse in that it rested on a horizontal surface. The Spacewar! control boxes were cobbled together with wood, Bakelite and toggle switches. Although they are often considered to be the first joysticks, Kotok did not accept credit for coinventing them with Saunders. He thought there were similar controllers in use at the time in games such as Tennis for Two and at NASA or another organization. Influence T-Square is a small part of the reason people use today's computers for drafting, architecture, drawing and illustration and engineering. Prior to this revolution and in some places to this day, draftsmen and women used triangles, wood or metal T-squares, pencils and technical pens on film and paper. The beginning of this change can be seen in a video of Sutherland demonstrating Sketchpad. In his 1963 MIT Ph.D. thesis, Sutherland explains he completed an early version that could draw parallel and perpendicular lines in November 1961. He goes on to say, "Somewhat before my first effort was working, Welden Clark of Bolt, Beranek and Newman..." showed him a "similar program" running on a PDP-1. T-Square and Sketchpad were developed in the same location a year or two apart but their influence on each other is unknown. See also Sketchpad T-square Notes References Also available at Google Video: Computer-aided design software Technical drawing History of software
22845203
https://en.wikipedia.org/wiki/SecureCRT
SecureCRT
SecureCRT is a commercial SSH and Telnet client and terminal emulator by VanDyke Software. Originally a Windows product, VanDyke added a Mac OS X version and Linux version. History SecureCRT is a GUI-based telnet client and terminal emulator originally called CRT. It was first released in the autumn of 1995 by VanDyke Software. Originally released as a premium version of CRT with support for SSH encryption, SecureCRT later absorbed the CRT product entirely. The program is part of a line of networking software which includes SecureFX, a file transfer client with SSL capability, and VShell, an SSH server. SecureCRT and SecureFX can be started from within each other and use a combined host information list. A separately-sold pack of command-line tools (e.g., scp, modeled after the Unix command of the same name) for use with VShell is also sold by the company. All offerings are commercialware. Features Graphical user interface with tab support and configurable sessions Extensive protocol support (SSH1, SSH2, RDP, Telnet, Telnet over SSL, Rlogin, Serial, TAPI) Support for a large number of ciphers: AES-128, AES-192, AES-256, AES-128-CTR, AES-192-CTR, AES-256-CTR, Twofish, Blowfish, 3DES, and RC4 Advanced SSH features including public key assistant, X.509, smart card and GSSAPI support, X11 forwarding, tunneling of other protocols, Advanced terminal emulation capabilities (VT100, VT102, VT220, ANSI, SCO ANSI, Wyse 50/60, Xterm, and Linux terminals) with full Unicode support 128,000-line scrollback and unlimited logging capabilities WSH Scripting support, meaning it can be programmed in VBScript, JScript, PerlScript, ooRexxScript, PythonScript, TclScript, PHPScript, variants of Delphi, Rexx, Basic, and any other available WSH scripting engines. File transfers available via SecureFX integration FIPS compliance Compatibility SecureCRT runs on Windows XP, Windows Vista and Windows 7, Windows 8, Windows 10. It also runs on the Windows Server series of operating systems. For Windows Vista and later, a 64-bit version is available for download. SecureCRT is also available for Mac OS X and Linux. Export restrictions SecureCRT is developed in New Mexico, and is therefore subject to United States export restrictions. References External links SecureCRT product page at VanDyke Software Cryptographic software Telnet Terminal emulators
28684
https://en.wikipedia.org/wiki/Session%20Initiation%20Protocol
Session Initiation Protocol
The Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, and terminating real-time sessions that include voice, video and messaging applications. SIP is used for signaling and controlling multimedia communication sessions in applications of Internet telephony for voice and video calls, in private IP telephone systems, in instant messaging over Internet Protocol (IP) networks as well as mobile phone calling over LTE (VoLTE). The protocol defines the specific format of messages exchanged and the sequence of communications for cooperation of the participants. SIP is a text-based protocol, incorporating many elements of the Hypertext Transfer Protocol (HTTP) and the Simple Mail Transfer Protocol (SMTP). A call established with SIP may consist of multiple media streams, but no separate streams are required for applications, such as text messaging, that exchange data as payload in the SIP message. SIP works in conjunction with several other protocols that specify and carry the session media. Most commonly, media type and parameter negotiation and media setup are performed with the Session Description Protocol (SDP), which is carried as payload in SIP messages. SIP is designed to be independent of the underlying transport layer protocol and can be used with the User Datagram Protocol (UDP), the Transmission Control Protocol (TCP), and the Stream Control Transmission Protocol (SCTP). For secure transmissions of SIP messages over insecure network links, the protocol may be encrypted with Transport Layer Security (TLS). For the transmission of media streams (voice, video) the SDP payload carried in SIP messages typically employs the Real-time Transport Protocol (RTP) or the Secure Real-time Transport Protocol (SRTP). History SIP was originally designed by Mark Handley, Henning Schulzrinne, Eve Schooler and Jonathan Rosenberg in 1996 to facilitate establishing multicast multimedia sessions on the Mbone. The protocol was standardized as in 1999. In November 2000, SIP was accepted as a 3GPP signaling protocol and permanent element of the IP Multimedia Subsystem (IMS) architecture for IP-based streaming multimedia services in cellular networks. In June 2002 the specification was revised in and various extensions and clarifications have been published since. SIP was designed to provide a signaling and call setup protocol for IP-based communications supporting the call processing functions and features present in the public switched telephone network (PSTN) with a vision of supporting new multimedia applications. It has been extended for video conferencing, streaming media distribution, instant messaging, presence information, file transfer, Internet fax and online games. SIP is distinguished by its proponents for having roots in the Internet community rather than in the telecommunications industry. SIP has been standardized primarily by the Internet Engineering Task Force (IETF), while other protocols, such as H.323, have traditionally been associated with the International Telecommunication Union (ITU). Protocol operation SIP is only involved in the signaling operations of a media communication session and is primarily used to set up and terminate voice or video calls. SIP can be used to establish two-party (unicast) or multiparty (multicast) sessions. It also allows modification of existing calls. The modification can involve changing addresses or ports, inviting more participants, and adding or deleting media streams. SIP has also found applications in messaging applications, such as instant messaging, and event subscription and notification. SIP works in conjunction with several other protocols that specify the media format and coding and that carry the media once the call is set up. For call setup, the body of a SIP message contains a Session Description Protocol (SDP) data unit, which specifies the media format, codec and media communication protocol. Voice and video media streams are typically carried between the terminals using the Real-time Transport Protocol (RTP) or Secure Real-time Transport Protocol (SRTP). Every resource of a SIP network, such as user agents, call routers, and voicemail boxes, are identified by a Uniform Resource Identifier (URI). The syntax of the URI follows the general standard syntax also used in Web services and e-mail. The URI scheme used for SIP is sip and a typical SIP URI has the form sip:username@domainname or sip:username@hostport, where domainname requires DNS SRV records to locate the servers for SIP domain while hostport can be an IP address or a fully qualified domain name of the host and port. If secure transmission is required, the scheme sips is used. SIP employs design elements similar to the HTTP request and response transaction model. Each transaction consists of a client request that invokes a particular method or function on the server and at least one response. SIP reuses most of the header fields, encoding rules and status codes of HTTP, providing a readable text-based format. SIP can be carried by several transport layer protocols including Transmission Control Protocol (TCP), User Datagram Protocol (UDP), and Stream Control Transmission Protocol (SCTP). SIP clients typically use TCP or UDP on port numbers 5060 or 5061 for SIP traffic to servers and other endpoints. Port 5060 is commonly used for non-encrypted signaling traffic whereas port 5061 is typically used for traffic encrypted with Transport Layer Security (TLS). SIP-based telephony networks often implement call processing features of Signaling System 7 (SS7), for which special SIP protocol extensions exist, although the two protocols themselves are very different. SS7 is a centralized protocol, characterized by a complex central network architecture and dumb endpoints (traditional telephone handsets). SIP is a client-server protocol of equipotent peers. SIP features are implemented in the communicating endpoints, while the traditional SS7 architecture is in use only between switching centers. Network elements The network elements that use the Session Initiation Protocol for communication are called SIP user agents. Each user agent (UA) performs the function of a user agent client (UAC) when it is requesting a service function, and that of a user agent server (UAS) when responding to a request. Thus, any two SIP endpoints may in principle operate without any intervening SIP infrastructure. However, for network operational reasons, for provisioning public services to users, and for directory services, SIP defines several specific types of network server elements. Each of these service elements also communicates within the client-server model implemented in user agent clients and servers. User agent A user agent is a logical network endpoint that sends or receives SIP messages and manages SIP sessions. User agents have client and server components. The user agent client (UAC) sends SIP requests. The user agent server (UAS) receives requests and returns a SIP response. Unlike other network protocols that fix the roles of client and server, e.g., in HTTP, in which a web browser only acts as a client, and never as a server, SIP requires both peers to implement both roles. The roles of UAC and UAS only last for the duration of a SIP transaction. A SIP phone is an IP phone that implements client and server functions of a SIP user agent and provides the traditional call functions of a telephone, such as dial, answer, reject, call hold, and call transfer. SIP phones may be implemented as a hardware device or as a softphone. As vendors increasingly implement SIP as a standard telephony platform, the distinction between hardware-based and software-based SIP phones is blurred and SIP elements are implemented in the basic firmware functions of many IP-capable communications devices such as smartphones. In SIP, as in HTTP, the user agent may identify itself using a message header field (User-Agent), containing a text description of the software, hardware, or the product name. The user agent field is sent in request messages, which means that the receiving SIP server can evaluate this information to perform device-specific configuration or feature activation. Operators of SIP network elements sometimes store this information in customer account portals, where it can be useful in diagnosing SIP compatibility problems or in the display of service status. Proxy server A proxy server is a network server with UAC and UAS components that functions as an intermediary entity for the purpose of performing requests on behalf of other network elements. A proxy server primarily plays the role of call routing; it sends SIP requests to another entity closer to it destination. Proxies are also useful for enforcing policy, such as for determining whether a user is allowed to make a call. A proxy interprets, and, if necessary, rewrites specific parts of a request message before forwarding it. SIP proxy servers that route messages to more than one destination are called forking proxies. The forking of a SIP request establishes multiple dialogs from the single request. Thus, a call may be answered from one of multiple SIP endpoints. For identification of multiple dialogs, each dialog has an identifier with contributions from both endpoints. Redirect server A redirect server is a user agent server that generates 3xx (redirection) responses to requests it receives, directing the client to contact an alternate set of URIs. A redirect server allows proxy servers to direct SIP session invitations to external domains. Registrar A registrar is a SIP endpoint that provides a location service. It accepts REGISTER requests, recording the address and other parameters from the user agent. For subsequent requests, it provides an essential means to locate possible communication peers on the network. The location service links one or more IP addresses to the SIP URI of the registering agent. Multiple user agents may register for the same URI, with the result that all registered user agents receive the calls to the URI. SIP registrars are logical elements and are often co-located with SIP proxies. To improve network scalability, location services may instead be located with a redirect server. Session border controller Session border controllers (SBCs) serve as middleboxes between user agents and SIP servers for various types of functions, including network topology hiding and assistance in NAT traversal. SBCs are an independently engineered solution and are not mentioned in the SIP RFC. Gateway Gateways can be used to interconnect a SIP network to other networks, such as the PSTN, which use different protocols or technologies. SIP messages SIP is a text-based protocol with syntax similar to that of HTTP. There are two different types of SIP messages: requests and responses. The first line of a request has a method, defining the nature of the request, and a Request-URI, indicating where the request should be sent. The first line of a response has a response code. Requests Requests initiate a functionality of the protocol. They are sent by a user agent client to the server and are answered with one or more SIP responses, which return a result code of the transaction, and generally indicate the success, failure, or other state of the transaction. Responses Responses are sent by the user agent server indicating the result of a received request. Several classes of responses are recognized, determined by the numerical range of result codes: 1xx: Provisional responses to requests indicate the request was valid and is being processed. 2xx: Successful completion of the request. As a response to an INVITE, it indicates a call is established. The most common code is 200, which is an unqualified success report. 3xx: Call redirection is needed for completion of the request. The request must be completed with a new destination. 4xx: The request cannot be completed at the server for a variety of reasons, including bad request syntax (code 400). 5xx: The server failed to fulfill an apparently valid request, including server internal errors (code 500). 6xx: The request cannot be fulfilled at any server. It indicates a global failure, including call rejection by the destination. Transactions SIP defines a transaction mechanism to control the exchanges between participants and deliver messages reliably. A transaction is a state of a session, which is controlled by various timers. Client transactions send requests and server transactions respond to those requests with one or more responses. The responses may include provisional responses with a response code in the form 1xx, and one or multiple final responses (2xx – 6xx). Transactions are further categorized as either type invite or type non-invite. Invite transactions differ in that they can establish a long-running conversation, referred to as a dialog in SIP, and so include an acknowledgment (ACK) of any non-failing final response, e.g., 200 OK. Instant messaging and presence The Session Initiation Protocol for Instant Messaging and Presence Leveraging Extensions (SIMPLE) is the SIP-based suite of standards for instant messaging and presence information. Message Session Relay Protocol (MSRP) allows instant message sessions and file transfer. Conformance testing The SIP developer community meets regularly at conferences organized by SIP Forum to test interoperability of SIP implementations. The TTCN-3 test specification language, developed by a task force at ETSI (STF 196), is used for specifying conformance tests for SIP implementations. Performance testing When developing SIP software or deploying a new SIP infrastructure, it is important to test the capability of servers and IP networks to handle certain call load: number of concurrent calls and number of calls per second. SIP performance tester software is used to simulate SIP and RTP traffic to see if the server and IP network are stable under the call load. The software measures performance indicators like answer delay, answer/seizure ratio, RTP jitter and packet loss, round-trip delay time. Applications SIP connection is a marketing term for voice over Internet Protocol (VoIP) services offered by many Internet telephony service providers (ITSPs). The service provides routing of telephone calls from a client's private branch exchange (PBX) telephone system to the PSTN. Such services may simplify corporate information system infrastructure by sharing Internet access for voice and data, and removing the cost for Basic Rate Interface (BRI) or Primary Rate Interface (PRI) telephone circuits. SIP trunking is a similar marketing term preferred for when the service is used to simplify a telecom infrastructure by sharing the carrier access circuit for voice, data, and Internet traffic while removing the need for PRI circuits. SIP-enabled video surveillance cameras can initiate calls to alert the operator of events, such as the motion of objects in a protected area. SIP is used in audio over IP for broadcasting applications where it provides an interoperable means for audio interfaces from different manufacturers to make connections with one another. Implementations The U.S. National Institute of Standards and Technology (NIST), Advanced Networking Technologies Division provides a public-domain Java implementation that serves as a reference implementation for the standard. The implementation can work in proxy server or user agent scenarios and has been used in numerous commercial and research projects. It supports in full and a number of extension RFCs including (event notification) and (reliable provisional responses). Numerous other commercial and open-source SIP implementations exist. See List of SIP software. SIP-ISUP interworking SIP-I, Session Initiation Protocol with encapsulated ISUP, is a protocol used to create, modify, and terminate communication sessions based on ISUP using SIP and IP networks. Services using SIP-I include voice, video telephony, fax and data. SIP-I and SIP-T are two protocols with similar features, notably to allow ISUP messages to be transported over SIP networks. This preserves all of the detail available in the ISUP header. SIP-I was defined by the ITU-T, whereas SIP-T was defined by the IETF. Encryption Concerns about the security of calls via the public Internet have been addressed by encryption of the SIP protocol for secure transmission. The URI scheme SIPS is used to mandate that SIP communication be secured with Transport Layer Security (TLS). SIPS URIs take the form sips:[email protected]. End-to-end encryption of SIP is only possible if there is a direct connection between communication endpoints. While a direct connection can be made via Peer-to-peer SIP or via a VPN between the endpoints, most SIP communication involves multiple hops, with the first hop being from a user agent to the user agent's ITSP. For the multiple-hop case, SIPS will only secure the first hop; the remaining hops will normally not be secured with TLS and the SIP communication will be insecure. In contrast, the HTTPS protocol provides end-to-end security as it is done with a direct connection and does not involve the notion of hops. The media streams (audio and video), which are separate connections from the SIPS signaling stream, may be encrypted using SRTP. The key exchange for SRTP is performed with SDES (), or with ZRTP (). When SDES is used, the keys will be transmitted via insecure SIP unless SIPS is used. One may also add a MIKEY () exchange to SIP to determine session keys for use with SRTP. See also Computer telephony integration (CTI) Computer-supported telecommunications applications (CSTA) H.323 protocols H.225.0 and H.245 IP Multimedia Subsystem (IMS) Media Gateway Control Protocol (MGCP) Mobile VoIP MSCML (Media Server Control Markup Language) Network convergence Rendezvous protocol RTP payload formats SIGTRAN (Signaling Transport) SIP extensions for the IP Multimedia Subsystem SIP provider Skinny Client Control Protocol (SCCP) T.38 XIMSS (XML Interface to Messaging, Scheduling, and Signaling) Notes References External links IANA: SIP Parameters IANA: SIP Event Types Namespace VoIP protocols Videotelephony Application layer protocols
55113662
https://en.wikipedia.org/wiki/Mario%20Gerardo%20Piattini%20Velthuis
Mario Gerardo Piattini Velthuis
Mario Gerardo Piattini Velthuis (Buenos Aires, Argentina March 28, 1966). He is a computer scientist with diverse researches in the field of systems and software engineering, founder of the Alarcos Research Group. Biography Piattini was born as the first child of three brothers, in Buenos Aires (Argentina) whose parents are Carlos Piattini and Ans Velthuis. He later moved to Rome (Italy) and studied at the Liceo Cervantes Secondary School in Rome, where he finished in 1983. In 1989, he finished his bachelor degree in Computer Science at the Polytechnic University of Madrid, where he obtained his PhD in Computer Science in 1994. After working in several companies and being Associate Professor at the Complutense University, and at the Universidad Carlos III (UC3M) in Madrid, in 1997 he joined the University of Castilla la Mancha (UCLM). The same year he founded and managed Alarcos Research Group. Additionally, since 2002, he works as a Professor of the UCLM University in the fields of Languages and Computer Systems. In 2008, he was among the fifteen best researchers in the world in the field of systems and software engineering in the independent study Top scholars, in the area of systems and software engineering (2004-2008). In 2010, he received the Award "Gabriel Alonso de Herrera" for his research career (2010), awarded by the Regional Government of Castilla-La Mancha. In 2012, he received the National Award to the Professional Career of the Computer Engineer (2012). Federation of Associations of Computer Engineers of Spain. In 2016, he received the Spanish National Award on Computing Science 'ARITMEL' 2016, for having made outstanding scientific contributions in the area of computer engineering. He has worked as a consultant in the Ministry of Industry and Energy, and in the Ministry of Public Administration. Career Research His career began in the field of the database design and advanced databases, and later, in the field of the quality of information systems, where he has led and participated in various research projects. He is the director and founder of the Alarcos Research Group, specialized in the quality of information systems. He has been Director of the Joint Research and Development Center UCLM-INDRA and the Institute of Technologies and Information Systems (ITSI) of the University of Castilla-La Mancha. Coordinator of the Area of Computer Science and Information Technology of the National Agency for Evaluation and Forecasting (ANEP) University Management In the field of University management, he held various positions at the local level. In the University of Ciudad Real (UCLM) he was the Director of the Departmental Section of Computer Science. At the University of Castilla-La Mancha, he served as Deputy Director of the Department of Computer Science between 2000 and 2005. In addition to this, he worked as an employer, between 2003 and 2011, of the Ínsula Barataria Foundation for the promotion of the Knowledge Society. In 2005, he founded the UCLM-INDRA Joint Research and Development Center, where he was director until 2010, and meanwhile, he founded the Institute of Technologies and Information Systems (ITSI) of the University of Castilla-La Mancha, where he was director until 2015. Publications Mario Piattini has published several articles in international academic journals, delivered several papers at international conferences, and published a large number of books related to Software Engineering, Databases, Quality, and Audit of information systems. References External links Mario Piattini interview by ComputerWorld in February 2018. Mario Piattini interview by ABC magazine after the global cyberattack of the WannaCry virus in May 2017. Piattini Mario, Digital Bibliography & Library Project Mario Piattini, Google Scholars Mario Piattini, Directorio U.C.L.M. 1966 births Living people
17435496
https://en.wikipedia.org/wiki/Calamus%20%28DTP%29
Calamus (DTP)
Calamus is a desktop publishing application, built for the Atari ST computer. The first version was released on July 1, 1987 by the former German software company DMC GmbH. It is also able to run under a built-in and transparent Atari emulator on Windows, or on other platforms such as Mac OS 9 and Mac OS X, using any available TOS emulator. Calamus is a software RIP application which generates high-quality output in any resolution. It was one of the first DTP applications supporting an own vector font format, notable for its support for automatic kerning even where adjacent characters are set in different fonts or at different sizes. Its high modularity offers features for almost every purpose in desktop publishing. Calamus also was one of the first DTP apps to support real virtual objects and frames, nondestructive vector masks, and editable PS/PDF import. Its (adjustable) measurement base of 1/10,000mm allows accurate positioning of elements. Calamus was ported to Windows by MGI Software and was released as Calamus 95. In 1997, distribution rights for the program were taken over by the German company invers Software, which sold the program and developed new versions for the next two decades. In March 2018, invers Software was closed, and sales and development of Calamus were discontinued, although the official website is still functioning as of 2021. The current and last version of Calamus is Calamus SL 2015, also available as SLC 2015 (complete edition with all additional modules) and LE 2015 (lite edition with restricted number of modules). Raster Image Processor Calamus is a RIP itself and handles various, adjustable raster dot sizes at the same time. It handles rasterization information per document, page or even per frame. It also uses a unique, notable method of cutting raster dots, which means that a screen raster can be cropped or clipped at certain borders, given by the document layout elements. Thus, it does not require any external RIP for interpretation, rendering and screening of documents. Using a special module, Calamus supports dot rasterization (using the term Star Screening) which is a frequency modulated method of halftoning (Stochastic screening). Calamus Intelligent Kerning Rather than using kerning pairs or relying on simple side-bearing measurements, Calamus’ native fonts encode left and right bounds for each character at eight different latitudes. Unlike the kerning information in other formats, the resulting jigsaw-pieces can be used to fit characters together, even if those characters are from different fonts or if they are set at different sizes. In contrast, the kerning implementation in OpenType and TrueType only works when adjacent characters are part of the same font, which can result in character collisions or poor kerning in some instances. The alternative is to use optical kerning, where the shapes of the characters are analysed to determine the appropriate distances; Calamus’ approach might be regarded as a simplification of that, working with a low-resolution version of the final character. See also iCalamus Atari ST character set References External links Official Calamus website Official iCalamus website Review of Calamus SL2006 Atari ST software Desktop publishing software
6984868
https://en.wikipedia.org/wiki/List%20of%20cities%20with%20defensive%20walls
List of cities with defensive walls
The following cities have, or historically had, defensive walls. Africa Algeria Algiers Ghardaïa Timimoun Egypt Al-Fustat Cairo Damietta See List of Egypt castles, forts, fortifications and city walls. Ethiopia Harar Libya Apollonia Benghazi Cyrene Derna Germa Ghadames Ghat Jaghbub Kabaw Murzuq Nalut Sokna Tolmeita Tripoli Waddan Mali Djenné Gao Timbuktu Morocco Agadir Aït Benhaddou Asilah Azemmour Casablanca Chefchaouen Eljadida Essaouira Fes Ksar el-Kebir Ksar es-Seghir Larache Marrakech Meknes Moulay Abdallah Moulay Idriss Ouarzazate Oujda Rabat Safi Salé Sefrou Tangier Taroudannt – best preserved in Morocco Taza Tétouan Tiznit Niger Zinder, Niger was well known for its city wall, the remains of which can still be seen Nigeria Benin City Kano Keffi Tunisia Bizerte Hammamet Kairouan Monastir Sfax Sousse Tozeur Tunis Americas Canada Chile Valdivia Colombia Cartagena Cuba La Habana Dominican Republic Santo Domingo was a fortified city from the 16th to the early 20th centuries. Parts of the wall are still visible in the Colonial Zone. One of the main gates is very well preserved and centuries ago was named "The Gate of the Count" after the Count of Peñalba, who stopped the invasion of William Penn and Robert Venables during the Siege of Santo Domingo. Mexico Campeche Mexico City Tulum Veracruz (walls demolished in the 19th century, but a bastion remains) Panama Old Quarter of Panama City (a portion of the Wall still exists) Peru Lima Trujillo Puerto Rico San Juan United States Boston, Massachusetts, maintained a defensive city wall and gate across Boston Neck, the sole point where the city was connected with the mainland, from 1631 until the end of the 18th century. Charleston, South Carolina was a walled city from the 1690s until the 1720s. A portion of the wall, called Half Moon Battery, is still visible in the Provost Dungeon of the Old Exchange Building. St. Augustine, Florida, starting in 1704, the Spanish constructed the Cubo Line - attached to the Castillo de San Marcos and enclosing the city. 18th century maps detail the walls enclosing all of St. Augustine New Orleans, Louisiana, planned in 1718 as a walled city. The wall was present during the Battle of New Orleans, but was found to be in such a state of disarray that it could not be used. Uruguay Montevideo Colonia del Sacramento Asia Afghanistan Balkh, the ancient city China Beijing, see City Wall of Beijing. Many parts of the walls of Beijing were demolished during the 1960s to open large streets around the city. A metro line also follows the location of the former city walls. Xiangyang Guangzhou Dali Shangqiu Jianshui Zhangjiakou, see Wanquan District Zhaoqing Guangfu Ancient City Xingcheng Liaocheng Kaifeng Qiansuo in Huludao Datong Daming County Yongtai Fortress Jingzhou Kowloon Walled City, a former enclave of Hong Kong Nanjing, see City Wall of Nanjing Linhai Qufu Taiyuan, see Jinyuan District Pingyao Shanghai (Old City (Shanghai)) - largely destroyed in 1912, only fragments survive Songpan Xi'an - The city of Xi'an has well-preserved walls with a water filled moat that is a tourist attraction incorporating small parks surrounding a busy and modern area of the city. Zhengding Yuanzhou District in Guyuan Walled villages can still be found in Mainland China and Hong Kong. India Agra Ahmedabad Amravati Amritsar Datia Delhi Dholavira Hyderabad Jaipur Jaisalmer Jodhpur Lucknow Mumbai (old city of Bombay) Raigad Udaipur Warangal Chennai Mhow Indonesia Bogor Pakuan Pajajaran, the capital of the Sunda Kingdom, was surrounded by defensive moats and walls. Now the area is part of the modern city of Bogor. Jogjakarta An 18th century wall made by Hamengkubuwono the 1st from the Ngayogyakarta Hadiningrat Kingdom to protect the inner capital city from the Dutch and other enemies during the Mataram Kingdom period. Today, 96% of the wall still exists and is a local landmark. Surakarta On 17 February 1745, the Surakarta Kingdom moved to a new opened forest named Sala Village and build their Royal Residential Palace and urban area with a 15 kilometers long of "Beteng Kraton" or Palace wall around it. The wall was 90% exist. Surosowan Well known as Banten Kingdom's capital. The wall was destroyed by the Dutch during its colonial period in the way to ended the Banten reign. The city wall that left is only about 10% from the real appearance. Trowulan Trowulan was the capital of the former Majapahit Empire. When its glory period, the capital being a first European systemized ancient city (with city canal system for transportation and also large aisle and road for major transportation) in Indonesia, because Trowulan was developed in Majapahit's glory period in 13th–15th century. The wall was protecting the inner "Kraton" or royal palace and some important places. Today the wall can't be seen as the original appearance. Iran Bam Isfahan Shiraz Tabriz Yazd Iraq Babylon Baghdad Basra Arbil (central city, fully intact) Israel Acre – 18th-century modern Ottoman fortification able to withstand cannon attack. The wall has been restored and now includes a rampart for tourists. Jaffa Jerusalem Safed Tiberias Lebanon Baalbek: sections of the Arab fortifications (built with stones from Roman structures) can still be seen around the Acropolis and the old town Batroun: the town is known for its 225 m long Phoenician seawall. There was also a 9th-century BC citadel, parts of which are still visible Beirut: sections of the Phoenician and Roman fortifications and Ottoman citadel have been unearthed in the city's central district. The famous walls erected by Emir Fakhruddin II have yet to be recovered. Byblos: the old town is surrounded by medieval walls, with a castle standing at their Southern edge Sidon: little remains today of the city's medieval fortifications, except the Castle of St. Louis. Malaysia Malacca - Built by the Portuguese after the city's occupation in 1511, it was torn down by the British in 1806. Known locally as the A Famosa. Pakistan Almost every old city in Pakistan had a defensive wall. Much of these walls were destroyed by the British in order to refortify the cities. Few cities which were fortified are: Hyderabad Lahore Multan Peshawar Shikarpur hazro, district Attock Palestine Old City of Jerusalem Nablus Ancient Jericho Philippines Cebu (see Fort San Pedro) Manila (Intramuros) – partially preserved, partially restored after World War II. Original walls are still well preserved. Olongapo ("Spanish Gate") Ozamiz (Fuerte de la Concepción y del Triunfo) Zamboanga (see Fort Pilar) South Korea Dongnae (now part of Busan) (See Dongnaeeupseong.) Seoul (See Fortress Wall of Seoul.) Suwon (See Hwaseong Fortress.) Gwangju, Gyeonggi (See Namhansanseong.) Goyang (See Bukhansanseong) Sri Lanka Galle (See Galle Fort.) Matara (See Matara Fort.) Syria Aleppo Damascus Homs Taiwan Changhua Chiayi Fongshan (now part of Kaohsiung) Hengchun (see Hengchun Old Town) Hsinchu Magong Puli Quemoy Tainan Taipei (see Walls of Taipei) Zuoying (now part of Kaohsiung, see Old City of Zuoying) Some other towns fortified with thorny bamboos in Qing era. Thailand Ayutthaya Bangkok – See Fortifications of Bangkok Chiang Mai was surrounded by a moat and city walls when it was established by King Mangrai the Great in 1296. They were extensively rebuilt in the early 19th century. Large parts of the city walls and city gates of Chiang Mai survived till the present. Chiang Rai Chiang Saen Kamphaeng Phet Lampang Lamphun Lopburi Nakhon Ratchasima Nakhon Si Thammarat Nan, Thailand Phichai Phayao Phimai Phitsanulok Phrae Si Satchanalai Songkhla Sukhothai Suphanburi Thonburi Wiang Kum Kam Uzbekistan Bukhara Khiva Samarkand Shahrisabz Vietnam Cổ Loa Hà Nội Huế Bắc Ninh Vinh Thanh Hóa Quảng Trị Nam Định Mạc citadel Sơn Tây citadel Palestinian Authority Jericho Yemen Sana'a Shibam Europe Albania Berat Butrint Durrës Elbasan - sizable remains of Roman walls Krujë Tepelenë Austria Allentsteig Amstetten Not walled but ditched and banked with gate towers. Bleiburg Bludenz Braunau am Inn Bregenz Bruck an der Leitha – partially preserved Bruck an der Mur Donnerskirchen. Drosendorf Dürnstein Ebenfurth Eferding Eggenburg Eisenstadt Enns Fehring Feldkirch Friedberg Freistadt – almost completely preserved Friesach Frohnleiten Fürstenfeld Gmünd Gmuend-in-Kaernten Gmunden Graz Gross-Enzersdorf Güssing Hainburg an der Donau – almost completely preserved (2.5 km, 3 gates, 15 towers) Hallein Hall in Tirol – partially preserved Hardegg Hartberg Haslach an der Muhl Heidenreichstein Herzogenburg Horn Judenburg Kitzbuhel Klagenfurt Klosterneuburg Knittelfeld Korneuburg Krems Kufstein Laa an der Thaya Leoben Leonfelden Leoben Lienz Linz Litschau Maissau Marchegg – some segments preserved Mautern - remains of the Roman fortress "Favianae" can be found at the western side of the old town. Melk Murau Mürzzuschlag Neumarkt am Wallersee Neumarkt Obdach Oberwölz Oggau am Neusiedler See Ottensheim Peuerbach Pöchlarn Purbach am Neusiedler See Raabs an der Thaya Radfeld Radkersburg Radstadt – almost completely preserved wall (13th- to 16th-century); 3 round towers (1530s); 1 gate Rattenberg Retz Ried im Innkreis Rottenmann Rust St Andrä Sankt Veit an der Glan St Pölten Salzburg Schärding Scheibbs Schladming Schrattenthal Schwanenstadt the settlement surrounded by a bank, surmounted by wooden palisade, with only a short length of wall adjacent to the ‘‘Stadtturm’’. Stadtschlaining Stainach Stein Straßburg Steyr Steyregg Traismauer Tulln an der Donau Vienna – destroyed and became the Ringstraße Villach Vils Vöcklabruck Völkermarkt Voitsberg Waidhofen an der Thaya Waidhofen an der Ybbs Weitra Wels Wiener Neustadt Wilhelmsburg Wolfsberg Ybbs an der Donau Zeiselmauer. The Roman auxiliary fort was re-fortified by the Babenbergs in the 10th century, but never granted a market or charter. Zistersdorf Zwettl Azerbaijan Baku, retains most of the city walls that separate the historic Inner City from the newer parts of the city developed after the 19th century. Belgium Bosnia and Herzegovina Banja Luka Bihać Počitelj Stolac Travnik Walled city of Jajce Walled city of Vratnik Bulgaria Hisarya - the old Roman town is still almost entirely surrounded by the ruins of its defensive walls. Nessebar - fortified island city Nicopolis ad Istrum roman town, Nikyup, Veliko Tarnovo Nicopolis ad Nestum roman town, Garmen, Gotse Delchev, Blagoevgrad Province Novae roman town, Svishtov Pliska as first capital of Danubian Bulgaria Plovdiv fortifications and walls - Eastern gate of Philippopolis, Hisar Kapia and Nebet Tepe Preslav as capital of Bulgaria Silistra Sozopol Sofia - established as walled city Ulpia Serdica by the Roman emperor Trajan Varna Veliko Turnovo – three fortified hills - Trapezitsa fortress, Tsarevets fortress and Sveta Gora make one city capital of Bulgaria Vidin Croatia Buje Dubrovnik has well-preserved city fortifications including towers, gate, rampart walk and two citadels guarding the docks. Walls of Dubrovnik are among the finest and most complete in Europe. Hvar Korčula Krk city walls which obtained their current appearance between the 12th and the 15th centuries but the town itself was fortified since Roman period. Karlovac city walls, built in 1579 as a six-point star with bastions. Motovun Nin, Croatia Novigrad Grožnjan Omišalj Oprtalj Pag Poreč Roč Rovinj Senj Šibenik Split – several remains of the defensive walls of Diocletian's Palace still survive to this day, including 3 gates and long stretches of the fortified Roman walls. Most of the towers are now demolished, apart from 3 square towers, each of them located at a corner of the palace. North of the town centre are the remains of a bastion trace, which includes portions of the walls and a bastion located in a park. Ston: Walls of Ston were built in 14th and 15th centuries, at the isthmus of the Pelješac peninsula, to the north of Dubrovnik; 890 meters long town wall and 5 km Great Wall outside the town Ston. Trogir Zadar retains about half of its wall Cyprus Czech Republic Bechyně Bělá pod Bezdězem Benátky nad Jizerou Beroun Bochov Bor u Tachova Brno Broumov Bruntál Čáslav Česká Lípa České Budějovice Český Brod Český Dub Český Krumlov Cheb Chrudim Chyše Dačice Domažlice Dvůr Králové nad Labem Frýdlant Fulnek Havlíčkův Brod Hlučín Horažďovice Horšovský Týn Hostinné Hradec Králové Hranice Jablonné v Podještědí Jaroměř Jindrichuv Hradec Jevíčko Jičín Jihlava - Large parts of the town walls remain to the south, west and east side of the medieval town. Some fragments remain on the north side. The fortifications are also a good example of a Zwinger. Jindřichův Hradec Josefov- originally known as Ples Kadaň Klatovy Kolín Kostelec nad Labem Kouřim Krnov Kutná Hora Kromeriz Lanškroun Lipník nad Bečvou Litomyšl Litovel Loket (Sokolov District) Louny Mělník Mladá Boleslav Náchod Nové Město nad Metují Nový Bydžov Nový Jičín Nymburk Odry Olomouc Opočno Opava Osoblaha Ostrava Ostrov Pardubice Písek Planá u Mariánských Lázní Plzeň Plumlov Polička - Close to 80% of Policka's town walls survive today, in an excellently preserved condition. Prachatice Prague Hradčany Prague Malá Strana Prague Staré Město Prague Nové Město Prague Vyšehrad Přelouč Prostějov Přerov Rabštejn nad Střelou Rakovnik Rataje nad Sázavou Rokycany Rožmitál pod Třemšínem Slaný Soběslav Sobotka Stará Boleslav Šternberk Štramberk Strážnice Stříbro Svitavy Šumperk Sušice Tábor Tachov Teplá Tovačov Třeboň Trutnov Toužim Uničov Ústí nad Orlicí Valtice Velvary Vidnava Vraný Vysoké Mýto Zábřeh Zákupy Žatec Žlutice Znojmo - In Znojmo, more than half of the walls are preserved, with large parts of the zwinger surviving. Denmark Fredericia, extensive renaissance ramparts to the north and west of the city and sea facing ramparts. Copenhagen, extensive renaissance ramparts to the south and east, trace remains to the north and west, nice fort at the harbor mouth, three small island fortlets outside the harbor entrance. Nyborg – the remains include three preserved bastions, a town gate and the old town is still mostly surrounded by a moat indicating the locations of the other (now demolished) bastions. Stege, One of the town gates, the Mølleporten, still remains. Most of the earthwork rampart and dry ditch surrounding the town center still remain. Estonia Haapsalu Narva Paide Pärnu, a rampart with two bastions, a moat and a town gate remain to the west of the old town. It is now transformed into a park, the Valli Park. Tallinn (and Toompea), see Tallinn City Walls, most of the wall and towers remains Tartu, very few sections remained Viljandi Rakvere Finland Hamina Surrounded by about 4–5 km long star-shaped walled fortification Lappeenranta The old center of the town is located inside a fortress Loviisa It was planned to build a full fortress around the town, but only two bastions were complete Suomenlinna An inhabited sea fortress off the coast of Helsinki France Acquigny Agde Aigues-Mortes Ainay-le-Château Aire-sur-la-Lys Aix-en-Provence Alençon, Orne Amance, Haute-Saône Amboise, Indre-et-Loire Ammerschwihr Angers, Maine-et-Loire Angoulême Antibes Apt Ardres Arles Arras Aubigny-sur-Nère Auch Autun Auvet-et-la-Chapelotte Avallon Avesnes-sur-Helpe Avignon Avranches Ayherre Bâgé-le-Châtel Bargème Baux-de-Provence Bavay Bayonne Bazas Beaugency Beaune Beauvais Béguios Bellême Bergheim, Haut-Rhin Bergues Besançon Blois, Loir-et-Cher Bœrsch Boisseron Bonneval, Eure-et-Loir Bougue Bourbon-Lancy Bourges Bourg-le-Roi Briançon Brignon Briod Bruch, Lot-et-Garonne Cadillac, Gironde Caen Cahors Campel Capdenac Carcassonne Carignan, Ardennes Caudebec-en-Caux Cernay, Haut-Rhin Chalon-sur-Saône Champdieu Champigneulles Champlitte Charleville-Mézières Château-Thierry, Aisne Châtelais Châtillon-sur-Saône Chéraute Clermont-Ferrand Cluny Collonges-la-Rouge Colmar Colmars Compiègne Compreignac Concarneau Condé-sur-l'Escaut Corbigny Cordes-sur-Ciel Cormery Cosne-Cours-sur-Loire Coucy-le-Château-Auffrique - Large parts of the walls remain, though partly in a ruinous state. Remains include several towers, stretches of curtain wall and three gates, the Porte de Laon, Porte de Soissons and the Porte de Chauny. Courthézon Crécy-la-Chapelle - fragmentary remains Créquy Cucuron Cuiseaux Cusset Dachstein, Bas-Rhin Dambach-la-Ville Dax, Landes Decize Die, Drôme Diemeringen Dieppe, Seine-Maritime Dinan Dole, Jura Domfront, Orne Domme, Dordogne Dun-sur-Auron Espalion Eu, Seine-Maritime Évreux Falaise, Calvados Faucogney-et-la-Mer Feurs Figeac Fos-sur-Mer Fougères Fréjus, Var Givet Granville, Manche Grenoble Guémar, Haut-Rhin Guérande Hennebont Herrlisheim-près-Colmar Hesdin Hiers-Brouage Honfleur Île-d'Aix Illfurth Issoudun, Indre Isturits Joigny La Cavalerie La Charité-sur-Loire La Chassagne La Couvertoirade La Groutte La Martyre La Roche-de-Glun La Rochelle La Roche-Posay La Sauvetat, Puy-de-Dôme La Turbie Langres Lanneray Lantabat Laon Larceveau-Arros-Cibits Larressingle Laval, Mayenne Le Castellet, Var Le Crozet Le Malzieu-Ville Le Mont-Saint-Michel Le Palais Le Poët-Laval Le Quesnoy Le Thor Les Andelys Les Cluses Levens Loches - large parts remain intact. The upper town and the Loches castle are built on a hill which offers a strategic position over the surrounding countryside and the Indre river. The walls of the upper town remain largely intact and include the ruins of the Porte de Saint-Ours, the well preserved Porte Royale, long stretches of curtain wall and several towers and bastions. The walls of the lower town are partly demolished, but 4 towers, a few smaller later-added turrets, a long section of curtain wall and the well preserved Porte des Cordeliers and Porte Picois (which now serves as the City hall) still remain intact. Loudun, Vienne Lucéram Maisod Mans Marcolès Marsal, Moselle Marville, Meuse Maubeuge Mende, Lozère Mennetou-sur-Cher Metz Meursac Molsheim Monceaux-sur-Dordogne Mondoubleau Monpazier Montarcher Montbrison, Loire Mont-de-Marsan Monteux Montfort-sur-Meu Montivilliers Mont-Louis Montréal, Yonne Montreuil, Pas-de-Calais Montreuil-Bellay Montverdun Moret-sur-Loing Morlaix Mougins Mouzon, Ardennes Nabas, Pyrénées-Atlantiques Nages-et-Solorgues Nantes Narbonne Navarrenx Neubois Neuf-Brisach Nevers Nice, Alpes-Maritimes Nieul-sur-l'Autise Nîmes Notre-Dame-de-Gravenchon Oberhaslach Obernai Oradour-sur-Glane, Haute-Vienne Orange, Vaucluse Orgon Ostabat-Asme Paris Parthenay Pérouges Pertuis Pesmes Placey Ploërmel Poitiers, Vienne Poligny, Jura Pommiers, Loire Pont-de-l'Arche Pontgibaud Pont-l'Abbé-d'Arnoult Pontoise Pouilly-lès-Feurs Prades-le-Lez Prats-de-Mollo-la-Preste Provins Puycelsi Quimper, Finistère Quintin Rânes Rauzan La Réole Revest-des-Brousses Ribeauvillé Richelieu, Indre-et-Loire Rions Riquewihr Rocamadour Rochefort, Charente-Maritime Rocroi Rodemack Romenay Rosheim Rouffach Roye, Somme Ruoms Saint-Bertrand-de-Comminges Saint-Dyé-sur-Loire Sainte-Croix-sur-Buchy Saint-Émilion, Gironde Saintes, Charente-Maritime Sainte-Eulalie-de-Cernon Sainte-Suzanne-et-Chammes Saint-Étienne-de-Baïgorry Saint-Félix-Lauragais Saint-Gence Saint-Hippolyte, Haut-Rhin Saint-Jean-Pied-de-Port Saint-Junien - A tower and remains of the curtain wall remain behind houses at the junction of the Boulevard de la République and the Rue de Brèche. Saint-Laurent-des-Arbres Saint-Léger-Magnazeix Saint-Lô Saint-Macaire Saint-Marcouf, Manche Saint-Martin-d'Arrossa Saint-Mitre-les-Remparts Saint-Omer Saint-Pastour Saint-Paul-de-Vence Saint-Pompont Saint-Suliac Saint-Sulpice-de-Favières Saint-Trivier-sur-Moignans Saint-Valery-sur-Somme - Large parts remain, including the Porte de Nevers, the Porte Jeanne d'Arc, stretches of curtain wall and some towers. A hill named Cap Hornu arises above the town which is the most likely and possible location of the Roman Saxon Shore fort and harbour named Locus Quartensis sive Hornensis. Saint-Vérain Saissac Sarralbe Sarrebourg Saumur, Maine-et-Loire Sauvain Sélestat Semur-en-Auxois Senlis, Oise Sens, Yonne Septème Sisteron Soissons Sorel-Moussel Strasbourg Suèvres Thann, Haut-Rhin Thionville, Moselle Thouars Tillac Tincry Toul, Meurthe-et-Moselle Toulouse Tours, Indre-et-Loire Trôo Turckheim Uzès Vabre Vannes Vaucouleurs, Meuse Venasque Vence Verdun, Meuse Vervins Vézelay Vianne Vienne, Isère Viens, Vaucluse Vievy-le-Rayé Villefranche-de-Conflent Villeneuve-sur-Yonne Vitré, Ille-et-Vilaine Vouvant Wangen, Bas-Rhin Wattwiller Westhoffen Wissembourg Zellenberg Georgia Mestia (The "Svan towers".) Omalo Gori Kaspi Akhaltsikhe Telavi Mtskheta Signagi Rustavi Surami Kutaisi Germany Aachen, some parts of the inner walls still remain alongside Tempelgraben (at the corner with the Eilfschornsteinstraße and the corner with the Pontstraße), and at the back of the houses alongside Seilgraben. Of the outer walls three towers, the Langer Turm, Pfaffenturm and the Marienturm, still stand today. The two remaining city gates, Ponttor and Marschiertor, are among the best preserved gates in Germany. Aach Abensberg Ahrweiler Aichach Altentreptow – the remains include some stretches of wall, a tower and two town gates, the Brandenburger Tor and the Demminer Tor. Annaberg-Buchholz Amberg Amöneburg Andernach Arberg - only one town gate remains. Arnstadt Aschaffenburg Aub – large sections of the walls remain, including some towers. One town gate remains, the Zentturm. Babenhausen Bad Colberg-Heldburg Bad Frankenhausen Bad Hersfeld Bad Langensalza – large parts of the walls still remain today, including 12 wall towers and one city gate, the Klagetor. Bad Münstereifel Bad Neustadt an der Saale Bad Orb Bad Rodach Bad Sooden-Allendorf Bad Waldsee Bad Wimpfen Bacharach Ballenstedt Barby Bautzen Beilngries Berching Berlin had a defensive wall around the city from about 1250 until the mid-17th century, and a Customs Wall from the mid-18th to the mid-19th centuries. The Berlin Wall that existed from 1961 to 1989 was claimed by the authorities of East Germany to be defensive, but in fact it was rather intended to prevent unauthorized emigration. Parts of Berlin's medieval wall still remain alongside the Littenstraße. Bernau bei Berlin Bernkastel - one town gate, the Graacher Tor, remains. Besigheim Blankenburg (Harz) Bodenwerder Boizenburg Boppard Bönnigheim – some parts of the walls and a town gate remain. Brandenburg Buchen Burgau Burg bei Magdeburg Burghausen Butzbach Büdingen Calbe Chemnitz - only one tower remains, the Roter Turm (Red Tower). Coburg Cologne Crailsheim – some remains are located north of the Ringgasse, including a wall tower. Another tower remains alongside the Grabenstraße. Darmstadt Dausenau – the walls remain almost intact. One town gate still remains, the Torturm. Delitzsch Demmin large parts of the city walls still remain alongside Nordmauer, Bauhofstraße and Südmauer. One town gate still remains, the Luisentor. Dettelbach Dillenburg Dillingen Dilsberg Dinkelsbühl – the medieval town walls remain fully intact, including 4 gates and 19 towers. Dollnstein Dömitz Donauwörth Dresden - Dresden's Defensive walls were some of the first in Germany, inspired by the earlier Italian model. The walls surrounded both the ‘Old City’ south of the Elbe, and the ‘New City’ to the north. The walls, gates and moats were largely removed c.1815, following the Napoleonic Wars, being deemed outmoded for modern warfare. Some small sections have been rediscovered and established as the Museum Festung Dresden https://web.archive.org/web/20160509160153/http://www.festung-dresden.de/de/festung_dresden/museum/ below the more famous Brühl Terrace. Duderstadt Duisburg Ebern Eberbach (Baden) Eibelstadt Eichstätt Einbeck Eisenheim Ellwangen Eltville am Rhein Emden Erding Erlangen – some stretches of wall still remain alongside Nördliche Stadtmauerstraße, Wöhrstraße and Schulstraße. Feuchtwangen Fladungen Forchheim Freiberg Freyburg, Germany Freystadt Friedberg, Bavaria Freinsheim Frickenhausen am Main Fritzlar Gangelt Gardelegen – there are several remains of the old town wall, including the impressive Salzwedeler Tor, the remains of the Stendaler Tor, and some stretches of wall. Gartz (Oder) - The remains of the walls around the medieval town include some sizable stretches of walls, towers and one town gate, the Stettiner Tor. Geisa Gelnhausen Germersheim Gerolzhofen Göllheim – two town gates are preserved, the Kerzenheimer Tor and the Dreisener Tor. One tower remains, the Ulrichsturm. Gräfenberg – the remains include three well-preserved town gates, the Egloffsteiner Tor, the Hiltpoltsteiner Tor and the Gesteiger Tor. Some parts of the walls still remain adjacent to the Gesteiger Tor and at the back of the houses alongside Am Gesteiger and Schulgasse. Grebenstein - most of the medieval walls are still surrounding the old town. One town gate remains, the Burgtor. Greding Grimma Grimmen one tower still remains, the Wasserturm. All three of the original town gates also remain, the Stralsunder Tor, Greifswalder Tor and the Mühlentor. Großostheim Gundelfingen an der Donau Gundelsheim Gunzenhausen Güstrow - remains of the walls remain south of the cathedral and alongside the Gelviner Mauer. The town Haldensleben Hannoversch Münden Hattingen Heidelsheim – one town gate and a wall tower still remain today. Heidingsfeld, today part of Würzburg Heilbad Heiligenstadt Herborn Herrieden Hildburghausen Hirschhorn Haldensleben Hammelburg Hardgesen Hollfeld – the remains include one town gate, the Obere Tor, and some parts of the walls to the south of the old town. Homberg, Efze Horn Höchstadt an der Aisch Höchstädt an der Donau Horb am Neckar – large sections of the walls still remain. One town gate, the Ihlinger Tor, still remains, and some towers still remain, most notably the Schurkenturm and the Schütteturm. Höxter Hünfeld Ingelheim am Rhein - sizable remains, including stretches of wall, the Malakoffturm, the Bismarckturm, Ohrenbrückertor, Uffhubtor and the ruined Heidesheimer Tor. The medieval town centre also houses the ruins of the Ingelheimer Kaiserpfalz. Ingolstadt Iphofen Jena Kallenhardt Karlstadt am Main Alt Kaster - The old medieval town of Kaster now forms part of Bedburg. The town walls remain largely intact, including 2 town gates and several towers. Kaub Kaufbeuren Kemnath - several sections and towers of the walls remain around the medieval town. The eastern town gate was later converted into a church tower. Kempen - some parts of the walls still remain. They include the Kuhtor, a well-preserved town gate, the Mühlenturm and the remains of another town gate, the Peterstor. Kindelbrück Kirchberg an der Jagst Kirchhain Kirchheim unter Teck Kitzingen Kroppenstedt Korbach Kranenburg Kronach Kulmbach Kuppenheim Kyritz Ladenburg Landsberg am Lech Landshut Langenzenn Laucha an der Unstrut Lauchheim Lauingen Lauf an der Pegnitz Laufen Lauffen am Neckar - the old town consists of three parts. While the town is divided by the river Neckar, the castle stands on a small island circled by the river. On the left bank there is a sizable stretch of wall is located next to the church. On the right bank, some towers, stretches of wall and the Neues Heilbronner Tor still remain. Leipheim Leipzig - remains include the Moritzbastei bastion. Leonberg Leutershausen Löbejün Lohr am Main Lübben Luckau Magdeburg Mainbernheim Maintal – large sections of the walls still remain, notably to the north of the medieval town. Mainz – the remains include the well-preserved square-shaped citadel, the medieval Alexanderturm, and the remains of a bastion alongside the Augustusstraße. Malchin two town gates still remain, the Kalensches Tor and the Steintor. Some parts of the walls to the south and east of the town still remain. Marbach am Neckar Markt Einersheim – two town gates still remain. Marktbreit Mayen Meisenheim Mellrichstadt Memmingen Meppen – the remains include a star shaped moat around the medieval town. Merkendorf Meyenburg Michelstadt Miltenberg Mindelheim Möckmühl Monheim – two town gates remain, the Oberes Tor and the Unteres Tor. Mühlhausen Müncheberg Munich has some of its former city gates still standing, and a section of its late 13th-century defensive wall. Münnerstadt Münzenberg – fragments of the walls remain, including two towers. Monheim – some stretches of wall still remain and both town gates, the Oberes Tor and the Unteres Tor, are preserved. Nabburg Naumburg Neckarsulm Neubrandenburg Neubrunn Neuburg an der Donau – some parts of the medieval walls still remain, including the Unteres Tor. The trace of the later bastion earthworks, the so-called Untere Schanze, Elias Holl Schanze and Oberer Schanze, is still recognizable in the fields and from the air. Neudenau Neuenstadt am Kocher Neuenstein Neuleiningen Neumarkt in der Oberpfalz Neunkirchen am Brand – three town gates still remain, the Forchheimer Tor, the Erleinhofer Tor and the Erlanger Tor. Neuss Neustadt (Hessen) Neustadt an der Aisch – substantial parts of the walls still remain, including some towers and a well-preserved town gate, te Nürnberger Tor. Neustadt in Holstein - one town gate remains, the Kremper Tor. Niedernberg - several stretches of the walls wall remain. One wall tower remains at the riverside end of the Turmgasse Niedernhall – most of the town walls remain intact. Nordhausen Nördlingen Nürnberg Obernburg am Main Oberwesel Ochsenfurt Oebisfelde Oettingen Öhringen Oldenburg Oppenheim – some stretches of the town walls remain near the ruins of Landskron castle. One town gate and two towers remain, the Gautor, the Ruprechtsturm and the Uhrturm. Ornbau Orsoy Ortenberg Oschatz Ostheim Paderborn Pappenheim Pasewalk Tribsees – two town gates remain, the Steintor and the Mühlentor Trier-Pfalzel Pfullendorf Pößneck Potsdam Prenzlau there are some good remains of the walls, especially North, East and South of the town. 4 gates still remain, the Steintor, Wasserpforte, Mitteltor and the Blindower Tor. The walls also include 25 towers. Prenzlin Prichsenstadt Querfurt Radolfzell am Bodensee Ratingen Ravensburg – three town gates still remain, the Frauentor, Obertor and the Untertor. Nine of the original ten wall towers still remain, most notably a tower named Mehlsack. Recklinghausen two defensive towers and some portions of wall still remain today, north west of the old city. Reichelsheim – three towers remain. Rodach Rees - large parts of the town walls still remain intact, mainly located at the riverside of the town and in the parks at the north-east and west side of the medieval town. Rheinbach Rheinberg Rhens – the town walls remain largely intact. Three town gates still remain, the Rheintor, the Josephstor and the ruins of the Viehtor. Rostock Röttingen Roth Rothenburg ob der Tauber Rottweil Rüthen Salzkotten Salzwedel Schleusingen Schlüsselfeld Schmalkalden Schongau, Bavaria Schrobenhausen Schwaigern Schwalmstadt – the remains of a town gate still survive, the medieval Lüdertor. The earthworks are mostly demolished, leaving a moat of which the course indicates the location of four round bastions. Schweinfurt Seehausen - the moat still surrounds most of the medieval town. Fragments of the walls are to be found at the southern side of the old town. One town gate still remains, the Beustertor. Seßlach Seligenstadt – the remains include the Steinheimer Torturm, the Pulverturm and a tower at the Friedhofsmauer. Segnitz Soest - 2,5 km of the town walls (1180) are still intact, also a town gate ("Osthofentor", with the world largest collection of crossbow bolts) and a defense tower ("Kattenturm"). Sommerach Sömmerda Sommerhausen Spalt Spangenberg Stade Staßfurt Stadt Blankenberg Steinheim Steinau an der Straße Stendal – two town gates still remain. Sternberg Stadtsteinach Stralsund Sulzbach – sizable parts of the walls and towers still remain. One town gate is preserved, the Rosenberger Tor. Sulzfeld am Main Tangermünde – most of the town walls still remain, including some towers. Templin Themar Treysa – the remains are located mainly South, East and North of the old town. Trier, portions of the city walls still exist, but the size of the Roman gate, the "Porta Nigra", gives evidence of the importance of the city. Other Roman remains include the baths, the Constantine Basilica, an amphitheater, and a 2nd-century AD Roman bridge. Torgau Überlingen Uffenheim Ulm an der Donau Villach Villingen Vilseck Vilshofen an der Donau Vellberg Volkach Waiblingen Waldenburg Waldfeucht Wangen im Allgäu Warburg (Westfalia) Wassertrüdingen Wemding Weikersheim Weil der Stadt Weilrod – the only town gate still remains. Weißenburg (Bavaria) Werben – one town gate still remains to the north east of the medieval town, the Elbtor. A tower with adjacent portion of the town wall remains to the west of the medieval town. Wertheim Wettenberg Windsbach Winterhausen Wittstock Witzenhausen Woldegk Wolframs-Eschenbach Worms, Germany Wörth am Main Wunsiedel 3 towers, small portions of the walls and a town gate (Koppetentor) still remain. Würzburg Xanten Zeil am Main Zerbst Zons Zülpich Zwickau Gibraltar Gibraltar Greece Many towns and cities still retain at least parts of their defensive walls, including: Arta Athens - mostly demolished, see city walls of Athens Chania - see Fortifications of Chania Chios Corfu (city) Drama, Greece - sizable parts of the town walls remain to the north and east side of the old town. Including 2 towers and stretches of wall. Heraklion Candia Khandak - see Fortifications of Heraklion see siege of Candia - Arab and Byzantine walls still remain, about 20%, Venetian 7.5 km long walls, 95% still remain, 30.000 people live now inside the Venecian walls. Two gates, one castle in the sea (Koules) Ioannina - see Ioannina Castle Kastoria - fragmentary remains. Kavala (a significant part of the seaside walls survive) Kissamos Komotini Koroni - preserved fortifications of the castle and upper town. Missolonghi Monemvassia Mystras Nafplion Naupactus Preveza Rethymno - see Fortezza of Rethymno Rhodes - see Fortifications of Rhodes Thessaloniki - see Walls of Thessaloniki Veria (about 170 m of the Byzantine walls survive) Hungary Buda – the Castle Hill is surrounded by preserved medieval and early modern fortifications. Only a short section survived from the walls of the Víziváros neighbourhood. Pest – segments of the 15th-century city walls are preserved inside the courtyards of later houses. Sopron – medieval circle of walls partly built on ancient Roman foundations Pécs – long sections of the medieval walls are preserved and freed to later intrusions. Veszprém – walled old town on Castle Hill Székesfehérvár – long sections of the medieval walls are preserved Sárospatak Vác – some segments and one tower preserved Eger – some segments preserved, mostly demolished Győr – the walls were demolished in the 19th century but segments are preserved Mosonmagyaróvár – the walls were demolished in the 1820s Szécsény – some segments of the city walls preserved Republic of Ireland Italy Acqui Terme - 3 town gates and remains of walls. Acuto Albenga - fragmentary remains, including stretches of wall and 3 town gates. Alghero Altamura - some remains; two gates are still visible, namely Porta Bari and Porta dei Martiri Ancona Anghiari Aosta's Roman walls are still preserved almost in their entirety Appignano Aquasparta Arcevia Asolo Assisi Arezzo - Large parts of the town walls still survive, including several stretches of curtain wall, 6 bastions, 4 town gates and the well preserved citadel Fortezza Medicea. Bagnacavallo - two town gates remain. Bari – historically a walled port city on a promontory but only two bastions and a short section of the sea walls survived Bassano del Grappa Bastia Umbra Belvedere Ostrense Belluno Bergamo - surrounding hill of the old city Bisceglie Bologna Bosco Marengo - a large part of the north-western walls with towers are preserved. Bozzolo Brescia – the castle hill (called Cidneo Hill) is surrounded by preserved medieval and Renaissance fortifications. Segments of Roman and venetian walls are partially survived Bressanone - the western gate remains as well as the north side where the houses serves as walls Brindisi - several parts of the walls are preserved, including 5 bastions and two town gates, the Porta Lecce and the Porta Mesagne. Brunico - three gates remain, the western, northern and eastern ones. Busseto Cagli Cagliari Camerino Capua Castel Bolognese - three wall towers still remain. Castel del Monte Castel Goffredo - tiny fraction of the walls and a tower remain Castelfranco Veneto - the old town is completely surrounded by medieval walls and a moat Castelvetro di Modena Castelsardo Castiglion Fiorentino Castiglione di Garfagnana Castiglione del Lago's old town has fully preserved walls Cesena Cingoli Cittadella - one of the best preserved walled towns in Italy, there's a small breach on the northwestern part (the walls are fully walkable) Città della Pieve Città di Castello Cividale del Friuli - small part of the walls remain on the north east Colmurano Cologna Veneta - minor part of the walls remaining on the western side Como - about 70% is remaining with a few towers Cordovado - two town gates remain Corinaldo Corridonia Cortona Crema Crotone Domodossola - a tiny fraction remains behind the church Este, Veneto - parts of walls still remaining Fabriano Faenza Falerone Fano – large sections of the Roman walls and towers are preserved. One town gate still remains, the Roman Arco di Augusto. Felizzano Ferrara - originally 13 km now 9 km remain Firenzuola Fiuggi Florence Foligno Fossano - a minor part remains, particularly a bastion at the north end Forlì - remains include the ruins of the Porta Schiavona. The foundations of a tower can be found in the roundabout at the Piazza Santa Chiara. Gallipoli Gemona Genoa has partial fortifications still standing Glurns Glorenza in Italian, the medieval stone walls fully encapsulate the old town Gradara Gradisca d'Isonzo - large part of the walls and towers still intact Grosseto's star shaped town walls are almost completely intact. Guardiagrele Guastalla - a star shaped road around the town indicates the trace of the fortifications. A wall tower still stands at the corner Via Giuseppe Verdi/Via Volturno. Iglesias Isernia Ivrea Jesi Lanciano Lazise - part of the northern and southern walls still intact, including several towers and 3 town gates. Lecce Lecco - small part of the walls remains on the north east Leonessa Livorno Loano Loro Piceno Lucca Macerata Marostica - The defensive walls around the old town are fully intact. The walls are among the best preserved medieval defensive structures in Italy. Including 3 town gates, 20 towers and two castles, the Castello Superiore and the Castello Inferiore. Marsala Marta Massa Martana Massa Fermana Matera Melfi Messina - see Fortifications of Messina Mignano Monte Lungo - the Porta Fratte town gate is the only remain of the medieval town walls. Mondolfo Monopoli Montefalco Montegiorgio Montagnana - perfectly preserved medieval walls and one of the most impressive in Europe Montappone - small fortified town. The town directly borders the walled town of Massa Fermana Montecassiano Montecatini Terme Monte del Lago Monte San Giusto - fragmentary remains, including an impressive town gate and a tower. Monte San Pietrangeli Monte San Savino Monte Vidon Corrado Muggia - remains include two towers, two stone bastions, two town gates and large stretches of the walls. Naples Nardò - several fragments of the walls still stand around the town, including many towers which are incorporated in houses. Narni Nettuno Noale Norcia Novi Ligure Orbetello Orvieto Ostra Ostuni Otranto Padova Palmanova has fortress plan and structure, called a star fort it is a nine pointed citadel Passignano Sul Trasimeno Pavia Perugia Pesaro - the remains include two bastions, a curtain wall and a town gate, the Porta Rimini. Peschiera del Garda - fortified town surrounded by water Peschici Petriolo Piacenza has large sections of its Renaissance walls still standing Piglio Piombino Pisa Pistoia Pizzighettone - nearly completely surrounded by walls apart from a few breaches Pollenza Pontremoli Portobuffolé - little town with a gate remaining Portoferraio Potenza Piceno Pozzuoli Prato Procida Rapagnano Rapolano Terme Ravenna Reggio Emilia - very little remains of the medieval town walls. One town gate remains, the impressive Porta Santa Croce. A stretch of wall is located at the Viale Monte Grappa. Ricetto di Candelo - small town completely surrounded by walls Rieti Rimini Riva del Garda - parts of the walls and two gates remain Rome has walls since the Roman Empire Rovereto - a part of the medieval stone walls remains on the eastern side Sabbioneta . surrounded by a star fort Salò - two gates remaining San Costanzo - one of the smallest fortified towns in Italy San Gemini San Gimignano San Severino Marche San Vito al Tagliamento - part of the walls remain and three gates Santarcangelo di Romagna – most of the medieval town wall remains around the old town, including long stretches of wall, a gate and several towers. Sansepolcro Sant'Angelo in Pontano Sassari fragmentary remains, mainly at the north side of the old town. Savignaro Sul Panaro Sciacca Senigallia Serra De'Conti Sesto al Reghena - two gates remain Siena Siracusa Soave - town surrounded by medieval walls and three gates (Porta Bassano, Porta Vicentina and Porta Verona) Soncino - nearly completely surrounded by walls and a moat Spilamberto - one town gate still remains. Spilimbergo Spoleto Staffolo Sulmona Susa - fragmentary remains of Roman walls. The cathedral is built against the side of the Roman town gate Porta Savoia. Several parts of the walls and three lowered towers can be found alongside the Corso Unione Sovietica. Talamone Tarquinia Termoli Terra del Sole almost all town walls remain, with four bastion and two gate (Porta Romana and Fiorentina). Ideal-town of renaissance Todi Torino - the remains include the impressive Roman town gate Porta Palatina and 3 bastions with turrets and curtain walls in the park nearby the Porta Palatina. torre San Patrizio Torri del Benaco - minor part of the wall remaining on the south side Trapani Treia Trevi Treviso Tuscania Udine - fraction of the walls remain and two gates Urbino Urbisaglia Verona Veruccio Venzone - medieval stone walls surrounding the town, partly rebuilt after the 1976 earthquake Vicenza large sections of the town walls still remain, mainly alongside the Viale Giuseppe Mazzini, Via Goivanni Cecciarini and the Via Legione Gallieno. Four town gates remain, the Porta San Bortolo, Porta Santa Lucia, Porta Castello and the Porta Santa Croce. Villafranca di Verona - completely intact walls part of the castle Vipiteno - a tower gate remains Volterra Vaste Latvia Riga – the best preserved part of the old town walls is the Powder Tower. Just north west of the Powder Tower remains a stretch of wall with a square tower. Foundations of the wall can be seen at Kalēju iela street, and there are fragments of a ruined wall at the site of a demolished building at Minsterejas iela street. The only remains of the earthen ramparts around the old town is a star shaped moat, now transformed into a park. Cēsis Daugavpils fortress (Not a true walled city, but a huge fortress with buildings) Limbaži Valmiera Lithuania Vilnius (Can be seen in some places) Kaunas (Partially built) Luxembourg Luxembourg City Macedonia Ohrid Skopje Malta Monaco Monaco Montenegro Kotor Bar Budva Herceg Novi Kotor - built by Illyrian tribes in the 9th century and enlarged many times from the 13th century until the 19th century. Podgorica Sveti Stefan Ulcinj Netherlands Norway Fredrikstad Gamlebyen Oslo (Akershus Fortress) Poland Biała Prudnicka Białogard Bolesławiec – the old town has fragmentary remains of the old town wall, including several towers and stretches of wall. Braniewo Brodnica Brzeg – a star-shaped park around the old town is what remains of the renaissance fortifications. Some parts of the moat still remain. The shape of seven bastions is recognizable from the air. Bystrzyca Kłodzka Chełmno – almost whole length of walls (2.2 km), with 17 watch towers and city gate, 13th and 14th centuries. Chojna Chojnice Dąbie Dzierżoniów Gdańsk Głogów Gniew Goleniów Golub-Dobrzyń Gorzów Wielkopolski Grodków Grudziądz Gryfice Gryfino Jawor Jelenia Góra Kalisz Kamień Pomorski Kętrzyn Kłodzko – the remains include the impressive citadel located on a hill north of the medieval town. Kołobrzeg – a round basion and a part of the moat still remain. Kostrzyn – the medieval town was entirely destroyed during World War II, only remaining some ruins of houses, the ruins of a church and the riverside fortified walls. The fortified walls include three bastions and a land gate. The remaining moat of an outer work is located north west of the ruined medieval town. Koszalin Kowalewo Pomorskie Kożuchów Kraków – only the barbican, Floriańska Gate, two watch towers and some traces preserved Krapkowice Kwidzyn Legnica Lębork – city ruins from the Medieval era Lidzbark Warmiński Lipiany Lubań – partially preserved Lubawa Lubin Lublin Malbork – one gate and a round bastion still remain. Stretches of the walls still remain alongside the river in the direction of the famous Malbork Castle Maszewo – the town walls are nearly complete, apart from two breaches made for the increasing traffic. The two original town gates are demolished, and an adjacent tower of one of the gates still remains. Mieszkowice Modlin Fortress Myślibórz Nowe – sizable parts of the walls remain. Nowe Miasto Lubawskie – two town gates remain. Nowogrodziec Nysa – there are large remains of the renaissance fortifications, notably to the east of the old town and to the north of the Nysa Klodzka river. There are several forts around Nysa. The remains of the medieval town walls include two land gates, the remains of a water gate, some towers and stretches of wall. Olkusz Olsztyn Opole – the remaining walls are located in the north east corner of the medieval town. Paczków – very well preserved walls with 19 towers and 3 gates Pasłęk – large stretches of the walls remain intact, including two city gates Poznań – city walls existed until the early 19th century (fragments remain); Prussian fortifications were built in the 19th century Prabuty Prudnik – three watch towers Przemyśl – partially preserved ruins Pyrzyce – until World War II best preserved city walls in Pomerania region, from the 14th century Sandomierz Słupsk Stargard – significant parts survived with 3 gates (including unique water gate – Brama Młyńska); one of the most interesting city walls in Poland Starogard Gdański Strzegom Sulechów Susz Syców Szczecin – to the east of the castle remains a well-preserved wall tower. Two town gates still remain. Szprotawa Szydłów – city walls with Krakowska Gate and watch towers built in the 14th century Środa Śląska Świebodzice Świebodzin Tarnów Tczew Toruń – several watch towers, three city gates and some sections (the longest and most impressive from Vistula) from the 13th to 15th centuries Trzcińsko-Zdrój Trzebiatów Warsaw – partially preserved, partially restored after World War II, barbican restored Wieluń Wolin – only one bastion remains to the south of the town. Wrocław Ząbkowice Śląskie Zamość – complete renaissance and 19th-century walls preserved Złotoryja Żagań Żary Portugal Almeida Vauban style fortress town. Avis (or Aviz) Beja Bragança – the old town is still completely surrounded with medieval walls, including all 12 towers and two gates. Caminha Castelo Branco Castelo de Vide Chaves Coimbra Évora Elvas - Elvas is among the finest examples of intensive usage of the trace italienne (star fort) in military architecture. Estremoz Guarda Guimarães Lagos, Portugal Lisboa, Portugal - There are fragments of a Fernandin Wall since the 13th century. Marvão Monção Monsaraz Monforte Óbidos Olivenza Peniche Santarém Setúbal - the remains of 5 bastions can be found around town. Valença Vide Vila Viçosa Romania Alba Iulia Bistriţa Brașov Cluj-Napoca Constanța Mediaș Oradea Orăștie Sebeș Sibiu Sighișoara Timișoara Russia Astrakhan Derbent Izborsk Ivangorod Kazan Kolomna Moscow Nizhny Novgorod Novgorod Porkhov Pskov St. Petersburg (Peter and Paul fortress town) Smolensk Shlisselburg Tobolsk Tula Vyborg (two towers of the medieval wall remain, while one bastion on one side and a full set on the other remain from the bastioned fortifications) Yaroslavl (only several towers still stand) Zaraysk Serbia Belgrade – Kalemegdan Novi Sad – Petrovaradin Bač Manasija – Resava Niš Pirot Smederevo Golubac Maglič Šabac Slovakia Banská Bystrica Banská Štiavnica – only one city gate left Bardejov – walls almost completely preserved, with bastions and barbican Beckov Bojnice – large parts of the wall preserved, together with one of the city gates Bratislava – only few structures have survived from original fortifications. Brezno Fiľakovo Komárno – baroque fortifications almost completely preserved Košice Kremnica – about two-thirds of the defensive walls around the town preserved, with several bastions and the city gate with barbican. Krupina Levice – parts of the defensive walls were found during an archaeological survey Levoča – almost completely preserved Modra – about two-thirds of the walls still standing, one bastion and one of the city gates Nové Zámky Pezinok – parts of the defensive walls visible on several locations of the town Podolínec Pukanec Prešov – parts of the defensive walls were found during an archaeological survey Sabinov Skalica – large parts preserved Spišská Kapitula Svätý Jur Trenčín – parts of the defensive walls were found during an archaeological survey Trnava – mostly preserved, with several bastions and one city gate Zvolen Žilina Slovenia Celje Koper Kranj - evidence of the 1st-century fortifications and parts of the medieval fortifications, with four of the original eight towers preserved Ljubljana - In the 1st century AD, a Roman settlement called Emona, on the site of the present-day Ljubljana, was fortified with strong walls. A small section of the southern wall is still preserved to this day. Ljubljana got its medieval walls, like many other towns in Slovenia, in the 13th century Maribor - 13th-century fortification, some segments of which, including four of the towers, are still preserved. The walls of Maribor withstood sieges by Matthias Corvinus in 1480/1481 and by the Ottoman Empire in 1532 and 1683 Novo Mesto Piran - 7th-century fortification, expanded between 1470 and 1533 Ptuj - 13th-century fortification Slovenj Gradec Škofja Loka Vipavski Križ Spain A Coruña - fragmentary remains and 3 gates Aínsa Alarcón Albarracín Alburquerque Alcalá de Henares - has preserved 1,200 metres of walls dotted with 19 towers Alcántara, Cáceres Alcúdia Almazán Alquézar Artajona Astorga Atienza Ávila - has the most complete medieval walls in Spain, half of which is navigable on foot Badajoz - has medieval walls and most of its renaissance fortress Balaguer Barcelona - has portions of a Roman wall Béjar Berlanga Berlanga de Duero Besalú Brihuega Buitrago del Lozoya - has complete medieval walls. Burgos - has some sizable remaining parts of the town walls alongside the Paseo Cubos and to the north east of the castle, including 10 wall towers. There are also remaining towers at the Calle Trinidad and the Calle San Lesmes. Five gates still remain intact, the Arco de Santa Maria, the Arco San Martin, the Arco de San Esteban, the Arco de San Gil and the Arco de San Juan Burgo de Osma-Ciudad de Osma Cáceres Campo Maior Cartagena Castellar de la Frontera Cedeira - fragmentary remains Ceuta Ciudad Rodrigo - suffered several sieges in Napoleonic wars, walls remain intact Ciutadella de Menorca Coca, Segovia Córdoba Coria – the old town is still completely surrounded by medieval and Roman walls Covarrubias, Province of Burgos Cuéllar Cuenca Daroca Frías, Province of Burgos Galisteo – the town walls are completely preserved Gijon Girona Granada Zarza de Granadilla Haza, Province of Burgos Hondarribia Huesca - fragmentary remains Ibiza Jerez de los Caballeros Laguardia Laredo - two town gates still remain, the Puerta de Merenillo and the Puerta de Bilbao Llanes León - has an almost complete set of Roman walls dating back to the 3rd century AD, besides some parts built during the Middle Ages Loarre Lugo - has completely intact Roman walls. It is protected by UNESCO as a World Heritage Site Maderuelo Walls of Madrid - five walls Maderuelo Madrigal de las Altas Torres Málaga Mansilla de las Mulas Manzaneda - Part of the medieval wall still remains, including one of the 3 gates Mataró Medina del Campo - fragmentary remains Melilla - the old town is still fully enclosed by its impressive medieval walls Mirambel Molina de Aragón Monforte de Lemos - most of the 13th century city walls have been preserved, including two gates. Montblanc Montfalco Murallat Mora de Rubielos Morella Niebla, Huelva Olivenza - the oldest part of the town, the area adjacent to the medieval castle of Olivenza, still has well-preserved stretches of walls and towers, including two original town gates. Large parts of the later star-shaped Renaissance fortifications are also preserved, including 9 bastions and 1 town gate, the Puerta del Calvario Olmedo Oviedo - has preserved parts of its medieval walls Palazuelos Palma, Majorca Pamplona Pedraza, Segovia Peniscola Plasencia Portillo, Valladolid - fragmentary remains Rada Rello Requena Ronda - has almost complete walls (not counting the gorge which defends it on one side) Salamanca San Vicente de la Barquera - the old town has preserved the walls along with the castle Santander – the old town had medieval defensive walls. A stretch of wall alongside Calle de Cadiz is all that remains Santiago de Compostela - only a gate (Arco de Mazarelos) remains Santillana del Mar – there are fragmentary remains of the medieval walls, including a stretch of wall alongside a car park southeast of the old town and a tower at the Plaza las Arenas facing to the north Sasamón Segovia - preserves parts of the wall plus three gates Sigüenza Talavera de la Reina Tarifa Tarragona Tiedra - vestiges Toledo Tortosa - large parts of the extensively fortified medieval town remain intact Tossa de Mar Tui - a large part of both the 12th century wall and the 17/18th century fortifications has been preserved. Urueña Valencia - preserves portions of a Muslim wall and towers from Christian medieval age Valladolid - vestiges Vitoria-Gasteiz - fragmentary remains Viveiro - fragmentary remains and 3 gates of the original 6 Xàtiva Zamora – the old town walls remain largely intact, especially at the north, west and riverside of the old town. Zaragoza Sweden City wall of Visby Gothenburg has a part of the western city wall left, the bastion Carolus Rex at Esperantoplatsen (Esperanto square) and most of the city moat is still left. Halmstad had renaissance ramparts. To the north of the old town a bastion with adjacent town gate remains, the Norre Port. To the south of the old town a bastion with a remnant of the moat remains. Kalmar substantial remains of the walls. Sizable stretches of walls and a bastion remain to the south of the old town. To the east remain two bastions. To the north remain portions of wall near Fiskaregatan. To the west the shape of two bastions is clearly recognizable, with a ravelin in front of the remaining town gate Westport (Westgate). Two other town gates still remain, an unmanned gate of later date at the Skeppsbrogatan, and a gate at Skeppsbron. Stockholm has a small remainder of the medieval city wall preserved. Bohus Fortress Switzerland Aarau – the remains of the medieval town walls include two town gates (the Haldertor and the Oberer Turm) and a tower (the Pulverturm) with an adjacent stretch of wall. Altstätten Arbon – the remains include some fragments of wall and a tower converted into a house. Avenches Baden Basel Bellinzona (Dominated by its three castles: Castelgrande, Castello di Montebello and Castello di Sasso Corbaro) Biel Bremgarten Brugg Bülach Chur Delémont Diessenhofen Frauenfeld Fribourg Geneva Greifensee Grüningen Gruyères Ilanz Laufen Lausanne Lenzburg Liestal – one town gate remains. Lucerne – the wall on the northern bank of the Reuss is well preserved and among the principal landmarks of the city. It is called Museggmauer and Stadtmauer. Maienfeld Meienberg, Sins, Aargau Morges Münchenstein Murten: Medieval walls Neuchâtel Nyon Olten Orbe Rapperswil Regensberg Rheinfelden Romont Schaffhausen Sempach Solothurn – large parts still remain, including several walls, towers and a bastion. Two town gates remain, the impressive Baseltor and the Bieltor. Steckborn Sursee Thun Uznach Wangen an der Aare Werdenberg Wiedlisbach Willisau Winterthur Yverdon-les-Bains Zofingen Zug – the only remainder of the inner town walls is the Zeitturm (Clocktower), a medieval town gate. The remains of the outer town walls include four towers (the Kapuzinerturm, Knopfliturm, Huwilerturm and the Pulverturm), and some stretches of wall. Zurich – the main remains are the Schanzengraben, and the shapes of several bastions are recognizable through the course of the moat. One bastions remains largely intact, and it now houses the Alter Botanischer Garten. Turkey Troy. The ancient city of Troy was famous for its defensive walls. There is archaeological evidence that Troy VII, generally identified as the stage of the legendary Trojan War of Homer's Iliad, usually dated between 1194 BC – 1184 BC, had walls with a carefully built stone base over four meters thick and some nine meters high in places, which was surmounted by a larger superstructure with towers in mudbrick. The walls in Homer's epic are so mighty that the siege of Troy by Achaeans lasts more than nine years, and only could be finished with the trickery of the Trojan Horse. Sections of the stone base of Trojan walls still survive on the archaeological site in present-day Hisarlık, in Çanakkale Province. Istanbul. The system of walls around (as it was then known) Constantinople built in 412 by the Roman emperor Theodosius II was a complex stone barrier that stretched 6.5 kilometers and is often called the Wall of Theodosius. This barrier stood impregnable for ten centuries and resisted several violent sieges until 1453 when the Ottomans succeeded in breaching the walls. There was a new element in the battlefield: the Ottoman army had powder cannon and the walls offered limited resistance to them. Diyarbakır. Diyarbakır is surrounded by an almost intact, dramatic set of high walls of black basalt forming a circle around the old city. There are four gates into the old city and 82 watch-towers on the walls, which were built in antiquity, restored and extended by the Roman emperor Constantius in 349. Osmangazi Ankara Çanakkale İznik Antalya Sinop Rize Amasya Bodrum Alanya Ani Kuşadası Pergamon Assos Bozcaada Edirne Trabzon. The most of the city walls are still standing and are among the city's oldest buildings. In fact, their oldest part can be dated back to the 1st century AD during the Roman Empire era. Historical sources provide information about older stages of their construction. Xenophon, who visited the city in the 5th century BC also mentioned the existence of city walls Enez Bursa Sığacık Ukraine Bilhorod-Dnistrovskyi Letychiv (see Letychiv Fortress) Lutsk (see Lubart's Castle) Lviv (see Hlyniany Gate) Medzhybizh (see Medzhybizh Fortress) Uzhhorod (see Uzhhorod Castle) United Kingdom England Northern Ireland Scotland Wales Aberystwyth Beaumaris Brecon Caerleon (Isca Augusta) Caerwent (Venta Silurum) Caernarfon Cardiff Cardigan Chepstow – Port Wall Cowbridge Conwy Denbigh Hay on Wye Kenfig Kidwelly Monmouth Montgomery Tenby Pembroke Radnor Vatican City Vatican City See also Defensive wall City gate Fortification List of walls Wall Stone wall Medieval fortification References Lists of buildings and structures
4465885
https://en.wikipedia.org/wiki/Marine%20Air%20Support%20Squadron%201
Marine Air Support Squadron 1
{{Infobox military unit |unit_name= Marine Air Support Squadron 1 | image= MASS-1 squadron insignia.png | image_size = 225 |caption= MASS-1 insignia |start_date= |country= |allegiance= |branch= |type= Aviation command and control |role= Provide the DASC |size= |command_structure= Marine Air Control Group 282nd Marine Aircraft Wing |garrison= Marine Corps Air Station Cherry Point |ceremonial_chief= |colonel_of_the_regiment= |nickname= "Chieftain" |patron= |motto= |colors= |march= |mascot= |battles= Operation Power PackOperation Desert StormOperation Iraqi FreedomOperation Enduring Freedom|current_commander= LtCol Amanda Donnelly |anniversaries= }}Marine Air Support Squadron 1' (MASS-1) is a United States Marine Corps aviation command and control unit that provides the Direct Air Support Center to coordinate close air support for the II Marine Expeditionary Force. Callsign "Cheiftain," the squadron is based out of Marine Corps Air Station Cherry Point, North Carolina, and falls under the command of Marine Air Control Group 28 and the 2nd Marine Aircraft Wing. Mission The squadron is responsible for the planning, receiving, coordination and processing of requests for direct or close air support. It provides this through the DASC, whether ground or airborne based. The DASC is the principal Marine air command and control system agency, responsible for the direction of air operations directly supporting ground forces. It functions in a decentralized mode of operation, but is directly supervised by the marine or Navy Tactical Air Command Center. During amphibious or expeditionary operations, the DASC is normally the first air command & control agency ashore and usually lands in the same serial (i.e., scheduled wave or on-call wave) as the Ground Combat Element's senior Fire Support Coordination Center. History Headquarters and Services Squadron, 1st Marine Aircraft Wing was commissioned on July 1, 1943 at Marine Corps Air Station Cherry Point. On April 1, 1944 the squadron was assigned to the 9th Marine Aircraft Wing and on March 31, 1946 it was again reassigned to the 2nd Marine Aircraft Wing. In July 1947, the unit was re-designated as Marine Tactical Air Control Squadron 1 (MARTACRON-1). In January 1948, MTACS-1 participated in the Seconds Fleet Tactical Exercises at Vieques, Puerto Rico returning on March 20, 1948. The squadron boarded USS LST-664 on February 13, 1949 and again sailed for Vieques to control aircraft during operations. The squadron returned on April 1. Between July 18-28, 1949, the squadron hosted Marine Ground Control Intercept Squadrons 21 & 22 for their annual training. Between October 5 & November 14, 1949 MTACS-1 participated in cold weather exercises in Cape Porcupine, Labrador. On February 15, 1954, the squadron assumed its present designation as Marine Air Support Squadron 1. In May 1956, MASS-1 deployed to the Dominican Republic and provided air support for Operation Power Pack by carrying out its duties as controlling agency for rotary and fixed wing aircraft. On September 1, 1967 the squadron was reassigned to Marine Air Control Group 28, where it remains today. In August 1990, MASS-1 deployed a detachment in support of 4th Marine Expeditionary Brigade, the amphibious forces which deployed to Southwest Asia during Operation Desert Shield. A second detachment later deployed to provide an airborne DASC in support of I MEF, and both detachments ultimately participated in Operation Desert Storm. During the 1990s, the squadron was twice designated as the Marine Air Command and Control Systems Unit of the Year, receiving the prestigious "Edward S. Fris Award" in both 1992 and 1998. On January 21, 2003, the squadron began deploying to Kuwait in support of the 3rd Marine Aircraft Wing. During the 2003 invasion of Iraq it was tasked with conducting airborne DASC operations from the back of Lockheed Martin KC-130 cargo aircraft and supporting Task Force Tarawa. The squadron returned home in June 2003. From January 2005 until February 2006, MASS-1 again deployed to Iraq to provide a DASC, Air Support Elements and Air Support Liaison Teams throughout Al Anbar Province. MASS-1 deployed to Iraq a third time in 2007 for a year-long tour in support of Operation Iraqi Freedom. In 2009, the squadron returned to Iraq for another 12-month deployment, while also sending a detachment on a concurrent combat deployment to Afghanistan in support of Marine Aircraft Group 40. Since the end of combat operations, MASS-1 moved into a state-of-the-art aviation C2 complex in 2016. MASS-1 leads the Marine Air Command and Control community as an innovator, qualifying the first DASC data link specialists (JICO/AJOC), developing enlisted controllers who are also qualified to operate from U.S. Navy ships, and integrating live/virtual/constructive training networks into their garrison facility. Unit awards Since the beginning of World War II, the United States military has honored various units for extraordinary heroism or outstanding non-combat service. This information is compiled by the United States Marine Corps History Division and is certified by the Commandant of the Marine Corps. MASS-1 has been presented with the following awards: See also United States Marine Corps Aviation List of United States Marine Corps aviation support units ReferencesThis article incorporates text in the public domain from the United States Marine Corps.'' External links MASS-1's official website. Retrieved on 14 February 2010. United States Marine Corps air support squadrons Military units and formations in North Carolina United States Marine Corps aviation support squadrons
53955866
https://en.wikipedia.org/wiki/Intellectual%20property%20protection%20of%20video%20games
Intellectual property protection of video games
The protection of intellectual property (IP) of video games through copyright, patents, and trademarks, shares similar issues with the copyrightability of software as a relatively new area of IP law. The video game industry itself is built on the nature of reusing game concepts from prior games to create new gameplay styles but bounded by illegally direct cloning of existing games, and has made defining intellectual property protections difficult since it is not a fixed medium. Issues related to intellectual property protection in video games Game creation There are multiple aspects about video game creation that have led to different components of the software being copyrighted separately; some cannot be copyrighted at all because of their existence in the public domain or Creative Commons. Common assets There is a plethora of websites which allow creators to 'borrow' assets to implement in-game. The model of granting access and permission to use these assets differs across websites and may range from an upfront payment to a portion of profits (if the assets are used commercially). This is not an issue with large video game publishers (such as EA, Activision, or Sony), but when these self-contained companies create large and detailed worlds, most of the assets they create end up being used only once. This limits the public pool of resources/assets. Assets will often have to be recreated in order to create a new game (or sequel by another company or creator), which is a common complaint of game developers, as it usually costs large amounts of money to create commercially viable assets and makes it difficult for smaller developers to produce games. Game engines A game engine is a framework which a developer can use to create games. They consist of a software suite with a multitude of components, such as a rendering engine, audio engine, physics engine, and artificial intelligence. Companies create these engines for the purpose of allowing developers (with or without charge) to create games. However, because of limitations or certain peculiarities of an engine, some designs or passive-background tasks may occur in a particular way for every game made using that engine. This particular feature (regardless of how central it may be to a game) is essentially the same in all games created with that engine, which takes it outside the scope of copyright. This reasoning would also apply to games made with the same engine which share source code—this would not constitute copying because the games' similarity is inherent to the tools. Large video game houses/publishers can sidestep this limitation by developing in-house engines. Producers-developers relation Classically, publishers had the role of securing (or providing) funding for a game, as well as bearing the losses and in many cases, marketing the game. These expenses were generally large and could run as high as tens of millions of dollars for AAA titles. But, with the advent of the Internet and the rise of indie culture, a new wave of financing and distribution technologies has emerged. Sites like Kickstarter and Indiegogo allow for interested consumers to directly contribute towards game development by purchasing the game in advance. Digital distributors like Steam and GOG.com removed the costly need for the manufacture and distribution of physical game discs. These innovations have allowed the industry to move away from the standard of intellectual property rights resting with the publisher instead of the developers, as "the IP rights that typically vested with publishers may now be shared with a publisher or owned by a developer or an investment vehicle". Music creators, voice actors and other contributors Contributions that do not add directly to the code of the game would not be protected by copyrights for literary works, but these components could be covered if an audiovisual copyright is taken out. As for authorship rights, most contributors are employees and hence their work would be considered "work for hire", belonging not to them, but to their employer. Music is generally not created in-house by game developers; since third parties are hired, this may not result in a work for hire. See U.S court case CCNV v. Reid, on the principle work for hire. Gameplay Hardware limitations Some copyrightable elements of a game may be created due to hardware limitations. For example, the classic game Space Invaders, as originally played as an arcade game, got faster as the player killed more of the onscreen aliens, which freed up system resources. User input User input is an essential component of video games, which are interactive media. Though this may not change the intellectual property rights in the base code of the game, some developers/publishers may restrict the rights of players to broadcast their playthrough of the game. The arguments from the other side are that the output of a game is coming in a particular way due to user input and this can reasonably give a player some restricted rights in his/her play through, also known as a Let's Play. Copyright Copyright is a protection of intellectual property that give exclusive right to the author(s) of a creative work. A video game may be protected as a creative work. Whether or not a work is copyrighted, and the duration of the copyright may differ between countries, and may also be limited by country specific exceptions, like the fair use doctrine in the United States. International standard The Berne Convention for the Protection of Literary and Artistic Works (The Berne Convention of 1886) is the international treaty which provides the scope for copyright protection of video games. This protection can be drawn from the wide definition of "Literary and Artistic Work" in Article 2 of the Convention, which reads: The expression "literary and artistic works" shall include every production in the literary, scientific and artistic domain, whatever may be the mode or form of its expression, such as books, pamphlets and other writings; lectures, addresses, sermons and other works of the same nature; dramatic or dramatico-musical works; choreographic works and entertainments in dumb show; musical compositions with or without words; cinematographic works to which are assimilated works expressed by a process analogous to cinematography; works of drawing, painting, architecture, sculpture, engraving and lithography; photographic works to which are assimilated works expressed by a process analogous to photography; works of applied art; illustrations, maps, plans, sketches and three-dimensional works relative to geography, topography, architecture or science. This standard treats the whole game as a singular component but does not define what would be covered by such a protection and what would be excluded. WIPO had recognized the complexity inherent in copyrighting video games, saying: "Although Article 2 of the Berne Convention provides a solid basis for eligibility for protection of video games by copyright, they are in fact complex works of authorship, potentially composed of multiple copyrighted works." WIPO has also stated in one of its reports that "there is no clear classification of video games and their protection will vary depending on each particular game and the elements that are part of it. In this sense, video games can be treated as computer programs and, thus, are classified as works of authorship; in that case, the source code for a video game is classified as a literary work. If pictorial or graphic authorship predominates, a video game may be classified as a visual arts work. Similarly, if motion picture or audiovisual authorship predominates, a video game may be classified as a motion picture/audiovisual work." National standards WIPO has written the following about copyright protection in different countries and jurisdictions: "For some countries, video games are predominantly computer programs, due to the specific nature of the works and their dependency on software. Whereas in other jurisdictions, the complexity of video games implies that they are given a distributive classification. Finally, few countries consider that video games are essentially audiovisual works." United States The Copyright Act of 1976, codified at enumerates the requirements of a copyright in the US, but does not use the term. For a work to be copyrightable under the Copyright Act it must meet the threshold of originality, be fixed in a medium (whether analog or digital) and the work must be perceivable and reproducible. Regarding copyrights for video games, the US Copyright office has stated that "a single registration may be made for a computer program and its screen displays...(and) when answering the 'Type of work being registered' question on the application form, the copyright holder shall choose the type most appropriate to the predominant authorship." In other words, US law does not specify a certain protection to be given to a game. The individual(s) registering the game, or their attorneys, must ascertain which category best protect the interests of the author/assignee.’ In the United States, the underlying source code, and the game's artistic elements, including art, music, and dialog, can be protected by copyright law. However, gameplay elements of a video game are generally ineligible for copyright; gameplay concepts fall into the idea–expression distinction that had been codified in the Copyright Act of 1976, in that copyright cannot be used to protect ideas, but only the expression of those ideas. The United States Copyright Office specifically notes: "Copyright does not protect the idea for a game, its name or title, or the method or methods for playing it. Nor does copyright protect any idea, system, method, device, or trademark material involved in developing, merchandising, or playing a game. Once a game has been made public, nothing in the copyright law prevents others from developing another game based on similar principles." Courts also consider scènes à faire (French for "scenes that must be done") for a particular genre as uncopyrightable; games involving vampires, for example, would be expected to have elements of the vampire drinking blood and driving a stake through the vampire's heart to kill him. It is generally recognized in the video game industry that borrowing mechanics from other games is common practice and often a boon for creating new games, and their widespread use would make them ineligible for legal copyright or patent protection. The United States passed the Digital Millennium Copyright Act (DMCA) in 1998 as part of the World Intellectual Property Organization (WIPO) Performances and Phonograms Treaty. Broadly, the DMCA prohibits hardware and software anti-circumvention tools, such as reading an encrypted optical disc. For both video game hardware manufacturers and for software developers and publishers, this helps to protect their work from being copied, disassembled, and reincorporated into a clone. However, the DMCA has been problematic for those in video game preservation that wish to store older games on more permanent and modern systems. As part of the DMCA, the Library of Congress adds various exemptions which have included the use of anti-circumvention for museum archival purposes, for example. In present-day case law driven by decisions in the United States legal system, video game copyrights come from two forms. The first is by its source code or equivalent, as determined by the 1983 decision in Apple Computer, Inc. v. Franklin Computer Corp. that software code can be considered a "literary work" and thus subject to copyright protection. The second form is as an audiovisual work, as determined in the 1982 case Stern Electronics, Inc. v. Kaufman; while video games present images and sound that are not in a fixed form, the repetitive use of these in a systematic response to player's actions was sufficient for copyright protections as audiovisual works. In the case of the earlier hardware before programmable computer chips, copyright was also recognized by the impression of software based on the circuit board patterns and features that made games work as a form of fixation, as established by both Stern and the 1982 case Midway Mfg. Co. v. Dirkschneide, in which Midway successfully sued a company that was reselling repackaged versions of their arcade games Pac-Man, Galaxian and Rally-X. Up until 2012, U.S. courts were reluctant to find for copyright infringement of clones. Driving case law in the United States was principally through the case Atari, Inc. v. Amusement World, Inc. (547 F. Supp. 222, 1982). Atari had sued Amusement World claiming that its video game Meteos violated their copyright on Asteroids. The court did find twenty-two similarities between the two games, but ruled against Atari's claims, citing these elements as scènes à faire for games about shooting at asteroids. The case established that "look and feel" of a game could not easily be protected. Attorney Stephen C. McArthur, writing for Gamasutra, said that during this period, courts opted to take a more lax view to balance innovation in the industry and prevent overzealous copyright protection that could have one company claim copyright on an entire genre of games. At best, copyright holders could challenge clones by threatening cease and desist letters, or on other intellectual property rights such as trademarks. Shifts since 2012 A shift in legal options for developers to challenge clones arose from the 2012 federal New Jersey district court decision in Tetris Holding, LLC v. Xio Interactive, Inc. that ruled in favor of The Tetris Company, the licensees of the Tetris copyright, over the clone Mino, developed by Xio Interactive, which used the same gameplay as Tetris but with different art assets. The developers for Mino has cited in their defense that they only used the uncopyrightable gameplay elements of Tetris in Mino. The court ruled that copyright law was in favor of the Tetris Company's claim, as the gameplay was copied without changes, and while the art assets were new, the "look and feel" of Mino could be easily confused for that of Tetris. The court also recognized that since the time Tetris had been released and when Mino was published, there was enough new technology in graphics that Mino could have added new forms of expression to the base gameplay to better distinguish from the idea of Tetris, such as how to display the tetraminos or the animation of how they fell, but instead copied very closely what Tetris had done, thus making it more likely a copyright violation. While only a district court decision and not binding outside of New Jersey, this served as case law for other developers to fend off "look-and-feel" clones. The same reasoning was found in a similar case that was occurring nearly simultaneously with the Tetris decision, in which SpryFox LLC, the developers of the mobile game Triple Town, successfully defended their game from a clone, Yeti Town, developed by 6Waves, through court settlement after the judge gave initially rulings in favor of SpryFox. These rulings suggested that there was copyright protection on the gameplay mechanics despite drastic differences in the games' art assets, though other factors, such as prior agreements between SpryFox and 6Waves, may have also been involved. Both the Tetris and Triple Town cases have established new but limited case law on "look and feel" that can be used to challenge video game clones in court. Idea/expression distinction There is a long established Copyright principle called the idea–expression distinction, where Copyright is meant to protect a creator’s unique expression, without giving anyone a monopoly on a broader idea. The US Copyright Office specifically states that “Copyright does not protect the idea for a game, its name or title, or the method or methods for playing it. Nor does copyright protect any idea, system, method, device, or trademark material involved in developing, merchandising, or playing a game.” The idea-expression distinction is related to other Copyright principles and doctrines. One is the merger doctrine, where an idea can only be expressed in one way. The courts will not recognize Copyright protection in any expression that is inseparable from a larger idea, since it would effectively grant a monopoly over that idea. Another related concept is scènes à faire (French for "scenes to be made"), where certain generic elements are considered essential to a fictional setting, and should not eligible for Copyright protection. For example, the necessity of a baseball in a baseball game would be uncopyrightable as a scènes à faire. Courts have applied the idea-expression distinction to numerous copyright disputes, starting with the 1981 case Atari v. Amusement World. Despite finding that Meteors copied the idea for Atari’s Asteroids game, the court ruled that none of the similarities were protected by copyright, since these elements were “unavoidable” in making a game about “a spaceship combatting space rocks”. Atari v. Philips was another early ruling, where courts granted a preliminary injunction to stop sales of K.C. Munchkin! due to its similarities with Pac-Man. Later courts have ruled that many game elements cannot be protected by copyright. In both Data East USA, Inc. v. Epyx, Inc. and Capcom U.S.A. Inc. v. Data East Corp., the courts did not recognize copyright protection in many game mechanics and character designs that were seen as essential to creating a martial arts themed fighting game. In later cases such as Tetris Holding, LLC v. Xio Interactive, Inc. and Spry Fox, LLC v. Lolapps, Inc., courts have recognized copyright infringement where there is evidence that one game copied another’s unique expression, more than just imitating the general idea. Substantial similarity test In Atari v. North American Philips Consumer Electronics Corp. (1982) the 7th Circuit wrote that "no plagiarist can excuse the wrong by showing how much of his work he did not pirate." This was said in the context of the fact that, "while a game is not protectable by copyright as such, this kind of work of authorship is protectable at least to a limited extent as long as the particular form in which it is expressed provides something new or additional over the idea" and that while two works may not be the same in many regards, if parts/components of the second work or wholly or substantially copied or like the first work, it is copyright infringement. Subtractive approach test Nichols v. Universal Pictures laid out the following test for copyrighted material which contains both copyrightable and public domain material. The case lays down 3 steps to be followed to ascertain copying: The allegedly infringed work is analyzed to determine the parts that are protected, The unprotected parts are subtracted, and The fact finder examines significant similarities between what remains of the allegedly infringed work and the allegedly infringing work. This subtractive approach is the preferred test by courts in the US (save the 9th Circuit), Abstraction-filtration-comparison test This test, developed in Computer Associates International, Inc. v. Altai, Inc. (1992) was specifically aimed at software infringement and hence is a better fit for what a court is likely to apply with regards video games. The test, like the subtractive test before it, lays down 3 steps: Abstraction – Ascertain each level of abstraction. Filtration – Identify factors at each level that are not deserving of protection (ideas, processes, those dictated by efficiency or required for external compatibility, those taken from the public domain, etc.) and subtract them from consideration. Comparison – Compare the remaining components for infringement. The Abstraction-filtration-comparison test was notably used in identify copyright violations in video games in Tetris Holding, LLC v. Xio Interactive, Inc., which was used to find against a clone of Tetris due to substantial similarly in the broad look and feel of the game. Authorship In the U.S, corporations can be the author of an audiovisual work, which tends to be the most commonly used classification for a video game. In this case, the hiring corporation, rather than employees or other contributors, would be considered the author. Unlike European law, which has very strong "Moral Right Protections", moral rights in American law are limited to works of visual arts as defined by Section 101 of the U.S. Copyright Act (Act). This definition excludes "motion pictures or other audiovisual works" or any works made for hire. There are developments in this field due to the advancement of technology as well. Services like 'Steam Workshop' allows for players to use tools provided by the game developer to add to the game in some manner. Usually, since these players are not employees copyright of their works usually resides with them. India The Indian Copyright Act of 1975, does not address video games specifically. Unlike the US, India has not publicly listed under what categorization video game makers should seek protection under. India follows the Anglo-American tradition of allowing corporate persons to hold copyrights. The Indian law has an exhaustive definition of the phrase "Artistic Work" under Chapter 1, Section 2(c) of the Copyrights Act, which states that Artistic Work is "(i) a painting, a sculpture, a drawing, an engraving or a photograph, whether or not any such work possesses artistic quality; (ii) a work of architecture; and (iii) any other work of artistic craftsmanship." Due to the specificity of the statute, the law on video games in India has developed more on the basis of business practice. This has led to developers and publishers seeking protection as "cinematograph works". Under Section 2 of the act, a "cinematograph film" means "any work of visual recording on any medium produced through a process from which a moving image may be produced by any means and includes a sound recording accompanying such visual recording and cinematograph shall be construed as including any work produced by any process analogous to cinematography including video films." The phrase "process analogous to cinematography" has a non-exhaustive list attached, meaning that part of the definition is open-ended enough to allow for video games to be covered, but there is no jurisprudence on this issue.) The law in India does clearly state that a "literary work" includes computer programs and hence by extension, the source code of video games can be protected as software or literary work. Unlike the US, in India, different aspects of a game, like the art, code, gameplay mechanics etc. are copyrightable independently. This understanding is furthered by Section 17 of the Indian Copyright Act which states that the person arranging for all components of a work to come together into a cohesive whole would be the one to hold the copyright in the work, only if all works are created under a contract of service as stated in Section 17 (c): "In the case of a work made in the course of the author's employment under a contract of service or apprenticeship (...) the employer shall, in the absence of any agreement to the contrary, be the first owner of the copyright therein" Under this rule, the authorship of creative contributions to a game that are made by individuals outside of the developers/publishers employment reside with the original creator, unless the rights are signed over to the developer. Contributors like musicians and lyricists, having once consented to have their works in a cinematograph work, can no longer restrict or object to the enjoyment of the performer’s rights by the producer but the original author/creator shall retain the right to receive royalties on public/commercial use of his/her work, as per Section 38 A (2) of the Indian Copyright Act. "It is unclear whether this new provision will affect video game authors due to the lack of qualification of this kind of work of authorship; this amendment to the Indian Copyright Act must, therefore, be further interpreted in this context...(it) must be interpreted by Indian courts in order to determine if it will apply to video game contributors and whether they shall have the right to receive royalties for the exploitation of their works." The landmark case for deciding on infringement cases in India is R.G. Anand, which laid out the following test: if "the viewer after having read or seen both the works is clearly of the opinion and gets an unmistakable impression that the subsequent work appears to be a copy of the original" then the copyright has been infringed. United Kingdom Copyright law in the United Kingdom is set by the Copyright, Designs and Patents Act 1988, but this does not specifically account for video games under any of the works eligible for copyright. Instead, video games are considered protected by copyright in their parts. The computer code or other fixed medium is considered copyrightable, and the game's presentation can be copyrighted as a literary work or dramatic work, while elements like character design, art and sound and music can also be copyrighted. Other facets, like the look and feel or game mechanics, are not considered eligible for copyrightable. European Union The European Union (EU) as a body of member nations sets policies for copyright and other intellectual property protections that are then to be supported by laws passed at the national levels, allowing individual nations to include additional restrictions within the EU directives. Multiple EU directives have been issued related to copyright that affect video games, but at the core, the Computer Programs Directive of 1991 provide for copyright protection of video games in their source code and all its constituent parts in its fixed format, such as on an optical disc or printed circuit. The audio, visual and other creative elements of a game themselves are not directly covered by any EU directive, but have been enshrined in national laws as a result of the Berne Convention of which the EU and its member states are part of, with video games either expressly called out as cinematographic works or more broadly under audiovisual works. At least one case at the European Court of Justice has ruled similarly to the United States that ideas like gameplay concepts cannot be copyrighted but it is their form of expression that can merit copyrightability. Patents on software and video games cannot be easily obtained in the European Union, unless it can be demonstrated that there is a significant technical effect beyond the interaction of the hardware and the software. Japan Japan's copyright laws are similar to the United States in that a form of artistic expression in a fixed medium is sufficient for copyright protection. Japan is also a member of the Berne convention. Video games, and computer code in general, are considered to fall under copyright as they are a "work of authorship" as "a production in which thoughts or emotions are expressed in a creative way and which falls in the literary, scientific, artistic or musical domain." Video games being eligible for copyrights in the same manner as cinematic works were established through three cases related to video game clones from 1982 to 1984, in which Japan's courted ruled, collectively, that the act of storing data into a computer's read-only memory (ROM) constitutes copying and thus unauthorized copies can be violations of copyright, that similarly hardware circuitry can carry software information and is also copyrightable, and that video games can contain artistic expression that is protected by copyright. These cases gave video games stronger protections for copyright than before, as Japan's courts typically put more onus on plaintiffs in copyright infringement cases to demonstrate similarity, and the fair use allowances tended to be more lax. As part of the WIPO Performances and Phonograms Treaty, Japan amended its copyright laws in 1999 to prohibit hardware and software anti-circumvention devices, basing its language on the United States' own DMCA. One issue that has affected the rerelease of older games in Japan are harsh copyright laws that would come into play if there was any possible dispute over possible copyright ownership. To republish a work, the publisher must have an agreement with the copyright owner, which for these older games may involve individuals that that died or moved to different fields and are difficult to track down. A new proposed law in 2021 would create a central repository for copyright management for such works across all media where the copyright owner is unclear and take responsibility for managing future rights issues. This would allow affected games to be republished without having to contact their original creators if they cannot be found. China China's legal framework to copyright does recognize individual elements video games as an eligible work for copyrightability with individual creative assets as being copyrightable, but does not have similar provisions as most other nations to recognize the fixed form of publication as also having copyright nor the work as a whole having copyright like a cinematographic work. These last elements have in part enabled enabled widespread copyright theft within the country, not just of video games but other works. The relatively lax copyright rules enables clones based on reskinning an existing game, replacing the art assets with new ones but otherwise not changing the game's code. China's copyright code also makes it difficult to take action on modification of copyrighted characters as these are not explicitly written into Chinese law, which has allowed widespread unlicensed use of others' intellectual property in Chinese games. Though the government has introduced more stringent copyright laws in recent years and harsher penalties for violations, video game clones still persist in China. One of the first major copyright cases over a video game in China was filed in 2007 by Nexon against Tencent, asserting that Tencent's QQ Tang had copied their Pop Tag. The court's decision in favor of Tencent fixed two concepts that remained part of case law: access to the original game, and whether there was substantial similarity in the claimed elements that violated copyright. The case also established that in considering copyrights of the individual elements, there must be a threshold of originality to be copyrightable. A second key case in 2018 occurred when Woniu Technology, the creators of Taiji Panda, sued Tianxiang Company over their mobile game Hua Qian Gu as a reskinned clone of Taija Panda. While Tianxiang attempted to argue that the overall game could not be copyrighted, the court established precedence that a video game fell into the category of cinematographic works, and that the expression of gameplay can be copyrighted, establishing this principle in case law. Patents Patents are frequently used to protect hardware consoles from cloning. Though patents do not cover elements like the form and shape of a console, they can be used to protect the internal hardware and electronic components, as Magnavox had used at the onset of the arcade game and home console clones. Notably, many of the patents for the Famicom and NES expired in 2003 and 2005, respectively, leading to additional grey market hardware clones within a short time. However, Nintendo had built other intellectual property protection into their system, specifically the 10NES lock-out system, covered by copyright law, that would allow only authorized games to be played on their hardware. Less frequently, patents have been used to protect video game software elements. Notably, Sega had filed a 1998 United States patent for the gameplay concepts in Crazy Taxi. The company subsequently sued Fox Interactive for patent infringement over their title The Simpsons: Road Rage, citing that the latter game was developed to "deliberately copy and imitate" the Crazy Taxi game. The case was ultimately settled out of court. Other known examples of gameplay patents include those for minigames on loading screens filed by Namco, the dialog choice wheel used in Mass Effect games by Bioware, the katamari of the Katamari Damacy games from Bandai Namco, and the Nemesis system from Middle-earth: Shadow of Mordor by Warner Bros. Interactive Entertainment. Trademarks Another approach some companies have used to prevent clones is via trademarks as to prevent clones and knockoffs. Notably, King have gotten a United States trademark on the word "Candy" in the area of video games to protect clones and player confusion for their game Candy Crush Saga. They have also sought to block the use of the word "Saga" in the trademark filing of The Banner Saga for similar reasons, despite the games having no common elements. Within the European Union, one can register for a European Union trade mark that includes multimedia elements, which would allow a developer or publisher to trademark a specific gameplay element that is novel from past games, providing a different route for them to protect their work from cloning. For example, Rebellion Developments filed to register its "Kill Cam" mechanic as a trademark from its series Sniper Elite in October 2017, though as of February 2018, the application is still being reviewed. Licensing A related aspect of video games and intellectual property is the licensing of other properties for use within the video game. This can come in many potential forms: Some games are developed as tie-ins to the release of another property as to help with that property's marketing and promotion, such as Superman 64 which was used as a tie-in to Superman: The Animated Series In other cases, games may simply used the licensed setting outside of the tie-in function, such as in the case of Batman: Arkham Asylum. Many games incorporate existing contemporary music from famous bands and musicians, each which must be licensed individuals. This is common for most rhythm games like Guitar Hero, as well as a common feature in Grand Theft Auto and various GTA clones for music played on an in-game car radio station. Various crossover games bring in characters, settings and other elements from other video games commonly outside of the publisher's IP realm, such as in the case of the Super Smash Bros. series. This type of licensing tends to pose an issue for the retention and preservation of video games particular on digital download services. Publisher can sometimes secure perpetual rights to a licensed property, such as in the case of Ubisoft with the name Tom Clancy. Otherwise, with limited-time licenses, publishers are generally required to remove the game from sale at the end of that term, though existing owners of the game often still have rights to redownload and use the game as necessary. For example, the Forza Motorsport series includes realistic models of numerous existing car models which are licensed from the car manufacturers. These licensing terms are limited, requiring publisher Microsoft to pull the game from sale roughly four years after release; Microsoft has generally established a development model where as the last iteration of Forza is about to be pulled, the next version, with a fresh start on the car licenses, was released. In one predominate example, Grand Theft Auto IV had to update the game for all digital owners to remove songs on the soundtrack which their ten-year license had expired. See also Digital rights management Mod (video games) Video game art, a form of art which uses video games as the artistic medium References Copyright law
37371867
https://en.wikipedia.org/wiki/Hikvision
Hikvision
Hangzhou Hikvision Digital Technology Co., Ltd., often shortened to Hikvision, is a Chinese state-owned manufacturer and supplier of video surveillance equipment for civilian and military purposes, headquartered in Hangzhou, Zhejiang. Its controlling shares are owned by the Chinese government. Due to its involvement in alleged human rights violation and national security concerns, the company has been placed under sanctions from the U.S. government and is prevented from receiving U.S. government contracts. History Hikvision was founded in 2001 by Zhejiang HIK Information Technology Co., Ltd. () with the company having a 51% stake and Gong Hongjia () a 13.4% stake. Hikvision is an IoT solution provider with video surveillance market as its core competency. It devotes 8% of its annual revenue to research and development with 40,403 employees. Hikvision has been listed on the Shenzhen Stock Exchange since 2010. The company provides surveillance products to the global market. In October 2016, the company concluded a deal to use Movidius' computer vision technology. In May 2017, Hikvision established Hikstorage, a subsidiary focused on the production of storage devices. In January 2021, the company won a US$33 million, 1,900-camera smart city project in Shanghe County, Shandong province that includes cameras with facial recognition and license plate recognition technologies. In 2021, Best Buy, Home Depot, and Lowe's stopped selling cameras from Hikvision brand Ezviz due to concerns about Hikvision’s complicity in surveillance and human rights violations in Xinjiang. U.S. investment prohibition In November 2020, U.S. President Donald Trump issued an executive order prohibiting any American company or individual from owning shares in companies that the United States Department of Defense has listed as having links to the People's Liberation Army, which included Hikvision. In December 2020, Hikvision was removed from FTSE Russell. On January 12, 2021, the Joe Biden inaugural committee returned a $500 donation to former U.S. Senator Barbara Boxer (D-CA) after she registered as a foreign agent for Hikvision. In March 2021, the Federal Communications Commission declared that Hikvision services and equipment "pose an unacceptable risk to U.S. national security.” Market In June 2019, Hikvision was ranked 800th in the 2019 edition of Forbes Global 2000. As of 16 November 2016, Hikvision was also a constituent of the SZSE 100 Index, a blue chip index of the Shenzhen Stock Exchange, as well as the pan-China indexes CSI 300 Index, FTSE China A50 Index and Hang Seng China 50 Index. Ownership Hikvision was owned by China Electronics Technology HIK Group Co., Ltd. (HIK Group, ), a wholly owned subsidiary of China Electronics Technology Group, which has a 39.59% stake. China Electronics Technology Group is a state-run enterprise that is owned and supervised by the State-owned Assets Supervision and Administration Commission of the State Council. China Electronics Technology Group holds an additional 1.96% stake of Hikvision via its 52nd research institute (). The Chairman of Hikvision, Chen Zongnian (), is also the chairman and the Party Committee Secretary of HIK Group, and Head of the aforementioned research institute. the firm's largest individual shareholder was Vice Chairman Gong Hongjia with a 13% stake. As of 12 2019 Fidelity International was also a major investor in Hikvision. In 2017, the third largest shareholder was a private equity fund () which had a 7% stake, which is associated with then Hikvision general manager Hu Yangzhong. According to previous filing, "Xinjian Weixun" was also associated with Liu Xiang (), former director (from 2015 to March 2018) and former deputy general manager of Hikvision, then deputy general manager of HIK Group, chairman of sister listed company Phenix Optical. In 2017, the fourth largest shareholder was another private equity fund () which had a 2% stake. The fund was partly owned by Gong's wife Chen Chunmei () and aforementioned Hu Yangzhong. Hu Yangzhong also owned an additional 1.33% stake personally. To sum up, those shareholders owned a combined 65.71% stake. Lastly, Hong Kong Securities Clearing Company owned 9.77%, which was the nominees of the Shanghai-Hong Kong Stock Connect and Shenzhen-Hong Kong Stock Connect. In 2021, IPVM alleged that Hikvision was created and controlled by the Chinese government. Alleged attempts to conceal government ownership In 2015, IPVM criticized Hikvision for allegedly obscuring its Chinese government ownership. Jeffrey He, president of Hikvision North America, had criticized the online blogger site for allegedly seeking financial gain. Alan West, in a 2016 interview published by The Times (and re-published by The Australian), suggested that Hikvision's ownership raised ethical and security concerns when it came to the usage of Hikvision's products by the British government. Controversies Cybersecurity vulnerabilities In May 2017, seven series of Hikvision cameras were affected by an improper authentication vulnerability which, if exploited, could allow "a malicious attacker [to] escalat[e] his or her privileges or assum[e] the identity of an authenticated user and [obtain] sensitive data," according to the U.S. Cybersecurity and Infrastructure Security Agency. In May 2021, Italian public broadcaster RAI reported that Hikvision cameras automatically "opened communication channels with addresses registered in China" once connected to the internet. Hikvision declined to comment on the RAI investigation. In September 2021, Hikvision announced a command injection vulnerability with the CVE-ID CVE-2021-36260. Forbes reported that the vulnerability, which has a CVSS base score of 9.8 out of 10, left dozens of Hikvision camera models "susceptible to remote hijacking" without requiring a username or password. In 2022, Axios reported that Hikvision had hired FTI Consulting to conduct cybersecurity audits of its products. Involvement in Xinjiang internment camps In January 2019, the U.S. government began considering whether it should sanction Hikvision, which The Nation described as having "provided thousands of cameras that monitor mosques, schools, and concentration camps in Xinjiang." The U.S. government banned Hikvision from receiving federal government contracts in August 2019 due to security concerns. In October 2019, Hikvision was formally placed on the Entity List by the U.S. government for its role in surveillance of Uyghurs in Xinjiang and of other ethnic and religious minorities in China. In response to the bans and sanctions, Hikvision has hired former U.S. ambassador Pierre-Richard Prosper "to advise the company regarding human rights compliance" as well as numerous lobbyists, including former U.S. senators David Vitter and Barbara Boxer, former U.S. congressman Toby Moffett, and a former senior OFAC official. In April 2021, the European Parliament confirmed that it had removed Hikvision thermal cameras from its premises following the approval of an amendment sponsored by Dutch MEP Lara Wolters calling for the removal of "all of Hikvision’s thermal cameras from Parliament’s premises" due to "an unacceptable risk that Hikvision, through its operations in Xinjiang, is contributing to serious human rights abuses." In July 2021, the UK Foreign Affairs Select Committee published a report stating that Hikvision cameras "have been deployed throughout Xinjiang, and provide the primary camera technology used in the internment camps". Bans In January 2021, the United States of America banned government installations of information communication equipment from brands based in the People's Republic of China, including Hikvision, which was of particular concern due to its use by over 300 government agencies. In June 2021, 224 Hikvision products were banned for one year by South Korea's Ministry of Science and ICT over forged test reports. In September 2021, the Indian Navy's headquarters "asked its all formations to 'discontinue' procurement of CCTV cameras and surveillance systems from Hikvision," according to The Week. The Week also reported that the Indian Navy had ordered the replacement and destruction of its existing Hikvision cameras. Notes References Technology companies of China Companies listed on the Shenzhen Stock Exchange Companies in the CSI 100 Index Electronics companies of China Video surveillance companies Action cameras Camcorders Companies based in Hangzhou Technology companies established in 2001 Chinese brands Government-owned companies of China Defence companies of the People's Republic of China
43335266
https://en.wikipedia.org/wiki/Georgios%20Magklaras
Georgios Magklaras
Georgios (George) V. Magklaras (born in Agrinio, Greece) (Greek: ) is a computer scientist working as a Senior Computer Systems Engineer at the Norwegian Meteorological Institute, in Norway. He also co-founded Steelcyber Scientific, an information security based consultancy specialising in digital forensics. He is a High Performance Computing engineer and information security researcher. He developed methods in the field of insider IT misuse detection and prediction and digital forensics. He is the author of the LUARM and POFR tools for the Linux Operating System. He has been a strong advocate of Linux, Open Source tools and the Perl programming language and has given a series of lectures internationally in the fields of Intrusion Detection Systems, Digital forensics, Bioinformatics, Computer Programming and Systems Administration. Education Magklaras gained his BSc (Hons) in Computer Systems and Networks from the University of Plymouth, UK, where he graduated in 2000. He was then awarded an EPSRC scholarship to start the study of an MPhil (2005) degree in the area of Information Security, under the Faculty of Technology at the University of Plymouth, UK. Under the supervision of Prof. Steven M. Furnell at the School of Computing, University of Plymouth, UK], he completed his PhD study in the same area (Information Security) in 2012. Research and career His research was initially concerned with ways to classify computer security incident management responses. However, his attention was drawn to the problem of misuse detection. Magklaras developed one of the first methods to systematize the misuse detection and misuse prediction techniques. He captured the problem of insider IT misuse and set the theoretical and practical foundations for a generic architecture that facilitates misuse detection and misuse prediction. As part of this work, he wrote the LUARM tool which is a live/volatile digital forensics engine that targets misuse detection. The LUARM research prototype has already been used with success on a number of notable cases detecting insiders and external computer intrusion attempts, however its main usefulness as a research prototype is to create data sets for researchers to further understand the nature of insider threats. An evolved open source version of the tool, the Penguin OS Forensic Recorder POFR has been developed under his supervision by Steelcyber Scientific, an IT consulting firm that focuses on information security and scientific computing. This version contains performance, security and forensic data accuracy improvements over the originally developed LUARM prototype and is suitable for auditing various IT infrastructure components. Magklaras also pioneered the use of Domain Specific Languages in the field of misuse detection and prediction, in order to strengthen the data mining capabilities of information security researchers. His work on the Insider Threat Prediction and Specification Language (ITPSL) forms the only known XML based DSL language that attempts to produce semantics capable of combining techniques that mine and interpret misuse data with tags that provide the likelihood of a misuse threat occurring. Magklaras has also been involved in the construction of deep packet inspection infrastructures for several hardware/software vendors, although this work has not been presented on the public domain. He is a strong advocate of information privacy. He has performed security assessments of covid-19 mobile phone contact tracing applications. However, he has expressed critical views on how the mass media are covering the issue of electronic surveillance and has consulted for the Free Software Foundation on that matter. He has been an infrequent contributor of Black Hat Briefings and has participated (as part of a team) in various computer hacking challenges, including that of the GCHQ challenge in 2011. In the field of bioinformatics, Magklaras has contributed to the study of biological sequence databases and protein-to-protein interactions by mainly engineering software (algorithms, programming) to address these tasks. His is also known for his technical work in architectures that address the data storage volume and processing requirements of Next Generation Sequencing machines. Prior working at the Norwegian Meteorological Institute, Magklaras has worked in various technical and scientific positions for a number of companies and organisations, including those of the University of Oslo, Sequent Computer Systems, IBM UK and Tiscali. He has held a number of professional affiliations, including those of an IEEE affiliate member, USENIX, SAGE/LOPSA and Red Hat Certified Engineer. He has held the position of Secretary (since 2005) and Chair (2010-2015) of the Technical Management Project Committee of the EMBnet organization. References External links https://www.steelcyber.com/georgioshome/ https://www.researchgate.net/profile/George_Magklaras Greek computer scientists Alumni of the University of Plymouth Living people Year of birth missing (living people)
69916877
https://en.wikipedia.org/wiki/Junade%20Ali
Junade Ali
Junade Ali is a British computer scientist known for research in cybersecurity. Ali studied for a Master of Science degree aged 17 and was awarded Chartered Engineer status by 24. He started his research career working on the UK's Motorway Incident Detection and Automatic Signalling network and working on the maximum coverage problem in road traffic sensor placement. Ali later worked for cybersecurity firm Cloudflare as an engineering manager where he worked on developing network diagnostic tooling, a security operations center and safety-engineered natural language processing. In February 2018, Ali created the first Compromised Credential Checking protocol (using k-anonymity and cryptographic hashing) to anonymously verify whether a password was in a data breach without fully disclosing the searched password. This protocol was implemented as a public API and is now consumed by multiple websites and services, including password managers and browser extensions. This approach was later replicated by Google's Password Checkup feature and by Apple iOS. Ali worked with academics at Cornell University to develop new versions of the protocol known as Frequency Smoothing Bucketization (FSB) and Identifier-Based Bucketization (IDB). In March 2020, cryptographic padding was added to the protocol. Ali's research was praised in Canadian cryptographer Carlisle Adams book, Introduction to Privacy Enhancing Technologies. Ali conducts cybersecurity research on North Korea and provides expert commentary to journalists at NK News. In January 2022, Ali told journalists at NK News and Reuters that he had observed North Korea's internet being taken offline in a second major outage that month following a missile test, Ali told journalists that data he collected was consistent with a DDoS attack. South Korean Government officials responded by saying "we are monitoring the situation under coordination with relevant government agencies," without elaborating further. Wired journalist, Andy Greenberg, later confirmed the downtime resulted from an attack and reported that a single American hacker by the pseudonym P4x had shared evidence of his responsibility. Ali currently owns the technology consultancy, Tansume Limited where he consults for cybersecurity firm Risk Ledger and engineering productivity company Haystack Analytics. In July 2021, Ali commissioned a study by Survation for Haystack Analytics which found that 83% of software developers were suffering from burnout. The poll also found 57% of software engineers agreed "to a great extent" or "to a moderate extent" with the phrase "Software reliability at my workplace concerns me". Ali claimed this was "the first time representative opinion polling was used to understand software engineers." During the COVID-19 pandemic, Ali worked on security improvements to the (Google/Apple) Exposure Notification system used to create public health contact tracing apps. Selected Publications Li, L., Pal, B., Ali, J., Sullivan, N., Chatterjee, R. and Ristenpart, T., 2019, November. Protocols for checking compromised credentials. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 1387–1403). Ali, J. and Dyo, V. (2020). Practical Hash-based Anonymity for MAC Addresses. In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications - SECRYPT, ISBN 978-989-758-446-6; ISSN 2184-7711, pages 572–579. DOI: 10.5220/0009825105720579. Ali, J. and Dyo, V., 2021, January. Cross hashing: Anonymizing encounters in decentralised contact tracing protocols. In 2021 International Conference on Information Networking (ICOIN) (pp. 181–185). IEEE. Pikies, M. and Ali, J., 2019, April. String similarity algorithms for a ticket classification system. In 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT) (pp. 36–41). IEEE. Ali, J. and Dyo, V. (2017). Coverage and Mobile Sensor Placement for Vehicles on Predetermined Routes: A Greedy Heuristic Approach. In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 5: WINSYS, (ICETE 2017) ISBN 978-989-758-261-5, pages 83–88. Ali, J. (2016). Mastering PHP Design Patterns (book). Packt Publishing Ltd. Ali, J. and Pikies, M. (2019). Password Authentication Attacks at Scale. The 6th International Conference on Advanced Engineering – Theory and Applications 2019. References Living people Computer security specialists British software engineers 1996 births
422461
https://en.wikipedia.org/wiki/Queen%20Mary%20University%20of%20London
Queen Mary University of London
Queen Mary University of London (QMUL, or informally QM) is a public research university in London, England, and a member institution of the federal University of London. It dates back to the foundation of London Hospital Medical College in 1785. Queen Mary College, named after Mary of Teck, was admitted to the University of London in 1915 and in 1989 merged with Westfield College to form Queen Mary and Westfield College. In 1995 Queen Mary and Westfield College merged with St Bartholomew's Hospital Medical College and the London Hospital Medical College to form the School of Medicine and Dentistry. Queen Mary has five campuses across East and Central London in Mile End, Whitechapel, Charterhouse Square, Lincoln's Inn Fields and West Smithfield, as well as an international presence in China, France, Greece and Malta. The Mile End campus is the largest self-contained campus of any London-based Russell Group university. In 2018/19 the university had around 26,000 students. Queen Mary is organised into three faculties – the Faculty of Humanities and Social Sciences, the Faculty of Science and Engineering and Barts and The London School of Medicine and Dentistry. Queen Mary is a member of the Russell Group of British research universities, the Association of Commonwealth Universities and Universities UK. Queen Mary is a major centre for medical teaching and research and is part of UCLPartners, the world's largest academic health science centre. Queen Mary runs programmes at the University of London Institute in Paris, taking over the functions provided by Royal Holloway. Queen Mary also collaborates with University of London to offer its Global MBA program. For 2020–21, Queen Mary had a turnover of £512.5 million, including £114.7 million from research grants and contracts. Queen Mary has produced many notable alumni in various fields of work and study around the world with several alumni having become notable leaders in their respective fields including politics, as heads of state, science, academia, law, history, business, technology, and diplomacy. There are nine Nobel Laureates amongst Queen Mary's alumni, current and former staff. Notable alumni include Ronald Ross, who discovered the origin and cure for malaria, Davidson Nicol, who discovered the breakdown of insulin in the human body, British politician Peter Hain, and Professor Andrew Pollard the chief investigator of the Oxford–AstraZeneca COVID-19 vaccine. History St Bartholomew's Hospital Medical College and the London Hospital Medical College The Medical College of the Royal London Hospital (now part of the Faculty of Medicine and Dentistry) was England's first medical school when it opened in 1785. In 1850, Elizabeth Blackwell became the first fully qualified female doctor in the UK, after training at St Bartholomew's Hospital. People's Palace The predecessor to Queen Mary College was founded in the mid-Victorian era as a People's Palace when growing awareness of conditions in London's East End led to drives to provide facilities for local inhabitants, popularised in the 1882 novel All Sorts of Conditions of Men – An Impossible Story by Walter Besant, which told of how a rich and clever couple from Mayfair went to the East End to build a ”Palace of Delight, with concert halls, reading rooms, picture galleries, art and designing schools." Although not directly responsible for the conception of the People's Palace, the novel did much to popularise it. The trustees of the Beaumont Trust, administering funds left by Barber Beaumont, purchased the site of the former Bancroft's School from the Drapers' Company. On 20 May 1885 the Drapers' Court of Assistants resolved to grant £20,000 "for the provision of the technical schools of the People's Palace." The foundation stone was laid on 28 June 1886 and on 14 May 1887 Queen Victoria opened the palace's Queen's Hall as well as laying the foundation stone for the technical schools in the palace's east wing. The technical schools were opened on 5 October 1888, with the entire palace completed by 1892. However others saw the technical schools as one day becoming a technical university for the East End. In 1892 the Drapers' Company provided £7,000 a year for ten years to guarantee the educational side income. East London College In 1895 John Leigh Smeathman Hatton, director of evening classes (1892–1896; later director of studies 1896–1908 and principal 1908–1933), proposed introducing a course of study leading to the Bachelor of Science degree of the University of London. By the start of the 20th century, the first degrees were awarded and Hatton, along with several other professors, were recognised as teachers of the University of London. In 1906 an application for Parliamentary funds "for the aid of Educational Institutions engaged in work of a University nature", led to the college being admitted on an initial three-year trial basis as a school of the University of London on 15 May 1907 as East London College. Teaching of aeronautical engineering began in 1907, which led to the first UK aeronautical engineering department being established in 1909, boasting a ground-breaking wind tunnel and creating what became (following the demise of the University of Paris) the oldest aeronautical programme in the world. In 1910 the College's status in the University of London was extended for a further five years, with unlimited membership achieved in May 1915. During this period the organisation of the governors of the People's Palace was rearranged, creating the separate People's Palace Committee and East London College Committee, both under the Palace Governors, as a sign of the growing separation of the two concepts within a single complex. During the First World War, the college admitted students from the London Hospital Medical College who were preparing for the preliminary medical examination, the first step in a long process that would eventually bring the two institutions together. After the war, the College grew, albeit constrained by the rest of the People's Palace to the west and a burial ground immediately to the east. In 1920 it obtained both the Palace's Rotunda (now the Octagon) and rooms under the winter gardens at the west of the palace, which became chemical laboratories. The college's status was also unique, being the only School of the University of London that was subject to both the Charity Commissioners and the Board of Education. In April 1929 the College Council decided it would take the steps towards applying to the Privy Council for a Royal Charter, but on the advice of the Drapers' Company first devised a scheme for development and expansion, which recommended amongst other things to re-amalgamate the People's Palace and the College, with guaranteed provision of the Queen's Hall for recreational purposes, offering at least freedom of governance if not in space. Queen Mary College In the early hours of 25 February 1931 a fire destroyed the Queen's Hall, though both the college and the winter gardens escaped. In the coming days discussions on reconstruction led to the proposal that the entire site be transferred to the college which would then apply for a charter alone. The Drapers' Company obtained St Helen's Terrace, a row of six houses neighbouring the site, and in July 1931 it was agreed to give these over to the People's Palace for a new site adjacent to the old, which would now become entirely the domain of the college. Separation was now achieved. The Charter was now pursued, but the Academic Board asked for a name change, feeling that "East London" carried unfortunate associations that would hinder the college and its graduates. With the initial proposed name, "Queen's College", having already been taken by The Queen's College, Oxford and "Victoria College" felt to be unoriginal, "Queen Mary College" was settled on. The Charter of Incorporation was presented on 12 December 1934 by Queen Mary herself. Under the charter During the Second World War, the college was evacuated to Cambridge, where it shared with King's College. After the war the College returned to London, facing many of the same problems but with prospects for westward expansion. The East End had suffered considerable bomb damage (although the college itself had incurred little) and consequently several areas of land near to the college site now became vacant. New buildings for physics, engineering, biology and chemistry were built on the new sites, whilst the arts took over the space vacated in the original building, now renamed the Queens' Building. Limited accommodation resulted in the acquisition of further land in South Woodford (now directly connected to Mile End tube station by means of the Central line's eastward extension), upon which tower blocks were established. The college also obtained the Co-operative Wholesale Society's clothing factory on the Mile End Road which was converted into a building for the Faculty of Laws (and some other teaching), as well as the former headquarters of Spratt's Patent Ltd (operators of the "largest dog biscuit factory in the world" – see Spratt's Complex) at 41–47 Bow Road, which was converted into a building for the Faculty of Economics founded by Maurice Peston, Baron Peston. Both faculties were physically separated from what was now a campus to the west. From the mid-1960s until the mid-1980s the college proposed to link with the London Hospital Medical College and St Bartholomew's Hospital Medical College with a joint facility in Mile End. A further link with both The London and St. Bartholomew's was made in 1974 when an anonymous donor provided for the establishment of a further hall of residence in Woodford, to be divided equally between Queen Mary College students and the two medical colleges. At the start of the 1980s changing demographics and finances led to a reorganisation of the University of London. At Queen Mary some subjects, such as Russian and Classics were discontinued, whilst the college became one of five in the University with a concentration of laboratory sciences, including the transfer of science departments from Westfield College, Chelsea College, Queen Elizabeth College and Bedford College. 1989 to 2010 In 1989 Queen Mary College (informally known as QMC) merged with Westfield College to form Queen Mary & Westfield College (often abbreviated to QMW). Over subsequent years, activities were concentrated on the Queen Mary site, with the Westfield site eventually sold. In 1990, the London Hospital was renamed the Royal London Hospital, after marking its 250th year, and a re-organisation of medical education within the University of London resulted in most of the free-standing medical schools being merged with existing large colleges to form multi-faculty institutions. In 1995 the London Hospital Medical College and St Bartholomew's Hospital Medical College merged into Queen Mary & Westfield College to form an entity named Barts and The London School of Medicine and Dentistry. In 2000 the college changed its name for general public use to Queen Mary, University of London; in 2013, the college legally changed its name to Queen Mary University of London. The VISTA telescope is a 4-metre class wide-field telescope at the Paranal Observatory in Chile that was conceived and developed by a consortium of UK universities led by Queen Mary University, costing approximately £36m. The Westfield Student Village opened in 2004 on the Mile End Campus, bringing over 2,000 rooms to students and a huge array of facilities, restaurants, and cafes. The Blizard Building, home to the Medical School's Institute of Cell and Molecular Science opened at the Whitechapel campus in 2005. The award-winning building was designed by Will Alsop, and is named after William Blizard, an English surgeon and founder of the London Hospital Medical College in 1785. The year 2006 saw the refurbishment of The Octagon, the original library of the People's Palace dating back to 1888. In 2007 parts of the School of Law – postgraduate facilities and the Centre for Commercial Law Studies – moved to premises in Lincoln's Inn Fields in central London. The Women at Queen Mary Exhibition was staged in the Octagon, marking 125 years of Westfield College and 120 years of Queen Mary College. In September 2009, the world's first science education centre located within a working research laboratory opened at the Blizard Institute of Cell and Molecular Science, hoping to inspire children with school tours and interactive games and puzzles. 2010 to present Queen Mary became one of the few university-level institutions to implement a requirement of the A* grade at A-Level after its introduction in 2010 on some of their most popular courses, such as Engineering, Law, and Medicine. Following on from the 2010 UK student protests, Queen Mary set fees of £9,000 per year for September 2012 entry, while also offering bursaries and scholarships. On 12 March 2012 it was announced that Queen Mary would be joining the Russell Group in August 2012. Later in March, Queen Mary and the University of Warwick announced the creation of a strategic partnership, including research collaboration, joint teaching of English, history and computer science undergraduates, and the creation of eight joint post-doctoral research fellowships. In January 2013, Queen Mary established the world's first professorial chair in animal replacement science. From 2014, Queen Mary began awarding its own degrees, rather than those of the University of London. Queen Mary became the first Russell Group university to offer Degree Apprenticeships and three years later was the first UK university to launch a social change degree, the BSc in Chartered Manager Degree Apprenticeship. In 2021, Queen Mary became the first UK university to receive the Platinum-level Engage Watermark from the National Co-ordinating Centre for Public Engagement. Campuses The main Mile End campus contains the Faculty of Humanities and Social Sciences, the Faculty of Science and Engineering, the Queens' Building, the main college library, the student union, Draper's bar and club, several restaurants, a number of halls of residences and a gym. The educational and research sites of the Arts Research Centre, Computer Science, the large Engineering building, G.E. Fogg Building, Francis Bancroft Building, G. O. Jones Building, Joseph Priestley Building, Lock-keeper's Graduate Centre, and the Mathematical Science Building, are all located within the Mile End campus. The Grade II listed Queens' Building is home to the Octagon. Built in 1887, the Octagon was originally the Queen Mary University of London library. It was designed by architect ER Robson and inspired by the British Museum Reading Room. In 2006, "brightly coloured leather bound books" were restored and reinstated to the bookshelves, along with "busts of famous literati looking down from the beautiful high domed ceiling." While the People's Palace is home to the Grade II listed Great Hall. The art deco style Great Hall has a seating capacity of over 700 and standing of 1,000. It is complemented by 3 lecture theatres and a foyer. The Whitechapel campus encompasses the Faculty of Medicine and Dentistry, the Whitechapel Medical Library, the award-winning Blizard Institute of Cell and Molecular Science, and the Royal London Hospital. The West Smithfield campus of the Faculty of Medicine and Dentistry, the West Smithfield Medical Library, the Wolfson Institute of Preventive Medicine, the John Vane Science Centre, the Heart Centre and St Bartholomew's Hospital are based in Smithfield. The Centre for Commercial Law Studies and LLM teaching and postgraduate law research activities are based in Lincoln's Inn Fields in Holborn. The Malta campus, situated on the island of Gozo, is part of the Faculty of Medicine and Dentistry. Students taught at the Malta campus are offered the same curriculum as taught in London, for the MBBS Medicine and Medicine Foundation programmes. Harold Pinter Drama Studio The Harold Pinter Drama Studio is the main teaching and performance space of the students and staff of the Department of Drama. On 26 April 2005, Harold Pinter, who was to win the Nobel Prize in Literature later that year, gave a public reading and was interviewed by his official authorised biographer, Michael Billington, in the studio named for Pinter and located as part of the Faculty of Arts (Department of Drama, School of English and Drama) in the Mile End campus, to celebrate its refurbishment. Organisation and administration Queen Mary and Westfield College was established by Act of Parliament and the granting of a Royal charter in 1989, following the merger of Queen Mary College (incorporated by charter in 1934) and Westfield College (incorporated in 1933). The Charter has subsequently been revised three times: in 1995 (as a result of the merger of the College with the Barts and the London School of Medicine and Dentistry); in 2008 (as a result of the Privy Council awarding the College Degree Awarding Powers; and in July 2010 (following a governance review). Schools, faculties and departments There are three faculties and an interdisciplinary life sciences institute. These are split further into independent schools, institutes, and departments: Faculty of Humanities and Social Sciences School of Business and Management School of Economics and Finance School of English and Drama School of Languages, Linguistics and Film School of Geography Global Shakespeare (in partnership with the University of Warwick) School of History School of Law Centre for Commercial Law Studies Department of Law School of Politics and International Relations Faculty of Medicine and Dentistry Barts Cancer Institute The Blizard Institute Institute of Dentistry Institute of Health Sciences Education William Harvey Research Institute Wolfson Institute of Preventive Medicine The Centre of the Cell Faculty of Science and Engineering Institute of Bioengineering School of Biological and Chemical Sciences School of Electronic Engineering and Computer Science School of Engineering and Materials Science School of Mathematical Sciences School of Physics and Astronomy Materials Research Institute (MRI) Life Sciences Institute Centre for Computational Biology Centre for Genomic Health Centre for Mind in Society Institute of Bioengineering Central administration Queen Mary is an 'exempt charity' under the Charities Act 1993. The Higher Education Funding Council for England has been Queen Mary's principal regulator since June 2010. Finances In the financial year ended 31 July 2011, Queen Mary had a total income (including share of joint ventures) of £297.1 million (2009/10 – £289.82 million) and total expenditure of £295.35 million (2009/10 – £291.56 million). Key sources of income included £100.02 million from funding body grants (2009/10 – £103.97 million), £82.8 million from tuition fees and education contracts (2009/10 – £76.22 million), £73.66 million from research grants and contracts (2009/10 – £68.47 million) and £1.17 million from endowment and investment income (2008/09 – £1.48 million). During the 2010/11 financial year Queen Mary had a capital expenditure of £42.53 million (2009/10 – £45.61 million). At year end Queen Mary had endowments of £33.59 million (2009/10 – £29.95 million) and total net assets of £300.79 million (2009/10 – £291.38 million). Queen Mary offers several packages of bursaries and scholarships, many of which are aimed at supporting undergraduate students from low income households. In 2017/18, 5,215 students were awarded a Queen Mary Bursary worth £7,724,401, 53 students received Science and Engineering Excellence Scholarships worth £157,500 and 21 students received Economics and Finance Excellence Scholarships worth £63,000. Academic profile Around 26,000 students study at the 21 academic schools and institutes, with over 40 percent coming from overseas, representing over 170 different nationalities. Queen Mary awarded over £2 million in studentships to prospective postgraduate students for the 2011/12 academic year. Research QMUL was ranked joint 9th in the UK amongst multi-faculty institutions for the quality (GPA) of its research. In the 2014 Research Excellence Framework it was 20th for its Research Power, fifth in the UK for the quality of research outputs and the Linguistics department was ranked first in the UK. In the UK Research Assessment Exercise results published in December 2008, Queen Mary was placed 11th according to an analysis by The Guardian newspaper and 13th according to The Times Higher Education Supplement, out of the 132 institutions submitted for the exercise. The Times Higher commented "the biggest star among the research-intensive institutions was Queen Mary, University of London, which went from 48th in 2001 to 13th in the 2008 Times Higher Education table, up 35 places." The QS World University Rankings 2019 ranked Queen Mary third in the world for research citations for the subject of medicine. The growth and strength of research at the college was rewarded with an invitation to join the Russell Group of research-intensive universities in the UK in 2012. The university is also a member of the Screen Studies Group, London. Other research highlights include an international team of scientists, led by astronomers at Queen Mary, discovering a planet orbiting Proxima Centauri, the closest star to the Solar System. In 2018, a project involving Queen Mary researchers reached its goal of sequencing 100,000 whole genomes from National Health Service patients. Libraries Queen Mary's main library is located on the Mile End campus where most subjects are represented. It also has two medical libraries in Whitechapel and West Smithfield. Usual opening hours are 8am to midnight. Since September 2017, the Mile End Library has been open 24 hours a day, 7 days a week during term time (including bank holidays). As members of a college of the University of London, students at Queen Mary have access to Senate House Library, shared by other colleges such as King's College London and University College London, in addition to library access throughout most of the individual University of London colleges, subject to approval at the given University. Partnerships Queen Mary offers a joint degree programme with Beijing University of Posts and Telecommunications. This was the first of its kind to be approved by the PRC Ministry of Education, it is taught 50% by each institution in English. In Beijing staff from Queen Mary teach part of the programme and the students receive two degrees, one from each university. The programmes are in Telecommunications and Management and Ecommerce Engineering and Law. Almost 2,000 students are studying on these programmes in 2009 and the first cohort graduated in the Summer of 2008. The joint programmes have been praised by the UK Quality Assurance Agency; the PRC Ministry of Education; and the UK Institution of Engineering and Technology. Queen Mary collaborated with Royal Holloway to help run programmes at the University of London Institute in Paris (ULIP) which is a central academic body of the University of London located in Paris, France, enabling undergraduate and graduate students to study University of London ratified French Studies degrees in France. From September 2016, Queen Mary took over the functions provided by Royal Holloway and all students are now considered registered students of Queen Mary. Queen Mary provides academic guidance for the Global Master of Business Administration degree offered by the University of London's distance learning. Queen Mary is a founding partner in UCLPartners, an academic health science centre located in London. Queen Mary joined UCLPartners in 2011. Admissions In terms of average UCAS points of entrants, Queen Mary ranked 32nd in Britain in 2014. The university gives offers of admission to 43.6% of its applicants, the 12th lowest amongst the Russell Group. According to the 2017 Times and Sunday Times Good University Guide, approximately 12% of Queen Mary's undergraduates come from independent schools. In the 2016–17 academic year, the university had a domicile breakdown of 68:10:22 of UK:EU:non-EU students respectively with a female to male ratio of 54:46. Rankings and reputation World In the 2021 QS World University Rankings Queen Mary ranked 114th worldwide. Times Higher Education World University Rankings 2021 ranked Queen Mary 110th in the world. Academic Ranking of World Universities 2020 ranks Queen Mary between 201 and 300 in the world. The university was ranked 51st in the world in the CWTS Leiden Ranking 2018. 2021 U.S. News & World Report ranks Queen Mary as 114th in the world. Europe Queen Mary was ranked 11th in Europe in the CWTS Leiden Ranking 2016. The university was ranked 47th in the 2017 U.S. News & World Report Best Global Universities in Europe. 2017 Times Higher Education ranked Queen Mary equal 46th among European universities. Subject In 2019, QS World Universities ranked both the schools of Law and English Literature and Language 32nd in the world, with the schools of Geography, History, Linguistics and Medicine all making top 100. In 2020, Law at Queen Mary University of London was ranked 30th in the world and 7th in the UK. The Faculty of Medicine and Dentistry has been ranked as the 15th best medical school in the UK by The Guardian and, globally, is ranked 9th by the QS World University Rankings. According to Times Good University Guide 2020 strong subject areas for Queen Mary University are Dentistry (5), Medicine (8), Materials Technology (11) and Drama, Dance and Cinematics (17). The Guardian in 2018 ranked the School of Law as 3rd best in the UK. Several other departments within the university are also internationally respected. Among them are the School of Economics and Finance, the School of Politics and International Relations and the School of Engineering and Material Sciences. National Queen Mary ranks 8th in the UK in the CWTS Leiden Ranking 2016. Queen Mary ranks 13th in the U.S. News & World Report Best Global Universities in the United Kingdom, and 5th in London. In Times Higher Education Best universities in the UK 2017, it has been ranked 15th. The Guardian ranks Queen Mary in the University league tables 2017 1st for Media & Film Studies, 2nd for Medicine in the UK, 3rd in the UK for Dentistry, 9th for History in the UK, 5th for Law in the UK. The Complete University Guide 2019 ranks Queen Mary 38th overall. The 2014 Research Excellence Framework ranked Queen Mary equal 9th with the University of Edinburgh and University of Bristol. Queen Mary students feature in the top 10 in the UK for graduate starting salaries, according to The Times and Sunday Times University League Table 2016. Student life Queen Mary Students' Union Queen Mary Students' Union (QMSU) unites the various clubs and societies of Queen Mary. The union is based at the recently refurbished Students' Hub. The elected representatives within the union are made up of a president and three vice-presidents. The union mascot is a leopard called Mary. SU facilities and publications Qmotion (Gym/Fitness Centre) Drapers Bar Ground The Learning Cafe Infusion Shop The Print (newspaper) CUB (magazine) Quest (radio) Queen Mary Theatre Company QMTV (television) Students' Union Hub The Students' Union Hub replaces the previous office called the Blomley Centre. It is named after a former President and VP Education, Laura Blomeley, who completed her term in office with terminal cancer. In remembrance of her commitment to QMSU, two key rooms in the new Students' Union Hub have been named after her. Sports The Merger Cup is a series of annual sporting fixtures played between Queen Mary and Barts London sports clubs. The event has taken place since the merger of the two institutions in 1995. The results of a number of matches normally played on the same day are combined to determine the overall winner. Sporting fixtures include badminton, basketball, football, hockey, netball, rugby, squash, swimming, tennis and rowing. In recent times Queen Mary have won the cup in 2005, 2006, 2007 and 2008. 2009 saw the cup return to the medical school with a 9–7 victory over Queen Mary, but a close 10–9 win brought it back to Queen Mary in 2010. In 2011, Barts & The London were Merger Cup winners. In 2012 QM won with a 15–7 defeat of BL, QM were also victorious in 2013. In 2014 Barts dominated 29–24, winning most major sports in the process. In 2016, Barts won against Queen Mary 67–37. The university has an alumni football club, Queen Mary College Old Boys FC, which was founded in 1989 and maintains close links with university. The club has three teams and competes in the Amateur Football Combination The club's 1st XI won four league titles in five seasons, including two league and London Old Boys Cup doubles Student housing Many Queen Mary students are accommodated in the college's own halls of residence or other accommodation; students are also eligible to apply for places in the University of London intercollegiate halls of residence, such as Connaught Hall. Most students in college or university accommodation are first-year undergraduates or international students. The majority of second and third-year students and postgraduates find their own accommodation in the private sector. Undergraduate The College's Westfield Student Village, situated in the north-east corner of the Mile End Campus, has en-suite, self-catering housing for 1,195 students, staff and academic visitors in six contemporary buildings. A shop, laundrette, café bar, 200-seat restaurant and central reception (staffed 24 hours a day), and a communal area situated adjacent to the Regents canal, form part of the Village development. Rooms are arranged in flats and maisonettes housing between four and eleven students. Undergraduate student housing at Queen Mary includes: Albert Stern House – Located next to Ifor Evans at the western end of the main Queen Mary campus. Beaumont Court – Housing for 167 first year, associate and foundation students in maisonettes and flats. Located opposite Sir France House and adjacent to Creed Court. Sir Christopher France House – Situated on the bank of the Regents canal, flats in this building have full en-suite facilities. Creed Court – Housing for 124 postgraduate students in 10 maisonettes and 12 flats. Located opposite Sir France House and adjacent to Beaumont Court. Ifor Evans – Located at the western end of the campus. Lindop House – A residential development situated directly opposite the Queens' Building. Housing for 74 first year undergraduate, mostly medics, and foundation students in single rooms in 11 six-person flats and 2 four-person flats. Maurice Court – containing 12 maisonettes and 18 flats for up to 173 first year students. Located at the rear of Creed and Beaumont Courts and very close to Mile End Hospital. Maynard & Varey Houses – Two buildings housing 200 first year undergraduate, associate and foundation students. Situated in Westfield Way at the eastern end of the Mile End campus directly opposite the College's Chemistry and IT Resource Centre. Pooley House – Located at the far end of the campus, providing housing for 378 first year, associate and foundation students in 48 flats. The largest building in the village development. Richard Feilden House – Housing for 200 first year, associate and foundation students. The Curve, a 200-seat restaurant is situated on the ground floor. Opened in 2007, it is the newest dwelling in the Village and is situated opposite the Joseph Priestley Building. Postgraduate Postgraduate student housing at Queen Mary includes: Chapman, Chesney and Selincourt – Four residences situated in Westfield Way, at the eastern end of the Mile End campus adjacent to the Regents Canal. 94 single en-suite rooms for final year undergraduate and new postgraduate students Dawson Hall – Located near Barbican tube station in the City of London and set around lawns and trees on the college's Charterhouse campus, close to St Bartholomew's Hospital. Provides single rooms for 207 medical and dental students and medical based postgraduates. Floyer House – Houses 145 medical and dental students and medical based postgraduates, located close to the London Hospital and Dental Institute at the College's Whitechapel campus. Hatton House – Situated in Westfield Way at the eastern end of the Mile End campus. Rooms are furnished and have full en-suite facilities. Notable people Notable alumni Notable academics Notable current and former staff of Queen Mary include: John Abernethy – British surgeon, lecturer of St. Bartholomew's Hospital; founder of the Medical College of St Bartholomew's Hospital Edgar Andrews – British physicist and engineer (founded the Department of Materials at Queen Mary in 1967) Keith Ansell-Pearson – British philosopher W. Ross Ashby – British psychiatrist and pioneer in cybernetics, the study of complex systems Rosemary A. Bailey – British mathematician Tim Bale – British political scientist Ted Bastin – British physicist and mathematician Sir Christopher Bayly – British historian William Bonfield – British material scientist, and Emeritus Professor of Medical Materials in the University of Cambridge Patrick Boyle British Financier, lecturer QMUL School of Economics and Finance; founder of Palomar Capital Management; Author Donald Bradley – British chemist Peter Cameron – Australian mathematician Bernard Carr – British mathematician and astronomer John Dennis Carthy – British zoologist Lorna Casselton – British biologist Lars Chittka – German biologist, founded the Department of Psychology at Queen Mary in 2007 Peter Clarricoats – British microwave engineer Roger Cotterrell – British legal scholar Philip Cowley – British political scientist Sir Ross Cranston – British lawyer, High Court judge, formerly academic lawyer and Labour Party politician David Currie, Baron Currie of Marylebone – British economist specialising in regulation, and a cross-bench member of the House of Lords Michael Dewar – British chemist Alan Deyermond – British historian Patrick Diamond – British policy advisor Toby Dodge – British political scientist Sebastian Doniach – British-American physicist and professor at Stanford University Graham Dorrington – British aeronautical engineer, subject of The White Diamond David Drewry – British glaciologist and geophysicist Michael Duff – British physicist Peter Duffy – British barrister Sir William Ellison-Macartney – Irish/British Governor of the People's Palace and Governor of Tasmania Sir Edward Frankland – British chemist Felipe Fernández-Armesto – British historian Daniel Friedmann – Israeli lawyer, Minister of Justice of Israel, 2007–2009 Robin Ganellin – British chemist Sir Archibald Garrod – British physician who pioneered the field of inborn errors of metabolism Samuel Gee – British physician and paediatrician; published the first complete modern description of the clinical picture of coeliac disease Dame Hazel Genn – British legal scholar, Dean of the Faculty of Laws and Professor of Socio-Legal Studies at University College London Trisha Greenhalgh – British medical doctor Karl W. Gruenberg – British mathematician Sanjeev Goyal – Indian economist Michael Green – British physicist William Harvey – British physician at Barts; discovery of circulation of blood Eric Heinze – British legal scholar Peter Hennessy, Baron Hennessy of Nympsfield – British historian, and a cross-bench member of the House of Lords Marian Hobson – British academic, Professor of French George Hockham – British engineer, co-pioneer of optical fibres for long-distance communications systems Tristram Hunt – British politician and historian Julian Jackson – British historian Ian Jacobs – British academic, Professor of Gynaecological Cancer Lisa Jardine – British academic, Professor of Renaissance Studies Jeremy Jennings – British academic, Professor of Political Theory Mark Jerrum – British computer scientist and computational theorist Colin Jones – British academic, Professor of History Gwyn Jones – British physicist and curator, Professor of Physics Ajay Kakkar, Baron Kakkar – British surgeon, Professor of Surgery at University College London, and a cross-bench member of the House of Lords Peter Kalmus – British academic, Emeritus Professor of Physics Annette Kuhn – British academic, Emeritus Professor of Film Studies Peter Landin – British academic, Professor of Theoretical Computer Science Vito Latora – British mathematician Sidney Lee – British academic, Professor of English Mario Vargas Llosa – Peruvian writer, politician, and recipient of the 2010 Nobel Prize in Literature H. R. Loyn – British historian Sir Alistair MacFarlane – British electrical engineer Shahn Majid – British mathematician Ursula Martin – British computer scientist, the first female professor at the University of St Andrews since its foundation in 1411 Frederick Barton Maurice – British general and historian Michael Mingos – British chemist Elaine Murphy, Baroness Murphy – British politician, cross-bench member of the House of Lords; Professor of Old Age Psychiatry, Queen Mary University of London (1995–2006) William Odling – British chemist who contributed to the development of the periodic table Sir Richard Owen – British biologist, comparative anatomist and paleontologist Nicholas O'Shaughnessy – British academic, Professor of Marketing and Communication James Parkinson – British medical doctor, activist, discovered Parkinson's disease J. R. Partington – British chemist and historian of chemistry Ian C. Percival – British theoretical physicist Maurice Peston, Baron Peston – British academic, Professor of Economics, and a Labour Party member of the House of Lords Dame Lesley Rees – British academic, Emeritus Professor of Chemical Endocrinology John Rentoul – British journalist Harold Roper Robinson – British academic, Professor of Physics Jacqueline Rose – British academic, Professor of English Sir Joseph Rotblat – Polish physicist, Professor of Physics, St Bartholomew's Hospital Medical College (1950–76); awarded the 1995 Nobel Peace Prize for efforts toward nuclear disarmament Miri Rubin – British academic, Professor of Early Modern History Michael Russel geologist Charles Saumarez Smith – British art historian Denise Sheer – British academic, Professor of Human Genetics Quentin Skinner – British academic, Professor of the Humanities Sir Adrian Smith – British mathematician Trevor Arthur Smith, Baron Smith of Clifton – British politician and academic, and a Liberal Democrat member of the House of Lords Anne Szarewski, British cancer researcher Matthew H. Todd, Britist chemist David Turner – British computer scientist Sir John Vane – British pharmacologist, awarded the Nobel Prize in Physiology or Medicine in 1982 Karen Vousden – British academic, Professor of Genetics Sir Nicholas Wald – British medical researcher Sir Robert Watson – British academic, Professor of Environmental Science Martin Weale – British academic, Professor of Economics Lois Weaver – British academic, Professor of Contemporary Performance Glenn White – British Astronomer, Professor of Physics and Astronomy Robert Winston, Baron Winston – British academic, pioneer of in vitro fertilisation, and a Labour Party member of the House of Lords Sir Nicholas Wright – British academic, Professor of Histopathology, Barts and the London School of Medicine and Dentistry, Queen Mary University of London Alec David Young – British academic, Professor of Aeronautical Engineering Ken Young – British academic in public policy studies Nobel laureates To date, there have been nine Nobel laureates who were either students or academics at Queen Mary. Principals To date, Queen Mary has had a total of 22 principals (11 of Westfield College, eight of Queen Mary College, and three since the merger of Queen Mary, Westfield, and Barts). The current principal is Colin Bailey, a structural engineer, who became Principal in September 2017. Notes References Bibliography External links Queen Mary Students' Union website Queen Mary University of London student lists Queen Mary University of London military personnel,1914–1918 University of London Russell Group Educational institutions established in 1885 1885 establishments in England Grade II listed educational buildings Universities UK
1648429
https://en.wikipedia.org/wiki/Matthew%20James%20Higgins
Matthew James Higgins
Matthew James Higgins (4 December 1810 – 14 August 1868) was a British writer who used the nom-de-plume Jacob Omnium, which was the title of his first magazine article. He was born in County Meath, Ireland to a landed family. He owned an estate in British Guiana, which he visited twice. Higgins became well known for his aggressive, campaigning journalism. His first essay was a satire on dishonest business practices, entitled "Jacob Omnium, the Merchant Prince". It was published in New Monthly Magazine in 1845. Though the name was that of the villain, he adopted it as his main pen-name. Nevertheless he also used other names such as "Civilian", "Paterfamilias", "West Londoner", "Belgravian Mother", "Mother of Six" and "John Barleycorn". He was particularly active on behalf of sufferers from the Great Famine in 1847, demanding more decisive action and volunteering as an agent of the British Relief Association. His The real bearings of the West India question (1847) advocated support for West Indian plantation owners who, he argued, could not compete against slave-owning countries which bore no wage costs. He contributed regularly to the Peelite newspaper The Morning Chronicle and also to The Times, the Pall Mall Gazette and the Cornhill Magazine (under Thackeray's editorship). His letters in The Times were instrumental in exposing many abuses. Like his friend Thackerary, he was active in gentlemen's social clubs, being a member of many London clubs and societies, including the Philobiblon Society and the Cosmopolitan Club. He was married to Emily Joseph, daughter of Sir Henry Joseph Tichborne. Thackeray dedicated to him his novel The Adventures of Philip, and one of his ballads, Jacob Omnium's Hoss, deals with an incident in Higgins's career. Some of his articles were published in 1875 as Essays on Social Subjects. References External links 1810 births 1868 deaths British essayists
10393789
https://en.wikipedia.org/wiki/Cision
Cision
Cision Ltd. is a public relations and earned media software company and services provider. The company is incorporated in the Cayman Islands and headquartered in Chicago, Illinois; with clients worldwide. The company went public via reverse merger in June 2017. In addition to its web-based PR and earned media software as a service (SaaS) suite the Cision Communications Cloud, the company owns online publicity and media services PRNewswire, PRWeb, Bulletin Intelligence, , Help a Reporter Out (HARO), CEDROM-SNI, Prime Research, and Canada Newswire. The company operates in the United States, Canada, Europe and Asia. Company is led by Brandon Crawley, Interim CEO & Managing Director Platinum Equity. Products and services Cision provides public relations services to businesses, using a cloud-based, or software as a service (SaaS) model. The company offers social media monitoring and engagement and media publicity services. Cision's software is distributed in seven languages. , it is used by more than 16,000 annual subscribers worldwide, including commercial businesses and governmental, educational and non-profit organizations. Software The company offers three web-based packages: the "CisionMarketing Suite", the "Public Relations Suite" and a "Government Relations and Political Action Committee Suite". The Cision "Public Relations Suite" allows users to distribute press releases, access a database of bloggers and journalists, and monitor and analyze news and social media sites. The company's "Government Relations Suite" manages government contacts, analyzes lobbying activity, facilitates communication with elected officials and provides PAC compliance software for filing reports to the FEC and state elections commissions. Services Through a series of acquisitions, the company provides services in PRWeb, HARO, North Social, Eureka, and Media Insight Suite which Cision has continued to operate under the existing brand names. Vocus also offers consulting services to support the use of its software products. PRWeb is an online press release service. PRWeb services are available through the "Vocus Marketing Suite," the "Vocus PR Suite" or as a separate service. History In 2011, Cision AB sold its Finnish subsidiary Oy Cision Finland AB to M-Brain Group. On September 15, 2014, Cision announced the acquisition of Visible Technologies, a social media analytics company. On October 14, 2014, Cision AB and Vocus announced a "friendly merger" of the two public relations companies. Cision based in Sweden will relocate its headquarters to Chicago and so will Vocus from Maryland, United States. The company will be based out of Chicago and the combined entity will be known as Cision. During 2015, Cision also acquired UK company Gorkana. Gorkana offered monitoring, journalist database and analysis services. On December 15, 2015, Cision agreed to acquire PRNewswire from UBM plc for $841 million (approx. £575 million). On June 29, 2017, Cision went public via its reverse merger with special purpose acquisition company Capitol Acquisition Corporation III. On December 26, 2017, Cision agreed to acquire PRIME Research. The acquisition was completed on January 24, 2018. On January 31, 2020, Platinum Equity Completes $2.7 Billion Acquisition Of Cision Ltd. Cision is privately held company again. In September 2020, Cision named Abel Clark as CEO, replacing interim chief Brandon Crawley. Prior to the appointment, Clark was CEO of TruSight. Cision announced the acquisition of Brandwatch in February 2021 for $450 million. Brandon Crawley returned as interim CEO in February 2022. See also Viralheat Vocus (software) References External links Companies based in Chicago Marketing companies established in 1867 Companies listed on the New York Stock Exchange Public relations companies of the United States Multinational companies headquartered in the United States Press release agencies News agencies based in the United States Special-purpose acquisition companies
101629
https://en.wikipedia.org/wiki/University%20of%20Twente
University of Twente
The University of Twente (Dutch: Universiteit Twente; , abbr. ) is a public technical university located in Enschede, Netherlands. The university has been placed in the top 200 universities in the world by multiple central ranking tables. In addition, the UT was ranked the best technical university in The Netherlands by Keuzegids Universiteiten, the most significant national university ranking. The UT collaborates with Delft University of Technology, Eindhoven University of Technology and the Wageningen University and Research Centre under the umbrella of 4TU and is also a partner in the European Consortium of Innovative Universities (ECIU). History The university was founded in 1961 as Technische Hogeschool Twente or (THT). After Delft University of Technology and Eindhoven University of Technology, it became the third polytechnic institute in the Netherlands to become a university. The institution was later renamed to Universiteit Twente (University of Twente) in 1986, as the result of the changes in the Dutch Academic Education Act in 1984. The Dutch government's decision to locate the country's third technical university in Enschede, the main city of Twente, had much to do with the north-eastern province's rich manufacturing industry (textiles, metal, electrical engineering, chemicals). Another important consideration was the fact that the local economy needed a boost to compensate for the dwindling textile industry. Just as the fact that the municipality of Enschede made the Drienerlo estate available for the first campus University of the Netherlands. Campus The University of Twente was built on the former country estate of Drienerlo, situated between Hengelo and Enschede. The 140-hectare estate consists of woodland, meadows and water. Architects Van Tijen and Van Embden designed the first — and so far only — Dutch campus university along American lines where students and staff live, work and pursue their leisure activities on campus. The Student Union, which is run entirely by students, manages several premises, including the student social centre(de pakkerij) and study centre(Wallstreet) in Enschede and The Water sport complex on the Twentekannal. Rankings According to the Times Higher Education Ranking, the University of Twente is considered one of the 200 most prestigious universities globally. The university performed particularly strongly in the Industry, Innovation and Infrastructure 2021 ranking. Here, the university was ranked eleventh in the world rankings. At the same time, psychology and social sciences also performed well, receiving 101-125 in the world rankings. In the Shanghai Ranking 2021, the University of Twente's Geoinformation and Earth Observation Sciences were awarded. In the field of remote sensing, the university landed among the top ten universities in the world. The commitment in this area will be further expanded in the coming years. According to Keuzegids Universiteiten, the most significant national university ranking, the University of Twente is the best technical university in the Netherlands. Organization Administration The current director of the university is professor Thom Palstra. The other two members of the executive board are Victor van der Chijs (president executive board) and Mirjam Built-Spiering (vice-president) Faculties There are five faculties at the University of Twente; each faculty is in turn organized into several departments: Behavioural, Management and Social Sciences (BMS) – i.a. Communication studies, psychology, public administration, educational science & technology, European studies, environmental & energy management and Risk management Engineering Technology (ET) – i.a. Mechanical engineering, civil engineering, industrial design engineering and sustainable energy technology. Electrical Engineering, Mathematics and Computer Science (EEMCS) – i.a. Electrical engineering, applied mathematics, interaction technology, internet science & Technology and computer science. Science and Technology (ST) – i.a. Chemical engineering, applied physics, biomedical engineering, health sciences, advanced technology and nanotechnology. Faculty of Geo-information Sciences and Earth Observation (ITC) – i.a. spatial engineering, cartography, geo-information science & earth observation. Next to the programmes administered by the faculties mentioned above, University College Twente offers the broad honours BSc programme in Technology and Liberal Arts and Sciences, or ATLAS for short, and the Twente Graduate School offers post graduate education (PhD and PDEng). Since 2019, this study is part of the faculty ITC. Bachelor's and Master's Degrees The University of Twente has the following faculties with corresponding bachelor- and master programmes: BMS (Behavioural, Management & Social Sciences) Bachelor programmes Communication Science Educational Science and Technology Industrial Engineering and Management International Business Administration Management, Society & Technology Psychology Master programmes Business Administration Communication Science Educational Science and Technology European Studies (incl. Double Diploma) Leraar VHO Maatschappijleer en Maatschappijwetenschappen Industrial Engineering and Management Psychology Philosophy of Science, Technology and Society Public Administration Science Education and Communication Environmental and Energy Management Research Master Methodology and Statistics for the BBSS ET (Engineering Technology) Bachelor programmes Civil Engineering Industrial Design Engineering Mechanical Engineering Master programmes Civil Engineering and Management Construction Management and Engineering Industrial Design Engineering Mechanical Engineering Sustainable Energy Technology EEMCS (Electrical Engineering, Mathematics & Computer Science) (a.k.a. EWI) Bachelor programmes Applied Mathematics Business & IT Technical Computer Science Creative Technology Electrical Engineering Master programmes Applied Mathematics Business Information Technology Computer Science Electrical Engineering Embedded Systems Interaction Technology Systems and Control Internet Science and Technology ST (Science and Technology) (a.k.a. TNW) Bachelor programmes Applied Physics (Dutch, Technische Natuurkunde) Chemical Science & Engineering Biomedical Engineering (Dutch, Biomedische technologie) Technical Medicine (Dutch, Technische geneeskunde) Advanced Technology Health Sciences (Dutch, Gezondheidswetenschappen) Master programmes Applied Physics Biomedical Engineering Chemical Engineering Nanotechnology Technical Medicine Health Sciences ITC (International Institute for Geo-Information Science and Earth Observation) Bachelor programmes Technology and Liberal Arts & Sciences (ATLAS) Master programmes Geo-information Science and Earth Observation Spatial Engineering Geographical Information Management and Applications Academics Research Research institutes MESA+ Institute for Nanotechnology TechMed Centre Digital Society Institute (DSI) Knowledge and research centres Center for Philosophy of Technology and Engineering Science (CEPTES) Center for European Studies (CES) Center for Higher Education Policy Studies (CHEPS) Center for healthcare operations improvement & research (CHOIR) Centre for integrated manufacturing and development (CIPV) Center for clean technology and environmental policy (CSTM) Nikos – Dutch institute for knowledge intensive entrepreneurship Science, Technology, and Policy Studies (STePS) Twente Water Centre (TWC) 4TU Resilience Engineering Centre 4TU Centre of Excellence for Ethics and Technology Max Planck Center for Fluid Dynamics Education The degree programs at the University of Twente range from business administration and psychology to applied physics, engineering and biomedical technology. In the applied sciences, the emphasis is on nanotechnology, process technology, engineering, information and communication technology, and the biomedical sciences. So far, the UT has produced over 1,000 spin-off companies and start-up companies; more than any other Dutch university. UT is also one of the founders of Novel-T, formerly Stichting Kennispark Twente, a startup accelerator and support program for university spin-offs. Timeline of rectors 1963–1967: Gerrit Berkhoff (d. 1996) 1967–1971: Jo Vlugter 1971–1974: Pieter Zandbergen 1974–1976: Jan Kreiken (d. 2001) 1976–1979: Izak Willem van Spiegell (d. 2005) 1979–1982: Harry van den Kroonenberg (d. 1996) 1982–1985: Wiebe Draijer (d. 2007) 1985–1988: Harry van den Kroonenberg (second term) 1988–1992: Jos de Smit 1992–1997: Theo Popma (d. 2013) 1997–2004: Frans van Vught 2005–2009: Henk Zijm 2009–2016: Ed Brinksma 2016–2020: Thom Palstra 2020-present: Tom Veldkamp Notable alumni Albert van den Berg, professor of physics and 2009 winner of the Spinoza Prize Ank Bijleveld, Dutch politician – Minister of Defence Bas Lansdorp, co-founder and CEO of Mars One Cees Links, Wi-Fi Innovator Dirk-Willem van Gulik, founder of the Apache Software Foundation Fred Teeven, former Dutch politician – State Secretary for Security and justice Giancarlo Guizzardi, creator of the Unified Foundational Ontology and the OntoUML language Gom van Strien, Dutch politician – member of the Senate Han Polman, Dutch politician – King's Commissioner of Zeeland Henry Franken, co-founder and managing director of BiZZdesign Iain Baikie, professor of physics and winner of the Swan Medal Jaap Haartsen, inventor of Bluetooth Marleen Veldhuis, swimmer – Olympic, World and European Champion Merlyna Lim, professor, Canada Research Chair, and member of Royal Society of Canada College Peter Flach, professor of artificial intelligence at the University of Bristol Yasemin Çegerek, MP of the Labour Party Notes and references External links Official Website Technical universities and colleges in the Netherlands Educational institutions established in 1961 1961 establishments in the Netherlands Education in Overijssel Buildings and structures in Enschede
2116135
https://en.wikipedia.org/wiki/Copyright%20law%20of%20the%20Philippines
Copyright law of the Philippines
A copyright is the legal protection extended to the owner of the rights in an original work. Original work refers to every production in the literary, scientific, and artistic domains. The Intellectual Property Office (IPOPHL) is the leading agency responsible for handling the registration and conflict resolution of intellectual property rights and to enforce the copyright laws. IPOPHL was created by virtue of Republic Act No. 8293 or the Intellectual Property Code of the Philippines which took effect on January 1, 1998, under the presidency of Fidel V. Ramos. In the Intellectual Property (IP) Code of the Philippines, literary and artistic works include books, writings, musical works, films, paintings, and other works including computer programs. Works are created on the sole fact of their very creation - regardless of their mode or form of expression as well as their content, the quality of said content, and purpose. Works covered Works covered by the copyright law are (1) literary and artistic works and (2) derivative works. On the other hand, works not protected by the copyright law are (1) unprotected subject matter and (2) works of the government. Literary and artistic works According to Section 172 of the Intellectual Property Code, literary and artistic works refer to the original and intellectual creations protected from the moment of their creation. The list of literary and artistic works includes the following: Books, pamphlets, articles and other writings. Periodicals and newspapers Lectures, sermons, addresses, dissertations prepared for oral delivery, whether or not reduced in writing or other material form Letters Dramatic or dramatico-musical compositions; choreographic works or entertainment in dumb shows Musical compositions, with or without words Works of drawing, painting, architecture, sculpture, engraving, lithography or other works of art; models or designs for works of art. Original ornamental designs or models for articles of manufacture, whether or not registrable as an industrial design, and other works of applied art Illustrations, maps, plans, sketches, charts and three-dimensional works relative to geography, topography, architecture or science Drawings or plastic works of a scientific or technical character Photographic works including works produced by a process analogous to photography; lantern slides Audiovisual works and cinematographic works and works produced by a process analogous to cinematography or any process for making audio-visual recordings Pictorial illustrations and advertisements Computer programs Other literary, scholarly, scientific and artistic works Derivative works According to Section 173.2 of the Intellectual Property Code, derivative works are defined as new work provided that they do not violate any subsisting copyright upon the original work employed or any part thereof, or to imply any right to such use of the original works, or to secure or extend copyright in such original works. The list of derivative works includes the following: Dramatizations, translations, adaptations, abridgements, arrangements, and other alterations of literary or artistic works Collections of literary, scholarly or artistic works, and compilations of data and other materials which are original by reason of the selection or coordination or arrangement of their contents. According to Section 174 which refers to the case of a published edition of work, the publisher has the copyright consisting merely of the right of reproduction of the typographical arrangement of the published edition of the work. Unprotected subject matter The list of unprotected subject matter include the following: Any idea, procedure, system, method or operation, concept, principle, discovery or mere data as such, even if they are expressed, explained, illustrated or embodied in a work News of the day and other miscellaneous facts having the character of mere items of press information Any official text of a legislative, administrative or legal nature, as well as any official translation thereof Works of the government According to Section 176 of Republic Act 8293, no copyright shall be applied in any work of the Government of the Philippines. To exploit such works for profit, prior approval from the government agency or office should be made. Such agency or office may impose payment of royalties. It is not required to seek prior approval or conditions for the use for any purpose of statutes, rules and regulations, and speeches, lectures, sermons, addresses, and dissertations, pronounced, read or rendered in courts of justice, before administrative agencies, in deliberative assemblies and in meetings of public character. Ownership According to Section 178 and 179 of Republic Act 8293, the copyright ownership is under the following rules: Copyright shall belong to the author of the work for original literary and artistic works For works with joint ownership, all the authors will be recognized as original owners. In the absence of agreement, their rights shall fall under the rules of co-ownership. In the case of works whose author per part can be identified, the author of each part shall be considered as the owner of the copyright in that respective part. For works created during the course of employment of an author, copyright ownership are as follows: If the object of ownership is not a part of the regular duties of the author, the employee shall get the copyright even if he/she used the time, facilities, and materials of the employer. If the work is an output of the author for his regularly-assigned duties, the employer shall get the copyright unless there is an agreement to the contrary. For works created in pursuance of a commission to the author by a person other than his/her employer, the ownership shall be granted to the person who commissioned but the copyright ownership shall remain with the creator, unless there is an agreement to the contrary. For audiovisual works, the copyright shall belong to the producer, the author of the scenario, the composer of the music, the film director, and the author of the work adapted. However, the producer shall exercise copyright only up to what is required for the exhibition of the work, except for the right to collect performing license fees for the performance of the compositions incorporated into the work. For letters, the copyright shall belong to the writer subject to Article 723 of the Civil Code. For anonymous works and works under a pseudonym, the publisher shall represent the work's author who are either anonymous or under a pseudonym, unless the contrary appears or the author discloses his/her identity. Types of Rights under the Law of Copyright These are the rights that authors are entitled to according to the law of copyright, under Part IV of R.A. 8293, or the Intellectual Property Code of the Philippines. Economic Rights This allows a creator to ask for or obtain payment for the use of their work by third parties. According to Section 177 of the Law of Copyright, these rights consist of the right to allow, impede, or carry out the following by the author: Replication of the work, or a portion of the work Transformation or dramatization of the original work The first public distribution of the original work and each copy of the work Rental of the original work, or copy of the work embodied in any form, including audiovisuals, cinematography, sound recordings, computer programming, or graphic work, regardless of ownership of the original work Public display of the original or copy of the work Public performance of the work Other communication of the work to the public Moral Rights These rights allow the author of the work to maintain their personal connection to the work, and to undertake measures in order to protect this connection. The author of the work, independent of the economic rights, also have the right to: Require the authorship of the work be attributed to him or her, meaning that the author may require that their name be displayed in a prominent fashion on a copy or public distribution or use of the work To make any transformation or adjustment to the work, or withhold it from publication To oppose any and all mutilation or any other derogatory action to the work which could potentially be detrimental to the author's honor and reputation To refuse to the use of the author's name on any mutilated or distorted version of his work, or any work not of his own creation Exceptions to moral rights Under Section 195 of the Law on Copyright, an author may waive his moral rights through a written contract. However, this contract is deemed invalid if it allows third parties to do the following: Make use of the author's name, the title of the work, or the author's reputation, in any version or adaptation of the work which could harm or be detrimental to the artistic reputation of another author Make use of an author's name for a piece of work not of his own creation The right of an author to have his contribution to a collective work credited to his name is deemed waived. A collective work here is defined as work created by two or more persons and under the understanding that the work will be attributed to the person whose direction said work is under. It is also understood that contributing natural persons will not be identified. If an author licenses or permits a third party to make use of their work, any necessary transformation, such as arranging, editing, or adaptations of work for use in publications, broadcast, or motion pictures, in accordance with the standards of the medium in which the work is to be used, shall not be found in contrary to the author's rights. In addition, the destruction of work unconditionally and completely transferred by an author shall likewise not be found in violation of the author's rights. Resale rights The author and their heirs have the inalienable right to partake of 5% of the proceeds of the sale or lease of their original work (painting, sculpture, manuscript, composition). This inalienable right is in effect during the lifetime of the author, and for fifty years after their death. Related rights Related rights are the rights of those whose help the author avails of in order to assist him in producing his work, and distributing this work to the public. These rights are also referred to as "neighboring rights" and include the following: Rights of performers Rights of producers of sound recordings Rights of broadcasting organizations Infringement Acts constituting infringement Section 216 of Republic Act No. 10372 states that a person infringes a right protected under this Act when one: Directly commits an infringement against copyright; Benefits from the infringing activity of another person who commits an infringement if the person benefiting has been given notice of the infringing activity and has the right and ability to control the activities of the other person; With knowledge of infringing activity, induces, causes or materially contributes to the infringing conduct of another. Liabilities of infringement Any person found infringing rights protected under RA 10372 shall be liable: To pay the copyright owner actual damages, legal costs, and other expenses, that may have been incurred due to infringement as well as profits earned by the infringement. Instead of recovering actual damages and profits, the copyright owner may file instead for an award of statutory damages for all infringements involved for not less than Fifty thousand pesos (Php 50,000.00). The court may consider the following factors in awarding statutory damages: The nature and purpose of the infringing act; The flagrancy of the infringement; Whether the defendant acted in bad faith; The need for deterrence; Any loss that the plaintiff has suffered or is likely to suffer by reason of the infringement; and Any benefit shown to have accrued to the defendant by reason of the infringement. Limitations The following acts shall not constitute infringement of copyright: The recitation or performance of a work, if it had been made accessible to the public, and if done in private and free of charge. Performance of a work done under a charitable or religious institution shall also fall under this. The quotation of published works if they are compatible with fair use and only to an extent. This includes quotations from newspaper articles and periodicals provided that the source and the name of the author, if available, are mentioned. The reproduction of articles or communication by the mass media on current political, social, economic, scientific, or religious topics, lectures, addresses, and other works of the same nature, which are delivered in public and will only be used for information purposes. The reproduction and communication to the public of literary, scientific, or artistic works for reporting current events. The inclusion of a work in a publication, broadcast, or other forms of communication, if it will be used as aids in teaching and if it is compatible with fair use. Also, the author and the name of the author shall be mentioned. The recording of a work made in educational institutions for the use of that education institution. In accordance to this, the recording should be deleted after the first broadcast. Also, the said recording should not be from works which are part of a film except for brief excerpts of the work. The making of recordings by a broadcast organization for its own broadcasting purposes. The use of a work under the direction or control of the government or other institutions for the purpose of informing and public. It must also be compatible with fair use. The public performance of a work in a place without admission fee and for other purposes that does not include profit making. The public display of a work not made on screen or by other devices. The use of a work for judicial proceedings or for legal advice. The provisions under this shall not be interpreted in a way that exploit the works and does not harm the interest of the right holder. The Intellectual Property Code of the Philippines does not have a freedom of panorama provision, concerning the right to photograph artistic works in public spaces and use the resulting images for any purposes without the need to secure permission from the authors of the said works. Fair use A fair use, in its most general sense, is the act of copying of copyrighted materials done for purposes such as commenting, criticizing, or parodying a copyrighted work without the permission from the copyright owner. It is used as a defense under copyright infringement. Factors in determining fair use Under fair use, the use of a copyrighted work for purposes of criticizing, commenting, news reporting, teaching, creating researches, and other similar purposes is not an infringement of copyright. In determining whether the use made is under fair use, the following factors should be considered: The purpose of the use, including it is of a commercial nature or for non-profit purposes The nature of the copyrighted work The amount and sustainability of the portion used in relation to the copyrighted work as a whole The effect of the use to the value of the copyrighted work List of reproductions allowed Given the mentioned rules and regulations above about copyright, reproduction of different materials, without the permission of the author, are still allowed given that they are done for reasons allowed by the Intellectual Property Code of the Philippines. Provided here are the reproductions and purposes allowed by the law. Reproduction of published work Under Subsection 187.1 of the Intellectual Property Code of the Philippines, the reproduction of a published work shall be permitted without the owner's authorization given that the reproduction was made for research purposes. The permission granted here shall not extend to: A work of architecture in the form of building or other construction An entire or a substantial part of a book or of a musical work A compilation of data and other materials A computed program except those stated in Section 189 Any reproduction that would exploit the work Reprographic reproduction by libraries Any library or archive with non-profit purposes may make a single copy of the work without the authorization of the author given that: The work cannot be lent to user in its original form The works are isolated articles contained in composite works or portions of other published works and the reproduction can supply them The making of a copy is for the purposes of preserving or replacing the original in situations that it is destroyed or lost Reproduction of computer program The reproduction of one back-up copy of a computer program shall be allowed without the permission of the copyright owner given that the reproduction is for the following uses: The use of the computer program in a computer for which it will be run To create a copy of the original computer program so that replacement is available if the original copy is lost or destroyed Notable cases Cases resulting to actions La Concepcion College vs. Catabijan Author and publisher Raymund Sta. Maria Catabijan was issued 608,450.00 pesos in damages from La Concepcion College, who he claimed directly copied his work books in order to sell to students. La Concepcion College was found guilty of copyright infringement by the Intellectual Property Office of the Philippines (IPOPHL). The non-sectarian school was hence banned from publishing, selling and distributing copies of Mr. Catabijan's works. EdCrish and Alkem vs. UPFA The Makati Regional Trial Court ruled on November 17, 2020, that EdCrisch International Inc. (EdCrisch) copied a substantial part of Panahon Kasaysayan at Lipunan: Kasaysayan ng Pilipinas texbook, published by the University Press of First Asia (UPFA), for their textbook Pilipinas: Isang Sulyap at Pagyakap. EdCrish and its Singaporean partner Alkem Company were both mandated by the court to cease production and distributions of the infringing textbook. The court also awarded UPFA ₱9.3 million in damages to be paid by both EdCrish and Alkem, bringing the 11-year copyright dispute to an end. St. Mary's vs. Chinese firm and local partners Fujian New Technology Color Making and Printing Co. Ltd., based in China, and its local partners M.Y. Intercontinental Trading Corporation (MITC) and Allianz Marketing and Publishing Corporation, were ordered to pay ₱24,695,830 worth of damages to St. Mary's Publishing Corporation (SMPC). This stemmed from Fujian's failure to abide by their contract with SMPC to deliver promised textbooks that they printed. The Chinese printing firm instead gave the marketing contract to MITC, with Allianz as the importer. The erring parties were also ordered to stop publications, imporations, and distributions of textbooks, inclusive of revised versions. This landmark decision was ruled by Manila City Regional Trial Court Branch 24 on December 8, 2017; the Court of Appeals of the Philippines upheld the decision on April 11, 2019. The latter court said that while Fujian is a foreign company, "its act constitute copyright infringement pursuant to the Berne Convention for the Protection of Literary and Artistic Works," of which the Philippines and China are signatories. Cases resulting to dismissals ABS-CBN vs. Willing Willie ABS-CBN demanded 127 million pesos from their former reality show star, Willie Revillame, citing copyright infringement due to stark similarities in Revillame's show, Willing Willie, and ABS CBN's Wowowee. ABS-CBN listed 5 acts of plagiarism allegedly committed by Willing Willie in their complaint as follows: Willing Willie's opening song and dance number was similar to that of Wowowee's “BIGA-Ten” and “Big Time Ka,” both segments from the shows involved, bear similar names. “Willie of Fortune” and “Willtime Bigtime” are segments from both shows which resemble each other. ABS-CBN claimed that Willtime Bigtime resembled its show as it also showcases contestants relaying their personal stories before proceeding to play a singing/trivia game. April “Congratulations” Gustilo is one of several backup dancers from Wowowee who also appear in Willing Willie. Other striking similarities ABS-CBN claimed are found in Willing Willie's set design, stage, studio viewers' seats lay-out, lighting angles and camera angles. A 25-page ruling later on dated May 22, 2015 junked the case against Revillame, declaring it moot. After the Quezon City RTC demanded a 400 million peso bond from Revillame to answer any further damage the network might sustain, it was later discharged. Revillame signed a contract with GMA network two days prior to the ruling, to work on a new show entitled, “Wowowin." Dating show alleged copyright infringement BJ Productions, Inc, produced a dating game show Rhoda and Me which aired from 1970 to 1977. On July 14, 1991, Francisco Joaquin, Jr., president of BJPI, saw on RPN Channel 9 an episode of It's a Date, produced by IXL Productions, Inc. (IXL) with similar format of his dating show. Joaquin filed a case against IXL Productions, headed by Gabriel Zosa and RPN 9 before Regional Trial Court of Quezon City. Meanwhile, Zosa sought a review of the resolution of the Assistant City Prosecutor before the Secretary of Justice Franklin Drilon. On August 12, 1992, Drilon reversed the Assistant City Prosecutor's findings and directed him to move for the dismissal of the case against private respondents. Joaquin filed a motion for reconsideration, but his motion denied by Drilon on December 3, 1992. The Supreme Court ruled on January 28, 1999 that the format or mechanics of a television show is not included in the list of the protected work provided by Presidential Decree no. 49 and Republic Act No. 8293. It further state that copyright, in the strict sense of the term, is purely a statutory right and does not extend to an idea, procedure, process, system, method or operation, concept, principles or discovery regardless of the form to which it is described, explained, and illustrated or embodied in the work. Pearl & Dean Philippines vs. Shoemart Pearl and Dean Philippines is a corporation engaged in the manufacture of advertising display units simply referred to as light boxes. In 1985, Pearl and Dean negotiated with Shoemart, Inc. (now SM Prime Holdings) for the lease and installation of the light boxes in SM Makati and SM Cubao. Only SM Makati was signed but later rescinded by Pearl and Dean due to non-performance of their terms. Years later, Pearl and Dean found out that exact copies of its light boxes were installed at different SM stores. It was further discovered that SM's sister company North Edsa Marketing Inc. (NEMI), sold advertising space in lighted display units located in SM's different branches. Pearl and Dean filed this instant case for infringement of trademark and copyright, unfair competition and damages. SM on its part maintained that it independently developed its poster panels using commonly known techniques and available technology, without notice of or reference to Pearl and Dean's copyright. Makati Regional Trial Court decided in favor of Pearl and Dean, finding SM and NEMI jointly and severally liable for infringement of copyright and infringement of trademark. On appeal, however, the Court of Appeals reversed the trial court. On August 15, 2003, Supreme Court strengthened the Court of Appeals' decision by stating Pearl and Dean never secured a patent for the light boxes and the copyright patent is on its technical drawings within the category of "pictorial illustrations." It applied the similar ruling of G.R. No. 108946 (Joaquin, Jr. v. Drilon). 2016 ruling requiring evidence over suspicion On G.R. No. 195835, penned March 14, 2016, the Supreme Court ruled that For a claim of copyright infringement to prevail, the evidence on record must demonstrate: (1) ownership of a validly copyrighted material by the complainant; and (2) infringement of the copyright by the respondent. It further stated that probable cause is not imputable against the respondent. The ruling stemmed from a dispute between LEC Steel Manufacturing Corporation and Metrotech Steel Industries where the former accused the latter infringing its intellectual property rights. The LEC failed to substantiate the alleged reproduction of the drawings/sketches of hatch doors it copyrighted had had no proof that the Metrotech reprinted the copyrighted sketches/drawings of LEC's hatch doors. The raid conducted by the NBI on Metrotech's premises yielded no copies or reproduction of LEC's copyrighted sketches/drawings of hatch doors. What were discovered instead were finished and unfinished hatch doors. References External links The Intellectual Property Code of the Philippines Frequently asked questions on Philippine copyright law Philippines Philippine law Philippine intellectual property law
378171
https://en.wikipedia.org/wiki/Federico%20Faggin
Federico Faggin
Federico Faggin (, ; born 1 December 1941) is an Italian-American physicist, engineer, inventor and entrepreneur. He is best known for designing the first commercial microprocessor, the Intel 4004. He led the 4004 (MCS-4) project and the design group during the first five years of Intel's microprocessor effort. Faggin also created, while working at Fairchild Semiconductor in 1968, the self-aligned MOS (metal–oxide–semiconductor) silicon-gate technology (SGT), which made possible MOS semiconductor memory chips, CCD image sensors, and the microprocessor. After the 4004, he led development of the Intel 8008 and 8080, using his SGT methodology for random logic chip design, which was essential to the creation of early Intel microprocessors. He was co-founder (with Ralph Ungermann) and CEO of Zilog, the first company solely dedicated to microprocessors, and led the development of the Zilog Z80 and Z8 processors. He was later the co-founder and CEO of Cygnet Technologies, and then Synaptics. In 2010, he received the 2009 National Medal of Technology and Innovation, the highest honor the United States confers for achievements related to technological progress. In 2011, Faggin founded the Federico and Elvia Faggin Foundation to support the scientific study of consciousness at US universities and research institutes. In 2015, the Faggin Foundation helped to establish a $1 million endowment for the Faggin Family Presidential Chair in the Physics of Information at UC Santa Cruz to promote the study of "fundamental questions at the interface of physics and related fields including mathematics, complex systems, biophysics, and cognitive science, with the unifying theme of information in physics." Federico Faggin has been a Silicon Valley resident since 1968 and is a naturalized US citizen. Education and early career Born in Vicenza, Italy, Federico grew up in an intellectual environment. His father, Giuseppe Faggin, was a scholar who wrote many academic books and translated, with commentaries, the Enneads of Plotinus from the original Greek into modern Italian. Federico had a strong interest in technology from an early age. He attended a technical high school in Vicenza, I.T.I.S. Alessandro Rossi, and later earned a laurea degree in physics, summa cum laude, from the University of Padua. Olivetti R&D Labs Faggin joined Olivetti aged 19. There he co-designed and led the implementation of a small digital transistor computer with 4 K × 12 bit of magnetic memory (1960). The Olivetti R&D department subsequently developed, one of the world's first programmable desktop electronic calculators, the Olivetti Programma 101 (1964). After this first work experience, Faggin studied physics at the University of Padua and taught the electronics laboratory course for 3rd year physics students in the academic year 1965–1966. SGS-Fairchild In 1967 he joined SGS Fairchild, now STMicroelectronics, in Italy, where he developed its first MOS metal-gate process technology and designed its first two commercial MOS integrated circuits. SGS sent him to California in 1968. When Fairchild sold SGS-Fairchild, Faggin accepted an offer to complete the development of the silicon-gate technology with Fairchild. Silicon Valley career Fairchild Semiconductor The silicon-gate technology (SGT) is one of the most influential technologies to have fueled the progress of microelectronics since the MOSFET. Without the SGT, the first microprocessor could not have been made during 1970–1971. In February 1968, Federico Faggin joined Fairchild Semiconductor in Palo Alto where he was the project leader of the MOS silicon-gate technology, a MOSFET with a silicon self-aligned gate, and the inventor of its unique process architecture. The SGT became the basis of all modern NMOS and CMOS integrated circuits. It made possible the creation of MOS semiconductor memory chips during 1969–1970, the first microprocessor during 1970–1971, and the first CCD and EPROM (electrically programmable read-only memory) with floating silicon gates (1970-1971). The SGT replaced the incumbent aluminum-gate MOS technology, and was adopted worldwide within 10 years, eventually making obsolete the original integrated circuits built with bipolar transistors. Fairchild 3708 At Fairchild, Faggin designed the first commercial integrated circuit using Silicon Gate Technology with self-aligned MOSFET transistors: the Fairchild 3708. The 3708 was an 8-bit analog multiplexer with decoding logic, replacing the equivalent Fairchild 3705 that used metal-gate technology. The 3708 was 5 times faster, had 100 times less junction leakage and was much more reliable than the 3705, demonstrating the superiority of SGT over metal-gate MOS. See also: Faggin, F., Klein T. (1969). "A Faster Generation of MOS Devices With Low Threshold Is Riding The Crest of the New Wave, Silicon-Gate IC's." Electronics, 29 Sept. 1969. Intel The Intel 4004. Federico Faggin joined Intel from Fairchild in 1970 as the project leader and designer of the MCS-4 family, which included the 4004, the world's first single-chip microprocessor. Fairchild was not taking advantage of the SGT and Faggin was burning with the desire of using his new technology to design advanced chips. The 4004 (1971) was made possible by the advanced capabilities of the silicon gate technology (SGT) being enhanced through the novel random logic chip design methodology that Faggin created at Intel. It was this new methodology, together with his several design innovations, that allowed him to fit the microprocessor in one small chip. A single-chip microprocessor – an idea that was expected to occur many years in the future – became possible in 1971 by using SGT with two additional innovations: (1) "buried contacts" that doubled the circuit density, and (2) the use of bootstrap loads with 2-phase clocks—previously considered impossible with SGT— that improved the speed 5 times, while reducing the chip area by half compared with metal-gate MOS. The design methodology created by Faggin was utilized for the implementation of all Intel's early microprocessors and later also for Zilog's Z80. The Intel 4004 – a 4-bit CPU (central processing unit) on a single chip – was a member of a family of 4 custom chips designed for Busicom, a Japanese calculator manufacturer. The other members of the family (constituting the MCS-4 family) were: the 4001, a 2k-bit metal-mask programmable ROM with programmable input-output lines; the 4002, a 320-bit dynamic RAM with a 4-bit output port; and the 4003, a 10-bit serial input and serial/parallel output, static shift register to use as an I/O expander. Faggin promoted the idea of broadly marketing the MCS-4 to customers other than Busicom by showing to Intel management how customers could design a control system using the 4004. He designed and built a 4004 tester using the 4004 as the controller of the tester, thus convincing Bob Noyce to renegotiate the exclusivity clause with Busicom that didn't allow Intel to sell the MCS-4 line to other customers. In 2009, the four contributors to the 4004 were inducted as Fellows of the Computer History Museum. Ted Hoff, head of Application Research Department, formulated the architectural proposal and the instruction set with assistance from Stan Mazor and working in conjunction with Busicom's Masatoshi Shima. However none of them was a chip designer and none was familiar with the new Silicon Gate Technology (SGT). The silicon design was the essential missing ingredient to making a microprocessor since everything else was already known. Federico Faggin led the project in a different department without Hoff's and Mazor's involvement. Faggin had invented the original SGT at Fairchild Semiconductor in 1968 and provided additional refinements and inventions to make possible the implementation of the 4004 in a single chip. With routine help from Shima, Faggin completed the chip design in January 1971. The Intel 2102A is a redesign of the Intel 2102 static RAM, where Federico Faggin introduced to Intel, for the first time, the depletion load, combining the silicon gate technology with ionic implantation. The design was done toward the end of 1973 by Federico Faggin and Dick Pashley. The 2102A was 5 times faster than the 2102, opening a new direction for Intel. Early Intel microprocessors Faggin's silicon design methodology was used for implementing all Intel's early microprocessors. The Intel 8008 was the world's first single-chip 8-bit CPU and, like the 4004, was built with p-channel SGT. The 8008 development was originally assigned to Hal Feeney in March 1970 but was suspended until the 4004 was completed. It was resumed in January 1971 under Faggin's direction utilizing the basic circuits and methodology he had developed for the 4004, with Hal Feeney doing the chip design. The CPU architecture of the 8008 was originally created by CTC Inc. for the Datapoint 2200 intelligent terminal, in which it was implemented in discrete IC logic. The Intel 4040 microprocessor (1974) was a much improved, machine-code-compatible version of the 4004 CPU allowing it to interface directly with standard memories and I/O devices. Federico Faggin created the architecture of the 4040 and supervised Tom Innes who did the design work. The 8080 microprocessor (1974) was the first high-performance 8-bit microprocessor in the market, using the faster n-channel SGT. The 8080 was conceived and designed by Faggin, and designed by Masatoshi Shima under Faggin's supervision. The 8080 was a major improvement over the 8008 architecture, yet it retained software compatibility with it. It was much faster and easier to interface to external memory and I/O devices than the 8008. The high performance and low cost of the 8080 let developers use microprocessors for many new applications, including the forerunners of the personal computer. When Faggin left Intel at the end of 1974 to found Zilog with Ralph Ungermann, he was R&D department manager responsible for all MOS products, except for dynamic memories. Zilog Zilog was the first company entirely dedicated to microprocessors started by Federico Faggin and Ralph Ungermann in November 1974. Faggin was Zilog's president and CEO until the end of 1980 and he conceived and designed the Z80 CPU and its family of programmable peripheral components. He also co-designed the CPU whose project leader was Masatoshi Shima. The Z80-CPU was a major improvement over the 8080, yet it retained software compatibility with it. Much faster and with more than twice as many registers and instructions of the 8080, it was part of a family of components that included several intelligent peripherals (the Z80-PIO, a programmable parallel input-output controller; the Z80-CTC, a programmable counter-timer; the Z80-SIO, programmable serial communications interface controller, and the Z80-DMA, programmable direct memory access controller). This chip family allowed the design of powerful and low-cost microcomputers with performance comparable to minicomputers. The Z80-CPU had a substantially better bus structure and interrupt structure than the 8080 and could interface directly with dynamic RAM, since it included an internal memory-refresh controller. The Z80 was used in many of the early personal computers, as well as in video game systems such as the MSX, ColecoVision, Sega Master System and Game Boy. The Z80 is still in volume production in 2017 as a core microprocessor in various systems on a chip. The Zilog Z8 micro controller (1978) was one of the first single-chip microcontrollers in the market. It integrated an 8-bit CPU, RAM, ROM and I/O facilities, sufficient for many control applications. Faggin conceived the Z8 in 1974, soon after he founded Zilog, but then decided to give priority to the Z80. The Z8 was designed in 1976–78 and is still in volume production today (2017). The Communication CoSystem The Communication CoSystem (1984). The Cosystem was conceived by Faggin and designed and produced by Cygnet Technologies, Inc., the second startup company of Faggin. Attached to a personal computer and to a standard phone line, the CoSystem could automatically handle all the personal voice and data communications of the user, including electronic mail, database access, computer screen transfers during a voice communication, call record keeping, etc. The patent covering the CoSystem is highly cited in the personal communication field. Synaptics In 1986 Faggin co-founded and was CEO of Synaptics until 1999, becoming chairman from 1999 to 2009. Synaptics was initially dedicated to R&D in artificial neural networks for pattern-recognition applications using analog VLSI. Synaptics introduced the I1000, the world's first single-chip optical character recognizer in 1991. In 1994, Synaptics introduced the touchpad to replace the cumbersome trackball then in use in laptop computers. The touchpad was broadly adopted by the industry. Synaptics also introduced the early touchscreens that were eventually adopted for intelligent phones and tablets; applications that now dominate the market. Faggin came up with the general product idea and led a group of engineers who further refined the idea through many brainstorming sessions. Faggin is a co-inventor of ten patents assigned to Synaptics. He is chairman emeritus of Synaptics. Foveon During his tenure as president and CEO of Foveon, from 2003 to 2008, Faggin revitalized the company and provided a new technological and business direction resulting in image sensors superior in all critical parameters to the best sensors of the competition, while using approximately half the chip size of competing devices. Faggin also oversaw the successful acquisition of Foveon by the Japanese Sigma Corporation in November 2008. Federico and Elvia Faggin Foundation Founded in 2011 the "Federico and Elvia Faggin Foundation" supports the scientific study of consciousness at US universities and research institutes. The purpose of the Foundation is to advance the understanding of consciousness through theoretical and experimental research. Faggin's interest in consciousness has his roots in the study of artificial neural networks at Synaptics, a company he started in 1986, that prompted his inquiry into whether or not it is possible to build a conscious computer. Works Papers On the silicon gate technology and the Fairchild 3708 Faggin, F., Klein, T., and Vadasz, L.: Insulated Gate Field Effect Transistor Integrated Circuits with Silicon Gates. The Silicon Gate Technology with self-aligned gates was presented by its developer Federico Faggin at the IEEE International Electron Device Meeting on 23 October 1968, in Washington D.C. This new technology empowered the design of dynamic RAM memories, non-volatile memories, CCD sensors and the microprocessor. Federico Faggin and Thomas Klein.: "A Faster Generation of MOS Devices with Low Thresholds is Riding the Crest of the New Wave, Silicon-Gate IC's". The article published in Electronics (29 September 1969) introduces the Fairchild 3708, the world's first commercial integrated circuit using Silicon Gate Technology, designed by Federico Faggin at Fairchild in 1968. F. Faggin, T. Klein: Silicon-Gate Technology. "Solid State Electronics", 1970, Vo. 13, pp. 1125–1144 On the 4004 microprocessor F. Faggin and M. E. Hoff: "Standard Parts and Custom Design Merge in a Four-chip Processor Kit". Electronics, 24 April 1972 F. Faggin, et al.: "The MCS-4 An LSI Microcomputer System". IEEE 1972 Region Six Conference Articles "The Birth of the Microprocessor" by Federico Faggin. Byte, March 1992, Vol.17 No.3, pp. 145–150. "The History of the 4004" by Federico Faggin, Marcian E. Hoff Jr., Stanley Mazor, Masatoshi Shima. IEEE Micro, December 1996, Volume 16 Number 6. "The 4004 microprocessor of Faggin, Hoff, Mazor, and Shima". IEEE Solid State Circuits Magazine, Winter 2009 Vol.1 No.1. "The MOS silicon gate technology and the first microprocessors" by Federico Faggin. La Rivista del Nuovo Cimento, year 2015, issue 12-December. SIF (Italian Physical Society) "How we made the microprocessor" by Federico Faggin. Nature Electronics, Vol. 1, January 2018. Published online: 8 January 2018 "Hard Problem and Free Will: an information-theoretical approach" by Giacomo Mauro D'Ariano and Federico Faggin. arXiv:2012.06580 28Jan2021 Books Silicon: From the Invention of the Microprocessor to the New Science of Consciousness by Federico Faggin. Waterside Productions (February 2021) Awards 1988: Marconi International Fellowship Award "for his pioneering contributions to the implementation of the microprocessor, a principal building block of modern telecommunications" 1988: Gold Medal for Science and Technology from the Italian Prime Minister 1988: title of "Grande Ufficiale" from the President of the Italian Republic 1994: W. Wallace McDowell Award "For the development of the Silicon Gate Process, and the first commercial microprocessor." 1994: Laurea honoris causa in Computer Science from the University of Milan (Italy). 1996: Ronald H. Brown American Innovator Award, with M. Hoff and S. Mazor 1996: a Lifetime Achievement Award by P.C. Magazine for "technical excellence". 1997: Kyoto Prize, with M. Hoff, S. Mazor and M. Shima 1996: inducted into National Inventors Hall of Fame, with M. Hoff and S. Mazor 1997: George R. Stibitz Computer Pioneer Award by the American Computer Museum, with M. Hoff and S. Mazor 1997: Masi Civilta' Veneta Prize 2001: Dr. Robert Noyce Memorial Award by the Semiconductor Industry Association, with M. Hoff and S. Mazor 2003: Laurea honoris causa in Electronic Engineering from the University of Rome Tor Vergata (Italy) 2003: AeA/Stanford Executive Institute Award for Outstanding Achievement in the High Tech Industry by an Alumnus 2006: European Inventor of the Year Lifetime Achievement Award by EPO (European Patent Office) 2007: Laurea honoris causa in Electronic Engineering from the University of Pavia (Italy) 2008: Laurea honoris causa in Electronic Engineering from the University of Palermo (Italy) 2009: Laurea honoris causa in Computer Sciences from the University of Verona (Italy) 2009: Fellow of the Computer History Museum "for his work as part of the team that developed the Intel 4004, the world's first commercial microprocessor." 2009: National Medal of Technology and Innovation from U.S. President Barack Obama 2011: The 2011 George R. Stibitz Lifetime Achievement Award by the American Computer Museum (Bozeman, MT): "For foundational contributions to the development of the modern technological world, including the MOS silicon gate technology that led to the realization of the world's first Microprocessor in 1971." 2019: Knight Grand Cross of the Order of Merit of the Italian Republic from the President of the Italian Republic Sergio Mattarella Source for the above-mentioned awards: 2012: Global Information Technology Award from the President of Armenia. 2012: Honorary PhD from the Polytechnic University (Armenia) 2012: Premio Franca Florio, given by Ministro Francesco Profumo and Prof. Ing. Patrizia Livreri 2013: Honorary PhD in science from Chapman University (CA) 2014: Enrico Fermi Award, given by the Italian Society of Physics: "For the invention of the MOS silicon gate technology that led him to the realization in 1971 of the first modern microprocessor." 2018: 2018 IEEE Italy Section Honorary Award to Federico Faggin for his outstanding contributions to the self aligned MOS silicon gate theory & technology and to the development of the first microprocessor 2018: 2018 AAAS Fellow by the American Association for the Advancement of Science 2019: PhD (Dottorato di ricerca) honoris causa in computer engineering from the University of Pisa (Italy) Università di Pisa. References External links The Intel 4004 Microprocessor and the Silicon Gate Technology, A testimonial from Federico Faggin, designer of the 4004 and developer of its enabling technology Federico Faggin personally gives details, history and nitty-gritty details about the Intel 4004's development and his inventions, innovations and ideas that made it all possible. "Executive Profile" from Foveon.com IEEE Global History Network Biography of Federico Faggin Oral History of Federico Faggin Computer History Museum. Recorded 2004-05 Busicom Calculator Engineering Prototype (Gift of Federico Faggin to the Computer History Museum, Mountain View, California). "Computers Still No Match for Human Intelligence" Video and article interview with Federico Faggin 40 years after the release of the Intel 4004 microprocessor 1941 births 20th-century American businesspeople 20th-century American engineers American computer scientists European Inventor Award winners 20th-century Italian businesspeople Italian computer scientists Italian emigrants to the United States 20th-century Italian engineers 20th-century Italian inventors Intel people Kyoto laureates in Advanced Technology Living people MOSFETs Knights Grand Cross of the Order of Merit of the Italian Republic National Medal of Technology recipients People from Vicenza Silicon Valley people University of Padua alumni
2304859
https://en.wikipedia.org/wiki/Patentable%20subject%20matter
Patentable subject matter
Patentable, statutory or patent-eligible subject matter is subject matter which is susceptible of patent protection. The laws or patent practices of many countries provide that certain subject-matter is excluded from patentability, even if the invention is novel and non-obvious. Together with criteria such as novelty, inventive step or nonobviousness, utility, and industrial applicability, which differ from country to country, the question of whether a particular subject matter is patentable is one of the substantive requirements for patentability. Legislations The subject-matter which is regarded as patentable as a matter of policy, and correspondingly the subject-matter which is excluded from patentability as a matter of policy, depends on the national legislation or international treaty. Canada According to the Canadian Intellectual Property Office (CIPO) patents may only be granted for physical embodiments of an idea, or a process that results in something that is tangible or can be sold. This excludes theorems and computer programs per se. However, business methods are patentable. European Patent Convention The European Patent Convention does not provide any positive guidance on what should be considered an invention for the purposes of patent law. However, it provides in a non-exhaustive list of what are not to be regarded as inventions, and therefore not patentable subject matter: then qualifies Art. 52(2) EPC by stating: (In a previous EPC version some further items are excluded under , as formally being not industrially applicable, notable medical methods as applied by a physician or a veterinarian. Nowadays these methods are excluded directly under Art. 53 EPC, together with other policy exclusions). Practice at the European Patent Office Under , "European patents shall be granted for any inventions, in all fields of technology, provided that they are new, involve an inventive step and are susceptible of industrial application." So, four questions need to be assessed: Is there an invention? Is the invention susceptible of industrial application? Is the invention novel? Does the invention involve an inventive step? The first question "Is there an invention?" is equivalent to: "Is the claimed subject-matter as a whole within the realm of patentable subject-matter?" The invention question or patentable subject-matter question precedes the three further questions, which cannot, and need not, be assessed if there is no invention. According to the case law of the Boards of Appeal of the EPO, the question "Is there an invention?" also implicitly implies the further question: "Does the claimed subject-matter have a technical character?" "Having technical character is an implicit requirement of the EPC to be met by an invention to be an invention within the meaning of ". Patentable subject-matter considerations also intervene again at a secondary level, during the inventive step assessment. In T 641/00 (Comvik/Two Identities), the Board held that, "An invention consisting of a mixture of technical and non-technical features and having technical character as a whole is to be assessed with respect to the requirement of inventive step by taking account of all those features which contribute to said technical character whereas features making no such contribution cannot support the presence of inventive step." The non-technical features are the ones that are excluded from the realm of patentable subject-matter as a matter of policy. T 258/03 (Hitachi/Auction Method) further developed this test for patentable subject-matter. Under this test, a patent application or patent which does not provide a technical solution to a technical problem would be refused (under ) or revoked (under ) as lacking inventive step. The European Patent Office provides guidelines for evaluating the patent-eligibility of computer-implemented inventions (CII), such as in particular based on Artificial Intelligence (AI). For instance, AI-based image processing programs are considered technical and therefore patent-eligible. Conversely, AI-based text processing programs with a text classification only based on the content of the text are not considered technical. These are excluded from patentability because attaching meaning to words is a cognitive task and not a technical implementation. Practice in the United Kingdom Following the 2006 Court of Appeal judgment in Aerotel v Telco and Macrossan's application, which contains a lengthy discussion of case law in the area, the UKPO has adopted the following test: (1) properly construe the claim (2) identify the actual contribution (3) ask whether it falls solely within the excluded subject matter (4) check whether the actual or alleged contribution is actually technical in nature. The Court decided that the new approach provided a structured and more helpful way of applying the statutory test for assessing patentability which was consistent with previous decisions of the Court. This test is quite different from the test used by the EPO, as expressed in T 641/00 (Comvik/Two Identities) and T 258/03 (Hitachi/Auction Method), but it is considered that the end result will be the same in nearly every case. United States Section 101 of Title 35 U.S.C. sets out the subject matter that can be patented: In October 2005, the United States Patent and Trademark Office (USPTO) issued interim guidelines for patent examiners to determine if a given claimed invention meets the statutory requirements of being a useful process, manufacture, composition of matter or machine (). These guidelines assert that a process, including a process for doing business, must produce a concrete, useful and tangible result to be patentable. It does not matter whether the process is within the traditional technological arts or not. A price for a financial product, for example, is considered to be a concrete useful and tangible result (see State Street Bank v. Signature Financial Group). However, on August 24, 2009, the USPTO issued new interim guidelines so that examination would comport with the Federal Circuit opinion in In re Bilski, which held that the "useful, concrete, and tangible" test for patent-eligibility is incorrect and that State Street Bank v. Signature Financial Group is no longer valid legal authority on this point. Instead, the Federal Circuit and the new USPTO guidelines use a machine-or-transformation test to determine patentability for processes. The Supreme Court determined that the claims in the Bilski case covered non-statutory subject matter as it was too abstract and broad. The USPTO has reasserted its position that literary works, compositions of music, compilations of data, legal documents (such as insurance policies), and forms of energy (such as data packets transmitted over the Internet), are not considered "manufactures" and hence, by themselves, are not patentable. Nonetheless, the USPTO has requested comments from the public on this position. The Federal Circuit has ruled, in In re Nuijten, that signals are not statutory subject matter, because articles of manufacture (the only plausible category under ) do not include intangible, incorporeal, transitory entities. The USPTO was prompted to issue the guidelines by a recent decision by their board of appeals, Ex Parte Lundgren. This decision asserted that according to US judicial opinions, inventions do not have to be in the "technological arts" to satisfy the requirements of . They must, however, produce a concrete, useful and tangible result. As indicated above, however, In re Bilski supersedes that legal test (as to the "useful, concrete, and tangible" test). The Bilski majority opinion also rejects the "technological arts" test, although three Federal Circuit judges (Mayer, dissenting, and Dyk and Linn, concurring) stated that they considered being technological an indispensable condition of patent-eligibility. On May 22, 2019, in Washington D.C. a bipartisan, bicameral draft bill that would reform Section 101 of the Patent Act was released. It was proposed by the Chair of the Senate Judiciary Subcommittee on Intellectual Property Senator Thom Tillis (R-NC) and its Ranking Member, Senator Chris Coons (D-DE). They were joined by the House of Representatives Ranking Member of the House Judiciary Committee, Hank Johnson (D-GA-4), the Chairman of the House Judiciary Subcommittee on Intellectual Property and the Courts, and Representative Steve Stivers (R-OH-15) The proposal was released prior to a round-table the Senators and Representatives were holding the following day and intended to solicit feedback. Introduction of a bill has been delayed by lack of agreement among stakeholders such as the American Bar Association's IP law section, the IP Owner's Association, the American Intellectual Property Law Association and BIO. Abstract ideas and patent-eligibility for computer-implemented inventions The Alice Supreme Court reduced the patent-eligibility of software patents or patents on software for business methods, excluding abstract ideas from the list of eligible subject matters. After much confusion within the patent examiners and patent practitioners, the USPTO prepared a list of examples of software patent claims that are deemed patent-eligible or not. The algorithm exception and the patent-eligibility trilogy The exception to patenting algorithms arose out of three Supreme Court cases commonly referred to as the "Supreme Court Trilogy" or "patent-eligibility trilogy". This is a designation for three Supreme Court cases (Gottschalk v. Benson, Parker v. Flook, and Diamond v. Diehr) decided within a decade on whether, and in what circumstances, a claimed invention was within the scope of the US patent system (that is, was eligible to be considered for a patent grant). The three cases of the trilogy can be harmonized on the basis of when a claimed implementation of an idea or principle is old or departs from the prior art in only a facially trivial way, the claim is patent-ineligible (as Nielson and Morse said, and Flook reaffirmed, it must be treated as if in the prior art). Gottschalk v. Benson The invention in this case was a method of programming a general-purpose digital computer using an algorithm to convert binary-coded decimal numbers into pure binary numbers. The Supreme Court noted that phenomena of nature, mental processes and abstract intellectual concepts were not patentable, since they were the basic tools of scientific and technological work. However, new and useful inventions derived from such discoveries are patentable. The Court found that the discovery in Benson was unpatentable since the invention, an algorithm, was no more than abstract mathematics. Despite this holding, the Court emphasized that its decision did not preclude computer software from being patented, but rather precluded the patentability of software where the only useful characteristic was an algorithm. The Court further noted that validating this type of patent would foreclose all future use of the algorithm in question. Therefore, like the traditional exceptions to patentable subject matter, the purpose of the algorithm exception was to encourage development of new technologies by not granting patents that would preclude others from using abstract mathematical principles. Parker v. Flook The invention in this case was a method of calculating alarm limits by using a "smoothing algorithm" to make the system responsive to trends but not momentary fluctuations in process variables (such as temperature). Because it was conceded that the implementation of the algorithm was conventional, the Court found that the inventor did not even purport to have invented anything on which a patent could be granted. The Court did so on the basis of the principle that the nonstatutory subject matter (the algorithm) must be regarded as already in the prior art. Therefore, there was nothing left on which a patent could issue. In a case in which a patent was sought on an implementation of a principle (the algorithm), the implementation itself must be inventive for a patent to issue. Since that was not so, the Court held that the patent office had properly rejected Flook's claim to a patent. The Court relied on the decision in Neilson v. Harford, an English case that the Supreme Court had relied upon in O'Reilly v. Morse, for the proposition that an idea or principle must be treated as if it were already in the prior art, irrespective of whether it was actually new or old. This approach is something like that of analytic dissection in computer-software copyright law, although its use in patent law preceded its use in copyright law by a century or more. Diamond v. Diehr On March 3, 1981, the United States Supreme Court backed away from the analytic dissection approach, and insisted that patent-eligibility must be decided on the basis of the claim (or invention) considered as a whole. The requirement of bypassing analytic dissection is found in the statute, but only for section 103 (governing obviousness or inventive step) and not for section 101 (governing patent-eligibility). Despite this difference in emphasis, however, Diehr can be harmonized with Flook and Benson, and the Diehr Court studiously avoided stating that Flook and Benson were overruled or limited. Bilski v. Kappos On June 28, 2010, the United States Supreme Court ruled in Bilski v. Kappos that Bernard Bilski's patent application for a method of hedging the seasonal risks of buying energy is an abstract idea and is therefore unpatentable. However, it also said that business methods are not inherently unpatentable, and was silent on the subject of software patents. The majority opinion also said that the Federal Circuit's "machine or transformation" test, while useful, is not an exclusive test for determining the patentability of a process. Instead, the Supreme Court reviewed the "Supreme Court Trilogy" described above and said that future decisions should be grounded in the examples and concepts expressed in those opinions. As has been reported, the decision leaves many questions unanswered, including the patentability of many medical diagnostic technologies and software. In May 2013, the Federal Circuit handed down an en banc decision in CLS Bank v. Alice applying the various concepts in the "Supreme Court Trilogy". The claims at issue were found unpatentable by a narrow margin, but the differences in positions of the various judges on the panel were dramatic and not definitive. Mayo Collaborative Services v. Prometheus Laboratories On March 20, 2012, the United States Supreme Court ruled in Mayo Collaborative Services v. Prometheus Laboratories, Inc. that a process patent, which Prometheus Laboratories had obtained for correlations between blood test results and patient health in determining an appropriate dosage of a specific medication for the patient, is not eligible for a patent because the correlation is a law of nature. The court reasoned “the steps in the claimed processes (aside from the natural laws themselves) involve well-understood, routine, conventional activity previously engaged in by researchers in the field.” The decision has been criticized for conflating two separate patent law concepts (patent eligibility under Section 101 and obviousness for patentability under Section 103), and potentially invalidating many patents relating to the biotech, medical diagnostics and pharmaceutical industries. Others, such as the American Medical Association (AMA), praised the decision for invalidating patents that would have hampered the ability of physicians to provide quality patient care. Under Section 287(c) of the Patent Act, however, a claim of patent infringement cannot be maintained against a medical practitioner for performing a medical activity, or against a related health care entity with respect to such medical activity, unless the medical practitioner is working in a clinical diagnostic laboratory. Association for Molecular Pathology v. Myriad Genetics On June 13, 2013, the United States Supreme Court in Association for Molecular Pathology v. Myriad Genetics held that patent claims directed to isolated DNA used for detecting a patient's genetic propensity of contracting breast cancer were not patentable subject matter. Diamond v. Chakrabarty On June 16, 1980, the United States Supreme Court ruled in Diamond v. Chakrabarty that a living non-naturally genetically modified bacterium is patent eligible as a composition of matter under 35 U.S.C. § 101, which provides for the issuance of a patent to a person who invents or discovers "any" new and useful "manufacture" or "composition of matter." As a result of the ruling, the patented invention included claims drawn to a non-naturally occurring bacterium that was genetically modified to be capable of degrading hydrocarbons. This ruling set the precedent for animate material as patentable subject matter. Japan Legal controversies The question of what should and should not be patentable subject matter has spawned a number of battlegrounds in recent years, setting against each other those in each area supporting patentability, claiming that patents would cause increased innovation and public good, against opponents with views that patentability is being sought only for private good but would do public harm. Flashpoints have included the patenting of naturally occurring biological material, genetic sequences, stem cells, "traditional knowledge," programs for computers, and business methods. In March 2010, a federal district court judge in the Southern District of New York ruled against Myriad Genetics and in favor of the American Civil Liberties Union that purified DNA sequences and the inventions using them are unpatentable. As has been discussed, Judge Sweet relied entirely upon Supreme Court precedent and ignored contrary case law of the Federal Circuit Court of Appeals to conclude that isolated DNA is of the same fundamental quality as natural DNA and is thus unpatentable under section 101 of the Patent Act; and that the method claims of the patents were abstract mental processes that were also unpatentable. His rationale was controversial and his ruling was appealed to the Federal Circuit. The appeal court reversed the ruling deciding that isolated DNA had a "markedly different chemical structure" from other human genetic material. In 2013 The US Supreme Court partly reversed the decision again deciding that DNA was not patentable, Justice Antonin Scalia writing "the portion of the DNA isolated from its natural state sought to be patented is identical to that portion of the DNA in its natural state". However, the Supreme Court also decided that complementary DNA can be patented because it is not naturally occurring. When the news was announced ACLU welcomed the decision and Myriad Genetics share prices rose. In October 2015, the High Court of Australia ruled against Myriad Genetics, holding that a mutated gene associated with susceptibility to breast cancer cannot give rise to a patentable invention under Australian law. See also Computer programs and the Patent Cooperation Treaty Software patents under the European Patent Convention Software patents under TRIPs Agreement Software patents under United Kingdom patent law References and notes Further reading Peter Mole, Economics, ethics and the subject-matter definition of the EPC, The CIPA Journal, April 2003 Justine Pila, The Requirement for an Invention in Patent Law, Oxford University Press, 2010, Emir Crowne, The Utilitarian Fruits Approach to Justifying Patentable Subject Matter (June 19, 2011). John Marshall Review of Intellectual Property Law, Vol. 10, No. 4, p. 753, 2011. Emir Crowne, What is an Invention? A Review of the Literature on Patentable Subject Matter (September 3, 2009). Richmond Journal of Law and Technology, Vol. 15, No. 2, 2008. Stephen Ornes, Should business be allowed to patent mathematics?, New Scientist, 18 March 2013 External links Typepad.com, Ex parte Lundgren (U.S. Board of Patent Appeals and Interferences, October 2005), especially the dissent of Judge Barrett, which contains a lengthy presentation of statutory subject matter following page 19. Patent.gov, UK Patent Office Manual of Patent Practice section on patentability. Patent law
529931
https://en.wikipedia.org/wiki/Software%20law
Software law
Software law refers to the legal remedies available to protect software-based assets. Software may, under various circumstances and in various countries, be restricted by patent or copyright or both. Most commercial software is sold under some kind of software license agreement. See also Legal aspects of computing Software copyright Software patent Software license Software license agreement Proprietary software Free and open source software
19125134
https://en.wikipedia.org/wiki/Solver
Solver
A solver is a piece of mathematical software, possibly in the form of a stand-alone computer program or as a software library, that 'solves' a mathematical problem. A solver takes problem descriptions in some sort of generic form and calculates their solution. In a solver, the emphasis is on creating a program or library that can easily be applied to other problems of similar type. Solver types Types of problems with existing dedicated solvers include: Linear and non-linear equations. In the case of a single equation, the "solver" is more appropriately called a root-finding algorithm. Systems of linear equations. Nonlinear systems. Systems of polynomial equations, which are a special case of non linear systems, better solved by specific solvers. Linear and non-linear optimisation problems Systems of ordinary differential equations Systems of differential algebraic equations Boolean satisfiability problems, including SAT solvers Quantified boolean formula solvers Constraint satisfaction problems Shortest path problems Minimum spanning tree problems Search algorithms Game solvers for problems in game theory Three-body problem The General Problem Solver (GPS) is a particular computer program created in 1957 by Herbert Simon, J. C. Shaw, and Allen Newell intended to work as a universal problem solver, that theoretically can be used to solve every possible problem that can be formalized in a symbolic system, given the right input configuration. It was the first computer program that separated its knowledge of problems (in the form of domain rules) from its strategy of how to solve problems (as a general search engine). General solvers typically use an architecture similar to the GPS to decouple a problem's definition from the strategy used to solve it. The advantage in this decoupling is that the solver does not depend on the details of any particular problem instance. The strategy utilized by general solvers was based on a general algorithm (generally based on backtracking) with the only goal of completeness. This induces an exponential computational time that dramatically limits their usability. Modern solvers use a more specialized approach that takes advantage of the structure of the problems so that the solver spends as little time as possible backtracking. For problems of a particular class (e.g., systems of non-linear equations) multiple algorithms are usually available. Some solvers implement multiple algorithms. See also TK Solver: A rule based problem solver with back solving capabilities. Mathematical software for other types of mathematical software. Problem solving environment: a specialized software combining automated problem-solving methods with human-oriented tools for guiding the problem resolution. Satisfiability modulo theories for solvers of logical formulas with respect to combinations of background theories expressed in classical first-order logic with equality. Semantic reasoner Lists of solvers List of linear programming solvers List of SMT solvers List of solvers for ordinary differential equations References Numerical software Formal methods tools
12891351
https://en.wikipedia.org/wiki/Tech%20Advisor
Tech Advisor
Tech Advisor, previously known as PC Advisor, is a consumer tech website and digital magazine published by Foundry, a subsidiary of IDG Inc, which also produces Macworld, PCWorld and TechHive. IDG Inc was acquired by Blackstone in 2021. Tech Advisor In June 2017 PC Advisor was rebranded Tech Advisor, which continues to operate as both a website and monthly digital magazine focused on consumer and small business technology buying advice. On 24 August 2020 a formal announcement was made that the Tech Advisor forums would close permanently on Wednesday 2 September 2020. In April 2021, Tech Advisor moved from a UK ccTLD (.co.uk) to a gTLD (.com) domain, focused primarily on smartphones, tablets, laptops and wearables, but also covering smart home and appliances, entertainment, audio and gaming, tech accessories, security, software and services. In February 2022, Tech Advisor publisher IDG Communications was formally renamed Foundry. PC Advisor PC Advisor magazine offered advice on various aspects of PCs, related items such as digital photography, the internet, security and smartphones, and other personal-technology products and services. PC Advisor was the UK & Ireland edition of IDG's PCWorld. (Another discontinued magazine called Personal Computer World and a PC World retailer – neither related to the PCWorld magazine – already existed in the UK.) PC Advisor's slogan was "Expert Advice You Can Trust". Each month PC Advisor ran tests on various areas of the IT world from new pre-built desktop computers and laptops, LCD displays, graphics cards, motherboards, PDAs, wireless network routers, printers and many more. The magazine also included many reviews from products across the IT board including phones and accessories, cameras, and software from a wide range of vendors. Each issue of the magazine featured a cover disc - either a DVD or a CD. The discs contained full-version commercial software products, as well as commercial software demos. In 2010 PC Advisor also became one of the first UK ESD (electronic software delivery) vendors of Microsoft's Windows 7 and Office 2010 products. PC Advisor 's website hosted one of Europe's largest online communities with its tech forums and was considered one of the most popular technology magazine websites. History The print publication first appeared on UK news-stands in August 1995 with an October cover date. The website was launched in 1996. In 2007, PC Advisor print magazine had an audited rate base of 65,160 readers (ABC audit: Jan-Dec 06) and a claimed 195,480 readers. PC Advisor's editorial team routinely recommended best-in-class hardware and software products, while the PC Advisor Awards ran annually, with awards chosen by a combination of the editorial team and readers. In 2009 it also ran a UK Broadband Survey in association with Broadband Genie, and published Home Broadband Surveys annually. In 1997, PC Advisor was given an official seal of Approval by the British Association of Criminal Experts. It achieved a '3-star' rating in three different categories, which is the highest level of rating for a non-forensic and expert publication. The magazine received 3 stars in each of the following categories; Academic Opinion, use as a Reference Source and use of Plain English. The editorial team behind PC Advisor was awarded Content Team of the Year in the 2014 British Media Awards. In 2016 PC Advisor was recognised as the UK's most popular tech website by Hitwise. PC Advisor ran for 264 issues, with the last being July 2017. See also Computer Shopper PC Format PC Plus PC Pro Personal Computer World References External links 1995 establishments in the United Kingdom 2017 disestablishments in the United Kingdom Defunct computer magazines published in the United Kingdom Home computer magazines Magazines established in 1995 Magazines disestablished in 2017 Monthly magazines published in the United Kingdom
6046165
https://en.wikipedia.org/wiki/Rollover%20%28keyboard%29
Rollover (keyboard)
Rollover is the ability of a computer keyboard to correctly handle several simultaneous keystrokes. Keyboard usage During normal typing on a conventional computer keyboard, only one key is usually pressed at any given time, then released before the next key is pressed. However, this is not always the case. When using modifier keys such as Shift or Control, the user intentionally holds the modifier key(s) while pressing and releasing another key. Rapid typists may also sometimes inadvertently press a key before releasing the previous one. Certain unusual forms of keyboarding require multiple keys to be pressed or held down simultaneously; for example, Braille2000 keying requires as many as six keys to be pressed at once analogous to the six dot keys of a Braille typewriter. Some computer games require multiple keys (other than the usual modifier keys) to be held down while others are pressed and released, in order to perform actions simultaneously; a common scenario would be the holding down of two Arrow keys or WASD keys in order to move the player in a diagonal direction. Other scenarios might be pressing a key to interact with an object or item in the game while holding down an Arrow key to signify movement. n-key rollover Certain high-end keyboards have "n-key rollover" (NKRO). This means that each key is scanned completely independently by the keyboard hardware, so that each keypress is correctly detected regardless of how many other keys are being pressed or held down at the time. Most music keyboards use isolation diodes in their keyboard matrix to implement full n-key rollover, making them immune to both key ghosting and key jamming. However, to reduce cost and design complexity, most computer keyboards do not isolate all keys in this way. Instead, they use a matrix of key switches, without any isolation diodes, that assumes that only a limited number of keys will be held down at any given time. With these keyboards, pressing as few as three keys can cause ghosting effects, although care is taken when laying out the matrix arrangement that this does not happen for common modifier key combinations. For the user to get the benefit of the full n-key rollover, the complete key press status must be transmitted to the computer. When the data is sent via the USB protocol, there are two operating modes: Human Interface Device (HID) "report protocol" and "boot protocol". The (optional) boot protocol, which is solely used by very limited USB host implementations such as BIOS, is limited to 8 modifier keys (left and right versions of Ctrl, Shift, Alt, and Win), followed by maximum 6 key codes. This will limit the number of simultaneous key presses that can be reported. The (mandatory) HID report protocol, which is what operating systems use, imposes no restrictions and supports full n-key rollover. The HID specification however imposes no requirements on rollover and low-end keyboards may impose the same restrictions regardless of whether the boot protocol or the HID report protocol is used. Multi-key rollover A keyboard with "two-key rollover" can reliably detect only any two keys used simultaneously; in other words, a user can hold down any key on the keyboard and press a second key, and be sure that the keypress is correctly detected by the computer. However, if the user has two keys depressed and attempts to strike a third key, the third keypress may create a "phantom key" by shorting out the switch matrix. This is not acceptable for quality keyboards because there are many cases when more than two keys need to be depressed at the same time, such as Ctrl-Alt-Delete, or when more than two keys are depressed because of fast typing ("rolling over" more than two keys). "Multi-key rollover" is considered essential for quality keyboards and for English-language touch typing. This is where the most common key sequences have been studied, and keys in the same common sequence are placed in the electrical switch matrix such that three keys down cannot produce a fourth "phantom" key by shorting out the matrix. The simplest way to accomplish this is to put all keys in the same common sequence on the same X or Y line of the switch matrix. As long as the electronics do not see more than two keys on different X and Y lines, which would create a phantom key, it will continue to process the next key depressed. This typically produces four- to five-key rollover for the most common key sequences. Key jamming and ghosting Key ghosting occurs on matrix keyboards for certain combinations of three keys. When these three keys are pressed simultaneously, a fourth keypress is erroneously registered by the keyboard controller. Modern keyboards detect ghosting, and instead of registering a fourth key, they will ignore the third key, which is known as jamming. Which keys jam when pressed together differs between brands and models of keyboards. Due to the keyboard matrix most consumer keyboards use, jamming and ghosting often occur when three out of four keys in a square block on the matrix are pressed, such as QASW or JKUI. Most music keyboards and some high-end computer keyboards use an isolation diode with each keyswitch in their matrix, and can correctly read any combination (chording) of keys pressed in any order and released in any order—they are immune to both key ghosting and key jamming. Some "gaming keyboards" use a matrix, but only give individual diodes to the most frequently-used keys in gaming such as WASD and the arrow keys. Key jamming is often noticed when using a keyboard to play computer games where many keypresses combine to movement vectors and other, simultaneous activities rather than typing text. The original Star Control game included a utility to test for key jamming and help the player to determine the best key mapping for their keyboard, since during gameplay it was common for each of the two players to be pressing three or four keys at the same time. Many computer games and console emulators use the control, alt, and shift keys by default. Computer keyboards typically are designed to detect these keys being activated in addition to others from the character matrix, and this may prevent key jamming. See also Charlieplexing Keyboard technology References External links Keyboard ghosting interactive demonstration Computer keyboards
428117
https://en.wikipedia.org/wiki/StuffIt
StuffIt
StuffIt was a family of computer software utilities for archiving and compressing files. Originally produced for the Macintosh, versions for Microsoft Windows, Linux (x86), and Sun Solaris were later created. The proprietary compression format used by the StuffIt utilities is also termed StuffIt. In December 2019, Smith Micro Software, the product's most-recent owner and developer, officially announced that StuffIt had reached its end-of-life and that StuffIt products would no longer be developed. One last update did come out in December 2020 after the launch of the Apple M1 architecture to support that and Intel Mac systems through a universal binary of the program. Overview StuffIt was originally developed in the summer of 1987 by Raymond Lau, who was then a student at Stuyvesant High School in New York City. It combined the fork-combining capabilities of utilities such as MacBinary with newer compression algorithms similar to those used in ZIP. Compared to existing utilities on the Mac, notably PackIt, StuffIt offered "one step" operation and higher compression ratios. By the fall of 1987 StuffIt had largely replaced PackIt in the Mac world, with many software sites even going so far as to convert existing PackIt archives to save more space. StuffIt soon became very popular and Aladdin Systems was formed to market it (the last shareware release by Lau was version 1.5.1). They split the product line in two, offering StuffIt Classic in shareware and StuffIt Deluxe as a commercial package. Deluxe added a variety of additional functions, including additional compression methods and integration into the Mac Finder to allow files to be compressed from a "Magic Menu", or seamlessly browse inside and edit compressed files without expanding them using "True Finder Integration". StuffIt was upgraded several times, and Lau removed himself from direct development as major upgrades to the "internal machinery" were rare. Because new features and techniques appeared regularly on the Macintosh platform, the shareware utility Compact Pro emerged as a competitor to StuffIt in the early 1990s. A major competitive upgrade followed, accompanied by the release of the freeware StuffIt Expander, to make the format more universally readable, as well as the shareware StuffIt Lite which made it easier to produce. Prior to this anyone attempting to use the format needed to buy StuffIt, making Compact Pro more attractive. This move was a success, and Compact Pro subsequently fell out of use. Several other Mac compression utilities appeared and disappeared during the 1990s, but none became a real threat to StuffIt's dominance. The only ones to see any widespread use were special-purpose "disk expanders" like DiskDoubler and SuperDisk!, which served a different niche. Apparently as a side-effect, StuffIt once again saw few upgrades. The file format changed in a number of major revisions, leading to incompatible updates. PC-based formats long surpassed the original StuffIt format in terms of compression, notably newer systems like RAR and 7z. These had little impact on the Mac market, as most of these never appeared in an easy-to-use program on the Mac. With the introduction of Mac OS X, newer Mac software lost their forks and no longer needed anything except the built-in Unix utilities like gzip and tar. Numerous programs "wrapping" these utilities were distributed, and since these files could be opened on any machine, they were considerably more practical than StuffIt in an era when most data is cross-platform. With the release of OS X Public Beta, Aladdin Systems released StuffIt 6.0 which runs under OS X. Although it was late to market, Aladdin Systems introduced the completely new StuffIt X format in September 2002 with StuffIt Deluxe 7.0 for Macintosh. It was designed to be extendable, support more compression methods, support long file names, and support Unix and Windows file attributes. StuffIt X improves over the original StuffIt format and its descendants by adding multiple compression algorithms such as PPM, and BWT to LZW-type compression. It also added a "block mode" option, error correcting "redundancy" options to protect against data loss, and several encryption options. In January 2005, JPEG compression was added as a StuffIt X compression option (see the related 'SIF Format' below). From the mid-1990s until the 2005 acquisition by Smith Micro Software, coinciding with the release of Mac OS X v10.4 "Tiger," StuffIt Expander came bundled with the Macintosh operating system. Although Mac files generally did not use filename extensions, one of StuffIt's primary uses was to allow Mac files to be stored on non-Mac systems where extensions were required. So, StuffIt-compressed files save the resource forks of the Macintosh files inside them, and typically have the extension . Newer (non-backwards compatible) Stuffit X-compressed files carry the file extension . Encrypted StuffIt archives created with the now-discontinued Private File utility will have extensions. StuffIt-compressed ShrinkWrap disk images will carry or extensions. However, a Classic Mac OS version of StuffIt is needed to mount the images or convert them to a newer format readable in macOS. Smith Micro Software offers free downloads of StuffIt Expander for Mac and Windows, which expands (uncompresses) files compressed using the StuffIt and StuffIt X format, as well as many other compressed, encoded, encrypted and segmented formats. The shareware application DropStuff permits the compressing of files into the StuffIt X format. The StuffIt and StuffIt X formats remain, unlike some other file compression formats, proprietary, and Smith Micro Software charge license fees for its use in other programs. Given this, few alternative programs support the format. There was also an "self-expanding" variant of StuffIt files with a extension that runs as an executable. A utility called exists to turn such an executable into a vanilla sit file. Derivative products StuffIt Image Format (SIF) Early in 2005, a new JPEG compression system was released that regularly obtained compression in the order of 25% (meaning a compressed file size 75% of the original file size) without any further loss of image quality and with the ability to rebuild the original file, not just the original image. (ZIP-like programs typically achieve JPEG compression rates in the order of 1 to 3%. Programs that optimize JPEGs without regard for the original file, only the original image, obtain compression rates from 3 to 10% (depending on the efficiency of the original JPEG). Programs that use the rarely implemented arithmetic coding option available to the JPEG standard typically achieve rates around 12%.) The new technique was implemented as a StuffIt X format option in their StuffIt Deluxe product. They have also proposed a new image format known as SIF, which simply consists of a single JPEG file compressed using this new technique. Pending filing of their patent, they retain knowledge of the details of this algorithm as a trade secret. Some details are disclosed in: the high JPEG recompression is achieved by undoing the last step of the JPEG compression itself (the Huffman encoding of quantized transform coefficients). Instead, the transform coefficients are compressed by a more efficient algorithm (a predictive model based on the DC coefficients of neighboring blocks). Similar techniques are also applied for other image file formats such as GIF and TIFF and even the MP3 music file format. By means of decomposition, the relatively high compression rates for individual file formats can also be achieved for container file formats such as PDF, PSD and even ZIP. StuffIt Wireless On July 5, 2005, Smith Micro Software announced their acquisition and intention to expand the new JPEG recompression technique to wireless platforms and other file formats. The initial press release and preliminary information saw the first use of the title “StuffIt Wireless.” StuffIt Expander StuffIt Expander is a proprietary, freeware, closed source, decompression software utility developed by Allume Systems (a subsidiary of Smith Micro Software formerly known as Aladdin Systems). It runs on the classic Mac OS, macOS, and Microsoft Windows. Prior to 2011, a Linux version had also been available for download. Notable features Duplicate Folding Duplicate Folding is a feature which saves even more space by only keeping one copy of a duplicate file in an archive. Issues Backwards compatibility Changes to the Stuffit compression format render previous versions of Stuffit or software using its API unable to decompress newer archives, necessitating installation of new versions. This incompatibility can be inconvenient for work flows where timely execution is of importance, or where the intended recipient's system is not capable of running newer versions of Stuffit. Though users are able to create archives in a legacy format, this functionality is not clearly exposed. Alternatives macOS includes Archive Utility which decompresses the legacy open formats ZIP, GZIP, and BZIP2, and creates ZIP. In versions since 10.3 (Panther), it now preserves resource forks in the ZIP format, so Stuffit is no longer a requirement for Mac file compression. ZIP is also a de facto standard, making it more widely accepted for archives and sharing. While StuffIt used to be a standard way of packaging Mac software for download, macOS native compressed disk images (DMG) have largely replaced this practice. StuffIt might still be used in situations where its specific features are required (archive editing/browsing, better compression, JPEG compression, encryption, old packages). An open source alternative might be The Unarchiver, even if it doesn't support the last versions of the StuffIt file formats. Some 3rd-party software, such as the Macintosh Finder replacement Path Finder, use the licensed Stuffit SDK to gain all the features of Stuffit. See also List of archive formats List of file archivers Comparison of file archivers DiskDoubler References External links StuffIt official website Raymond Lau's home page JPEG Compression Test Conversation with Raymond Lau Stuffit Method 15 compression format (Arsenic) Archive formats Data compression software Classic Mac OS software MacOS archivers and compression-related utilities Windows archivers and compression-related utilities File archivers Windows compression software
47107872
https://en.wikipedia.org/wiki/History%20of%20Nokia
History of Nokia
Nokia is a Finnish multinational corporation founded on 12 May 1865 as a single paper mill operation. Through the 19th century the company expanded, branching into several different products. In 1967, the Nokia corporation was formed. In the late 20th century, the company took advantage of the increasing popularity of computer and mobile phones. However, increased competition and other market forces caused changes in Nokia's business arrangements. In 2014, Nokia's mobile phone business was sold to Microsoft. 19th century The name "Nokia" is derived from the town Nokia and the Nokianvirta River which was aside the factory. The commercial entities that preceded the modern-day Nokia company included Nokia Ab (Nokia company); Suomen Gummitehdas Oy (Finnish Rubber Works Ltd); and Suomen Kaapelitehdas Oy (Finnish Cable Works Ltd). In 1865, the mining engineer, Fredrik Idestam established a ground wood pulp mill on the banks of the Tammerkoski rapids in the town of Tampere, in southwestern Finland. Tampere was then part of the Russian Empire. In 1868, Idestam built a second mill near the town of Nokia. Nokia lies west of Tampere, by the Nokianvirta river. The river had better hydropower resources than those at Tampere. In 1871, Idestam and Leo Mechelin, a statesman and Idestam's friend, transformed Idestam's enterprises into a public limited company called Nokia Ab. In the late 1800s, Mechelin wanted to expand the company into the electricity business. However, Idestam refused. In 1896, Idestam retired and Mechelin became the company's chairman. He remained chairman from 1898 to 1914. During this time, Mechelin persuaded shareholders to allow the company to enter the electricity business. In 1902, Nokia commenced electricity generation. 20th century Eduard Polón (1866 1960), was a Finnish business leader. In 1898, Polón founded Suomen Gummitehdas Oy (Finnish Rubber Works) - a manufacturer of galoshes and other rubber products. In the early 1900s, the Finnish Rubber Works established factories near Nokia and used the town's name in the company's branding. After World War I, the Nokia Company was nearing bankruptcy and was acquired by the Finnish Rubber Works. In 1932, the Finnish Rubber Works also acquired the Suomen Kaapelitehdas Oy (Finnish Cable Works). The cable works had been founded in 1912 by Arvid Wickström. His company produced telephone, telegraph, and electrical cables. In 1963, after 16 years as a technical director, Verner Weckman became the president of the Finnish Cable Works company. Weckman was a wrestler and was Finland's first Olympic Gold medallist. After World War II, Finnish Cable Works supplied cables to the Soviet Union as part of its war reparations. This gave the company a foothold for later trade. Nokia corporation In 1967, Nokia Corporation was formed through the merger of the three companies. The new company manufactured products including paper items, car and bicycle tires, rubber boots, communications cables, televisions and other consumer electronics, personal computers, generators, robotics, capacitors, Military technology and equipment (such as the SANLA M/90 device and the M61 gas mask for the Finnish Army), plastics, aluminum and chemicals. In 1960, a cable division of the Nokia group had been formed. In 1962, it produced a pulse height analyzer used in nuclear power plants. In 1967, an electronics division within the Nokia corporation was formed. It operated for the next fifteen years, sometimes at a loss. Nokia researchers were encouraged to develop their own projects. This may have contributed to Nokia's focus on mobile phone technologies. Network equipment In the 1970s, Nokia produced the Nokia DX 200, a digital switch for telephone exchanges. The DX 200 became the workhorse of the network equipment division. Its architecture allowed it to be further developed into other switching products. For example, in 1984, the development of an exchange for the Nordic Mobile Telephony network was begun. The network equipment division was merged with a Finnish State entity to form "Telefenno". In 1987, the state sold its shares in Telefenno to Nokia and in 1992, the name was changed to Nokia Telecommunications. In 1998, the Israeli multinational company, Check Point which was founded in 1993, established a partnership with Nokia. Check Point's software was bundled with Nokia's network security tools. Mobile radio telephony Prior to cellular mobile telephony, there was mobile radio telephony. In the 1960s, Nokia had started producing commercial and military mobile radio telephones. From 1964, Nokia had developed VHF radios in collaboration with Salora Oy. From 1966, Nokia and Salora had developed ARPs (Autoradiopuhelin or radio car phones). In 1971, this technology became the first commercially available mobile phone network in Finland and in 1978, it offered 100 percent coverage in Finland. In the 1970s and 1980s, Nokia developed the Sanomalaitejärjestelmä (messaging system), a digital, portable and encrypted text-based communications device for the Finnish Defence Forces. Nokia mobile telephone (1G) In 1979, Nokia and Salora established a joint venture, "Mobira Oy". Mobira developed mobile phones for the Nordic Mobile Telephone (NMT) network, called the "1G" and was the first fully automatic cellular phone system. It became commercially available in 1981. In 1982, Mobira introduced its first car phone, the "Mobira Senator" for NMT 450 networks. In 1984, Nokia purchased Salora. Nokia's telecommunications division was renamed "Nokia-Mobira Oy". In the same year, the "Mobira Talkman", an early portable phone was launched. In 1987, Nokia introduced its first mobile phone, the "Mobira Cityman 900" for NMT 900 networks. In comparison to the NMT 450 network, there was a better signal strength but less coverage. While the Mobira Senator of 1982 had weighed and the Talkman just under , the Mobira Cityman weighed only including its battery. The phone, which was considered expensive, became an item indicating a high status. In 1987, the Soviet leader Mikhail Gorbachev was seen using a Mobira Cityman in Helsinki. The phone developed the nickname, the "Gorba". In 1989, Nokia-Mobira Oy was renamed "Nokia Mobile Phones". Global system for mobile communications (2G) Nokia contributed to the development of the GSM 2G. It was able to carry data (computing) as well as voice traffic. Nordic Mobile Telephony (NMT) was an early provider of international roaming. In 1987, GSM 2G became the new European standard for digital mobile technology. In 1989, Nokia delivered its first GSM network to the Finnish operator Radiolinja. On 1 July 1991, in Helsinki, the first telephone call on the GSM G2 network was made by Harri Holkeri, the Prime Minister of Finland. He used a prototype Nokia GSM phone to make the call. In 1992, the first GSM phone, the Nokia 1011, was made commercially available. The model number, "1011" refers to its launch date on 10 November 1992. In 1994, a branding ringtone, the Nokia tune, was included with the Nokia 2100 series. The GSM 2G network and mobile phones provided improved voice calls, international roaming and support for new services such as text messaging (Short Message Service (SMS)). In 2008, the GSM 2G network had approximately 3 billion users. There were at least 700 mobile phone commercial providers in 218 nations or territories. There were 15 mobile phone connections per second and 1.3 million mobile phone connections per day. Personal computers In the 1980s, Nokia's computer division "Nokia Data" produced a series of personal computers called the "MikroMikko". It was aimed at the business market. MikroMikko 1, was released on 29 September 1981. Its competitor was the IBM personal computer. In 1991, Nokia Data was sold to a British company, International Computers Limited (ICL). Nokia produced Cathode ray tubes (CRT) and thin film transistor liquid crystal displays (|TFT LCDs) for personal computers and other applications. In 2000, Nokia sold its display products division to ViewSonic. However, in August 2009, Nokia released the Nokia Booklet 3G mini laptop which it continued for a short time. Other abandoned Nokia products include DSL modems and digital set-top boxes. Telecommunications In the 1980s under the chief executive officer (CEO) Kari Kairamo, Nokia expanded, mostly through acquisitions. In the late 1980s and early 1990s, however, Nokia corporation experienced financial difficulties. Losses were made in the television manufacturing division. In 1988, Nokian Tyres became a separate entity. Nokia's paper division was sold in 1989. In 1990, Nokian Footwear was a separate entity. During the rest of the 1990s, Nokia divested itself of all other businesses. In 1988, Kairamo committed suicide. Following his death, Simo Vuorilehto became Nokia's chairman and CEO. From 1990 to 1993, Finland was in recession. Vuorilehto made major changes to the Nokia corporation. The telecommunications division was stream-lined. The television and personal computing divisions were sold. In 1992, Jorma Ollila became CEO. He made telecommunications Nokia's sole concern. International sales increased relative to those in Finland. By the mid 1990s, Nokia's supply of mobile telephones could not meet demand. Changes to Nokia's supply chain were made. Between 1996 and 2001, Nokia's revenue increased from 6.5 billion euros to 31 billion euros and between 1998 and 2012, Nokia was the world's largest mobile phone manufacturer. Nokia's logistics and economies of scale advantaged the company. 21st century In 2000, Nokia launched the Nokia 3310. In 2003, the Nokia 1100 handset was launched. Nokia combined a video game console and a mobile phone in the "N-Gage". In April 2008, Nokia Productions started a mobile movie-making project. The movie which was presented at the Nokia Theater Los Angeles on 14 October 2008 was directed by Spike Lee. It was approximately 15 minutes long and comprised short segments made on phones contributed by the public. The theme of the movie was "humanity". In 2009, Nokia reentered the personal computing market. Its product, the Nokia Booklet 3G was a Windows-based netbook. The company also entered the smartphone market. The Series 40 was a phone platform used in feature phones, mainly running Java-based applications. Nokia acquired Smarterphone, a company making the Smarterphone OS for "low end" phones and merged it with Series 40 to form the Asha Platform, which also used some user interface characteristics from Nokia's MeeGo platform. The Asha 501 used this new operating system. The Series 40 was discontinued in late 2014. Symbian OS Until 2011, Symbian was Nokia's main smartphone operating system. The devices using the Symbian operating system included the Nokia 7650, Nokia N-Gage, Nokia N96, Nokia 6600, Nokia 7610, Nokia 6630, Nokia N90, Nokia N95, Nokia N82, Nokia E71, Nokia 5800 XpressMusic, Nokia N97, Nokia X6 and the Nokia N8. The 2012 Nokia 808 PureView had a 41-megapixel camera. It was the last phone using the Symbian platform. Linux devices Nokia's first Linux devices were the Nokia Internet tablets and the Nokia N900, which ran the Debian-based Maemo. The Maemo project merged with Intel's Moblin to create MeeGo. The Nokia N9 was released before MeeGo was abandoned in favour of Windows Phone. The final products using Linux were the Nokia X series which had an Android operating system. Reorganizations On 5 May 2000, Nokia opened a mobile phone factory in Komárom, Hungary. In April 2003, difficulties in Nokia's division of network equipment led to restructuring and layoffs. Nokia's public image in Finland was diminished. litigation was brought against Nokia and a critical documentary television program was broadcast. In June 2006, CEO of Nokia Jorma Ollila, resigned and became the chairman of Royal Dutch Shell Olli-Pekka Kallasvuo was the new CEO. In March 2007, Nokia signed an agreement with Cluj County Council, Romania to open a plant near the city in Jucu commune. Moving the production from the Bochum, Germany factory to a low wage country created an uproar in Germany. In 2008, Nokia ceased its mobile phone distribution in Japan. In 2009, Check Point purchased Nokia's network security division. In February 2012, Nokia announced that 4,000 employees would be dismissed. This was to allow its manufacturing centres to move from Europe and Mexico to Asia. In March 2012, Nokia dismissed 1,000 employees at its Salo, Finland factory. In June 2012, research facilities in Ulm, Germany and Burnaby, Canada closed. By the end of 2013, 10,000 employees had been dismissed. In January 2013, Nokia dismissed 1,000 employees from its internet technology, production and logistics divisions. Acquisitions On 22 September 2003, Nokia acquired "Sega.com", a branch of Sega in order to develop the N-Gage device. On 10 February 2006, Nokia purchased the Intellisync Corporation, a provider of data and Personal information management (PIM) synchronization software. On 19 June 2006, Nokia and Siemens AG announced the merger of their mobile and fixed-line phone network equipment businesses with equal holdings. This created the entity "Nokia Siemens Networks" located in Espoo, Finland. Approximately 20,000 Nokia employees were employed by the new company. On 8 August 2006, Nokia purchased the online music distributor "Loudeye Corporation" for approximately US$60 million. In July 2007, Nokia purchased the media sharing service "Twango". In September 2007, Nokia purchased "Enpocket", a supplier of mobile advertising technology and services. On 10 July 2008, Nokia purchased "Navteq", a U.S. based supplier of digital mapping data, for $8.1 billion. In September 2008, Nokia purchased "OZ Communications" of Montreal, Quebec, Canada. OZ was a private company with approximately 220 employees. On 5 August 2009, Nokia purchased some of the assets belonging to "Cellity", a privately owned mobile software company. In September 2009, Nokia purchased some of the assets belonging to "Plum Ventures corporation" to complement Nokia's social location services. In March 2010, Nokia purchased "Novarra", a mobile web browser firm. In April 2010, Nokia acquired MetaCarta, a local search technology firm. In 2012, Nokia purchased "Smarterphone", a feature phone operating system developer, and the imaging company Scalado. Loss of smartphone market share Apple's iPhone (2007) did not immediately outsell the Nokia smartphones such as the Nokia N95. At the end of the 2007 financial year, Symbian had 62.5 percent of the market share while Microsoft's Windows Mobile had 11.9 percent and BlackBerry (RIM) had 10.9 percent. However, at the end of the 2008 financial year, Nokia's market share had fallen to 40.8 percent. The Nokia N96, the Nokia 5800 XpressMusic and the Nokia E71 did not compete against Apple's iPhone 3G. On 24 June 2008, Nokia bought the Symbian operating system and in 2009 made it open source. In early 2009, Nokia released several devices such as the Nokia N97, a touchscreen device with a landscape QWERTY slider keyboard that was focused on social networking which received mixed reviews and the Nokia E52 which received positive reviews. At the end of the 2008 financial year, Symbian's market share was 52.4 percent and at the same time in 2009, it was 46.1 percent with the loss going to Blackberry, iOS and Android. In 2010, the commercial pressure on Nokia increased. Original equipment manufacturers such as Samsung Electronics and Sony Ericsson chose to make Android based smartphones, not Symbian based smartphones. Nokia developed "Symbian^3" to replace the S60 platform but it never became popular. At the end of the 2010 financial year, Symbian's market share was 32 percent while Android's was 30 percent. Despite losing market share, Nokia's smartphones were profitable. Sales in 2010 steadily increased quarter by quarter. In the last quarter of 2010, Nokia sold 4 million N8 smartphones. In February 2010, Nokia and Intel announced "MeeGo". MeeGo was a merger of their Linux based Maemo and Moblin projects. The project aimed to create one mobile operating system suitable for many types of device including tablets and smartphones. Nokia planned to use MeeGo on its smartphones. This was only achieved on the Nokia N9 (2011). In February 2011, Elop wrote to his employees. He said Nokia was on a "burning platform". Elop said the "war of ecosystems" (software ecosystem) between iOS and Android was part of Nokia's commercial difficulties. Partnership with Microsoft In February 2011, Stephen Elop and Microsoft's CEO Steve Ballmer formed a business partnership. (Elop had worked at Microsoft.) Nokia adopted Windows Phone as the operating system on its smartphones and accessed the Bing search engine for its devices. The "Here" Nokia maps software was integrated into Microsoft's "Bing" mapping services. In June 2011, Apple was making more smartphones than Nokia and a successful partnership with Microsoft became imperative for Nokia's business. In September 2011, Nokia dismissed 3,500 employees and closed its factory in Cluj, Romania. On 26 October 2011, at the Nokia World conference, the first Nokia Windows Phone 7 based devices were launched. They were the Nokia Lumia 710 and the more expensive Nokia Lumia 800. After the launch, Nokia's share price fell approximately 14 percent and Nokia's smartphone sales rapidly decreased. Between 2011 until 2013, Nokia's sales of smartphones fell from first in the market to tenth. In the second quarter of the 2011 financial year, Nokia made a loss of 368 million Euros. On 26 January 2012, Nokia reported its sales of the Lumia smartphones was "well above one million", two million sales in the first quarter of the 2012 financial year and four million sales in the second quarter of the 2012 financial year. However, in the second quarter of the 2012 financial year, in North America, Nokia sold 600,000 Symbian and Windows phones combined. In the same period, 26 million iPhones and 105 million Android phones were sold. In August 2012, while announcing an alliance with Groupon, Elop identified Google as a competitor. On 8 February 2012, Nokia dismissed 4,000 employees from smartphone manufacturing plants in Europe. Smartphone assembly was moved closer to component suppliers in Asia. On 14 June 2012, Nokia a further 10,000 dismissals. Production and research sites in Finland, Germany and Canada were closed. On 18 June 2012, Moody's downgraded Nokia's bond rating to junk. On 4 May 2012, a group of Nokia investors filed a class action against the company as a result of disappointing sales. On 22 August 2012, there were calls for Elop's dismissal. In December 2012, Nokia sold its headquarters, Nokia House, for €170 million and then leased the property. In the fourth quarter of the 2012 financial year, Nokia sold 6.6 million smartphones (2.2 million Symbian and 4.4 million Lumia devices). In May 2013, Nokia released the Asha platform on its inexpensive smartphone devices. The American media company Vox Media speculated Nokia was not fully committed to Windows. In the same month, Nokia entered a partnership with China Mobile, the Chinese mobile service provider to make the Lumia 920 (Lumia 920T) available in China. In the second quarter of the 2013 financial year, Nokia recorded an operating loss of €115m. Nokia's revenue fell to €5.7bn. In the same period, sales of the Lumia smartphone exceeded those of BlackBerry's handsets. Nokia's sales results were especially poor in China and the US. In the second quarter of the 2013 financial year, 7.4 million Lumia devices were sold. Sale of mobile phone business to Microsoft On 25 April 2014, Nokia sold its mobile phone business to Microsoft for approximately €3.79bn. €1.65bn was paid by Microsoft for a ten-year license to Nokia's patents. Nokia's mobile phone assets became a part of Microsoft Mobile, based in Finland. The purchase was delayed from March 2014 to April 2014 while a taxation dispute in India was resolved. Microsoft acquired the Asha, X and Lumia brands, but had only a limited license to the Nokia brand. Microsoft could only use the Nokia brand to promote Asha, X and Lumia products until December 2015, and feature phones for 10 years. Microsoft did not acquire any rights to the Nokia tune but can use it as the default ringtone on Nokia branded devices. Nokia was prohibited from manufacturing any Nokia branded smartphones until December 2015. Microsoft also took over Nokia's website and social media outlets for a minimum of one year. Microsoft used Nokia branding until October 2014. Elop became the head of Microsoft's devices division. Risto Siilasmaa became acting CEO of Nokia until the appointment of Rajeev Suri. Nokia continued Nokia Networks, its infrastructure division and Nokia Technologies, its development and licensing division. In July 2014, Microsoft dismissed 12,500 former Nokia employees. Microsoft also ended development of Nokia's non-Windows Phone product lines. Sale of licenses In October 2014, Nokia and China Mobile signed a $970 million framework deal for delivery between 2014 and 2015. On 17 November 2014, Ramzi Haidamus, head of the Nokia technologies division said the company planned to re-enter the consumer electronics business by licensing in-house hardware designs and technologies to third-party manufacturers. On 18 November 2014, the N1, an Android tablet manufactured by Foxconn was released. Alcatel-Lucent On 3 November 2016, Nokia purchased the French telecommunications equipment company Alcatel-Lucent for approximately €15.6 billion. At completion, Nokia shareholders held 66.5% of the new company and Alcatel-Lucent shareholders held 33.5% of the new company. Alcatel-Lucent's Bell Labs and submarine cables division were maintained in the new company. The Alcatel-Lucent brand was no longer used. The purchase required approval by China's Ministry of Commerce and French regulators. On August 3, 2015, Nokia announced that it had reached a deal to sell its Here digital maps division to a consortium of three German automakers—BMW, Daimler AG and Volkswagen Group, for €2.8 billion. Foxconn and HMD Global On 18 May 2016 Microsoft sold the Nokia-branded featurephone division to FIH Mobile, a division of Foxconn, and HMD, a new company in Finland. Nokia provided its brand and patent licensing to HMD, and took a seat on the board of directors. On 8 January 2017, Nokia 6, a mid-range smartphone based on the Qualcomm Snapdragon 430 system-on-chip running Android was launched. The Nokia 5, Nokia 3, Nokia 3310 and Nokia 6 Arte were also released. References Nokia Nokia
26597181
https://en.wikipedia.org/wiki/GNOSIS
GNOSIS
Great New Operating System In the Sky (GNOSIS) is a capability-based operating system that was researched during the 1970s at Tymshare, Inc. It was based on the research of Norman Hardy, Dale E. Jordan, Bill Frantz, Charlie Landau, Jay Jonekait, et al. It provided a foundation for the development of future operating systems such as KeyKOS, EROS, CapROS, and Coyotos. In 1984, McDonnell Douglas acquired Tymshare, and a year later sold GNOSIS to Key Logic, where GNOSIS was renamed KeyKOS. References External links , Norman Hardy Capability systems Microkernel-based operating systems Microkernels
15489625
https://en.wikipedia.org/wiki/District%2012%2C%20Ho%20Chi%20Minh%20City
District 12, Ho Chi Minh City
District 12 may also refer to a fictional location in The Hunger Games universe, or to other 12th legislative districts. District 12 () is an urban district (quận) of Ho Chi Minh City, the largest and most populous city in Vietnam. As of 2010, the district had a population of 427,083. The district covers an area of 53.0 km². The district is divided into 11 small subsets which are called wards. District 12 borders Bình Dương Province and the city of Thủ Đức to the east, Hóc Môn District to the west and north, the districts of Bình Thạnh, Gò Vấp, Tân Bình and Tân Phú to the south. Administration The district consists of 10 wards: An Phú Đông Đông Hưng Thuận Hiệp Thành Tân Chánh Hiệp Tân Thới Hiệp Tân Thới Nhất Thạnh Lộc Thạnh Xuân Thới An Trung Mỹ Tây Quang Trung Software City The goal of the city is to offer a living and workplace to people who are particularly interested in software development as an economic incentive system to spur the growth of the software industry in Vietnam. It is sponsored by the Japan External Trade Organization and United States Agency for International Development. The Vietnamese government has arranged for high speed internet to be wired to the area. The city opened in 2001 and housed 20,000 people in 2010. Legal Incentives In order to facilitate use of this resource a number of laws have been set up. Taxes Companies are tax-exempt for their first four years after making a profit, and then only charged 50% of their normal taxes for the next nine years after their exemption. Overall taxes for the area are 10% for the first 15 years of the city, and 25% after that. Imported materials used for software production are import-tax free so long as they can not yet be used domestically. Exported software products are export-tax exempt. A Value Added Tax is also waived for exported software and domestically consumed software. Foreign Workers Special privileges are available to foreigners who are involved in a city project, particularly in getting visas and in buying or renting houses. Cloud Service Provider Another part of the government incentives includes a cloud computing platform for use by local companies. References Districts of Ho Chi Minh City
35100531
https://en.wikipedia.org/wiki/Virtual%20Cell
Virtual Cell
Virtual Cell (VCell) is an open-source software platform for modeling and simulation of living organisms, primarily cells. It has been designed to be a tool for a wide range of scientists, from experimental cell biologists to theoretical biophysicists. Concept Virtual Cell is an advanced software platform for modeling and simulating reaction kinetics, membrane transport and diffusion in the complex geometries of cells and multicellular tissues. VCell models have a hierarchical tree structure. The trunk level is the "Physiology" consisting of compartments, species and chemical reactions, and reaction rates that are functions of concentrations. Given initial concentrations of species, VCell can calculate how these concentrations change over time. How these numerical simulations are performed, is determined through a number of "Applications", which specify whether simulations will be deterministic or stochastic, and spatial or compartmental; multiple "Applications" can also specify initial concentrations, diffusion coefficients, flow rates and a variety of modeling assumptions. Thus "Applications" can be viewed as computational experiments to test ideas about the physiological system. Each "Application" corresponds to a mathematical description, which is automatically translated into the VCell Math Description Language. Multiple "Simulations", including parameter scans and changes in solver specifications, can be run within each "Application". Models can range from the simple to the highly complex, and can represent a mixture of experimental data and purely theoretical assumptions. The Virtual Cell can be used as a distributed application over the Internet or as a standalone application. The graphical user interface allows construction of complex models in biologically relevant terms: compartment dimensions and shape, molecular characteristics, and interaction parameters. VCell converts the biological description into an equivalent mathematical system of differential equations. Users can switch back-and-forth between the schematic biological view and the mathematical view in the common graphical interface. Indeed, if users desire, they can manipulate the mathematical description directly, bypassing the schematic view. VCell allows users a choice of numerical solvers to translate the mathematical description into software code which is executed to perform the simulations. The results can be displayed on-line, or they can be downloaded to the user's computer in a wide variety of export formats. The Virtual Cell license allows free access to all members of the scientific community. Users may save their models in the VCell DataBase, which is maintained on servers at U. Connecticut. The VCell Database uses an access control system with permissions to allow users to maintain their models private, share them with select collaborators or make them public. The VCell website maintains a searchable list of models that are public and associated with research publications. Features VCell supports the following features: Within the "Physiology", models can be specified as reaction networks or reaction rules. Simulations can be chosen to either resolve variations of concentrations over space (spatial simulations) or assume concentrations constant across compartments (compartmental simulations). For spatial simulations, geometries can be specified by analytic geometry equations, derived from combination of simple shapes or derived from imported images, such as 3D confocal microscope stacks. Utilities for 3D segmentation of image data into regions such as nucleus, mitochondria, cytosol and extracellular are provided. Simulations can be based on either integration of differential equations without use of random numbers (deterministic simulations) or be based on random events (stochastic simulations). Simulations can be run using a variety of solvers including: 6 ordinary differential equation (ODE) solvers, 2 partial differential equation (PDE) solvers, 4 non-spatial stochastic solvers and Smoldyn for stochastic spatial simulations. VCell also offers a hybrid deterministic/stochastic spatial solver for situations where some species are present in low copy number and others are present in high copy number. Most recently, a network free solver, NFSim, was made available for stochastic simulation of large combinatorially complex rule-based models. Most solvers can be run locally, all solvers can be run remotely on VCell servers. For compartmental deterministic models, the best parameter values to fit experimental data can be estimated using algorithms developed by the COPASI software system. These tools are available in VCell. Models and simulation setups (so-called Applications) can be stored in local files as Virtual Cell Markup Language (VCML) or stored remotely in the VCell database. Models can be imported and exported as Systems Biology Markup Language (SBML) Biological pathways can be imported as Biological Pathway Exchange (BioPAX) to build and annotate models. Biological and related data sources VCell allows users integrated access to a variety of sources to help build and annotate models: Models stored in the VCell database can be made accessible by their authors to some users (shared) or all users (public). VCell can import models from the BioModels Database. Biological pathways can be imported from Pathway Commons. Model elements can be annotated with IDs from Pubmed UniProt (proteins) KEGG (reactions and species) GeneOntology (reactions and species), Reactome (reactions and species) and ChEBI (mostly small molecules). Development The Virtual Cell is being developed at the R. D Berlin Center for Cell Analysis and Modeling at the University of Connecticut Health Center. The team is primarily funded through research grants through the National Institutes of Health. References External links VCell home page VCell Download VCell user forum VCell Models in publications Tutorial about using VCell on YouTube. Source code on GitHub Mathematical and theoretical biology Systems biology Numerical software Numerical differential equations Free science software
8435544
https://en.wikipedia.org/wiki/Walls%20and%20Mirrors
Walls and Mirrors
Walls And Mirrors is a computer science textbook, for undergraduates taking a second computer science course (typically on the subject of data structures and algorithms), originally written by Paul Helman and Robert Veroff. The book attempts to strike a balance between being too mathematically rigorous and formal, and being so informal, practical, and hands-on that computer science theory is not taught. The "walls" of the title refer to the abstract data type (ADT) which has a wall between its public interface and private implementation. Early languages like Pascal did not build this wall very high; later languages like Modula-2 did create a much stronger wall between the two; and object-oriented languages such as C++ and Java implement walls using the class concept. The "mirrors" of the title refer to recursion. The idea is of looking at a reflection in two mirrors placed in opposition to one another, so a repeated image is reflected smaller and smaller in them. Editions The first edition, which used the language Pascal, was published in 1986. An edition that used Modula-2 was published in 1988. Modula-2 had much better support for the sort of ADT the book taught than Pascal. Later editions from the mid-1990s and the 2000s used C++ and Java, reflecting a fundamental shift in how computer science was taught. The original authors' names have been removed from the most recent editions of the book. Publication History Walls and Mirrors, Intermediate Problem Solving and Data Structures (Pascal edition) (1986), Paul Helman and Robert Veroff. (Benjamin Cummings Publishing Co.) Walls and Mirrors, Intermediate Problem Solving and Data Structures (Modula-2 edition) (1988), Paul Helman and Robert Veroff. (Benjamin Cummings Publishing Co.) Intermediate Problem Solving and Data Structures: Walls and Mirrors, Second Pascal edition, (1991), Paul Helman, Robert Veroff, and Frank M. Carrano. (Benjamin Cummings Publishing Co.) Data Structures and Problem Solving with Turbo Pascal: Walls and Mirrors, (1993), Frank M. Carrano, Paul Helman, and Robert Veroff. (Benjamin Cummings Publishing Co.) Data Abstraction and Problem Solving with C++: Walls and Mirrors, (1995), Frank M. Carrano, Paul Helman, and Robert Veroff. (Benjamin Cummings Publishing Co.) Data Abstraction and Problem Solving with C++: Walls and Mirrors, Second edition, (1998), Frank M. Carrano, Paul Helman, and Robert Veroff. (Addison Wesley Longman, Inc.) Data Abstraction and Problem Solving with Java: Walls and Mirrors, (2001), Frank M. Carrano and Janet J. Prichard. . (Addison Wesley Longman, Inc.) Data Abstraction and Problem Solving with C++: Walls and Mirrors, Third edition, (2002), Frank M. Carrano and Janet J. Prichard. (Pearson Education, Inc.) Data Abstraction and Problem Solving with Java: Walls and Mirrors, Updated edition (2004), Frank M. Carrano and Janet J. Prichard. (.) Data Abstraction and Problem Solving with C++: Walls and Mirrors, Fourth edition, (2005), Frank M. Carrano. (Pearson Education, Inc.) Data Abstraction and Problem Solving with Java: Walls and Mirrors, Second edition, (2006), Frank M. Carrano and Janet J. Prichard. . (Pearson/Addison Wesley) Data Abstraction and Problem Solving with C++: Walls and Mirrors, Fifth edition, (2007), Frank M. Carrano. . (Pearson Education, Inc.) Data Abstraction and Problem Solving with Java: Walls and Mirrors, Third edition, (2011), Janet J. Prichard and Frank M. Carrano. . (Addison Wesley, an imprint of Pearson) Data Abstraction and Problem Solving with C++: Walls and Mirrors, Sixth edition, (2013), Frank M. Carrano and Timothy M. Henry. . (Pearson Education, Inc.) Data Abstraction and Problem Solving with C++: Walls and Mirrors, Seventh edition, (2017), Frank M. Carrano and Timothy M. Henry. . (Pearson Education, Inc.) 1986 non-fiction books 1988 non-fiction books 2004 non-fiction books Computer science books Science textbooks
1387542
https://en.wikipedia.org/wiki/Pages%20%28word%20processor%29
Pages (word processor)
Pages is a word processor developed by Apple Inc. It is part of the iWork productivity suite and runs on the macOS, iPadOS, and iOS operating systems. It is also available on iCloud on the web. The first version of Pages was released in February 2005. Pages is marketed by Apple as an easy-to-use application that allows users to quickly create documents on their devices. A number of Apple-designed templates comprising different themes (such as letters, résumés, CVs, posters, and outlines) are included with Pages. History On January 11, 2005, Apple announced the first version of Pages, as part of iWork '05. On January 6, 2009, Apple released the fourth version of Pages as a component of iWork '09. On January 27, 2010, Apple announced a new version of Pages for iPad with a touch interface. On May 31, 2011, Apple updated the iOS version of Pages to 1.4, bringing universal binaries, allowing the app to be run on iPad, iPhone, and iPod Touch devices. On October 12, 2011, Apple updated the iOS app to version 1.5, adding the iCloud "Documents in the Cloud" feature. iOS Pages was updated to version 1.6 on March 7, 2012, and will only run on iOS 5.1 or later. Pages for OS X was updated to version 4.3 on December 4, 2012, to support Pages 1.7 for iOS, which was released on the same day. Pages for iOS 1.7.1 introduced better compatibility with Word and Pages for Mac, and version 1.7.2, released on March 7, 2013, merely added stability improvements and bugfixes. On October 23, 2013, Apple released a redesign with Pages 5.0 and made it free for anyone with an iOS device. In this release, many templates, as well as some advanced features that were available in version 4.3, were not included. Some of these missing features were put back over the next releases but the current version (10.3.5) still lacks features from version 4.3, including mail merge, non-contiguous selection of text, advanced find/replace functions, the ability to print comments, and more. Features Pages is a word processor and page layout application. When Pages is first opened, users are presented with a template chooser which allows them to start with a blank document or with a predesigned template—including a basic, report, letter, résumé, envelope, business card, flyers & posters, cards, miscellaneous, and a newsletter section of templates—that contains placeholder text and images which can be replaced by dragging and dropping photos from the Media Browser. The Media Browser provides quick access to media from iTunes, iMovie, and Photos. Users can drag and drop music, movies, and photos directly into Pages documents from the Media Browser window. Each document window contains a toolbar, which gives one-click access to commonly used functions such as inserting objects (text boxes, shapes, tables, charts, and comments), uploading the document to iWork.com, and adding additional pages. In addition, the document window contains a contextual format bar that allows one-click formatting of text and adjustments to images. When text is selected, the format bar enables users to choose fonts, text size, color, and adjust line spacing and alignment. When an image is selected, the format bar displays tools to adjust opacity, show and hide shadow and reflection effects, and mask the image. A separate Inspector window provides almost all formatting options available for any element in the open document. Beginning in iWork '08, word processing and page layout are two distinct modes. In word processing mode, Pages supports headers and footers, footnotes, and outline and list creation. Users can collaborate with others on a document. Pages tracks changes by users by displaying each person's edits in different colors. Users can also add comments alongside the document. In page layout mode, users have complete control over the position of objects on the page. Images and text can be placed anywhere on the canvas. Pages used to feature a number of other advanced writing tools. Many of these have been stripped out of the current version. The "Full Screen" mode (introduced in Mac OS X Lion) and supported in Pages 4.1 hid the menubar and toolbars, allowing users to focus on a single document without being distracted by other windows on the screen; however, after Pages 5, full screen mode requires the user to manually hide various panes for focused writing, and the page thumbnails pane does not automatically open when the cursor is moved to the left screen edge. Earlier versions featured mail merge, which automatically populated custom fields with contact data from the Address Book or Numbers apps to create personalized documents. For example, if a user wanted to send one letter to three people, mail merge allowed the user to create a single document with placeholder fields that were populated when printing. The mail merge feature was completely removed in version 5, although it is still doable through AppleScript. Tables and charts pasted from Numbers are automatically updated if the original spreadsheet is changed. Compatibility Pages can import some Microsoft Word documents (including Word 2007's Office Open XML format). Pages 4 and earlier could also import AppleWorks word processing documents, and export documents to rich text, but those features were removed until Pages 6.1. Pages 5 can still export to PDF, EPUB, and Microsoft Word DOC formats. Simple and complex mathematical equations can be written for a Pages document with macOS's Grapher, offering similar capabilities to Microsoft Equation Editor (plus 2D and 3D rendering tools only Grapher can use). As of January 2015, Pages does not support OpenDocument file format. The only known software other than Pages which can open its files are Apple's iWork productivity suite through Apple's iCloud, LibreOffice, and Jumpshare. Windows users can view and edit Pages files using iWork for iCloud via a web browser. The iCloud system can also read Microsoft Word files and convert Pages files to Microsoft Word format. Jumpshare can view Pages files. Other than accessing iCloud through a browser, there is no program that can officially view or edit a Pages file using Windows or Linux. Some content can be retrieved from a document created in Pages '09, because a .pages file is actually a bundle. A user can open a .pages file in an unpackaging program, or by renaming files as .zip files in Windows (XP and onwards), and will find either a .jpg or .pdf preview in its entirety for viewing and printing, although this is only possible if the creator of the .pages files elected to include a preview. The user will also find a .xml file with unformatted text. This process can also be used for users of the 2008 version of Pages to open documents saved in the 2009 version of Pages, which are not backward compatible. Pages can also export documents into a number of formats; formatting is generally retained during the export process. Version history See also List of word processors Comparison of word processors References External links – official site Pages free resources at iWork Community Screenplay template MacOS word processors MacOS-only software made by Apple Inc. IOS-based software made by Apple Inc. 2005 software iOS software Freeware Word processors
742521
https://en.wikipedia.org/wiki/Initiative%20for%20Software%20Choice
Initiative for Software Choice
The Initiative for Software Choice (ISC) is a lobby group founded in May 2002 in response to widespread international government interest in open source software. The ISC website characterizes its membership as "committed to advancing the concept that multiple competing software markets should be allowed to develop and flourish unimpeded by government preference or mandate". According to many Free Software advocates such as Bruce Perens, Microsoft founded ISC in reaction to the call for the adoption of Free Software by politicians in many countries. The Computing Technology Industry Association (CompTIA) chairs the Initiative. External links Software Choice(Official web site) MS 'Software Choice' scheme a clever fraud, by Bruce Perens ZDNet: Microsoft-sponsored lobbyist to the EU: It’s a mistake to floss us References Information technology lobbying organizations
4539862
https://en.wikipedia.org/wiki/Osaka%20Institute%20of%20Technology
Osaka Institute of Technology
, abbreviated as Dai kōdai (大工大), Han kōdai (阪工大), or Osaka kōdai (大阪工大) is a private university in Osaka Prefecture, Japan. OIT has 3 Campuses, Omiya Campus located in Asahi-ku, Osaka City, Umeda Campus located in Kita-ku, Osaka City and Hirakara Campus located in Hirakata City. History OIT was originally founded in 1922 as Kansai Engineering Technical School by business man Kyosaburo Honjo, together with architect Yasushi Kataoka, who graduated from Tokyo Imperial University (present University of Tokyo) and also served as the school's first principal. In 1940, the school foundation established Kansai Advanced Technical School, a three-year college for men (for ages 17–20). Kansai Advanced Technical School was renamed to Setsunan Advanced Technical School in 1942, further renamed Setsunan Engineering Technical School in 1944. In April 1949, Setsunan Engineering Technical School was upgraded to Setsunan Institute of Technology, a four-year university under Japan's new educational systems. In October 1949, it was renamed to Osaka Institute of Technology (OIT). At first, OIT had one faculty: the so-called Faculty of Engineering, which consisted of three departments (Architecture, Civil Engineering, Electrical Engineering). Later on, OIT added several departments (Mechanical Engineering, Electronics Engineering, Applied Chemistry, Environmental Engineering, Biomedical Engineering), three faculties (Faculty of Information Science and Technology, Faculty of Intellectual Property, Faculty of Robotics and Design), and a graduate school which includes doctoral-level courses. 1949: Faculty of Engineering 1965: Graduate School (Department of Engineering Research; master's courses only) 1967: Ph.D. courses offered 1996: Faculty of Information Science and Technology 2003: Faculty of Intellectual Property 2017: Faculty of Robotics and Design As of April 2017, OIT has four faculties. The Faculty of Intellectual Property was the first-ever and is still the only one of its kind in Japan. Moreover, the Faculty of Robotics and Design provides design thinking education to stress an innovative and creative approach towards design. OIT has three campuses: Omiya Campus: Faculty of Engineering, Faculty of Intellectual Property Umeda Campus: Faculty of Robotics and Design Hirakata Campus: Faculty of Information Science and Technology The Umeda Campus was opened in 2017 near Osaka station and is housed in the 21-storey OIT Umeda Tower, located in the central business district (CBD). Education From Academic Year 2017, OIT offers 16 undergraduate degrees and 6 master's degrees in the field of engineering, robotics and design, information science and technology, and intellectual property. It also offers 5 doctoral degrees in the fields of engineering, robotics and design, information science and technology. OIT offers a number of project-based learning opportunities, including: Solar Car Project Challenge of the OIT MONOLAB. Robot Project Human-Powered Aircraft Project Development of Wireless Electric Vehicle Charging System (Kawakami-mura Eco Project) Science À La Carte École Project Smartphone Application Design Project Computer Design Project The IP (Intellectual Property) PR Project Faculties (Undergraduate Schools) Intellectual Property (in Omiya) *The only one and first-ever Faculty in Japan Department of Intellectual Property Engineering (in Omiya) Department of Architecture Department of Civil Engineering and Urban Design Department of Electrical and Electronic Systems Engineering Department of Electronics, Information and Communication Engineering Department of Mechanical Engineering Department of Applied Chemistry Department of Environmental Engineering Department of Biomedical Engineering Robotics and Design (in Umeda) *"Design Thinking" education as innovative & creative approach Department of Robotics Department of Design and Architecture Department of System Design *IoT, AI Information Science and Technology (in Hirakata) Department of Computer Science Department of Information Systems Department of Media Science Department of Information Networks Graduate Schools Intellectual Property (Professional Degree Course) Major in Intellectual Property Engineering (Master's and Ph.D. Courses) Major in Architecture, Civil Engineering and Urban Design Major in Electrical, electronic and Mechanical Engineering Major in Applied Chemistry, Environmental and Biomedical Engineering Robotics and Design (Master's and Ph.D. Courses) Major in Robotics and Design Information Science and Technology (Master's and Ph.D. Courses) Major in Information Science and Technology Research Centers Omiya Campus: Center for Monodzukuri Management Nanomaterials Microdevices Research Center Umeda Campus: Human Robotics R&D Center Robotics & Design Center Hiyakata Campus: Yawata Engineering Laboratories Structure Research Center Hydraulic Research Center High Voltage Research Center Digital Archive Center Virtual Reality Laboratory Visualization Software Developing Center Rankings Times Higher Education World University Rankings(THE) Focusing on the field of Engineering & Information Technology, OIT was ranked 801–1000th in the World University Rankings 2021 and ranked in TOP10 Private Universities in Japan. Especially in terms of the Score of “Citations”, OIT was placed next to Osaka University in Japan Universities and higher ranking than Tokyo University of Science and Shibaura Institute of Technology in the Private Universities. Moreover, OIT was ranked 401+ in the Asia University Rankings 2021 as well. SCImago Institutions Rankings(SIR) OIT was ranked 58th in the Japan University Rankings 2019 focusing on the field of “Innovation” and 75th in Japan University Rankings 2018 focusing on the field of “Research”. ”Truly Strong Universities" for Employment(Toyo Keizai Japan University Rankings) OIT was ranked 2nd in the Japan University Rankings 2020 and it was the higher ranking than Tokyo University of Science and Shibaura Institute of Technology in the Private Universities. Especially focusing on the field of Information Technology & Digital media, OIT at Faculty of Information Science and Technology was ranked No.1 in 2019 from Institute of technology in Japan. Innovations Research 2021: An international collaborative research group of OIT at Department of Applied Chemistry, Tokyo Institute of Technology and National Yang Ming Chiao Tung University developed an innovative method for preparing ‘Chiral Silica’ consisting of a molecular-scale helical structure by an extremely simple process. This research was promoted by the moonshot-type research and development project of the New Energy and Industrial Technology Development Organization(NEDO), and was recently published in the Open Access Journal ‘JACS Au’ of the American Chemical Society (ACS). 2020: A research group of University of Tokyo at Department of Applied Physics, RIKEN(Institute of Physical and Chemical Research) and OIT at Faculty of Information Science and Technology succeeded in developing an innovative “Transportable Optical lattice clock(OLC) with Ultra-precise measurements(10 to the power of minus 18)“ for the first time in the world through a verification testing on validity of Albert Einstein's general theory of relativity at Tokyo Skytree. Compared to conventional space experiments, using the transportable OLC on satellite and rocket, the equivalent experiments are available with a height difference of 10,000 times less. 2019: OIT researchers at Department of Applied Chemistry discovered that poly-3-hexylthiophene(P3HT), a conductive polymer widely used as a material for solar cells and transistors, has a new ability to convert light into heat. Since P3HT dissolves in organic solvents, it can be used as a paint, and can be applied to substrates of various shapes. Also it can be expected to be applied to local heating in a vacuum space or a fine space, such as hyperthermia, which uses heat in an outer space(space station or space shuttle) or kills cancer cells by heat. This innovative research was highly evaluated and published by the American Chemical Society (ACS) in the field of polymer. (Macromolecules 2019, 52, 2,708-717) 2018: OIT researcher at Department of Information Systems, Faculty of Information Science and Technology participated in “KAGRA”(Kamioka Gravitational Wave Detector) Project, a national project managed by Institute for Cosmic Ray Research (ICRR) of University of Tokyo and National Institutes of Natural Sciences(NINS)/National Astronomical Observatory of Japan(NAOJ)/High Energy Accelerator Research Organization(KEK) for Astrophysics & Information systems research on Gravitational-wave observatory. From Institute of technology in Japan, only Tokyo Institute of Technology and OIT were engaged in the project. 2017: OIT researcher at Department of System Design, Faculty of Robotics and Design jointly developed an innovative Odor Measuring Platform that allows them to analyze and evaluate different kinds of odors objectively together with Konica Minolta through open innovation. Based on the platform, Konica Minolta unveiled "Kun Kun"(or "Sniff Sniff") body. "Kun Kun" body, simply consisting of a device and a smartphone application, can measure odors of the scalp, armpits, skin behind the ears, and feet. Measured odor data are sent via Bluetooth and displayed in the smartphone app in 20 seconds or so. Odors are classified into 10 levels, allowing users to objectively decide whether they need to take some deodorizing measures. OIT has been researching ways of distinguishing different odors through neural network-based AI technology using gas sensor. 2016: OIT researcher at Department of Applied Chemistry jointly developed an innovative material transfer technology combining Liquid droplets (Liquid marble) covered with solid particles and Light together with Asahikawa Medical University and Max Planck Institutes. As it makes the Light directly convert into propulsion force, there is no power conversion process like photovoltaic power generation. It is eco-friendly and low-cost as well. The research paper was published in German scientific journal "Advanced Functional Materials". 2015: OIT researcher at Department of Applied Chemistry jointly developed an innovative technology, so-called "Non-sticky powdery adhesive" in the field of Biomimetics materials together with Max Planck Institutes. It was developed with hint that Aphids covers the surface of honey which they discharge by solid wax particles and prevents drowning due to honey in the nest by liquid marble. It was introduced to journal cover published by the Royal Society of Chemistry and Chemistry World in UK. 2012: An innovative Small satellite with Pulsed plasma thruster(PPT), named PROITERES(Project of OIT Electric-Rocket-Engine Onboard Small Space Ship) was developed by OIT researcher and students mainly from Department of Mechanical Engineering and it was launched in Sep 2012 on PSLV-C21 Rocket from Satish Dhawan Space Centre operated by Indian Space Research Organisation in India. Business 2017: Japan's first "Robot Service Business School" was launched by New Energy and Industrial Technology Development Organization (NEDO) at OIT's Robotics & Design Center in OIT Umeda campus in order to provide an integrated education in the technology, design, and business expertise necessary with robotics innovation. Achievements and awards International Students from Faculty of Information Science and Technology monopolistically won the “Best prize” and “1st prize” with defeating University of Tokyo etc in the Japan tournament 2019(Category: C/C++ Programming, 19,967 participants) of “Lan Qiao Cup” that is the largest Collegiate Programming competition in China. As of 2019, the OIT’s winner was ranked as “No.1 C/C++ Programmer” in Japan universities. OIT researcher at Department of System Design, Faculty of Robotics and Design won the “Sensors and Actuators Award 2018” for his outstanding research achievements at the International Association of Advanced Materials international conference in Stockholm. From the universities in Japan, the Advanced Materials Award was provided only to University of Tokyo and OIT. Joint team "JoiTech" from Osaka University and OIT won the "World Championship"(*Category: Humanoid League Adult Size) in RoboCup 2013 for Robotics in Eindhoven.Moreover, OIT’s own team ”OIT Trial” from Faculty of Robotics and Design together with Faculty of Information Science and Technology won the “World's No. 7 place” (*Category: @Home) in RoboCup 2017 in Nagoya. Student team from Department of Electrical and Electronics Systems Engineering won the "3rd prize" and "Best Innovative Design Award" in the international student contest on IFEC(International Future Energy Challenge) 2015 hosted by IEEE at the University of Michigan–Dearborn. The topic was "High-efficiency Wireless Charging System for Electric Vehicles (EV) and other Applications". As Japanese university, OIT got through to the Final Competition and also won the award for the first time ever. Student from Department of Electrical and Electronics Systems Engineering won the "Excellent Paper Award" in the International Conference on IEEE PEAC(Power Electronics Application Conference) 2014 in Shanghai. The topic was "A New V2H System with Single-Ended Inverter Drive Bidirectional Wireless Resonant IPT. Student team from Faculty of Information Science and Technology passed the Domestic Preliminary competition(82 universities, 372 teams in Japan) on ACM International Collegiate Programming Contest(“ACM-ICPC”) 2015 and got through to the Asia Regional competition in Tsukuba. From the private universities in Japan, the qualifiers were only 3 universities, Keio University, Meiji University and OIT.In addition, back to the Asia Regional competition 2006, only Tokyo Institute of Technology and OIT were in the “Top 10” from Institute of technology in Japan, and also OIT was the only ranked from private universities in Japan. The OIT graduates who experienced this event joined Google, Yahoo and Information technology(IT) companies. Graduate student from Electronics, Information and communication Engineering won the "Student Award" in the International symposium on ALC(Atomic Level Characterizations) 2015 for New Materials and Devices in Nagoya. The topic was "Surface potential distribution of insulating film on a conductive substrate irradiated by electron beam with an application of the bias-voltage". From the private universities in Japan, it was awarded only to Tokyo University of Science and OIT. Graduate student from Electronics, Information and communication Engineering won the "Best Paper Award" in Photomask Japan 2014 organized by SPIE(Society of Photographic Instrumentation Engineers). The topic was "Electron beam current dependence on a surface potential distribution at a resist film on a conductive substrate". Graduate student from Electronics, Information and communication Engineering won the "Student Travel Award" in the International Conference on EIPBN(Electron, Ion, and Photon Beam Technology and Nanofabrication) 2012 organized by IEEE Electron Devices Society in Hawaii. The topic was "Measurement of Surface Potential Distribution at an Insulating Film Produced by Fogging Electrons in a Scanning Electron Microscope". A variety of universities, countries, and topics were represented among the students receiving support. Students from 10 countries (including the US) and 33 universities(including MIT, Stanford University, Yale University, Carnegie Mellon University, Princeton University, University of British Columbia and more.) were among the recipients of student travel financial support. From the universities in Asia, it was awarded only to National University of Singapore, Peking University and OIT. Student from Department of Architecture got through to "The 3rd Asian Contest of Architectural Rookie's Award" in Dalian as a member of Japan national team after winning the “1st prize” in "Kenchiku SHINJINSEN"(Architectural Rookie’s Contest)2014 in Japan. Membership/Cooperating organization IAESTE (International Association for the Exchange of Students for Technical Experience)Japan: OIT is one of the "University member" and "Business supporting member" as well as The University of Tokyo, Tohoku University, Hokkaido University, Yokohama National University, Tokyo Metropolitan University, Tokyo University of Science and Waseda University. Especially from the universities in Kansai region, OIT is only listed as "Business supporting member" who can receive foreign trainees. OIT accepts a limited number of international research students under this program each year, and also dispatches students to other universities. - Trainees Accepted in OIT from; 2018: Slovak University of Technology (Slovakia) 2017: Gdańsk University of Technology, Lodz University of Technology (Poland) 2016: Brno University of Technology (Czech Republic), Budapest University of Technology and Economics (Hungary) 2015: Kwame Nkrumah University of Science and Technology (Republic of Ghana), Tomas Bata University in Zlín (Czech Republic) 2014: Norwegian University of Science and Technology (Norway), Federal University of Minas Gerais (Brazil) - Trainees Dispatched from OIT to; 2017: Manipal University (India) 2016: University of Information Science and Technology "St. Paul The Apostle" (North Macedonia) 2014: Karunya University (India) WIPO(World Intellectual Property Organization) OIT cooperates with WIPO on organizing the conferences in order to evangelize the Intellectual Property(IP) in Asia. For instance, “Conference for Presidents/Vice-Presidents and Technology Transfer Officers of Universities and Research Institutions on Creating an Enabling Intellectual Property(IP) Environment for Technology Development, Management and Commercialization” in 2017. The overseas participants were mainly from Philippines, Thailand, Malaysia, Indonesia and Sri Lanka. JICA(Japan International Cooperation Agency) OIT supports as Training Institution for JICA Training Course mainly related to Intellectual Property, such as "Japan-Mexico Strategic Global Partnership Training Program - Intellectual property rights" Other than Mexico, OIT received the trainees from Brazil, Argentina and Paraguay. Overseas Partner Universities Australia Queensland University of Technology Swinburne University of Technology Austria Vienna University of Technology Hong Kong City University of Hong Kong China Tsinghua University Tongji University Zhejiang University East China University of Science and Technology University of Science and Technology Beijing Finland Tampere University of Technology France EPITECH(Paris Graduate School of Digital Innovation, formerly European Institute of Information Technology) University of Bordeaux Germany Technical University of Munich Bundeswehr University Munich University of Wuppertal Hochschule Hildesheim/Holzminden/Göttingen India Manipal University Indonesia Hasanuddin University University of Palangka Raya Widya Mandala Catholic University Mulawarman University Bakrie University Malaysia Universiti Teknologi Malaysia Universiti Teknologi Petronas Universiti Malaysia Sabah Mexico University of Guanajuato Mongolia Mongolian Institute of Engineering and Technology Netherlands Delft University of Technology Norway University of Stavanger Philippines University of San Jose–Recoletos Poland Wrocław University of Technology Saudi Arabia King Abdulaziz University South Korea Inje University Daejeon University Spain University of Salamanca Universidad Politécnica de Madrid Sweden Uppsala University Taiwan National Taipei University of Technology National Taiwan University of Science and Technology National Tsing Hua University National Chung Hsing University National Formosa University National Yunlin University of Science and Technology National Kaohsiung First University of Science and Technology Southern Taiwan University of Science and Technology Shih Hsin University Tatung University Thailand Chulalongkorn University Thammasat University Thai-Nichi Institute of Technology United States Georgia Institute of Technology San Jose State University Rice University Clemson University Angelo State University Vietnam Da Nang University of Technology Can Tho University References External links Official site Private universities and colleges in Japan Engineering universities and colleges in Japan Education in Osaka Universities and colleges in Osaka Prefecture Kansai Collegiate American Football League
33775337
https://en.wikipedia.org/wiki/Lindley%20Bothwell
Lindley Bothwell
Lindley Bothwell (August 1, 1901 – June 19, 1986) was a prosperous Southern California orange grower, a consulting citrus agriculturalist from his Lindley Bothwell Ranch in the San Fernando Valley, and an antique automobile collector and racer. He is well known for being a founding member of the Trojan Knights, as well as a Yell Leader at the University of Southern California (USC) and for his invention of moving card stunts in stadium bleachers. He was the founder and volunteer coach of the USC Yell Leaders and Song Girls for 60 years. Student years At University of Southern California Born in Los Angeles, Lindley Bothwell entered the University of Southern California (USC) in the year 1919. His choice of school made sense: his grandfather, Dr. Walter Lindley, was the first dean of the USC School of Medicine, and his aunts founded USC's chapter of Kappa Alpha Theta There he completed both his undergraduate and master's degrees while founding many organizations and groups that are still present at the university today. In addition to his studies and involvement with organizations on campus, Bothwell was a varsity member of the baseball team, and was good enough to be offered a $10,000 signing bonus to play for the Pittsburgh Pirates, an offer he turned down so that he could continue his education. The Yell Leaders In his freshman year at USC (1919), Bothwell and some of his friends decided that the fans at USC Trojans football games were not loud enough or energetic enough, and that having an energetic crowd could be a large factor in the success of the team. In pursuit of this goal, Bothwell formed the USC Yell Leading Squad (better known as the Yell Leaders), with Bothwell dubbed the "Yell King". The Yell Leaders were a group of male students who led the university's student section in cheers at football games. All of the cheers were original, and had an immediate effect on the fans and the team. One of the more impressive and creative cheers created by Bothwell and organized by the Yell Leaders was the "Floating 'T'". Whenever it was called out, students would release balloons that had been assigned to their seats at the same time, giving the effect of a giant golden 'T' rising from the stands, shortly followed by a mass of cardinal balloons with an 'T' shape in the middle. The "Floating 'T'" drew such a large response from the crowd that Lindley organized an even bigger stunt with a group of spirited students. On October 21, 1922, during the Trojans' game against the University of Nevada, the Yell Leaders commenced in performing the first ever moving card stunt consisting of 500 men sitting on the 50-yard line. The cards spelled out "Trojans" in sequence and was immediately successful; over the next few years, many other universities began performing similar card stunts. Trojan Knights In addition to the USC Yell Leaders, Bothwell – along with fellow students Harry Pryor and Harry Kennedy – decided to found an organization that would be dedicated to upholding the traditions of the university. In 1921, the three students formed the Trojan Knights, a spirit and service fraternity specific to the University of Southern California. A non-Greek fraternity, the Trojan Knights are still referred to as both the university's official hosts and its "guardians of tradition". The Knights have been responsible and/or influential in many of the university's traditions, including the Victory Bell, the adoption of George Tirebiter, USC's first (unofficial) mascot, and the origin story of the current mascot, Traveler. At Oregon Agricultural College In 1924, after Bothwell had graduated from USC with two degrees, he decided to attend Oregon Agricultural College (now Oregon State University) to study agriculture. There he continued his fondness for leading in spirit by becoming OAC's yell king as well. He continued with his trademark moving card stunts, improving from the simple spelling of words to animated pictures, the most famous being the OAC Beaver squashing rival Oregon University's yellow 'O'. The spirit with which he led the student section of OAC reached many people, including Notre Dame's head football coach Knute Rockne. Rockne was so impressed with Bothwell that he asked him to be an honorary cheerleader for the Fighting Irish in their upcoming 1925 Rose Bowl game with Stanford, a request that Bothwell was more than happy to agree to. Adulthood Agriculturalist After graduating from OAC in 1926 with a degree in agriculture, Bothwell purchased a Valencia orange orchard in Woodland Hills, a community in the western San Fernando Valley of Los Angeles. He was very successful, expanding his citrus empire to 34 ranches in Southern California that he owned or managed. The USDA considered him one of the country's ten largest citrus farmers by 1943. The Lindley Bothwell Ranch, reduced in size, is the last commercial citrus orchard in the San Fernando Valley. Bothwell had his own soil chemistry laboratory, and was a consultant to growers throughout the Southwest U.S. He also became one of the leading cattle breeders in California. He was a member of American Society of Agronomy, and the Society of Soil Scientists. Personal life In 1927, Bothwell married Marion Seale, a fellow Oregon State student. The couple had two children: son Lindley Jr. and daughter Bonnie. Lindley Bothwell, apart from being a very successful citrus farmer, had many other hobbies and commitments. In 1926 he helped found the USC chapter of the Sigma Alpha Epsilon fraternity. He was also the coach of the USC Yell Leaders (and later the USC Song Girls, founded in 1967) for 60 years. Automobile collector Bothwell was avid antique car collector. By 1954, he was the owner of the largest private antique automobiles collection in the country. His collection included the 1911 Rolls-Royce which had belonged to Nicholas II, the last tsar of Russia. Bothwell served as the Los Angeles regional executive of the Sports Car Club of America. Bothwell drove and raced some of them, and so created vintage racing in the United States in the 1940s and 1950s. He used a 1913 Peugeot to break one of the speed records at the Indianapolis Motor Speedway in 1949. Even though this was a new track record for the car's class, Bothwell failed to qualify for the Indianapolis 500 due to the Peugeot's age. He also collected horse-drawn streetcars, with the only private collection in the world at the time. He built a rail line and a tram barn on his ranch, to keep them in working order and to entertain guests. Lindley Bothwell had an affinity for the water. He was a pioneer surfer in California, and a rower who maintained a small fleet of crew shells for training in San Pedro Bay and off of Catalina Island. After battling a long illness, Lindley Bothwell died at the age of 84 on June 19, 1986 in Sherman Oaks. His second wife, Ann, continued management of the 1,987 trees remaining in their Woodland Hills orchard. She also kept his antique automobile collection intact, and running/run regularly on the ranch property. The collection was sold in November 2017. References External links Los Angeles Times: "Vestige of Idyllic Life Still Bears Fruit" (1998) - Bothwell Citrus Farm history 1901 births 1986 deaths American agriculturalists Citrus farmers Farmers from California 20th-century American businesspeople American cheerleaders American car collectors University of Southern California alumni Oregon State University alumni People from Woodland Hills, Los Angeles
1098169
https://en.wikipedia.org/wiki/NuCalc
NuCalc
NuCalc, also known as Graphing Calculator, is a computer software tool made by the company Pacific Tech. The tool can perform many graphing calculator functions. It can graph inequalities and vector fields, as well as functions in two, three, or four dimensions. It supports several different coordinate systems, and can solve equations. It is available for OS X (under the name Graphing Calculator) and Microsoft Windows. History The Graphing Calculator 1.0 software was bundled for free on all Power Macintosh computers since its introduction in 1994. Having shipped on more than 20 million machines, it is the most familiar version of the program. This version of Graphing Calculator was secretly developed at Apple by Ron Avitzur, an abandoned contractor who felt obligated to complete the project, and their friend and colleague Greg Robbins. They also made a version for older 680x0 Macintosh computers called NuCalc 1.0. In 2005, This American Life featured Avitzur's story in episode 284, Should I Stay or Should I go? Later models of Power Macintosh computers included newer versions of the Graphing Calculator program. At one time, versions were available for free download for Mac OS 9, Mac OS X 10.3 and Mac OS X 10.4. However, these versions may lack some of the features of the original version 1.0 program and may include promotion for the more advanced, commercial version of the software. A Windows version (offered for sale) was at one time renamed NuCalc. , the latest commercial version was Graphing Calculator 4.0. Product Editions of Graphing Calculator Version 4 are available for Mac OS X and Microsoft Windows. Pacific Tech also offers free-of-charge downloads of a viewer for saved graphs, for the same three platforms. Subsets of functionality are available as separate applications: Graphing Calculator Lite, Equation Calculator, Data Calculator, 2D Grapher, 3D Grapher, and 4D Grapher. See also Grapher — Apple's replacement, included with Mac OS X 10.4 References External links NuCalc/Graphing Calculator homepage Information and Download for the original Graphing Calculator 1.0 for PowerPC and 680x0 Macs can still be found here Google Tech Talk of the story behind NuCalc Plotting software MacOS graphics-related software Windows graphics-related software
4562088
https://en.wikipedia.org/wiki/Minnesota%20National%20Guard
Minnesota National Guard
The Minnesota National Guard is the National Guard of the state of Minnesota, United States. It has more than 13,000 soldiers and airmen, serving in 61 communities across the state. The Constitution of the United States specifically charges the National Guard with dual federal and state missions. The National Guard is the only United States military force empowered to function in a state status. Those functions range from limited actions during non-emergency situations to full scale law enforcement of martial law when local law enforcement officials can no longer maintain civil control. The National Guard may be called into federal service in response to a call by the President or Congress. When National Guard troops are called to federal service, the President serves as Commander-in-Chief. The federal mission assigned to the National Guard is: "To provide properly trained and equipped units for prompt mobilization for war, National emergency or as otherwise needed." The Governor may call individuals or units of the Minnesota National Guard into state service during emergencies or to assist in special situations which lend themselves to use of the National Guard. The state mission assigned to the National Guard is: "To provide trained and disciplined forces for domestic emergencies or as otherwise provided by state law." Major units Minnesota National Guard Joint Force Headquarters The Minnesota National Guard has units in sixty-two communities statewide. The Minnesota National Guard Joint Force Headquarters is located in the St. Paul Capitol complex. 34th Infantry Division The Rosemount-based 34th Infantry Division oversees the training and operations of eight National Guard brigades in six different states. Known as the Red Bulls, the 34th Infantry Division is capable of deploying its Main Command Post, Tactical Command Post and Special Troops Battalion in order to provide command and control for Army brigades. The 34th Infantry Division fought in World War II and continued the legacy when the division assumed control of U.S. Division – South, Iraq, in May 2009. The Red Bulls provided command and control of military forces in the southern third of Iraq. The area, known as US Division-South, is geographically about the size of Minnesota and is the largest sector in Iraq. Headquartered at Contingency Operating Base Basra, more than 1,200 Minnesota Citizen-Soldiers led a force of approximately 14,000 U.S. Service members throughout nine of Iraq’s 18 provinces. 1st Armored Brigade Combat Team The Bloomington-based 1st Armored Brigade Combat Team of the 34th Infantry Division consists of eight major subordinate commands. More than 5,000 Soldiers make up the brigade's combined arms, cavalry, artillery, engineer and brigade support battalions. Combat Aviation Brigade The St. Paul-based 34th Combat Aviation Brigade is an Army National Guard unit that supports the 34th Infantry Division and the state of Minnesota by providing aviation capabilities - both UH-60 Black Hawk and CH-47 Chinook helicopters and the C-12 Huron fixed-wing aircraft - for federal and state missions. The Minnesota-based subordinate units of the 34th CAB are the 2nd Battalion, 147th Assault Helicopter Battalion, the 834th Aviation Support Battalion, C Company, 1st General Support Aviation Battalion, 171st Aviation Regiment, B Company and C Company of the 2nd Battalion, 211th General Support Aviation Battalion, and F Company, 1-189 Aviation Regt., General Support Aviation Battalion. Outside Minnesota, the 34th CAB provides training and operational guidance to the 1st Battalion, 112th Aviation Regiment of the N.D., the 1st Battalion, 189th Aviation of the Montana and Missouri National Guard and the 1st Battalion, 183rd Aviation Regiment of the Idaho National Guard. 133rd Airlift Wing The 133rd Airlift Wing is a Minnesota National Guard flying wing headquartered at the Minneapolis - St. Paul International Airport. Utilizing the C-130H Hercules, the wing provides the U.S. Air Force with tactical airlift capability to transport troops, cargo and medical patients across the globe, in addition to providing the citizens of Minnesota with domestic operations and disaster response support. Established in 1921, the 133rd is known as the first federally recognized National Guard flying unit in the country. 148th Fighter Wing The 148th Fighter Wing, headquartered in Duluth, operates the F-16C Block 50 Fighting Falcon. The full wing structure, which includes the headquarters, communications, logistics, civil engineer, maintenance and security sections, is composed of airmen prepared to rapidly respond to support federal and state missions and community needs. There are five major units in the 148th FW: Headquarters Group; Maintenance Group; Operations Group; Medical Group; and Mission Support Group. 84th Troop Command The 84th Troop Command, headquartered in Minneapolis, maintains control of field artillery, military police, engineer and civil support forces, providing a force capable of performing a wide variety of missions. A specialized command with a unique mission, the 84th Troop Command maintains traditional training standards to remain ready to support federal missions in addition to being challenged with the responsibility of conducting domestic operations throughout the state. A large portion of the 84th Troop Command's domestic operations are the responsibility of the very specific Chemical, Biological, Radiological and Nuclear response capabilities within the 55th Civil Support Team and the CBRN Enhanced Response Force Package. 347th Regional Support Group The 347th Regional Support Group (RSG) is an Army National Guard brigade headquartered in Roseville that is capable of providing trained and ready combat forces. Additionally, the 347th RSG is prepared to support the State of Minnesota with troops capable of assisting in a disaster. The mission of the 347th Regional Support Group is to deploy and provide contingency and expeditionary base operations, with responsibilities for managing facilities, providing administrative and logistical support for troop services and ensuring the security of personnel and facilities on a base camp. The brigade provides command and control of assigned units during homeland security, homeland defense and other civil support missions within the U.S. to include managing the reception, staging, onward movement and integration of supporting forces. 175th Regiment (Regional Training Institute) The Camp Ripley-based 175th Regiment Regional Training Institute provides combat arms, Military Occupational Specialty and leadership training to prepare soldiers and units for deployment at maximum combat readiness levels. 175th Regiment consists of headquarters and two battalions: the 1st Battalion (Officer Candidate School), and the 2nd Battalion (General Studies). Each year hundreds of Soldiers from across the country travel to the Camp Ripley Training Center to attend one of 31 courses offered by the 175th RTI. The courses offered qualify soldiers as infantrymen, cavalry scouts, health care specialists, wheeled vehicle mechanics and tracked vehicle repairers. Camp Ripley Training Center Camp Ripley Training Center, located near Little Falls, Minn., is a regional training installation featuring ranges and facilities to support military and civilian agency training requirements. See detailed list of Minnesota National Guard units. History 1636–1849 The idea of a militia, or body of citizen Soldiers as distinct from career soldiers, was borrowed from England and dates in this country from 1636, when three militia regiments were organized for the common defense in the Massachusetts Bay Colony. Militia companies were eventually organized throughout colonial America, and they provided its principal defense force. In spite of shortcomings, the various colonial militias became indispensable to the cause of American independence. They were the back-up for General Washington's Continental Army, providing large numbers of armed men when needed on short notice, and they assured the authority of colonial governors against British sympathizers. Later, the United States Constitution and Militia Act of 1792 provided for continuation of a state-based militia system. The federal government could employ the militia for purposes of national security, but its organization was left with the individual states. 1850–1860 Minnesota formed a Territorial Enrolled Militia in 1850, but it only existed on paper until April 1856 when the first uniformed, volunteer company was formed in St. Paul. Called the Minnesota Pioneer Guards, it was a source of such civic pride that soon nine other companies were formed in St. Paul, St. Anthony (Minneapolis) and in river towns from Stillwater to Winona. Minnesota's National Guard traces its beginning to these early militia companies. 1861–1865 When Civil War broke out in April 1861, volunteers from Minnesota's militia formed a nucleus for the first three companies of the First Minnesota Volunteer Infantry Regiment. Both sides in the war had to rely on volunteer regiments, battalions and separate companies recruited by the states. The "First Minnesota" is officially recognized as the senior such regiment in the Union Army because Alexander Ramsey was the first governor to offer state troops to President Lincoln. The regiment went on to serve with distinction in the Army of the Potomac and became legend as a result of its gallant counter-charge at Gettysburg on July 2, 1863. During that charge the First Minnesota was ordered to attack. Having run out of ammunition, the Minnesotans, numbering only 262 charged into the leading Confederate brigade, facing overwhelming odds and roughly 1,600 Confederate troops. The fighting was bloody and hand to hand. The Minnesotans gained the time necessary for the Union line to reform, thoroughly demoralising the Confederates. But the cost was great. Of the 262 members of the regiment present for duty that morning, only 47 answered the roll that evening. The regiment incurred the highest casualty rate of any unit in the Civil War, a record still held to this day for any U.S. unit. On July 3, while rebounding from the horrendous casualties of the previous day, the 47 survivors were reinforced by detached Company F, and the reunited regiment was moved slightly northward on Cemetery Ridge. Destiny placed the remaining Minnesotans at one of the few places where Union lines were breached during Pickett's Charge and required them to charge advancing Confederate troops once again. It is here that Capt. Messick was killed, Capt. W. B. Farrell mortally wounded, and then command fell to Capt. Henry C. Coates. During the desperate and chaotic fighting, Private Marshall Sherman of Company C captured the colors of the 28th Virginia Infantry and received the Medal of Honor for this exploit. The Confederate flag was taken back to Minnesota as a prize of war and is kept and seldom publicly displayed at the Minnesota Historical Society. In the mid-1990s, several groups of Virginians threatened to sue the Society to return the 28th Virginia's battle flag to the Old Dominion. The Minnesota Attorney General advised that such threats were without a legal basis, and the flag remains in the possession of the Society. After being knocked out by a bullet to the head and later shot in the hand, Corporal Henry O'Brien repeatedly picked up the fallen colors of the 1st Minnesota and carried a wounded comrade back to the Union lines. He was also awarded a Medal of Honor for his heroism. Minnesota eventually organized and recruited volunteers for 11 infantry regiments, two cavalry regiments, a heavy artillery regiment, three light artillery batteries and two sharpshooter companies, totaling 22,000 men. Many of these Soldiers also served on Minnesota's frontier; in fact, hastily organized local militias and detached companies from several volunteer regiments were the only line of defense during Minnesota's Dakota (Sioux) War of 1862. After the Civil War, the Minnesota Militia re-emerged to become officially known as the Minnesota National Guard. These organizations became a colorful part of community social life but when called upon never failed to deal with civil disturbances and other state emergencies requiring military aid. Annual summer encampments were held at Camp Lakeview on Lake Pepin near Lake City. Control was vested with the state and funding came largely from modest state appropriations and from the members themselves. 1866–1915: The Spanish–American War and Beginnings of Federal Control Minnesota's National Guard was converted to four U.S. Volunteer Regiments when the war with Spain began in April 1898. Only the Thirteenth Minnesota Volunteer Regiment, however, was destined to see foreign service. The 13th fought Spanish troops and Filipino revolutionaries in the Philippines from 1898 to 1899. During the Battle of Manila, the Thirteenth Minnesota Volunteer Regiment, under the command of Major General Arthur MacArthur, were to take the right flank during the battle of Manila. When it came time to advance on Manila, it was a battalion from the 13th which led the way. Of all the fighting that day, the most intense combat took place on the right flank with the Minnesotans in the worst of it. The 13th saw the heaviest fighting during the battle. The 13th also had the greatest number of casualties, more than all of McArthur’s regiments combined. The U.S. gained status as a world power as a result of its war with Spain, but the war also called attention to serious military deficiencies. Among them was the nature of the National Guard, which had been functioning, more or less, as a group of autonomous "state armies." Landmark federal legislation in 1903, 1908 and 1916 resulted in federal controls that brought standardization and affirmed the National Guard as the Army's primary organized reserve. 1916–1918 In July 1916, because of border raids conducted by Pancho Villa and the courting of an unstable Mexican government by Germany, President Woodrow Wilson used his new legal authority to mobilize the nation's entire National Guard for patrol duty on the U.S.- Mexican border. The Minnesota Guard was sent to Camp Llano Grande near Mercedes, Texas. Although they never saw fighting, their border duty helped prepare them for a much bigger challenge: World War I. Barely home from Texas, Minnesota Guardsmen were again mobilized when the United States entered the war against Germany in April 1917. Most went directly to Camp Cody near Deming, New Mexico, for training with a newly organized 34th "Sandstorm" Infantry Division. The 34th consisted of Guardsmen from Minnesota, the Dakotas, Iowa and Nebraska. The 34th was eventually named as a depot division and broken up. Minnesotans were reassigned and sent to France as individual replacement troops while the division was reorganized and filled with new draftees from the southwest. Fortunately, Minnesota's field artillery regiment remained intact. Redesignated as the 151st Field Artillery, it became part of the 42nd "Rainbow" Division where it fought with great distinction in France. 1919–1940 In the years following World War I, the Minnesota National Guard was preoccupied with reorganization, recruitment and armory construction. Minnesota's 109th Observation Squadron became the first federally recognized air unit in the National Guard in January 1921. In June 1931, a new field training site was opened to troops at Camp Ripley north of Little Falls. It took its name from Fort Ripley, a long-abandoned 19th century army post which, coincidentally, had been located on land purchased for the new National Guard training camp. The first Air National Guard unit in the nation was the 109th Airlift Squadron, Minnesota National Guard, passing muster inspection on January 17, 1921. 1941–1945 With war threatening in Europe and the Far East, the Minnesota National Guard was mobilized again in February 1941. Most troops went to Camp Hahn, near Riverside, California, for coastal anti-aircraft artillery training or to Camp Claiborne, Louisiana, for training with the 34th Infantry Division. The 34th (soon to be re-nicknamed as the "Red Bull" Division) became the first American Division to ship for Europe in January 1942. It fought through North Africa (where men of Minnesota's 175th Field Artillery fired the first American shells against the Nazis), and Italy. Brainerd's tank company, after training with its newly organized 194th Tank Battalion at Fort Lewis, Washington, was shipped to the Philippines in September 1941 to shore up American defenses there. When war broke out in December it fought the Japanese into the Bataan Peninsula and endured the Bataan Death March. The 109th Observation Squadron ended up in Europe where it initially flew Mark V "Spitfires" with the Royal Air Force and, later, reconnaissance missions with P-51 "Mustangs." The Minnesota National Guard became part of a newly organized 47th "Viking" Infantry Division following World War II, and its Airmen became part of a new Air National Guard. 1946–1953 America again found itself at war in 1950-this time in Korea. In January 1951, as a result of the massive and sudden reinforcement of North Korean forces by Soldiers from Communist China, the Minnesota Guard was again called up. Many of its members were seasoned World War II vets and the 47th Division was selected to serve as a training division for two years during the Korean War. Most of its personnel were eventually reassigned as replacement troops in Korea or Germany. Minnesota's Air Guard was also activated, contributing pilots to Korea's "Mig Alley." 1954–1969 Threats by the Soviet Union to oust Western troops from West Berlin in 1961 prompted the Berlin Crisis and a call-up of selected National Guard forces throughout the nation. Included in this mobilization were members of the 133rd Air Transport Wing, Minnesota Air National Guard, who served in federal active service for 11 months while operating out of their home station at the Minneapolis-St. Paul Airport. During the Vietnam War, although never officially mobilized, the Air Guard flew hundreds of supply and transport missions to Southeast Asia. In the 1950s and early 1960 both units of the 179th Fighter Interceptor Squadron in Duluth and 109th Fighter Interceptor Squadron in St. Paul were providing active air defense commitments with 24-hour alert status. 1970–1989 The transition from a Vietnam-era draft to an all-volunteer force had a tremendous impact on the Minnesota National Guard. 1990–1999 Growing tensions in the Persian Gulf erupted in August 1990 when Iraq invaded its neighbor, Kuwait. Within months this oil-rich region experienced the largest deployment of American combat forces since World War II. "Operation Desert Shield," intended to protect Saudi Arabia, became "Operation Desert Storm," when a US-led international coalition used its military to liberate Kuwait and destroy Iraq's army and air force. Unlike the war in Vietnam, Desert Shield/Desert Storm made heavy use of reservists. About a fourth of all U.S. military personnel called into active duty during the Gulf War were from the National Guard and Reserves. Over 600 Minnesota Guard members volunteered or were activated with their units, including the 109th Aeromedical Evacuation Flight, 109th Light Equipment Maintenance Company, the 1187th Medical Company, and the 257th Military Police Company. The war was over by April 1991, and soon Minnesota's troops headed home. The 135th Public Affairs Detachment left in June 1996 for Germany to support Operation Joint Endeavor. Originally stationed in Heidelberg, Germany the Minnesota element of the 135th traveled to Eagle Base just outside Tuzla, Bosnia to cover the first free elections since the ending of the war. Later the team moved to "tent city" Steel Castle to support the 1st Armored Division Engineers by reporting stories of maintaining roads, de-mining inhabited areas and providing American military forces with living conditions to allow Soldiers to maintain health and spirit, all contributing to the success of the Balkan mission. The worst flooding in the state’s history occurred in 1997, and Minnesota National Guard troops were there to assist the citizens of the state. The Guard helped lead and organize search and rescue, security, shelters, medical support, and logistics efforts. 2000–2019 The Minnesota National Guard has been involved in the Global War On Terror since the September 11 attacks in 2001. Immediately after the attack on New York City and Washington, D.C., Minnesota National Guard F-16 Fighter Jets from the 148th Fighter Wing were providing combat air patrols over key locations. Minnesota Army National Guard troops mobilized to ensure that Minnesota airports were safeguarded. In addition to being called upon for the Global War on Terror, the Minnesota National Guard was called upon to provide stability and peace in the Balkans. Minnesota National Guard troops executed the Bosnia Security Force (SFOR-14) mission 2003-04 and the Kosovo Force (KFOR-5) mission in 2004. 2006 marked the 150th anniversary of the Minnesota National Guard. On April 17, 2006 the House of Representatives of the State of Minnesota congratulated the Minnesota National Guard and honored all the men and women, past and present, who have ever served in the Minnesota National Guard. Minnesota National Guard forces are heavily involved in the “Long War” to this day. Current operations have troops deployed for Operation Noble Eagle (Homeland Security) and Operation Enduring Freedom (Afghanistan). Minnesota National Guard in Iraq (2003–2011) The Minnesota National Guard has played a significant role in the war in Iraq. Since 2003, more than 8,000 Minnesota National Guard Citizen-Soldiers and -Airmen have been deployed to Iraq in support of Operation Iraqi Freedom and Operation New Dawn. More than 8,000 Minnesota National Guard Citizen-Soldiers and -Airmen deployed to Iraq from 2003 to 2011. Sixteen Minnesota National Guard Soldiers died in Iraq, and 79 earned Purple Heart Medals due to injuries received in combat. Sustained military operations in Iraq inspired the Minnesota National Guard to begin the Beyond the Yellow Ribbon program, a ground-breaking process to reintegrate returning Service members back from deployments. The Minnesota National Guard’s 1st Brigade Combat Team, 34th Infantry Division was an important part of the 2007 “surge.” As a result of the extension of their tour to 16 months in Iraq, and 22 months overall, the Red Bulls are recognized as having served the second longest tour of duty in Iraq of any military unit, active or reserve. The Duluth-based 148th Fighter Wing expertly provided real-time surveillance for ground commanders using their Theater Aerial Reconnaissance System. St. Paul’s 34th Combat Aviation Brigade was responsible for corps-level helicopter support from 2008 to 2009. In 2009-2010, the 34th Red Bull Infantry Division Headquarters provided command and control for 16,000 U.S. military Service members operating in nine of Iraq’s 18 provinces. With the prevalence of improvised explosive devices on the roadways in Iraq, the St. Paul-based 133rd Airlift Wing provided critical aerial transportation of people, equipment and materiel throughout the region. In 2011, the 1st Armored Brigade Combat Team, 34th Infantry Division mission in Kuwait was the largest deployment of Minnesota Guardsmen since World War II. The brigade's mission included base management, convoy security, reaction forces, and management of specialized units from the Army, Navy and Coast Guard. The brigade drove 1.35 million miles and escorted 25,970 trucks during 480 missions prior to the last U.S. military convoy departing Iraq. 2020–present Controversy surrounding George Floyd protests In 2020, the Minnesota National Guard was mobilized in full in response to the George Floyd protests in the Twin Cities. However, the Minnesota National Guard delayed its arrival to areas were unrest was occurring and afterwards received criticism for "lagging" in its response to the riots. After being activated, Minnesota National Guard adjutant general Maj. Gen. Jon A. Jensen claimed he and other guardsman were not provided clear directions by Minnesota Governor Tim Walz on how to respond to the protests and riots. It was noted that no Minnesota National Guardsmen were present during the May 29, 2020 riot which destroyed numerous businesses in Minneapolis and did not clear streets until the next day. The Minnesota National Guard conducted a security mission alongside local law enforcement as street protests turned violent over the murder of George Floyd. A soldier from the Minnesota National Guard fired his weapon at a vehicle that was speeding towards police officers and National Guard soldiers in Minneapolis. The driver of the vehicle was given several verbal commands, and nonverbal signals in an attempt to slow the driver down. After the driver refused to stop, a soldier fired 3 rounds towards the speeding vehicle. Minnesota National Guard Major General Jon Jensen said "Our soldier fired 3 rounds from his rifle in response to a perceived and legitimate threat to him and the Minnesota police officers he was in direct support of." The Minnesota National Guard was activated during the trial of Derek Chauvin and also for the police-involved killing of Daunte Wright. Two National Guard soldiers sustained minor injuries after being shot at while sitting in a military vehicle. The two soldiers suffered injuries that included glass fragments in an eye and facial cuts caused by the shattering glass. One soldier was transported to a hospital for treatment. Adjutants General James M. Boal Sylvanus Lowry Isaac Van Etten Alex C. Jones William H. Acker John B. Sanborn Oscar Malmros John Peller Horatio P. Van Cleve Mark D. Flower Henry A. Castle Horatio P. Van Cleve A. C. Hawley C. M. McCarthy F. W. Seely John H. Mullen Herman Muehlberg George C. Lambert Ellias D. Libbey Fred B. Wood Walter F. Rhinow Ellard A. Walsh Joseph C. Nelson Chester J. Moeglein James G. Sieben Robert Schauman Eugene R. Andreotti Harry A. Sieben, Jr. Larry W. Shellito Richard C. Nash Jon A. Jensen Shawn P. Manke See also Minnesota Naval Militia Minnesota State Guard Minnesota Wing Civil Air Patrol References External links Camp Cody - Minnesota National Guard WW1 Bibliography of Minnesota Army National Guard History compiled by the United States Army Center of Military History GlobalSecurity.org National Guard of the United States Military in Minnesota
33346412
https://en.wikipedia.org/wiki/Galaxy%20Nexus
Galaxy Nexus
The Galaxy Nexus (GT-I9250) is a touchscreen Android smartphone co-developed by Google and Samsung Electronics. It is the third smartphone in the Google Nexus series, a family of Android consumer devices built by an original equipment manufacturer partner. The phone is the successor to Google's previous flagship phones, the Nexus One and Nexus S. The Galaxy Nexus has a high-definition (1280 × 720) Super AMOLED display with a Dragontrail curved glass surface, an improved camera, and was the first Android version 4.0 Ice Cream Sandwich device. The name is the result of co-branding between the Samsung Galaxy and Google Nexus brands of Android smartphones. The device is known as the Galaxy X in Brazil, however, due to a trademark on the "Nexus" brand. The Galaxy Nexus was unveiled jointly by Google and Samsung on October 19, 2011, in Hong Kong. It was released in Europe on November 17, 2011. It is one of the few phones recommended by the Android Open Source Project for building Android from source. By October 29, 2012, the Galaxy Nexus was no longer available for sale on the Google Play Store, following the release of its successor, the LG Nexus 4. History Google's plans to continue the Nexus series and bring a third-generation Nexus to market were confirmed by Google's senior vice president of mobile platforms Andy Rubin in May 2011. Samsung mobile put out a teaser video for its "Google Episode" of Unpacked on October 11 but later postponed (to October 19) the product announcement out of respect, following the death of Steve Jobs on October 5. Before the official announcement, it was also referred to as the Google "Nexus Prime" by the general public and the media. There had been repeated leaks containing almost accurate details about this device. The phone was officially announced on October 19, 2011, in Hong Kong, revealing the official name as "Galaxy Nexus". Hardware The Galaxy Nexus hosts support for MHL through the use of its Micro USB 2.0 port, allowing the Galaxy Nexus to output up to 1080p audio-visual content (through HDMI) to any supported external display such as a HD Television. USB port supports both host and devices modes (OTG); as a note, its successor Nexus 4 supports only the device mode. The Galaxy Nexus has no physical buttons on the front, but instead features on-screen soft keys embedded into the system software (part of Android 4.0). Beneath the soft keys, a multicolored notification LED is featured, a feature missing from the Nexus S. There is no microSD card support. Software The Galaxy Nexus was the first device to run [Android 4.0], introducing a large number of new features, bug fixes and improvements. Beginning from July 11, 2012, Android 4.1 Jelly Bean began rolling out to the GSM Galaxy Nexus as an over-the-air (OTA) update. The 4.2 update began rolling out on November 13, 2012, to the GSM Galaxy Nexus Takju/Maguro variant (smartphones sold in the US and directly supported by Google) as an (OTA) update. Google started rolling out the update to the international version (Yakju/Maguro) a week later. Towards the end of December, however, not all phones had received the update. On March 19, 2013, Verizon Wireless began updating OTA their CDMA Galaxy Nexus Mysid/Toro variant to Android 4.2.2. This device first got released with Android 4.0, last official uptade is Android 4.3. Unofficially upgradable to Android 6.0. Android 4.3 Jelly Bean was released for GSM models on July 24, 2013, and Sprint began OTA updates on October 31, 2013. Google has stated that the Galaxy Nexus will not receive Android 4.4 KitKat, even after having 14,000 signatures requesting it. New drivers may allow unofficial Android versions to be available for the device. Canonical's Ubuntu Touch operating system was available and supported on the Galaxy Nexus, however, support for the Galaxy Nexus was soon discontinued on January 13, 2014. Google Wallet The Galaxy Nexus is one of the few devices that officially supported Google Wallet, Google's predecessor to the NFC based Android Pay electronic payment system. The Verizon variant is the only variant that did not offer official Google Wallet support. This unsupported feature caused a controversy among US users with Verizon defending its actions by reasoning that the Galaxy Nexus uses a "secure element." It was possible to sideload Google Wallet and it would install and function correctly. Care must be taken when using aftermarket batteries to be sure it has near field communication ability, since the NFC antenna is located in the battery. Availability In some countries, the Samsung Galaxy Nexus is sold SIM-unlocked. It is also hardware-unlocked (unlocked bootloader, allowing root access). The fact that the Galaxy Nexus is sold SIM-locked in some markets—primarily where operators subsidize the phone or have exclusive selling rights—breaks the more liberal tradition of previous Nexus phones: the Nexus One and the Nexus S. Europe In the UK, the HSPA+ version of the Galaxy Nexus became available on O2 and 3 on November 17, 2011. In Germany, the HSPA+ version was sold SIM-unlocked from Vodafone and O2. It launched in December 2011 in Portugal, by Vodafone. North America In Canada, the device was launched on December 8, 2011. The Canadian model was sold unlocked and supports GSM/UMTS/HSPA/AWS bands. A GSM/UMTS, SIM-unlocked version was officially released in the United States by Google in the Google Play Store. Sprint officially announced the Galaxy Nexus for their network at CES 2012, and was released on April 22, 2012, as one of Sprint Nextel's first LTE smartphones. On April 24, 2012, the Galaxy Nexus was sold SIM-unlocked on Google's Play Store for $399.99 then dropped to $349.99 later. The only difference between this variant and the internationally sold variant is the inclusion of "Google Wallet" out of the box. Brief sales ban On June 29, 2012, Apple was granted a request for a pre-trial injunction against the import and sale to the U.S. of Galaxy Nexus by Samsung. The order was issued by U.S. District Judge Lucy Koh in San Jose, California. The ruling was based primarily on a patent which is defined as a "universal interface for retrieval of information in a computer system". The injunction against Samsung took effect when Apple paid a $96 million bond that will be used to cover damages done to Samsung if Apple loses the case. The Galaxy Nexus was temporarily unavailable for purchase on Google's Play store, and Google stated they would push a software update that would remove local phone searching. On July 6 the ban was lifted. Asia-Pacific On May 3, 2012, Samsung India officially announced that India will not have the official release of the Samsung Galaxy Nexus, despite numerous earlier reports that the device would be launched as early as mid-December 2011. The Galaxy Nexus was released in Indonesia on January 21, 2012, the Philippines on January 28, 2012, Bahrain on March 4, 2012, and Saudi Arabia in March 2012. Variants The device was originally only available in black, developed under the codename "Tuna". A white version (with the front-panel in black) was made available in February 2012. There was a special edition released to Google employees with a unique back cover. Because the device was designed to work with carriers utilizing different network technology, there are several hardware variations of the Galaxy Nexus: SCH-I515 "Toro": Verizon Wireless's variant featuring 4G LTE connectivity in the 700 MHz band (Band 13) as well as CDMA/EV-DO Rev. A connectivity in the PCS bands (800/1900 MHz). This device features either 16 or 32 GB of on-board storage, measures 9.47 mm thick and features a 1850 mAh battery. This device's appearance is similar to that of the international version. GT-I9250 "Maguro": GSM/HSPA+ variant. Features support for both AT&T's and T-Mobile's HSPA+ bands in the United States. This particular variant was sold SIM-unlocked by Google in the Play Store. SPH-L700 "Toro Plus": Sprint's variant featuring 4G LTE connectivity in the 1900 MHz band (Band 25). It is virtually identical to the Verizon variant, save for the omission of the SIM slot, and minor cosmetic differences. GT-I9250T: Australian GSM/HSPA+ variant. Complies with Australian regulatory requirements and the baseband is tuned to prefer 3G 850 MHz. This particular variant is currently sold by Optus, Telstra and Vodafone. SHW-M420S/K: Korean GSM/HSPA+ variant. Complies with Korean regulatory requirements, like a camera shutter sound. This particular variant was sold by SKT and KT. Accessories The official Samsung accessory range includes a Desktop Dock with an HDMI port, a Desk Stand with a 3.5 mm jack, a stand with a charging port for a second battery and a car holder that will let users turn their Galaxy Nexus phone into a SatNav replacement. All of the Samsung accessories feature a microUSB port so the phone can be charged while it is being used. Reception The Galaxy Nexus generated a high level of anticipation, and received very positive reviews upon release. Engadget's Myriam Joire praised the phone's speed, feel, display and battery life. Joire concluded that at the time of writing, the Galaxy Nexus is "the best Android phone available today" further concluding that it's "possibly even the best phone available today, period". Ginny Mies of PCWorld echoed the previous statement, while saying that the Samsung Galaxy Nexus is "a superb phone, and a great vehicle for introducing Android Ice Cream Sandwich to the world". Despite writing that Android has "a long way" to go, in terms of progression, the tweaks and updates Google has implemented throughout the operating system substantially improves the efficiency and ease of use of the operating system. In their review, Mobilesyrup lauded the phone, saying "there is no going back". They praised its aesthetics, noting that the Galaxy Nexus combined design elements of the Nexus S and Galaxy S II. Although the OMAP SoC was clocked lower and used a last-generation GPU while pushing a 720p screen with 40% more pixels than competitors with qHD (540p) screens, there was no slowdown or app instability and the Galaxy Nexus was often faster than contemporary smartphones in both benchmarks and real-world usage. They also praised its software, as the "experience is just that much better", declaring the phone as "the first best Android device ever." Engadget's Darren Murph, described Ice Cream Sandwich as "smooth as ever" further saying that "without question, this is easily the slickest, most polished version of Android yet". Murph was overall "thrilled with how the first Ice Cream Sandwich handset has turned out." with its "understated, sleek, beautiful" continuing with lauding the phone's display. Vincent Nguyen, from SlashGear noted the fast performance of Android 4.0.1, the tight integration between the operating system and the hardware and concluded that "this is the best Android phone around today". J.R. Raphael of Computerworld, stated "The Galaxy Nexus [...] is an exceptional phone, arguably the finest Android handset to date", saying it is "sleek and attractive, with a thin, light body and a beautiful HD display". Raphael ended the review writing that the Galaxy Nexus is "screamingly fast [...] delivering what may be the best overall performance of any mobile device available". In a T3 review, Thomas Tamblyn noted the primary (rear-facing) camera was "quicker than many digital cameras", and praised the phone's experience to be "very fluid" and that "it feels like a version of Android that is already very polished." The Verge's Joshua Topolsky stated the phone is one of the "best smartphones ever made, and with a couple of minor tweaks (particularly to the camera), it could be the best smartphone ever produced." Charlie White, at Mashable, described the screen as "gorgeous", offering "an exquisitely sharp view", and describing the hardware design as "a spectacular success", concluding the Galaxy Nexus "is by far the best Android phone I’ve seen yet". See also Comparison of smartphones References External links Google Nexus Nexus Smartphones Samsung mobile phones Android (operating system) devices Active noise control mobile phones Mobile phones introduced in 2011 Discontinued smartphones Mobile phones with user-replaceable battery
2970486
https://en.wikipedia.org/wiki/Symbolic%20Link%20%28SYLK%29
Symbolic Link (SYLK)
Symbolic Link (SYLK) is a Microsoft file format typically used to exchange data between applications, specifically spreadsheets. SYLK files conventionally have a .slk suffix. Composed of only displayable ANSI characters, it can be easily created and processed by other applications, such as databases. Microsoft does not publish a SYLK specification. Variants of the format are supported by Multiplan, Microsoft Excel, Microsoft Works, OpenOffice.org, LibreOffice and Gnumeric. The format was introduced in the 1980s and has not evolved since 1986. A commonly encountered (and spurious) 'occurrence' of the SYLK file happens when a comma-separated value (CSV) format is saved with an unquoted first field name of 'ID', that is the first two characters match the first two characters of the SYLK file format. Microsoft Excel (at least to Office 2016) will then emit misleading error messages relating to the format of the file, such as "The file you are trying to open, 'x.csv', is in a different format than specified by the file extension...". SYLK is known to cause security issues, as it allows an attacker to run arbitrary code, offers the opportunity to disguise the attack vector under the benign-looking appearance of a CSV file, and is still enabled by default on recent (2016) versions of Microsoft Excel. Limitations SYLK does not have support for Unicode. Even if a SYLK file is created by an application that supports Unicode (for example Microsoft Excel), the SYLK file will be encoded in the current system's ANSI code page, not in Unicode. If the application contained characters that were displayable in Unicode but have no code point in the current system's code page, they will be converted to question marks ('?') in the SYLK file. The semicolon is treated as a field separator in SYLK, so cannot be used unescaped in data values. If a character string in the SYLK file is to contain a semicolon (;) then it should be prefixed with another semicolon so the string would appear as e.g., "WIDGET;;AXC1254". MS Excel will strip the first semicolon on import and the data element will appear as "WIDGET;AXC1254". Each line of a SYLK input file must be no longer than 260 characters. Otherwise, Microsoft Excel will issue an error message and skip loading the overlong line. Sample SYLK code As an example, the following SYLK code in a text file with the .slk extension: ID;P C;Y1;X1;K"Row 1" C;Y2;X1;K"Row 2" C;Y3;X1;K"Total" C;Y1;X2;K11 C;Y2;X2;K22 C;Y3;X2;K33 E would be displayed like this when read by an appropriate spreadsheet: for numeric formatting The formatting of 2 decimal digits is applied to Column 2 using F;P2;C2 where P0 is for General, P1 is for no decimal, P2 is for 2 digits, P3 has leading $ sign with 2 decimal points as defined below. ID;P P;PGeneral P;P_(* #,##0_);;_(* \-#,##0_);;_(* "-"_);;_(@_) P;P_(* #,##0.00_);;_(* \(#,##0.00\);;_(* "-"??_);;_(@_) P;P_("$"* #,##0.00_);;_("$"* \(#,##0.00\);;_("$"* "-"??_);;_(@_) C;Y1;X1;K"Row 1" C;Y2;X1;K"Row 2" C;Y3;X1;K"Total" C;Y1;X2;K11 C;Y2;X2;K22 C;Y3;X2;K0;ER1C2+R2C2 F;P2;C2 E would be displayed like this when read by an appropriate spreadsheet: for column width defines the widths of a group of columns: [S] one space < n1 > the first column < n2 > the last column < n3 > the width of columns in number of characters For example: Adding these SYLK codes will adjust the column width of column 1 and 2 to 20 and 30 respectively. F;W1 1 20 F;W2 2 30 cell formatting properties F; < cl > < n > < c2 > < cl > one of the following 1-character formatting codes: D default C continuous cross-cell display E scientific exponentiation F fixed decimal point G general format $ leading $ and 2 decimal points * bar graph, one asterisk per unit (5 would be *****) < n > the number of digits. < c2 > one of the following 1-character alignment codes: D default C center G general(textleft, numbersright) L left justify R right justify For example: The following SYLK code demonstrates the cell formatting properties: ID;P P;PGeneral C;Y1;X1;K"Row 1 Left Justify" F;P0;FG0L C;Y2;X1;K"Row 2 Right Justify" F;P0;FG0R C;Y3;X1;K"Total at Center" F;P0;FG0C C;Y1;X2;K11 C;Y2;X2;K22 C;Y3;X2;K0;ER1C2+R2C2 F;Y1;X2;FF2L F;Y2;X2;FF2R F;Y3;X2;F$2C F;W1 2 25 E SYLK syntax SYLK_file ::= Record + Record ::= RecordType Field* newline ID record Use: A header to identify spreadsheet type and creator. Must be first record in the file. Record type: ID Mandatory fields: P program file creator possible creators include: MP (Multiplan) XL (Excel) Possible fields: N If present, file uses ;N style cell protection If absent, file uses ;P style cell protection E If present, NE records are redundant If absent, NE records are not redundant B record Use: Tells number of rows and columns in the spreadsheet. Recommended that it come before C and F records Record type: B Mandatory fields: X columns tells maximum number of columns Y rows tells maximum number of rows C record Use: Cell contents Record type: C Mandatory fields: X column column position (one based) Possible fields: Y row row position (one based). If omitted, most recently encountered value is used. E expression expression for the cell K value value of the cell C column column reference R row row reference G defines shared value D defines shared expression S references shared value or shared expression N If present, the cell is not protected. If absent and ;N is present in the ID record, cell is protected. P If present, cell is protected. If absent and ;N is absent in the ID record, cell is not protected. H If present, cell is hidden. If absent, cell is not hidden. M expression matrix expression from (X,Y) to (C,R) I inside a matrix Compatible fields: If ;G is present, ;E must be absent. If ;G is present, ;K must be present. If ;D is present, ;E must be present. If ;S is present, ;E, ;K, ;G, ;D, and ;M must be absent. If ;S is present, ;R and ;C must be present. (They define the row and column that the shared value/expression is copied from.) If ;N is present in the ID record, ;P must be absent. If ;N is absent from the ID record, ;N must be absent. If ;M is present, ;E must be absent. If ;I is present, ;K and ;E must be absent P record Use: Cell format If F records are present, precedes them. Mandatory fields: P formatting Excel style cell format specification F record Use: Format If P record(s) are present, follows them. Possible fields: X column column (one based) Y row row (one based) C column column (one based) R row row (one based) F format Cell/row/column format The format of format is ch1 digits ch2 ch1 is Ddefault Ccurrency Eexponent Ffixed Ggeneral $dollar *graph %percent digits is number of digits after decimal point ch2 is alignment Ddefault Ccenter Gstandard Lleft Rright -ignored Xfill D format Default format. The format of format is ch1 digits ch2 ch1 is Ccurrency Eexponent Ffixed Ggeneral $dollar *graph %percent digits is number of digits after decimal point ch2 is alignment Ccenter Gstandard Lleft Rright -ignored Xfill E show formulas K show commas W col1 col2 width set column widths N fontid size font to use P index Excel cell format, number of the P record (e.g. P0 means the first P record, which is usually declared as P;PGeneral S style style The following characters can be part of style Iitalic Dbold Tgridline top Lgridline left Bgridline bottom Rgridline right Sshaded background H If present, don't show row/column headers If absent in the entire file, show row/column headers G If present, don't show default gridlines If absent in the entire file, show default gridlines Compatible fields: At least one of ;X, ;Y, ;C, ;R, ;D, ;E, ;K, ;W, ;P, ;H, or ;G must be present. If ;X or ;Y is present, both ;X and ;Y must be present. (This sets cell format.) If ;X is present, ;R, ;C, ;E, ;K, ;W, ;N, ;H, ;G must be absent. If ;R is present, ;X, ;Y, ;C, ;E, ;K, ;W, ;N, ;H, ;G must be absent. (This sets default row format.) If ;C is present, ;X, ;Y, ;R, ;E, ;K, ;W, ;N, ;H, ;G must be absent. (This sets default column format.) If ;D is present, ;X, ;Y, ;R, ;C must be absent. (This sets default spreadsheet format.) If ;X, ;Y, ;R, ;C are present, ;P and/or ;F and/or ;S must be present. O record Use: Options Possible fields: A iter delta If present, allow value iteration If absent, circular references are not allowed. iter (maximum number of iterations) delta (step test. If smaller, then finished.) C completion test at nearest preceding C record P sheet is protected L use A1 mode references Even if ;L is given R1C1 references are used in SYLK file expressions. M If present, use manual recalculation. If absent, use automatic recalculation. E Macro sheet. This should appear before the first appearance of a ;G or ;F field in a NN record. This should appear before the first C record which uses a macro-only function. V value value indicates the base date used for calculating serial date values 0:1 January 1900 4:1 January 1904 NU record Use: file name substitution If NE record(s) are present, must precede them. Mandatory fields: L filename old filename F filename new filename NE record Use: external link Mandatory fields: E expression Target area on spreadsheet F filename Source file S expression Source area on external sheet NN record Use: Defines names More efficient if NN appears before name use. Mandatory fields: N name name E expression expression describing value of name Possible fields: G ch1 ch2 runable name (macro) with command key alias K ch1 ch2 ordinary name with unused command aliases F usable as a function Compatible fields: If ;G is present, ;K must be absent. W record Use: Window definitions NL record Use: Chart external link E record Use: End of file. Must be last record. Date and time are stored as a floating point value. The whole number part is a number of days from the Jan 1 1900 (if the O record contains the ;V0 directive, specifying 1900 as the starting point for calculations), the fraction is the number of seconds divided by 86400 (60*60*24, number of seconds in a day). Conversion to unix time can be done by subtracting the difference between Jan 1 1970 and Jan 1 1900 (25,569 days) and then multiplying by 86400; converting from unix time to SYLK datetime is done by dividing the value by 86400 and then adding 25569. The cell style has to be set to some date formatting value, e.g. to be displayed properly. .slk file exports opened with Excel have a limit of 255 characters in a cell. This limit is not present in LibreOffice. External links Detailed examples can also be found at here Syntax for SYLK can be found at: Microsoft SYLK summary (see also the Abusing the SYLK file format article for some useful information) GFF Format Summary: Microsoft SYLK and at: comp.apps.spreadsheets FAQ Excel Tips Converting Unix Date Time Stamps Limits related to reading and saving with Excel: Microsoft.com Excel features References Spreadsheet file formats Microsoft Office
24763603
https://en.wikipedia.org/wiki/Libvirt
Libvirt
libvirt is an open-source API, daemon and management tool for managing platform virtualization. It can be used to manage KVM, Xen, VMware ESXi, QEMU and other virtualization technologies. These APIs are widely used in the orchestration layer of hypervisors in the development of a cloud-based solution. Internals libvirt is a C library with bindings in other languages, notably in Python, Perl, OCaml, Ruby, Java, JavaScript (via Node.js) and PHP. libvirt for these programming languages is composed of wrappers around another class/package called libvirtmod. libvirtmod's implementation is closely associated with its counterpart in C/C++ in syntax and functionality. Supported Hypervisors LXC – lightweight Linux container system OpenVZ – lightweight Linux container system Kernel-based Virtual Machine/QEMU (KVM) – open-source hypervisor for Linux and SmartOS Xen – bare-metal hypervisor User-mode Linux (UML) – paravirtualized kernel VirtualBox – hypervisor by Oracle (formerly by Sun) for Windows, Linux, macOS, and Solaris VMware ESXi and GSX – hypervisors for Intel hardware VMware Workstation and Player – hypervisors for Windows and Linux Hyper-V – hypervisor for Windows by Microsoft PowerVM – hypervisor by IBM for AIX, Linux and IBM i Bhyve – hypervisor for FreeBSD 10+ (support added with libvirt 1.2.2) User Interfaces Various virtualization programs and platforms use libvirt. Virtual Machine Manager, GNOME Boxes and others provide graphical interfaces. The most popular command line interface is virsh, and higher level tools such as oVirt. Corporate Development of libvirt is backed by Red Hat, with significant contributions by other organisations and individuals. libvirt is available on most Linux distributions; remote servers are also accessible from Apple and Microsoft Windows clients. See also SPICE libguestfs References Books External links Mailing lists Free software programmed in C Free virtualization software Hardware virtualization Linux APIs Virtualization-related software for Linux Software that uses Meson Red Hat software
28675993
https://en.wikipedia.org/wiki/John%20F.%20Jones%20Jr.
John F. Jones Jr.
John F. "Jack" Jones Jr. is currently the vice president and chief technology officer at WiseDesign. He previously served as chief information officer (CIO) of the National Institutes of Health (NIH), an agency of the U.S. Department of Health and Human Services. The NIH CIO advises the NIH director on strategic directions and management of information technology programs and policy. Jones also served as the director (acting) of the Center for Information Technology (CIT), at the NIH. Leadership positions Jones joined WiseDesign in 2013 and has focused his efforts in developing new data modeling approaches. He was appointed NIH CIO on June 22, 2008 and served till February 2011. He served as CIT director (acting) from 2005 till June 2008. His past appointments include NIH Chief IT Architect in 2001, when he joined the NIH; Deputy Director (Acting), CIT in 2003; and NIH CIO (Acting) in 2005. Before coming to the NIH, Jones served as director of information processes at Sandia National Laboratories. During his last two years at Sandia, he also served as senior advisor to the Deputy Assistant Secretary at the U.S. Department of Energy for the Advanced Strategic Computing Initiative. In his former role as the chief IT architect, and as CIO and CIT director (acting) at NIH, Jones has focused on ensuring that information technology is matched to the business needs and processes that it supports. His efforts have brought together disparate communities, from physician-scientists to accountants and technologists. Results of this effort include the development of business process and conceptual data models for grants award and management, and the acceptance of business process modeling as a required part of application development. Education and military service Jones attended Case Western Reserve University as an undergraduate and graduated first in his class. He continued his education at Stanford University and was awarded Master and Doctor of Philosophy degrees in Aeronautical Engineering. Jones's graduate education was interrupted by four years of service in the U.S. Navy, serving as a Naval Flight Officer. Jones's career focus moved from aviation to computing, and his work to develop and employ standards in computer-aided design and manufacturing was acknowledged with an award from the National Institute of Standards and Technology for being "the first commercial use of the Initial Graphics Exchange Specification." Sources NIH Almanac - Organization - Office of the Director; this publication is not copyrighted and is in the public domain. URL: http://www.nih.gov/about/almanac/organization/OD.htm Office of the Chief Information Officer. URL: https://web.archive.org/web/20100527085126/http://ocio.od.nih.gov/ External links OCIO Home Page, http://ocio.od.nih.gov/about.html NIH Almanac, http://www.nih.gov/about/almanac/organization/OD.htm CIT Home Page, http://www.cit.nih.gov/ NIH Home Page, http://www.nih.gov/ NIH Press Release, October 7, 2008, http://www.nih.gov/news/health/oct2008/od-07.htm U.S. Department of Health and Human Services, https://www.hhs.gov/ National Institutes of Health people Living people Chief information officers Case Western Reserve University alumni Stanford University alumni Sandia National Laboratories people Year of birth missing (living people) Place of birth missing (living people)
3526477
https://en.wikipedia.org/wiki/MODFLOW
MODFLOW
MODFLOW is the U.S. Geological Survey modular finite-difference flow model, which is a computer code that solves the groundwater flow equation. The program is used by hydrogeologists to simulate the flow of groundwater through aquifers. The source code is free public domain software, written primarily in Fortran, and can compile and run on Microsoft Windows or Unix-like operating systems. Since its original development in the early 1980s, the USGS has made six major releases, and is now considered to be the de facto standard code for aquifer simulation. There are several actively developed commercial and non-commercial graphical user interfaces for MODFLOW. MODFLOW was constructed in what was in 1980's called a modular design. This means it has many of the attributes of what came to be called object-oriented programming. For example, capabilities (called "packages") that simulate subsidence or lakes or streams, can easily be turned on and off and the execution time and storage requirements of those packages go away entirely. If a programmer wants to change something in MODFLOW, the clean organization makes it easy. Indeed, this kind of innovation is exactly what was anticipated when MODFLOW was designed. Importantly, the modularity of MODFLOW makes it possible for different Packages to be written that are intended to address the same simulation goal in different ways. This allows differences of opinion about how system processes function to be tested. Such testing is an important part of multi-modeling, or alternative hypothesis testing. Models like MODFLOW make this kind of testing more definitive and controlled. This results because other aspects of the program remain the same. Tests become more definitive because they become less prone to being influenced unknowingly by other numerical and programming differences. Groundwater flow equation The governing partial differential equation for a confined aquifer used in MODFLOW is: where , and are the values of hydraulic conductivity along the x, y, and z coordinate axes (L/T) is the potentiometric head (L) is a volumetric flux per unit volume representing sources and/or sinks of water, where negative values are extractions, and positive values are injections (T−1) is the specific storage of the porous material (L−1); and is time (T) Finite difference The finite difference form of the partial differential in a discretized aquifer domain (represented using rows, columns and layers) is: where is the hydraulic head at cell i,j,k at time step m CV, CR and CC are the hydraulic conductances, or branch conductances between node i,j,k and a neighboring node is the sum of coefficients of head from source and sink terms is the sum of constants from source and sink terms, where is flow out of the groundwater system (such as pumping) and is flow in (such as injection) is the specific storage are the dimensions of cell i,j,k, which, when multiplied, represent the volume of the cell; and is the time at time step m This equation is formulated into a system of equations to be solved as: where or in matrix form as: where A is a matrix of the coefficients of head for all active nodes in the grid is a vector of head values at the end of time step m for all nodes in the grid; and is a vector of the constant terms, RHS, for all nodes of the grid. Limitations The water must have a constant density, dynamic viscosity (and consequently temperature) throughout the modelling domain (SEAWAT is a modified version of MODFLOW which is designed for density-dependent groundwater flow and transport) The principal components of anisotropy of the hydraulic conductivity used in MODFLOW is displayed on the right. This tensor does not allow non-orthogonal anisotropies, as could be expected from flow in fractures. Horizontal anisotropy for an entire layer can be represented by the coefficient "TRPY" (Data Item 3 Page 153). Versions "Modular Model" The USGS throughout the 1970s had developed several hundred models, written in different dialects of FORTRAN. At the time, it was common practice to rewrite a new model to fit the need of a new groundwater scenario. The concept for MODFLOW was originally designed in 1981 to provide a common modular groundwater model, which could be compiled on multiple platforms without major (or any) modification, and can read and write common formats. Different aspects of the groundwater system would be handled using the modules, similar to the idea of a "component stereo system". The original name of the code was "The USGS Modular Three-Dimensional Finite-Difference Ground-Water Flow Model", or informally as "The Modular Model." The name MODFLOW was coined several years after the initial code development, which started in 1981. The first version of MODFLOW was published on December 28, 1983, and was coded entirely in FORTRAN 66. The source code for this version is listed in USGS Open File Report 83-875 referred to above. MODFLOW-88 This version of MODFLOW was rewritten in FORTRAN 77, and was originally released on July 24, 1987. The current version of MODFLOW-88 is 2.6, released on September 20, 1996. MODPATH, was initially developed in 1989 to post-process the steady-state MODFLOW-88 data to determine three-dimensional pathlines of particles. This innovation has been indispensable for the fields of contaminant hydrogeology. It is still used as a post-processor in recent versions of MODFLOW. A separate program, MODFLOWP, was developed in 1992 to estimate various parameters used in MODFLOW. This program was eventually built into MODFLOW-2000. MODFLOW-96 MODFLOW-96 (version 3.0) was originally released on December 3, 1996, and is a cleaned-up and revised continuation of MODFLOW-88. There are three final releases of MODFLOW-96: MODFLOW-96 (version 3.3, May 2, 2000) MODFLOW-96h (version 3.3h, July 10, 2000), with HYDMOD package MODFLOWP (version 3.2, Oct 9, 1997), MODFLOW-96 with parameter-estimation Several graphical interfaces were first developed using the MODFLOW-96 code. MODFLOW-2000 MODFLOW-2000 (version 1.0; version numbering was reset) was released on July 20, 2000, which merged MODFLOWP and HYDMOD codes into the main program and has integrated observation, sensitivity analysis, parameter estimation, and uncertainty evaluation capabilities. Many new packages and enhancements were also included, including new solvers, stream and saturated flow packages. The internal design concepts also changed from previous versions, such that packages, processes and modules are distinct. This version was coded in a mixture of FORTRAN 77, Fortran 90, and one solver was programmed in C. MODFLOW-2000 can also be compiled for parallel computing, which can allow multiple processors to be used to increase model complexity and/or reduce simulation time. The parallelization capability is designed to support the sensitivity analysis, parameter estimation, and uncertainty analysis capabilities of MODFLOW-2000. The final version of MODFLOW-2000 (or MF2K) is version 1.19.01, released on March 25, 2010. There are four related or branched codes based on MODFLOW-2000: MF2K-GWM or GWM-2000 (version 1.1.4, May 31, 2011, branched from mf2k 1.17.2), with groundwater management capability using optimization MF2K-FMP (version 1.00, May 19, 2006, based on mf2k 1.15.03), with Farm Process MF2K-GWT (version 1.9.8, October 28, 2008, based on MF2K 1.17.02), groundwater flow and solute-transport model SEAWAT (version 4.00.05, October 19, 2012), variable-density flow and transport processes VSF (version 1.01, July 5, 2006), variably saturated flow MODFLOW-2005 MODFLOW-2005 differs from MODFLOW-2000 in that the sensitivity analysis, parameter estimation, and uncertainty evaluation capabilities are removed. Thus, the support for these capabilities now falls to "clip on" codes that are supported externally to the MODFLOW support effort. In addition, the code was reorganized to support multiple models within one MODFLOW run, as needed for the LGR (Local Grid Refinement) capability. MODFLOW-2005 is written primarily in Fortran 90 and C, with C being used for one solver. The current version of MODFLOW-2005 is version 1.12.00, released on February 3, 2017. Related or branched codes include: MODFLOW-CFP (version 1.8.00, February 23, 2011), conduit flow process to simulate turbulent or laminar groundwater flow conditions MODFLOW-LGR (version 2.0, September 19, 2013), local grid refinement GWM-2005 (version 1.4.2, March 25, 2013), groundwater management capability using optimization MF2005-FMP2 (version 1.0.00, October 28, 2009), estimate dynamically integrated supply-and-demand components of irrigated agriculture as part of the simulation of surface-water and ground-water flow MODFLOW-NWT(version 1.1.3, August 1, 2017), Newton formulation for solving problems involving drying and rewetting nonlinearities of the unconfined groundwater-flow equation. MODFLOW-OWHM (version 1.00.12, October 1, 2016), The One-Water Hydrologic Flow Model (MODFLOW-OWHM, MF-OWHM or One-Water), developed cooperatively between the USGS and the U.S. Bureau of Reclamation, is a fusion of multiple versions of MODFLOW-2005 (NWT, LGR, FMP, SWR, SWI) into ONE version, contains upgrades and new features and allows the simulation of head-dependent flows, flow-dependent flows, and deformation dependent flows that collectively affect conjunctive use of water resources. MODFLOW-USG. All version of MODFLOW listed above are constructed on what is called a structured grid. That is, the grid is composed of rectilinear blocks. The only exception is the LGR capability, which allows locally refined grids to be inserted into the structure of a "parent" grid. The local area is again composed of rectilinear blocks, but the blocks are smaller. Experimentation with a much more flexible grid structure resulted in the release of MODFLOW-USG (version 1.3.00, December 1, 2015), designed to be adapted to a wide range of grid variations using unstructured grids. MODFLOW-USG has similar capabilities as MODFLOW 6, which provides grid capabilities with and intermediate level of flexibility. MODFLOW 6 MODFLOW 6 (MF6), first released in 2017, is the sixth core version of MODFLOW to be released by the USGS. This release is a rewrite of MODFLOW following an object-oriented programming paradigm in Fortran, and provides a platform that includes the capabilities from several previous MODFLOW-2005 versions, including MODFLOW-NWT, MODFLOW-USG, and MODFLOW-LGR. MODFLOW 6 supports structured or unstructured grids, has full support for the Newton-Raphson formulation, and has a unique Water Mover Package that allows flows to be routed between the advanced packages, including the Streamflow Routing, Lake, Multi-Aquifer Well, and Unsaturated Zone Flow Packages. MODFLOW 6 also contains a Groundwater Transport (GWT) model that simulates transient three-dimensional solute transport on structured or unstructured grids and through the advanced flow and mover packages. An Application Programming Interface (API) is also available for MODFLOW 6, which allows the program to be coupled with other models or controlled with popular scripting languages, such as Python. While there are a few features lacking in the current release that are supported in MODFLOW-2005, most of the popular capabilities in previous MODFLOW versions are available in MODFLOW 6. The current version is 6.2.2, released July 30, 2021. Packages The names in this table are the labels used to turn MODFLOW capabilities on and off via a key input file. Most capabilities have many alternatives or can be omitted, but the ones related to the BASIC Package are always required. Many of the capabilities introduced are supported in later versions, though the grid change enabled with MODFLOW-USG and MODFLOW 6 meant that such backward compatibility was rather selective. Graphical user interfaces There are several graphical interfaces to MODFLOW, which often include the compiled MODFLOW code with modifications. These programs aid the input of data for creating MODFLOW models. Non-commercial interfaces Non-commercial MODFLOW versions are free, however, their licensing usually limit the use to non-profit educational or research purposes. ModelMuse is a grid-independent graphical user interface from the USGS for MODFLOW 6, MODPATH, SUTRA, and PHAST version 1.51. There are no license restrictions. The source code is included. FloPy is a Python package for creating, running, and post-processing MODFLOW-based models. MODFLOW-GUI – Made by the USGS: it is updated often to match the current USGS MODFLOW development. It supports MODFLOW-96, MODFLOW-2000, MODFLOW-2005, MODPATH, ZONEBUDGET, GWT, MT3DMS, SEAWAT, and GWM. Source code for MODFLOW-GUI is included. It depends on Argus ONE: a commercial interface for constructing generic models. There are no license restrictions beyond those of Argus ONE. PMWIN – "Processing MODFLOW" (for Windows) – powerful freeware for MODFLOW processing and visualization, provided alongside an instructional book; also available in Traditional Chinese. The license for this version is limited to non-commercial use. mflab - mflab is a MATLAB interface to MODFLOW. The user builds and analyzes models by writing a set of MATLAB scripts. This results in flexible and efficient workflows, allowing a great deal of automation. iMOD - Free and open source interface developed by Deltares. iMOD contains an accelerated version of MODFLOW with fast, flexible and consistent sub-domain modeling techniques. Facilitating large, high resolution MODFLOW modeling and geo-editing of the subsurface FREEWAT is a free and open source, QGIS-integrated modelling platform integrating MODFLOW (MODFLOW versions integrated are MODFLOW-2005 and MODFLOW-OWHM) and the following MODFLOW-related simulation codes: MT3DMS, MT3D-USGS, SEAWAT, ZONE BUDGET, MODPATH, UCODE-2014. FREEWAT has been developed in the framework of the H2020 FREEWAT project (FREE and open source software tools for WATer resource management), financed by the EU Commission under the call WATER INNOVATION: BOOSTING ITS VALUE FOR EUROPE. The source code is released under a GNU GENERAL PUBLIC LICENSE, Version 2, June 1991, along with a complete set of User Manuals and tutorials. Commercial programs Commercial MODFLOW programs are typically used by governments and consultants for practical applications of MODFLOW to real-world groundwater problems. Professional versions of MODFLOW are generally priced at a minimum of around $1000 and typically range upward to US$7000. This is a list of commercial programs for MODFLOW: Argus ONE GMS – Groundwater Modeling System Groundwater Vistas Leapfrog Hydro Processing Modflow Visual MODFLOW All current versions of these programs run only on Microsoft Windows, however previous versions of GMS (up to Version 3.1) were compiled for several Unix platforms. Former graphical interfaces Graphic Groundwater – Windows-based interface ModelCad – A Windows-based interface, developed by Geraghty and Miller, Inc. ModIME – A DOS-based interface by S.S. Papadopulos & Associates, Inc. See also FEFLOW HydroGeoSphere Hydrological optimization MIKE SHE MT3D References External links MODFLOW and related programs official website Online guide to MODFLOW-2000 MODFLOW Users Group on Google Groups Hydrology models Hydrogeology software United States Geological Survey Geology software for Linux Public-domain software Free science software
20252949
https://en.wikipedia.org/wiki/Construction%20estimating%20software
Construction estimating software
Construction cost estimating software is computer software designed for contractors to estimate construction costs for a specific project. A cost estimator will typically use estimating software to estimate their bid price for a project, which will ultimately become part of a resulting construction contract. Some architects, engineers, construction managers, and others may also use cost estimating software to prepare cost estimates for purposes other than bidding. Methods Traditional methods Construction contractors usually prepare bids or tenders to compete for a contract award for a project. To prepare the bid, first a cost estimate is prepared to determine the costs and then establish the price(s). This involves reviewing the project's plans and specifications to produce a take off or quantity survey, which is a listing of all the materials and items of work required for a construction project by the construction documents. Together with prices for these components, the measured quantities are the basis for calculation of the direct cost. Indirect costs and profit are added to arrive at a total amount. Spreadsheets Cost estimators used columnar sheets of paper to organize the take off and the estimate itself into rows of items and columns containing the description, quantity and the pricing components. Some of these were similar to accounting ledger paper. They became known as green sheets or spreadsheets. With the advent of computers in business, estimators began using spreadsheet applications like VisiCalc, Lotus 1-2-3, and Microsoft Excel to duplicate the traditional tabular format, while automating redundant mathematical formulas. Many construction cost estimators continue to rely primarily upon manual methods, hard copy documents, and/or electronic spreadsheets such as Microsoft Excel. While spreadsheets are relatively easy to master and provide a means to create and report a construction cost estimate and or cost models, their benefit comes largely from their ability to partially relieve estimators of mundane calculations. Accuracy, however, is not necessarily improved and productivity is not maximized. For example, data entry remains tedious and prone to error, formula errors are common, and collaboration and information sharing are limited. Commercial estimating software As cost estimators came to rely heavily on spreadsheets, and the formulas within the spreadsheets became more complex, spreadsheet errors became more frequent. These were typically formula errors and cell-reference errors which would often lead to cost overruns. As a result, commercial cost estimating software applications were originally created to overcome these errors by using hard-coded formulas and data structures. Other benefits include the use of reference to cost databases (aka "cost books") and other data, predictable and professional looking reports, speed, accuracy, and overall process standardization. As cost estimating programs became more and more popular over the years, more advanced features, such as saving data for reuse, mass project-wide changes, and trade-specific calculations, have become available. For example, programs that are designed for building construction, include libraries and program features for traditional builders. In sharp contrast, programs that are designed for civil construction, include libraries and program features for roadway, utility, and bridge builders. Sophisticated, cost estimating and Efficient Project Delivery Software systems are also available to integrate various construction delivery methods such as Integrated Project Delivery, Job Order Contracting, and others (IDIQ, JOC, SABER...) simultaneously and securely. These systems enable cost estimators and project managers to collaboratively work with multiple projects, multiple estimates, and multiple contracts. A 'short list' of additional capabilities includes the ability to work with multiple cost books/guides/UPBs, track project status, automatically compare estimates, easily copy/paste, clone, and reuse estimates, and integrated sophisticated visual estimating and quantity take-off (QTO) tools. Owners, contractors, architects and engineers are moving to advanced cost estimating and management systems, and many oversight groups such are beginning to also require their use. The level of collaboration, transparency, and information re-use enabled by Cost Estimating and Efficient Project Delivery Software drives 15-25%+ reductions in procurement cycles, six to ten times faster estimating, reduce overall project times, as a significant reduction in change orders and the virtual elimination of contract related legal disputes. Typical features Three functions prove to be the most critical when buying cost estimating software: Takeoff software - this provides for measurement from paper or electronic plans Built-in cost databases - this provides reference cost data which may be your own or may come from a commercial source, such as RS Means Estimating worksheets - these are the spreadsheets where the real work takes place, supported by calculations and other features Other typical features include: Item or Activity List: All estimating software applications will include a main project window that outlines the various items or activities that will be required to complete the specified project. More advanced programs are capable of breaking an item up into sub-tasks, or sub-levels. An outline view of all of the top-level and sub-level items provides a quick and easy way to view and navigate through the project. Resource Costs: Resources consist of labor, equipment, materials, subcontractors, trucking, and any other cost detail items. Labor and equipment costs are internal crew costs, whereas all other resource costs are received from vendors, such as material suppliers, subcontractors, and trucking companies. Labor costs are usually calculated from wages, benefits, burden, and workers' compensation. Equipment costs are calculated from purchase price, taxes, fuel consumption, and other operating expenses. Item or Activity Detail: The detail to each item includes all of the resources required to complete each activity, as well as their associated costs. Production rates will automatically determine required crew costs. Calculations: Most estimating programs have built-in calculations ranging from simple length, area, and volume calculations to complex industry-specific calculations, such as electrical calculations, utility trench calculations, and earthwork cut and fill calculations. Markups: Every program will allow for cost mark-ups ranging from flat overall mark-ups to resource-specific mark-ups, mark-ups for general administrative costs, and bonding costs. Detailed Overhead: Indirect costs, such as permits, fees, and any other overall project costs can be spread to billable project items. Closeout Window: Many estimating programs include a screen for manually adjusting bid prices from their calculated values. Reporting: Project reports typically include proposals, detail reports, cost breakdown reports, and various charts and graphs. Exporting: Most software programs can export project data to other applications, such as spreadsheets, accounting software, and project management software. Job History: Storing past projects is a standard feature in most estimating programs. References Cost engineering Cost Estimating Cost analysis software
199450
https://en.wikipedia.org/wiki/Information%20industry
Information industry
The information industry or information industries are industries that are information intensive in one way or the other. It is considered one of the most important economic branches for a variety of reasons. There are many different kinds of information industries, and many different ways to classify them. Although there is no standard or distinctively better way of organizing those different views, the following section offers a review of what the term "information industry" might entail, and why. Alternative conceptualizations are that of knowledge industry and information-related occupation. The term "information industry" is mostly identified with computer programming, system design, telecommunications, and others. Information products First, there are companies which produce and sell information in the form of goods or services. Media products such as television programs and movies, published books and periodicals would constitute probably among the most accepted part of what information goods can be. Some information is provided not as a tangible commodity but as a service. Consulting is among the least controversial of this kind. However, even for this category, disagreements can occur due to the vagueness of the term "information." For some, information is knowledge about a subject, something one can use to improve the performance of other activities—it does not include arts and entertainments. For others, information is something that is mentally processed and consumed, either to improve other activities (such as production) or for personal enjoyment; it would include artists and architects. For yet others, information may include anything that has to do with sensation, and therefore information industries may include even such things as restaurant, amusement parks, and prostitution to the extent that food, park ride, and sexual intercourse have to do with senses. In spite of the definitional problems, industries producing information goods and services are called information industries. Information services Second, there are information processing services. Some services, such as legal services, banking, insurance, computer programming, data processing, testing, and market research, require intensive and intellectual processing of information. Although those services do not necessarily provide information, they often offer expertise in making decisions on behalf of clients. These kinds of service industries can be regarded as an information-intensive part of various industries that is externalized and specialized. Information distribution Third, there are industries that are vital to the dissemination of the information goods mentioned above. For example, telephone, broadcasting and book retail industries do not produce much information, but their core business is to disseminate information others produced. These industries handle predominantly information and can be distinguished from wholesale or retail industries in general. It is just a coincidence, one can argue, that some of those industries are separately existing from the more obvious information-producing industries. For example, in the United States, as well as some other countries, broadcasting stations produce a very limited number of programs they broadcast. But this is not the only possible form of division of labor. If legal, economic, cultural, and historical circumstances were different, the broadcasters would have been the producers of their own programs. Therefore, in order to capture the information related activities of the economy, it might be a good idea to include this type of industry. These industries show how much of an economy is about information, as opposed to materials. It is useful to differentiate production of valuable information from processing that information in a sophisticated way, from the movement of information. Information devices Fourth, there are manufacturers of information-processing devices that require research and sophisticated decision-making. These products are vital to information-processing activities of above mentioned industries. The products include computers of various levels and many other microelectronic devices, as well as software programs. Printing and copying machines, measurement and recording devices of various kinds, electronic or otherwise, are also in this category. The role of these tools are to automate certain information-processing activities. The use of some of these tools may be very simple (as in the case of some printing), and the processing done by the tools may be very simple (as in copying and some calculations) rather than intellectual and sophisticated. In other words, the specialization of these industries in an economy is neither production of information nor sophisticated decision-making. Instead, this segment serves as an infrastructure for those activities, making production of information and decision-making services will be a lot less efficient. In addition, these industries tend to be "high-tech" or research intensive - trying to find more efficient ways to boost efficiency of information production and sophisticated decision-making. For example, the function of a standard calculator is quite simple and it is easy to how to use it. However, manufacturing a well-functioning standard calculator takes a lot of processes, far more than the task of calculation performed by the users. Research industries Fifth, there are very research-intensive industries that do not serve as infrastructure to information-production or sophisticated decision-making. Pharmaceutical, food-processing, some apparel design, and some other "high-tech" industries belong to this type. These products are not exclusively for information production or sophisticated decision-making, although many are helpful. Some services, such as medical examination are in this category as well. One can say these industries involve a great deal of sophisticated decision-making, although that part is combined with manufacturing or "non-informational" activities. Infrastructure Finally, there are industries that are not research intensive, but serve as infrastructure for information production and sophisticated decision-making. Manufacturing of office furniture would be a good example, although it sometimes involves research in ergonomics and development of new materials. As stated above, this list of candidates for information industries is not a definitive way of organizing differences that researchers may pay attention to when they define the term. Among the difficulties is, for example, the position of advertising industry. Importance Information industries are considered important for several reasons. Even among the experts who think industries are important, disagreements may exist regarding which reason to accept and which to reject. First, information industries is a rapidly growing part of economy. The demand for information goods and services from consumers is increasing. In case of consumers, media including music and motion picture, personal computers, video game-related industries, are among the information industries. In case of businesses, information industries include computer programming, system design, so-called FIRE (finance, insurance, and real estate) industries, telecommunications, and others. When demand for these industries are growing nationally or internationally, that creates an opportunity for an urban, regional, or national economy to grow rapidly by specializing on these sectors. Second, information industries are considered to boost innovation and productivity of other industries. An economy with a strong information industry might be a more competitive one than others, other factors being equal. Third, some believe that the effect of the changing economic structure (or composition of industries within an economy) is related to the broader social change. As information becomes the central part of our economic activities we evolve into an "information society", with an increased role of mass media, digital technologies, and other mediated information in our daily life, leisure activities, social life, work, politics, education, art, and many other aspects of society. See also Intellectual property Artificial scarcity Knowledge worker Content industry References Information economy Information Age Service industries Information technology Data processing Industries (economics)
24785528
https://en.wikipedia.org/wiki/WorkPLAN
WorkPLAN
WorkPLAN is a range of Enterprise Resource Planning (ERP) software products (WorkPLAN Enterprise and MyWorkPLAN) developed by Sescoi for custom manufacturers or departments who work project-based and need specialized ERP software for project management. The typical users of this ERP software are from the following industries: mold and die manufacturing, engineering, tooling, automotive, aerospace and defense. History The first version of the WorkPLAN ERP software was launched by Sescoi in 1992. Version 12, released in 2006, is the last version of this first system. Sescoi started development of a new generation of WorkPLAN ERP from 2003, which it launched as two complementary products. The first of these is MyWorkPLAN, a modular ERP for project management, launched in 2006. The second one is WorkPLAN Enterprise, a full ERP software for custom manufacturers, mold and die makers and engineering departments, launched in 2008. These two products use MySQL as a database engine, and they include a redesigned user interface with a navigation tree similar to the one used in CAD systems. Version 3 of MyWorkPLAN and WorkPLAN Enterprise was released in 2009. Both products are an officially SAP Certified Solution since 25 November of year 2009. MyWorkPLAN and WorkPLAN Enterprise can receive jobs or task lists from the SAP ERP or other ERP systems, detailing parts and quantities of components to be produced. WorkPLAN then manages the manufacturing process, including the production planning and scheduling, production performance monitoring, and recording the time spent on each task by each employee or machine in real time, using touchscreens, barcode readers or data-entry forms. As production proceeds, data can be fed back into SAP in the form of time taken, events completed and parts produced. Detail such as set-up times, processing times, teardown times, quantities completed, reworked or scrapped can be included in the information flow. Real-time recording of this information in WorkPLAN helps keep the SAP system up to date, producing a dynamic exchange of data, and safeguards the business information, so when it is presented to managers, it reflects the true and current status of manufacture. Companies using SAP solutions at a corporate level can benefit from this integration, which enables to optimise the performance of specialised areas within the organization, such as engineering departments or manufacturing units of moulds, dies or prototypes. Version 4 was launched at the Euromold show held at the Frankfurt Trade Fair in December 2010. This version includes new tools for customer relationship management (CRM) and a combination of detailed and simplified planning methods. It also includes an updated user interface, a new web enabled access to the system and new functions to manage batch production. Functionality WorkPLAN ERP products allow companies or departments to automate and manage the most important activities such as project costs, quotations, orders, planning, document management, analysis of 3D CAD files, bills of materials, quality, touch screen to control time and attendance and to record time spent on tasks, purchasing, stock management, key performance indicators, management overview and strategic analysis. Technology The first version of the WorkPLAN ERP was programmed using Unify VISION language, and with Unify DataServer as a database engine from Unify Corporation. The two new products, MyWorkPLAN and WorkPLAN Enterprise, have been programmed using PowerBuilder, Delphi and C++, and they use MySQL as a database engine. Both products incorporate technology from US company Tom Sawyer Software, for the graphical creation and visualization of links between tasks. Interfaces with other systems WorkPLAN Enterprise and MyWorkPLAN have interfaces with the following types of software: MS Office, MS Project and Open Office Accounting systems (Sage, QuickBooks, Datev, Cegid, EBP, Varial, etc.) Payroll systems Other ERP products (SAP, Navision, etc.) CAM Software (WorkNC) CAD and PLM software to import Bills of Materials (VisiCAD, Think3, TopSolid, AutoCAD, Cimatron, ProEngineer, Unigraphics, etc.) CAD/CAM software, for analysing CAD files (STEP, IGES, CATIA V4 & V5, Unigraphics, SolidWorks, SolidEdge, Pro/E, Parasolid, STL, etc.) with the option of using WorkXPlore 3D Advanced planning and scheduling systems (Ortems and Preactor) CRM software (Sage Vente Partner, etc.) Shop Floor Data Collection systems Manufacturing systems, through the XML agent References External links WorkPLAN POLAND website ERP software Project management software Industrial automation
8057461
https://en.wikipedia.org/wiki/SAP%20IQ
SAP IQ
SAP IQ (formerly known as SAP Sybase IQ or Sybase IQ; IQ for Intelligent Query) is a column-based, petabyte scale, relational database software system used for business intelligence, data warehousing, and data marts. Produced by Sybase Inc., now an SAP company, its primary function is to analyze large amounts of data in a low-cost, highly available environment. SAP IQ is often credited with pioneering the commercialization of column-store technology. At the foundation of SAP IQ lies a column store technology that allows for speed compression and ad-hoc analysis. SAP IQ has an open interface approach towards its ecosystem. SAP IQ is also integrated with SAP's Business Intelligence portfolio of products to form an end-to-end business analytics software stack, and is an integral component of SAP's In-Memory Data Fabric Architecture and Data Management Platform. History In the early 1990s, Waltham, Massachusetts-based Expressway Technologies, Inc. developed the Expressway 103, a column-based, engine optimized for analytics, that would eventually become Sybase IQ. Sybase acquired Expressway and re-introduced the product in 1995 as IQ Accelerator, then renamed it shortly thereafter to Sybase IQ, giving it version number 11.0. By offering the IQ product as part of a collection of related technologies often found in a data warehouse (including Sybase Adaptive Server Enterprise, Replication Server, PowerDesigner PowerDesigner, and SQL Anywhere), Sybase became one of the first mainstream companies to acknowledge the need for specialized products for the data warehouse market. With version 12.0, Sybase replaced the loosely coupled query interface from Adaptive Server Enterprise with a tight coupling with SQL Anywhere. Version 16 brings a re-engineered column store for extreme, petabyte scale, data volumes, and more extreme data compression. In 2014, SAP HANA, together with partners BMMsoft, HP, Intel, NetApp, and Red Hat announced the world's largest data warehouse. A team of engineers from SAP, BMMsoft, HP, Intel, NetApp, and Red Hat, built the data warehouse using SAP HANA and SAP IQ 16, with BMMsoft Federated EDMT running on HP DL580 servers using Intel Xeon E7-4870 processors under Red Hat Enterprise Linux 6 and NetApp FAS6290 and E5460 storage. The development and testing of the 12.1PB data warehouse was conducted by the SAP/Intel Petascale lab in Santa Clara, Calif., and audited by InfoSizing, an independent Transaction Processing Council certified auditor. Version history With the release of SP08, the version numbers have been changed to align with and match SAP HANA's version numbers to reflect the product's continuous integration with SAP HANA. The actual release title SP03 is a follow-on to SP02, covering all platforms not affected by the release. In-memory data fabric SAP's new approach streamlines and simplifies Data Warehousing into an In-Memory Data Fabric. SAP IQ with SAP HANA With the advent of big data, SAP IQ has coupled with SAP HANA to deliver a distributed in-memory analytics platform. There are three main applications and use cases which try to capitalize on SAP IQ's strengths concerning scalability and performance as an EDW and big data processor, while leveraging SAP HANA's in-memory speed for operational reporting: SAP IQ as a Near-line Service (NLS) to SAP HANA https://blogs.sap.com/2016/10/12/sap-nls-solution-sap-bw SAP HANA for operational reporting with SAP IQ for big data processing (NLS) In this scenario, SAP Enterprise Resource Planning (ERP) data goes into SAP HANA which acts as an operational data store for immediate analysis. Once the data is analyzed it is integrated into SAP IQ via Near-line storage mechanisms (as described above). Here SAP IQ acts as an enterprise data warehouse that receives data from a variety of traditional sources (such as OLTP Databases and files systems), and SAP HANA Operational Data Store(ODS) https://blogs.sap.com/2019/05/22/q-the-easy-installer-for-sap-iq/ SAP IQ as an Enterprise Data Warehouse (EDW) with SAP HANA as Agile Data Mart When SAP IQ is used as an EDW, it can also be augmented with HANA's in-memory technology. Common uses include planning and analysis reports where simultaneous OLTP processing is needed. In this case, data flows from SAP IQ to SAP HANA. SAP BusinessObjects BI can be used to achieve visibility across both platforms. Technology To a user, SAP IQ looks just like any relational DBMS with a SQL-based language layer accessible via ODBC/JDBC drivers. However, inside, Sybase IQ is a column-oriented DBMS, which stores data tables as sections of columns of data rather than as rows of data like most transactional databases. Column-Store Architecture Column-orientation has a number of advantages. If a search is being done for items matching a particular value in a column of data, only the storage objects corresponding to that data column within the table need to be accessed. A traditional row-based database would have to read the whole table, top to bottom. Another advantage is that when indexed correctly, a value that would have to be stored once in each row of data in a traditional database is stored only once, and in SAP IQ, an n-bitindex is used to access the data. Nbit and tiered indexing is used to allow for increased compression and fast, incremental batch loads. Additionally, the column-based storage enables SAP IQ to compress data efficiently on the fly. Indexing Technology Prior to SAP IQ 16, each data page was structured as an array of cells of a fixed size, so all values have the same data type. While this storage approach is efficient for structured and fixed length data, this does not hold for the more unstructured and variable sized data that is seen today. To combat storage inefficiency and store variable sized data with minimal wasted space, each page is composed of cells of a variable size that are packed tightly together; the column store architecture supports a variable number of cells per page and various page formats within a column. SAP IQ also applies Lempel-Ziv-Welch ( LZW ) compression algorithms to each data page when it is written to disk, to significantly reduce data volume. Bitmaps are used for secondary indexes. Massively Parallel Processing Framework SAP IQ has a massively parallel processing (MPP) framework based on a shared-everything environment that supports distributed query processing. Most other products capable of MPP tend to be based on shared-nothing environments. The benefit of shared-everything is that it's more flexible in terms of the variety of queries that can be optimized—especially for balancing the needs of many concurrent users. The downside is that in extreme cases, competition among processors to access a shared pool of storage (usually a storage-area network), can lead to I/O contention, which affects query performance.[12] However, the aforementioned storage architecture of SAP IQ allows compute and storage layers to scale out independently of each other and also allows these resources to be provisioned on-demand for better utilization without restructuring the underlying database. Multiplex Architecture SAP IQ uses a clustered grid architecture, which is made up of clusters of SAP IQ servers, or Multiplex. These clusters are used to scale performance for large numbers of concurrent queries or queries that are great in complexity. This is built upon a shared-everything architecture where all compute nodes interact with the same shared storage and queries have the ability to distribute across all compute nodes. The Multiplex has a coordinator node which manages the database catalog and coordinates transactional writes to the store. Other nodes can be reader only nodes, or readers and writes, like the coordinator node. The storage fabric can be implemented with numerous technologies that allow sharing amongst the multiplex nodes. This architecture has multiple uses, including workload balancing and elastic virtual data marts. Workload balancing is achieved by the SAP IQ query engine through dynamically increasing/decreasing parallelism in response to changes in server activity. There is automatic failover if a node stops participating in a query, and other nodes will pick up work originally assigned to the failed node so the query can complete. On the client side, compatibility with external load balances ensures that queries are initiated on physical servers in a balanced fashion to eliminate bottlenecks. Physical nodes in the Multiplex can be grouped together into “logical servers” which allow workloads to be isolated from each other (for security or resource balancing purposes); machines can be added to these as demand changes. The aim of the grid architecture is to enable resiliency even during global transactions. Loading Engine The SAP IQ Loading Engine can be used for incremental batch, low latency, concurrent loading, and bulk loading (with both client and server data files). The bulk loading process allows for multiple load process to occur simultaneously, if the loads are of different tables. Data can be loaded from other databases as well as files. Page-level snapshot versioning allows concurrent loads and queries, with locking occurring at the table level only. With SAP Replication Server, now enhanced to optimize loads into SAP IQ, transactions are compiled into the fewest set of operations, and then bulk micro-batch loads into SAP IQ are performed, which gives the appearance of real-time, continuous loads. The bulk loader now performs all operations in parallel to make full use of all server cores, remove bottlenecks, and keep all threads productive, instead of serializing the process. The loading process remains a two-phase process, first reading raw data and creating FP indexes, and second creating secondary indexes, but everything is executed in parallel. High Group indexes, which the query optimizer relies on for information about which columns/rows contain which data values, are now structured as a set of tiers, increasing as you move down the pyramid. Lastly, SAP IQ introduces a write-optimized, Row Level Versioned (RLV) Delta store which enables high-velocity data loads and fast availability of data to users. This store is minimally indexes and compressed, with row-level locking for concurrent write, and its own transaction log and is append only, and acts as a companion to the main store, with data being loaded at high speed to the RLV store, and migrating to the main store later, merging to it periodically. To the user it does not appear as though there are two separate entities at work and queries operate transparently across the two stores. To make use of this the users can specify particular “hot” database tables as RLV tables. Framework and Client APIs SAP IQ offers query APIs based on pure ANSI SQL standards (with few restrictions), that include OLAP and full-text search support. Stored procedures are supported in both ANSI SQL and Transact-SQL dialects, and can be executed on a scheduled or immediate basis. As well there are database drivers for a variety of programming languages such as JAVA, C/C++m PHP, PERL, Python, Ruby, and ADO.Net. Handling of Unstructured Data SAP IQ is an analytics engine that can query both structured and unstructured data and join the results together. SAP IQ introduced a new text index and an SQL “contains” clause to facilitate this by searching for terms within a blob of unstructured text; SAP Sybase's partnerships with vendors allow for various binary forms of text files to be ingested into SAP IQ and text indexes created for them; these text indexes get the data ready for higher level text analysis applications to perform full-text searches within SAP IQ via SELECT statements. SELECT syntax can be used by applications performing tokenization, categorization and further text analysis. In-Database Analytics / Extensibility Framework In-database analytics are built upon the fundamental concept of keeping analytics algorithms close to the data for higher performance. The extensibility framework, called “in-database analytics” enables embedding of analytic functions inside the database engine of SAP IQ, moving analytics into the database, instead of to a specialized environment out of the database, a process which is error prone and slower. Pre-built functions are available natively and via partners of SAP IQ providing specialized statistical and data mining libraries that plug into SAP IQ. This framework increases SAP IQ's power to do advance processing and analysis as the data does not have to be moved out of the database into a specialized environment for analytics. All data and results obtained can be shared though the DBMS and can be easily acquired through an SQL interface. Through user defined functions (UDFS) partners can extend the DBMS with custom computations, by providing a specialized statistical and data mining libraries that plug right into SAP IQ to enhance its performance of advanced processing and analysis. Security SAP IQ provides several features, both included in the base product and licensable separately, to help protect the security of the user's data. A new feature introduced in IQ 16 is the Role Based Access Control (RBAC) which enables for a separation of duties and upholds the principle of least privilege, by allowing the breakdown of privileged operations into fine-grained sets that can be individually granted to users. Included as part of the base product are: users, groups and permissions, database administration authorities, user login policies, database encryption, transport-layer security, IPV6, role-based access control, and database auditing. Additional features are part of a licensable option called the advanced security option: FIPS encryption, Kerberos authentication, LDAP authentication, and Database column encryption. Information Lifecycle Management (ILM) As part of ILM, SAP IQ allows users to create multiple user DBSpaces (logical units of storage/containers for database objects) for organizing data. This can be used to separate structured or unstructured data, group it together according to age and value, or to partition table data. DBSpaces can also be marked as read-only to enable one-time consistency checking and back-up. Another application of ILM is the ability to partition tables, and place moving portions along the storage fabric and backup capabilities; this enables a storage management process where data cycles through tiered storage, moving from faster more expensive storage to slower, cheaper storage as it ages, partitioning data according to value. High availability and Disaster Recovery The multiplex set-up provides scalability and High Availability for compute nodes because a multiplex coordinator node can failover to an alternate coordinator node. The SAP IQ Virtual Backup also allows users to quickly backup data, and along with storage replication technology, data is continuously copied so backups can occur quickly and “behind the scenes”. Once virtual backups are completed they can be verified through test and restore; enterprise data can be copied for development and testing. Then all that's left is to complete the backup at a transactionally consistent point in time. SAP claims that disaster recovery is easier with a shared everything approach to MPP. The SAP Sybase PowerDesigner modelling tool enables users to build an ILM model that can be deployed with SAP IQ. Storage types, DBSpaces, and lifecycle phases can be defined in an ILM model and the tool can be used to generate reports and create partition creation and movement scripts. Hadoop Integration SAP IQ provides federation with the Hadoop distributed file system (HDFS), a very popular framework for big data, so that enterprise users can continue to store data in Hadoop and utilize its benefits. Integration is achieved in four different ways, depending on the user's needs, through client-side federation, ETL, data, and query federation. Client-side federation joins data from IQ and Hadoop at a client application level while ETL federation lets the user load Hadoop data into the column store schemas of IQ. HDFS data can also be joined with IQ data on the fly through SQL queries from IQ, and finally results of MapReduce jobs can be combined with IQ data, also on the fly. SAP Control Center SAP Control Center replaces Sybase Central as a Web-Based graphical tool for administration and monitoring. SAP Control Center can be used for monitoring SAP Sybase servers and resources (node, multiplex) from any location, as well as monitoring performance, and spotting usage trends, The web application has a multi-tiered plug-in architecture which is made up of a server and product-based agents that bring SAP Sybase performance back to the Control Center Server. Web-Enabled Analytics SAP IQ comes with web-enabled application drivers facilitating access to SAP IQ from a variety of Web 2.0 programming and execution environments (Python, Perl, PHP, .Net, Ruby). Through query federation with other databases, developers can build applications that interact with multiple data sources at the same time (as well as with database platforms from other vendors). Federation proxy tables that map to tables in external databases can be created; these are materialized as in-memory tables but that can be interacted with as though they resided within SAP IQ. This way data sources can be combined in a unified view. Supported Platforms SAP IQ also supports plugging in external algorithms written in C++ and Java. SQL queries can call these algorithms, allowing for the execution of in-database analytics, which provides better performance and scalability. Additionally, Sybase IQ also provides drivers for access via languages such as PHP, Perl, Python, and Ruby on Rails. SAP IQ supports most major operating system platforms, including: Sun Solaris 64 bit Red Hat Linux 64/32 bit SuSE Linux 64/32 bit HP-UX 64 bit HP-UX Itanium 64 bit IBM-AIX 64 bit Windows 64/32 bit Customers Sybase claims that Sybase IQ is currently installed in over 2000 customer sites. Notable customers include comScore Inc., CoreLogic, Investment Technology Group (ITG), and the U.S. Internal Revenue Service (IRS). While Sybase IQ has been widely used for focused, data-mart-style deployments, it has also been deployed as an enterprise data warehouse. References External links SAP IQ website SAP IQ Community Wiki SAP IQ Documentation SAP IQ Support Page Technical documents at SybaseWiki Business software Data warehousing products Big data companies Proprietary database management systems SAP SE Column-oriented DBMS software for Linux
19327123
https://en.wikipedia.org/wiki/Vision%20Guided%20Robotic%20Systems
Vision Guided Robotic Systems
A Vision Guided Robot (VGR) System is basically a robot fitted with one or more cameras used as sensors to provide a secondary feedback signal to the robot controller to more accurately move to a variable target position. VGR is rapidly transforming production processes by enabling robots to be highly adaptable and more easily implemented, while dramatically reducing the cost and complexity of fixed tooling previously associated with the design and set up of robotic cells, whether for material handling, automated assembly, agricultural applications, life sciences, and more. In one classic though dated example of VGR used for industrial manufacturing, the vision system (camera and software) determines the position of randomly fed products onto a recycling conveyor. The vision system provides the exact location coordinates of the components to the robot, which are spread out randomly beneath the camera's field of view, enabling the robot arm(s) to position the attached end effector (gripper) to the selected component to pick from the conveyor belt. The conveyor may stop under the camera to allow the position of the part to be determined, or if the cycle time is sufficient, it is possible to pick a component without stopping the conveyor using a control scheme that tracks the moving component through the vision software, typically by fitting an encoder to the conveyor, and using this feedback signal to update and synchronize the vision and motion control loops. Such functionality is now common in the field of vision guided robotics (VGR). It is a fast-growing rapidly evolving technology proving to be economically advantageous in countries with high manufacturing overheads and skilled labor costs by reducing manual intervention, improving safety, increasing quality, and raising productivity rates, among other benefits. Vision systems for robot guidance A vision system comprises a camera and microprocessor or computer, with associated software. This is a very wide definition that can be used to cover many different types of systems which aim to solve a large variety of different tasks. Vision systems can be implemented in virtually any industry for any purpose. It can be used for quality control to check dimensions, angles, colour or surface structure-or for the recognition of an object as used in VGR systems. A camera can be anything from a standard compact camera system with integrated vision processor to more complex laser sensors and high resolution high speed cameras. Combinations of several cameras to build up 3D images of an object are also available. Limitations of a vision system There are always difficulties of integrated vision system to match the camera with the set expectations of the system, in most cases this is caused by lack of knowledge on behalf of the integrator or machine builder. Many vision systems can be applied successfully to virtually any production activity, as long as the user knows exactly how to set up system parameters. This set-up, however, requires a large amount of knowledge by the integrator and the number of possibilities can make the solution complex. Lighting in industrial environments can be another major downfall of many vision systems. VGR Approaches Typically, vision guidance systems fall into two categories; stationary camera mount, or robot arm-mounted camera. A stationary camera is typically mounted on a gantry or other structure where it can observe the entire robot cell area. This approach has the advantage of knowing its fixed position, providing a stable point of reference for all the activity within the cell. It has the disadvantage of additional infrastructure cost, and occasionally having its view obstructed by the robot arm's position. It also typically requires large image files (5 Mpixel or more) since the image must cover the entire work area. These may be 2D or 3D cameras, although the vast majority of installations (2019) are using machine vision 2D cameras offered by companies such as COGNEX, Basler, Sick, Datalogic and many others. Emerging players such as Pickit3D, Zivid, and Photoneo are offering 3D cameras for stationary use. COGNEX recently acquired EnShape to add 3D capabilities to its lineup as well. 3D stationary mount cameras create large image files and point clouds that require substantial computing resources to process. A camera mounted on a robot arm has some advantages and disadvantages. Some 3D cameras are simply too large to be practical when mounted on a robot, but Pickit 3D's Xbox cameras and 2D cameras such as Robotiq's wrist camera are compact and/or light enough to not meaningfully affect available robot working payload. An arm mounted camera has a smaller field of view, and can operate successfully at lower resolution, even VGA, because it is only surveying a fraction of the entire work cell at any point in time. This leads to faster image processing times. However, arm mounted cameras, whether 2D or 3D, typically suffer from XYZ disorientation because they are continually moving and have no way of knowing the robot arm's position. The typical workaround is to interrupt each robot cycle long enough for the camera to take another image and get reoriented. This is visible in essentially all published videos of arm-mounted camera's performance, whether 2D or 3D, and can increase cycle times by as much as double what would otherwise be required. Pickit 3D's Xbox camera has been arm-mounted for some applications. While capable of more complex 3D tasks such as bin picking, it still requires the stop-take-a-picture re-orientation mentioned above; it's 3D awareness does not help with that problem. Visual Robotics claims to eliminate this cycle interruption with their "Vision-in-Motion" capabilities. Their system combines a 2D imager with internal photogrammetry and software to perform 3D tasks at high speed, owing to the smaller image files. The company claims a pending patent covering techniques for ensuring the camera knows its location in 3D space without stopping to get reoriented, leading to substantially faster cycle times. While much faster than other 3D approaches, it is not likely to be able to handle the more complex 3D tasks a true stereo camera can. On the other hand, many 3D applications require relatively simple object identification easily supported by the technique. To date, their ability to visually pick objects in motion (e.g. items on a conveyor) using an arm-mounted camera appears to be unprecedented. VGR systems Benefits Traditional automation means serial production with large batch sizes and limited flexibility. Complete automation lines are usually built up around a single product or possibly a small family of similar products that can run in the same production line. If a component is changed or if a complete new product is introduced, this usually causes large changes in the automation process-in most cases new component fixtures are required with time-consuming setup procedures. If components are delivered to the process by traditional hoppers and vibrating feeders, new bowl feeder tooling or additional bowl feeder tops are required. It may be that different product must be manufactured on the same process line, the cost for pallets, fixtures and bowl feeders can often be a large part of the investment. Other areas to be considered are space constraints, storage of change parts, spare components, and changeover time between products. VGR systems can run side-by-side with very little mechanical set up, in the most extreme cases a gripper change is the only requirement, and the need to position components to set pick-up position is eliminated. With its vision system and control software, it is possible for the VGR system to handle different types of components. Parts with various geometry, can be fed in any random orientation to the system and be picked and placed without any mechanical changes to the machine, resulting in quick changeover times. Other features and benefits of VGR system are: Switching between products and batch runs is software controlled and very fast, with no mechanical adjustments. High residual value, even if production is changed. Short lead times, and short payback periods High machinery efficiency, reliability, and flexibility Possibility to integrate a majority of secondary operations such as deburring, clean blowing, washing, measuring and so on. Reduces manual work See also Machine vision Simultaneous localization and mapping References Industrial robotics Machine vision
47402328
https://en.wikipedia.org/wiki/Index%20of%20branches%20of%20science
Index of branches of science
Science (from Latin scientia, meaning "knowledge") is a systematic enterprise that builds and organizes knowledge in the form of testable explanations and predictions about the universe. Modern science is typically divided into three major branches that consist of the natural sciences (biology, chemistry, physics, astronomy and Earth science), which study nature in the broadest sense; the social sciences (e.g. psychology, sociology, economics, history) which study people and societies; and the formal sciences (e.g. mathematics, logic, theoretical computer science), which study abstract concepts. There is disagreement, however, on the formal sciences being a science as they do not rely on empirical evidence. Disciplines that use science, such as engineering and medicine, are described as applied sciences. A Acanthochronology – study of cactus spines grown in time ordered sequence Acarology – study of mites and ticks Aceology – science of remedies, or of therapeutics; iamatology Acology – study of medical remedies Acoustics – science of sound Actinobiology – synonymous with radiobiology Adenology – study of glands Aedoeology – science of generative organs Aerobiology – study of airborne organisms Aerodonetics – science or study of gliding Aerodynamics – dynamics of gases; science of movement in a flow of air or gas Aerolithology – study of aerolites; meteorites Aeropalynology – study of pollens and spores in atmosphere Aerology – study of the atmosphere Aeronautics – study of navigation through air or space Aerostatics – science of air pressure; art of ballooning Agnoiology – study of ignorance Agonistics – art and theory of prize-fighting Agriology – comparative study of primitive peoples Agrobiology – study of plant nutrition; soil yields Agroecology – study of ecological processes applied to agricultural production systems Agrogeology – study of agrominerals Agrology – study of agricultural soils Agronomics – study of productivity of land Agrostology – science or study of grasses Alethiology – study of truth Algedonics – science of pleasure and pain Algology (botany) – study of algae Algology (medicine) – study of pain Anaesthesiology – study of anaesthetics Anatomy – study of the structure of the body Andragogy – theory and practice of education of adults Andrology – study of men's physiology Anemology – study of wind Angiology – study of blood flow and lymphatic system Anthropobiology – study of human biology Anthropology – study of human cultures Anthrozoology – study of human-animal interaction Apiology – study of bees Aquatic ecology – study of aquatic environment Arachnology – study of arachnids Archaeology – study of human material remains Archelogy – study of first principles Archology – science of the origins of government Areology – study of Mars Aretaics – science of virtue Aristology – science or art of dining Aromachology – study of smell and odor Arthrology – study of joints Arthropodology – study of arthropods like insects and arachnids Astacology – science of crayfish Asteroseismology – study of star oscillations Astheniology – study of diseases of weakening and aging Astrobotany – study of plants in space Astrobiology – study of extraterrestrial life Astrodynamics – study of motion of rockets and spacecraft Astrogeology – study of extraterrestrial geology Astronomy – study of celestial bodies and phenomena Astrophysics – study of behaviour of interstellar matter Atmology – the science of aqueous vapor Audiology – study of hearing Autecology – study of ecology of one species Autology – scientific study of oneself Auxology – science of growth Avionics – science of electronic devices for aircraft Axiology – science of the ultimate nature of value B Bacteriology – study of bacteria Balneology – science of the therapeutic use of baths Barodynamics – science of the support and mechanics of bridges Barology – study of gravitational force Bathymetry – study of underwater depth of ocean floors or lake floors Batology – the study of brambles Bibliology – study of books Bibliotics – study of documents to determine authenticity Bioecology – study of interaction of life in the environment Biogeochemistry – study of chemistry of the surface of the Earth Biology – study of life Biochemistry – study of chemical processes within and relating to living organism Biomechanics – study of the structure, function and motion of the mechanical aspects of biological systems Biometrics – study of biological measurement for security purposes Bionomics – study of organisms interacting in their environments Biophysics – study of physics of biological phenomena Biopsychology – application of the science of biology to the study of psychology Biotribology – study of friction, wear and lubrication of biological systems Botany – study of plants Bromatology – study of food Bryology – study of mosses and liverworts C Cacogenics – study of racial degeneration Caliology – study of bird's nests Calorifics – study of heat Cambistry – science of international exchange Campanology – study of bells Carcinology – study of crabs and other crustaceans Cardiology – study of the heart Caricology – study of sedges Carpology – study of fruit Cartography – science of making maps and globes Castrametation – art of designing a camp Catacoustics – science of echoes or reflected sounds Catallactics – science of commercial exchange Catechectics – art of teaching by question and answer Celestial mechanics – study of motion of objects in outer space Cell biology – study of the different structures and functions of both eukaryote and prokaryote cells Cetology – study of whales and dolphins Chalcography – art of engraving on copper or brass Chalcotriptics – art of taking rubbings from ornamental brasses Chaology – study of chaos or chaos theory Characterology – study of development of character Chemistry – study of properties and behaviours of substances Chirocosmetics – beautifying the hands; art of manicure Chirography – study of handwriting or penmanship Chirology – study of the hands Chiropody – medical science of feet Chorology – science of the geographic description of anything Chrematistics – study of wealth; political economy Chromatics – study of color Chronobiology – study of biological rhythms Chrysology – study of precious metals Ciselure – art of chasing metal Classical mechanics – study of motion of macroscopic objects Climatology – study of climate Clinology – study of aging or individual decline after maturity Codicology – study of manuscripts Coleopterology – study of beetles and weevils Cometology – study of comets Computer science – study of processes that interact with data Conchology – study of shells Connectomics – study of connectomes Contact mechanics – study of the deformation of solids that touch each other Coprology – study of feces Cosmetology – study of cosmetics Cosmochemistry – study of the chemical composition of matter in the universe and the processes that led to those compositions Cosmology – study of the universe Craniology – study of the skull Criminology – study of crime and criminals Cryobiology – study of life under cold conditions Cryptology – study of codes Cryptozoology – study of animals for whose existence there is no conclusive proof Ctetology – study of the inheritance of acquired characteristics Cyclonology – study of tropical cyclones, e.g. hurricanes Cynology – scientific study of dogs Cytology – study of living cells D Dactyliology – study of rings Dactylography – study of fingerprints Dactylology – study of sign language Deltiology – collection and study of picture postcards Demography – study of population Demology – study of human behaviour Dendrochronology – study of tree rings Dendrology – study of trees Deontology – theory or study of moral obligation Dermatoglyphics – study of skin patterns and fingerprints Dermatology – study of skin Desmology – study of ligaments Diabology – study of devils Diagraphics – art of making diagrams or drawings Dialectology – study of dialects Dietetics – study of prevention of health conditions and diseases through human nutrition and regulation of diet Dioptrics – study of light refraction Diplomatics – science of deciphering ancient writings and texts Diplomatology – study of diplomats Docimology – art of assaying Dosiology – study of doses Dynamics – study of forces and their effects on motion Dysgenics – study of racial degeneration E Ecclesiology – study of church affairs Eccrinology – study of excretion Ecology – study of environment Economics – study of material wealth (production, distribution, and consumption of goods and services) Edaphology – study of soils Egyptology – study of ancient Egypt Eidology – study of mental imagery Ekistics – study of human settlement Electrochemistry – study of relations between electricity and chemicals Electrodynamics – study of the effects arising from the interactions of electric currents with magnets, with other currents, or with themselves Electrology – study of electricity Electrostatics – study of static electricity Electromagnetism – study of electromagnetic force Embryology – study of embryos Emetology – study of vomiting Emmenology – study of menstruation Endemiology – study of local diseases Endocrinology – study of glands Energetics – study of energy under transformation within various fields Engineering studies – study of engineering Enigmatology – study of enigmas (puzzles) Entomology – study of insects Entozoology – study of parasites that live inside larger organisms Enzymology – study of enzymes Ephebiatrics – branch of medicine dealing with adolescence Epidemiology – study of diseases and epidemics Epileptology – study of epilepsy Epistemology – study of grounds of knowledge Eremology – study of deserts Ergology – study of effects of work on humans Ergonomics – study of people at work Escapology – study of freeing oneself from constraints Eschatology – study of death; final matters Ethnobiology – study of dynamic relationships between peoples Ethnobotany – study of a region's plants and their practical uses through the traditional knowledge of a local culture and people Ethnogeny – study of origins of races or ethnic groups Ethnochoreology – study of dances and its implication in culture Ethnology – study of cultures Ethnomethodology – study of everyday communication and social interaction Ethnomusicology – study of comparative musical systems Ethology – study of natural or biological character Ethonomics – study of economic and ethical principles of a society Etiology – science of causes, especially of disease Etymology – study of origins of words Euthenics – science concerned with improving living conditions Exobiology – study of extraterrestrial life Exoplanetology – study of exoplanets F Felinology – study of felines Finance – science or study of money management Floristry – art of cultivating and selling flowers Fluid dynamics – study of flow of fluids Fluid mechanics – study of fluids behaviour at rest and in motion Fluid statics – study of fluids behaviour at rest Fluviology – study of watercourses Folkloristics – study of folklore and fables Forestry – study of the creation, management, use, conservation, and repair of forests and associated resources Fracture mechanics – study of the propagation of cracks in materials Futurology – study of future G Garbology – study of garbage Gastroenterology – study of the digestive system Gastronomy – study of fine dining Gemmology – study of gems and jewels Gender Studies – study of gender Genealogy – study of descent of families Genesiology – study of reproduction and heredity Genetics – study of genes Geochemistry – study of chemistry of the earth's crust Geochronology – study of measuring geological time Geography – study of surface of the earth and its inhabitants Geology – study of the rocks of a planet Geometry – study the sizes, shapes, positions angles and dimensions of things. Geomorphogeny – study of the origins of land forms Geoponics – study of agriculture Geotechnics – study of increasing habitability of the earth Geratology – study of decadence and decay Gerocomy – study of old age Gerontology – study of the elderly and aging Gigantology – study of giants Glaciology – study of ice ages and glaciation Glossology – study of language; study of the tongue Glyptography – art of engraving on gems Glyptology – study of gem engravings Gnomonics – the art of measuring time using sundials Gnosiology – study of knowledge; philosophy of knowledge Gnotobiology – study of life in germ-free conditions Graminology – study of grasses Grammatology – study of systems of writing Graphemics – study of systems of representing speech in writing Graphology – study of handwriting Gromatics – science of surveying Gynaecology – study of women's physiology Gyrostatics – study of rotating bodies H Haemataulics – study of movement of blood through blood vessels Hagiology – study of saints Halieutics – study of fishing Hamartiology – study of sin Harmonics – study of musical acoustics Hedonics – part of ethics or psychology dealing with pleasure Helcology – study of ulcers Heliology – science of the sun Helioseismology – study of sun's interior by observing its surface oscillations Helminthology – study of worms Hematology – study of blood Hemodynamics – study of the dynamics behind blood circulation Hepatology – study of liver, gallbladder, biliary tree, and pancreas Heredity – study of passing of traits from parents to offspring Heresiology – study of heresies Hermeology – study of Mercury Herpetology – study of reptiles and amphibians Hierology – science of sacred matters Hippiatrics – study of diseases of horses Hippology – study of horses Histology – study of the tissues of organisms Histopathology – study of changes in tissue due to disease Historiography – study of writing history Historiology – study of history Homiletics – art of preaching Home Economics – deals with home and economics Hoplology – study of human combative behavior and performance Horography – art of constructing sundials or clocks Horology – science of time measurement Horticulture – study of gardening Hydrobiology – study of aquatic organisms Hydrodynamics – study of movement in liquids Hydrogeology – study of ground water Hydrography – study of investigating bodies of water Hydrokinetics – study of motion of fluids Hydrology – study of water resources Hydrometeorology – study of atmospheric moisture Hydropathy – study of treating diseases with water Hydrostatics – study of fluids behaviour at rest Hyetology – science of rainfall Hygiastics – science of health and hygiene Hygienics – study of sanitation; health Hygiology – hygienics; study of cleanliness Hygroscopy – study of humidity Hygrometry – science of humidity Hymnography – study of writing hymns Hymnology – study of hymns Hypnology – study of sleep; study of hypnosis Hypsography – science of measuring heights I Iamatology – study of remedies Iatrology – treatise or text on medical topics; study of medicine Iatromathematics – archaic practice of medicine in conjunction with astrology Ichnography – art of drawing ground plans; a ground plan Ichnology – science of fossilized footprints Ichthyology – study of fish Iconography – study of drawing symbols Iconology – study of icons; symbols Ideogeny – study of origins of ideas Ideology – science of ideas; system of ideas used to justify behaviour Idiomology – study of idiom, jargon or dialect Idiopsychology – study of the psychology of one's own mind Immunochemistry – study of chemistry of the immune system Immunogenetics – study of genetic characteristics of immunity Immunology – study of immunity Immunopathology – study of immunity to disease Insectology – study of insects Irenology – study of peace Iridology – study of the iris; diagnosis of disease based on the iris of the eye K Kalology – study of beauty Karyology – study of cell nuclei Kinematics – study of motion Kinesics – study of gestural communication Kinesiology – study of human movement and posture Kinetics – study of forces producing or changing motion Koniology – study of atmospheric pollutants and dust Ktenology – science of putting people to death Kymatology – study of wave motion L Labeorphily – collection and study of beer bottle labels Larithmics – study of population statistics Laryngology – study of larynx Lepidopterology – study of butterflies and moths Leprology – study of leprosy Lexicology – study of words and their meanings Lexigraphy – art of definition of words Lichenology – study of lichens Limacology – study of slugs Limnobiology – study of freshwater ecosystems Limnology – study of bodies of fresh water Linguistics – study of language Liturgiology – study of liturgical forms and church rituals Loimology – study of plagues and epidemics Loxodromy – study of sailing along rhumb-lines Ludology – study of games M Macroeconomics – branch of economics dealing with the performance, structure, behavior, and decision-making of the whole economy Magirics – art of cookery Magnanerie – art of raising silkworms Magnetics – study of magnetism Magnetohydrodynamics – study of electrically conducting fluids Magnetostatics – study of magnetic fields in systems where the currents are steady Malacology – study of molluscs Malariology – study of malaria Mammalogy – study of mammals Manège – art of horsemanship Mariology – study of the Virgin Mary Marine biology – study of the ocean's ecosystem Mastology – study of mammals Mathematics – study of magnitude, number, and forms Mazology – mammalogy; study of mammals Mechanics – study of action of force on bodies Meconology – study of or treatise concerning opium Media studies – study of mass media Medicine – science of diagnosis, prognosis, treatment, and prevention of disease Melissopalynology – study of honey Melittology – study of bees Melology – study of music; musicology Mereology – study of part-whole relationships Mesology – ecology Metallogeny – study of the origin and distribution of metal deposits Metallography – study of the structure and constitution of metals Metallurgy – study of alloying and treating metals Metaphysics – study of principles of nature and thought Metapolitics – study of politics in theory or abstract Metapsychology – study of nature of the mind Metascience – study of science Meteoritics – study of meteors Meteorology – study of weather Methodology – the study or description of methods Methyology – study of alcohol Metrics – study of versification Metrology – science of weights and measures Microanatomy – study of microscopic tissues Microbial ecology – study of microbial environment Microbiology – study of microscopic organisms Microclimatology – study of local climates Microeconomics – branch of economics that studies the behavior of individual households and firms in making decisions on the allocation of limited resources Micrology – study or discussion of trivialities Micropalaeontology – study of microscopic fossils Microphytology – study of very small plant life Microscopy – study of minute objects Mineralogy – study of minerals Molecular biology – study of the molecular basis of biological activity in and between cells Molinology – study of mills and milling Momilogy – study of mummies Morphology – study of forms and the development of structures Muscology – study of mosses Museology – study of museums Musicology – study of music Mycology – study of funguses Myology – study of muscles Myrmecology – study of ants Mythology – study of myths; fables; tales N Naology – study of church or temple architecture Nasology – study of the nose Nautics – art of navigation Necroplanetology – study of the destruction of planets Nematology – study of nematodes Neonatology – study of newborn babies Neossology – study of nestling birds Nephology – study of clouds Nephrology – study of the kidneys Neurobiology – study of anatomy of the nervous system Neuroeconomics – study of human decision making and the ability to process multiple alternatives and to choose an optimal course of action Neurology – study of nervous system Neuropsychology – study of relation between brain and behaviour Neurypnology – study of hypnotism Neutrosophy – study of the origin and nature of philosophical neutralities Nomology – the science of the laws; especially of the mind Noology – science of the intellect Nosology – study of diseases Nostology – study of senility Notaphily – study and collecting of bank-notes and cheques Numerology – pseudoscientific study of numbers Numismatics – study of coins Nymphology – study of nymphs Nanotechnology – study of nanite Keratnology Study of nails and hair O Obstetrics – study of midwifery Oceanography – study of oceans Oceanology – study of oceans Odontology – study of teeth Odonatology– study of dragonflies and damselflies Oenology – study of wines Oikology – science of housekeeping Olfactology – study of the sense of smell Ombrology – study of rain Oncology – study of tumours Oneirology – study of dreams Onomasiology – study of nomenclature Onomastics – study of proper names Ontology – science of pure being; the nature of things Oology – study of eggs Ophiology – study of snakes Ophthalmology – study of eye diseases Optics – study of light Optology – study of sight Optometry – science of examining the eyes Orchidology – study of orchids Ornithology – study of birds Organology (biology) – study of form, structure, development, and functions of plant or animal organs Organology (musicology) – study of musical instruments in relation to history, culture, construction, acoustic properties and classification Orology – study of mountains Orthoepy – study of correct pronunciation Orthography – study of spelling Orthopterology – study of cockroaches Oryctology – mineralogy or paleontology Osmics – scientific study of smells Osmology – study of smells and olfactory processes Osphresiology – study of the sense of smell Osteology – study of bones Otology – study of the ear Otorhinolaryngology – study of ear, nose and throat P Paedology – study of children Paidonosology – study of children's diseases; pediatrics Palaeoanthropology – study of early humans Palaeobiology – study of fossil plants and animals Palaeoclimatology – study of ancient climates Palaeoichthyology – study of ancient fish Palaeolimnology – study of ancient lakes Palaeontology – study of fossils Palaeopedology – study of early soils Paleobotany – study of ancient plants Paleo-osteology – study of ancient bones Palynology – study of pollen Papyrology – study of paper Paradoxology – study of paradoxes Parapsychology – study of unexplained mental phenomena Parasitology – study of parasites Paroemiology – study of proverbs Parthenology – study of virgins Pataphysics – science of imaginary solutions Pathology – study of disease Patrology – study of early Christianity Pedagogics – study of teaching Pedology – study of soils Pelology – study of mud Penology – study of crime and punishment Periodontics – study of gums Peristerophily – pigeon-collecting Pestology – science of pests Petrology – study of rocks Pharmacognosy – study of drugs of animal and plant origin Pharmacology – study of drugs Pharology – study of lighthouses Pharyngology – study of the throat Phenology – study of organisms as affected by climate Phenomenology – study of phenomena Philematology – act or study of kissing Phillumeny – collecting of matchbox labels Philology – study of ancient texts; historical linguistics Philosophy – science of knowledge or wisdom Phoniatrics – study and correction of speech defects Phonology – study of speech sounds Photobiology – study of effects of light on organisms Photonics – study of photons Phraseology – study of phrases Phrenology – study of bumps on the head Phycology – study of algae and seaweeds Physics – study of properties of matter, force and energy Physiology – study of processes of life Phytology – study of plants; botany Piscatology – study of fishes Pisteology – science or study of faith Planetology – study of planets Plumology – study of feathers Plutology – political economy; study of wealth Pneumatics – study of mechanics of gases Pneumonology – study of diseases involving the respiratory tract Podiatry – study and treatment of disorders of the foot; chiropody Podology – study of the feet Polemology – study of war Pomology – study of fruit-growing Pogonology – study of beards Posology – science of quantity or dosage Potamology – study of rivers Praxeology – study of practical or efficient activity; science of efficient action Primatology – study of primates Proctology – study of rectum, anus, and colon Prosody – study of versification Protistology – study of protists Proxemics – study of man's need for personal space Psalligraphy – art of paper-cutting to make pictures Psephology – study of election results and voting trends Pseudology – art or science of lying Pseudoptics – study of optical illusions Psychobiology – study of biology of the mind Psychogenetics – study of internal or mental states Psychognosy – study of mentality, personality or character Psychology – study of mind Psychopathology – study of mental illness Psychophysics – study of link between mental and physical processes Pteridology – study of ferns Pterylology – study of distribution of feathers on birds Punnology – study of puns Pyretology – study of fevers Pyrgology – study of towers Pyroballogy – study of artillery Pyrography – study of woodburning Pyrotechnics – study of combustion through fire or explosions Q Quinology – study of quinine. Quantum computing – the exploitation of collective properties of quantum states, such as superposition and entanglement, to perform computation. Quantum mechanics – a fundamental theory in physics which describes nature at the smallest scales of energy levels of atoms and subatomic particles Queer theory – study of issues related to sexual orientation and gender identity R Raciology – study of racial differences Radiobiology – study of the scientific principles, mechanisms, and effects of the interaction of ionizing radiation with living matter Radiochemistry – study of ordinary chemical reactions under radioactive circumstances Radiology – study of X-rays and their medical applications Reflexology – study of reflexes Rheology – science of the deformation or flow of matter Rheumatology – study of rheumatism Rhinology – study of the nose Rhochrematics – science of inventory management and the movement of products Robotics – deals with the designing, construction, and operation of robots Runology – study of runes S Sarcology – study of fleshy parts of the body Satanology – study of the devil Scatology – study of excrement or obscene literature Schematonics – art of using gesture to express tones Sciagraphy – art of shading Scripophily – collection of bond and share certificates Sedimentology – study of sediment Seismology – study of earthquakes Selenodesy – study of the shape and features of the moon Selenology – study of the moon Semantics – study of meaning Semantology – science of meanings of words Semasiology – study of meaning; semantics Semiology – study of signs and signals Semiotics – study of signs and symbols Serology – study of serums Sexology – study of sexual behaviour Siderology – study of iron and its alloys, including steel Significs – science of meaning Silvics – study of tree's life Sindonology – study of the shroud of Turin Sinology – study of China Sitology – dietetics Sociobiology – study of biological basis of human behaviour Sociology – study of society Solid mechanics – study of behaviour of solid materials Somatology – science of substances Sophiology – science of ideas Soteriology – study of theological salvation Snow hydrology – study of snow Spectrology – study of ghosts Spectroscopy – study of spectra Speleology – study and exploration of caves Spermology – study of seeds Sphagnology – study of peat moss Sphygmology – study of the pulse Splanchnology – study of the entrails or viscera Spongology – study of sponges Stasiology – study of political parties Statics – study of bodies and forces in equilibrium Stellar astronomy – study of stars, their origins, and their evolution. Stemmatology – study of relationships between text Stereochemistry – study of chemistry of the relative spatial arrangement of atoms that form the structure of molecules and their manipulation. Stoichiology – science of elements of animal tissues Stomatology – study of the mouth Storiology – study of folk tales Stratigraphy – study of geological layers or strata Stratography – art of leading an army Stylometry – studying literature by means of statistical analysis Suicidology – study of suicide Supramolecular chemistry – study of the chemistry of assembled molecular sub-units Symbology – study of symbols Symptomatology – study of symptoms of illness Synecology – study of ecological communities Synectics – study of processes of invention Syntax – study of sentence structure Syphilology – study of syphilis Systematics – study of the diversification of living forms, both past and present Systematology – study of systems T Taxidermy – art of curing and stuffing animals Taxonomy – study of plant, animals and microorganisms classification Tectonics – science of structure of objects, buildings and landforms Tegestology – study and collecting of beer mats Teleology – study of final causes; analysis in terms of purpose Telmatology – study of swamps Tempestology – study of tropical cyclones, e.g. hurricanes Teratology – study of birth defects and later abnormalities in living organisms Terrestrial ecology – study of terrestrial environment Teuthology – study of cephalopods Textology – study of the production of texts Thalassography – science of the sea Thanatology – study of death and its customs Thaumatology – study of miracles Theriatrics – veterinary medicine Theoretical computer science – science combining computer science and mathematics Theriogenology – study of animals' reproductive systems Thermodynamics – study of relation of heat to motion Thermokinematics – study of motion of heat Thermology – study of heat Therology – study of wild mammals Thremmatology – science of breeding domestic animals and plants Threpsology – science of nutrition Tidology – study of tides Timbrology – study of postage stamps Tocology – obstetrics; midwifery Tokology – study of childbirth Tonetics – study of pronunciation Topography – study of the shape and features of land surfaces Topology – study of places and their natural features Toponymics – study of place-names Toreutics – study of artistic work in metal Toxicology – study of poisons Toxophily – love of archery; archery; study of archery Traumatology – study of wounds and their effects Tribology – study of friction and wear between surfaces Trichology – study of hair and its disorders Trophology – study of nutrition Tsiganology – study of gypsies Turbology – study of tornadoes Turnery – art of turning in a lathe Typhlology – study of blindness and the blind Typography – art of printing or using type Typology – study of types of things U Uranography – descriptive astronomy and mapping Uranology – study of the heavens; astronomy Urbanology – study of cities Urenology – study of rust molds Urology – study of urine and the urinary tract V Venereology – study of venereal disease Vexillology – study of flags Victimology – study of victims Vinology – scientific study of vines and winemaking Virology – study of viruses Vitrics – study of glassy materials; glassware Volcanology – study of volcanoes X Xenobiology – study of biological systems which do not exist in nature Xylography – art of engraving on wood Xylology – study of wood Z Zenography – study of the planet Jupiter Zooarchaeology – study of animal remains of archaeological sites Zoochemistry – study of chemistry of animals Zoogeography – study of geographic distribution of animals Zoogeology – study of fossil animal remains Zoology – study of animals Zoonomy – animal physiology Zoonosology – study of animal diseases Zoopathology – study of animal diseases Zoophysics – physics of animal bodies Zoophysiology – study of physiology of animals Zoophytology – study of plant-like animals Zoosemiotics – study of animal communication Zootaxy – science of classifying animals Zootechnics – science of breeding animals Zygology – science of joining and fastening Zymology – science of fermentation Zymurgy – branch of chemistry dealing with brewing and distilling Zythology – study of beer See also List of words ending in ology List of sciences Science Outline of academic disciplines References Branches, science index Science-related lists
750101
https://en.wikipedia.org/wiki/Domain%20knowledge
Domain knowledge
Domain knowledge is knowledge of a specific, specialized discipline or field, in contrast to general (or domain-independent) knowledge. The term is often used in reference to a more general discipline—for example, in describing a software engineer who has general knowledge of computer programming as well as domain knowledge about developing programs for a particular industry. People with domain knowledge are often regarded as specialists or experts in their field. Knowledge capture In software engineering, domain knowledge is knowledge about the environment in which the target system operates, for example, software agents. Domain knowledge usually must be learned from software users in the domain (as domain specialists/experts), rather than from software developers. It may include user workflows, data pipelines, business policies, configurations and constraints and is crucial in the development of a software application. Expert's domain knowledge (frequently informal and ill-structured) is transformed in computer programs and active data, for example in a set of rules in knowledge bases, by knowledge engineers. Communicating between end-users and software developers is often difficult. They must find a common language to communicate in. Developing enough shared vocabulary to communicate can often take a while. The same knowledge can be included in different domain knowledge. Knowledge which may be applicable across a number of domains is called domain-independent knowledge, for example logics and mathematics. Operations on domain knowledge are performed by meta-knowledge. Literature Hjørland, B. & Albrechtsen, H. (1995). Toward A New Horizon in Information Science: Domain Analysis. Journal of the American Society for Information Science, 1995, 46(6), p. 400–425. See also Domain engineering Domain of discourse Knowledge engineering Domain (software engineering) Subject-matter expert Artificial Intelligence Knowledge
27550517
https://en.wikipedia.org/wiki/Perdana%20College%20of%20Malaysia
Perdana College of Malaysia
Perdana College of Malaysia is a private college founded in 1995 with two campuses, one in Kuala Lumpur, Malaysia and another in Dhaka, Bangladesh where students may earn a foreign degree while taking some or all of their classes in Dhaka and Kuala Lumpur. Some programs can be completed in Dhaka while others are completed overseas at one of Perdana's partner universities. About Perdana college is a sister campus of UCSI University of Malaysia. Because many students finish their degrees at Perdana's partner universities, enrollment fluctuates, averaging about 100 students per year. Due to its unique relationship with UCSI, all Perdana graduates receive their degrees from there andUrban are considered graduates from that university. Foreign partner universities Due to the UCSI University relationship, Perdana has partnerships with five other universities worldwide and have a 100% credit transfer rate and excellent student visa rate to these institutions. They are: Northumbria University, United Kingdom. Acadia University, Canada Algoma University, Canada University of Manitoba, Canada Curtin University of Technology, Australia Academic programs Beginning in 2009 there are three different degree programs completable in the college: Business Administration Accounting Mobile Computing In addition, Perdana also offers part of multiple other degree programs listed below with universities where the program can be completed in parenthesis. Business Information Systems (UCSI, Northumbria) Business Information Technology (Northumbria) Business (Northumbria) Business Administration/Commerce (Algoma, Acadia, Curtin, Manitoba, Northumbria) Information Technology (Alogma) Computer Science (Alcadia, Alogma) Computing (UCSI) UrbanApplied Computing (Northumbria) Information Technology (Curtin) Computer Systems and Networking (Curtin) Engineering (Manitoba, UCSI) University Foundation Program Also called Pre-University Program, the University Foundation Program (UFP) qualifies students who have completed SSC / ICSE / Grade 11 / GCE "O" Level to enter directly into year one of a university degree program. Completable in three semesters, the program works also for students who do not have the appropriate academic background or experience to gain access directly into a specific university program. Since its inception in 1995, hundreds of students have either completed the program and finished a degree in Dhaka or advanced to overseas institutions. Alumni On 5 August 2009 Perdana and its parent institution UCSI University launched a Bangladesh alumni chapter in hopes to foster increasing co-operation between the Malaysians and Bangladeshis and promote greater prosperity of the region. The launch was officiated by Bangladeshi Minister of Education, Mr. Nurul Islam Nahid, High Commissioner of Malaysia to Bangladesh, Mr. Jamaluddin Sabeh and UCSI University President, Peter T. S. Ng. Members of Perdana's Alumni Chapter will have access to the school's library, opportunities to serve on College Developmental Advisory Boards, as well as the ability to search and check for old friends. References Rahman, Tanzina. Perdana college of Malaysia welcome UCSI university president. Star Campus. 6 September 2009. Web 5 June 2010. Malaysian college launches 2 new programmes. The Daily Star. 29 April 2007 External links Perdana College UCSI University Acadia University International Partners Private colleges in Bangladesh Colleges in Dhaka District Universities and colleges in Dhaka Educational institutions established in 1995 1995 establishments in Bangladesh
6642703
https://en.wikipedia.org/wiki/Lillian%20E.%20Fishburne
Lillian E. Fishburne
Lillian Elaine Fishburne (born March 25, 1949) was the first African-American female to hold the rank of Rear Admiral (RDML) in the United States Navy. She was appointed to the rank of Rear Admiral (Lower Half) by President of the United States Bill Clinton and was officially promoted on February 1, 1998. Fishburne retired from the Navy in February 2001. Early life and education Fishburne was born March 25, 1949 at Patuxent River, Maryland and raised in Rockville, Maryland. She was commissioned an ensign upon completion of Women Officers School at Newport, Rhode Island in February 1973. Fishburne graduated from Lincoln University, Oxford, Pennsylvania in 1971 with a Bachelor of Arts degree in Sociology. She received a Master of Arts in Management from Webster College, St. Louis, Missouri in 1980. Fishburne was awarded a Master of Science degree in Telecommunications Systems Management from the Naval Postgraduate School, Monterey, California in 1982. Also, she is a 1993 graduate of the Industrial College of the Armed Forces, Fort McNair, Washington, D.C. Career Her first duty assignment was as the Personnel and Legal Officer at the Naval Air Test Facility, Lakehurst, New Jersey. In August 1974, she was assigned to Navy Recruiting District, Miami, Florida as an Officer Programs recruiter until November 1977. From November 1977 to August 1980, Fishburne was the Officer in Charge of the Naval Telecommunications Center, Great Lakes, Illinois. She then spent two years as a student at the Naval Postgraduate School, Monterey, California. Upon completion of postgraduate school, she reported to the Command, Control, Communications Directorate, Chief of Naval Operations (OP-940). There, she served as the Assistant Head, Joint Allied Command and Control Matters Branch until December 1984. Fishburne's next assignment was Executive Officer, Naval Communication Station, Yokosuka, Japan. In February 1987, she was assigned to the Command, Control, and Communications Directorate, Chief of Naval Operations (OP-942) as a Special Projects Officer. Her next duty assignment was Commanding Officer, Naval Computer and Telecommunications Station, Key West, Florida from July 1990 to July 1992. Following this tour, RDML Fishburne was a student at the Industrial College of the Armed Forces until 1993. Upon graduation, she was assigned to the Command, Control, Communications and Computer Systems Directorate, The Joint Staff, Washington, D.C., assuming the position as Chief, Command and Control Systems Support Division (J6C) in December 1994. Next, Fishburne assumed command of Naval Computer and Telecommunications Area Master Station, Eastern Pacific, Wahiawa, Hawaii (later renamed Naval Computer and Telecommunications Area Master Station Pacific) on August 25, 1995. In her final assignment she served as the Director, Information Transfer Division for the Space, Information Warfare, Command and Control Directorate, Chief of Naval Operations, Washington, D.C. Awards and decorations  Defense Superior Service Medal  Legion of Merit  Meritorious Service Medal with Gold Star  Navy and Marine Corps Commendation Medal with Gold Star  Navy and Marine Corps Achievement Medal See also Women in the United States Navy References External links 1949 births Living people African-American female military personnel United States Navy rear admirals (lower half) Recipients of the Legion of Merit Naval Postgraduate School alumni Female admirals of the United States Navy People from St. Mary's County, Maryland Recipients of the Defense Superior Service Medal People from Rockville, Maryland Recipients of the Meritorious Service Medal (United States) 21st-century African-American people 21st-century African-American women 20th-century African-American people 20th-century African-American women
32573840
https://en.wikipedia.org/wiki/Access%20Control%20Service
Access Control Service
Access Control Service, or Windows Azure Access Control Service (ACS) was a Microsoft-owned cloud-based service that provided an easy way of authenticating and authorizing users to gain access to web applications and services while allowing the features of authentication and authorization to be factored out of the application code. This facilitates application development while at the same time providing users the benefit of being able to log into multiple applications with a reduced number of authentications, and in some cases only one authentication. The system provides an authorization store that can be accessed programmatically as well as via a management portal. Once authorizations are configured, a user coming to an application via ACS arrives at the application entrance with not only an authentication token, but also a set of authorization claims attached to the token. ACS was retired by Microsoft on November 7, 2018. Features ACS has the following features Integration with Windows Identity Foundation (WIF) Support for popular web identity providers including Windows Live ID, Google, Yahoo, and Facebook Support for Active Directory Federation Services (AD FS) 2.0 Support for OAuth 2.0 (draft 10), WS-Trust, and WS-Federation protocols Support for the SAML 1.1, SAML 2.0, Simple Web Token (SWT) and JSON Web Token (JWT) token formats (JWT still in beta) Integrated and customizable Home Realm Discovery that allows users to choose their identity provider An Open Data Protocol (OData)-based management service that provides programmatic access to the ACS configuration A browser-based management portal that allows administrative access to the ACS configuration Web platform support ACS supports all modern web platforms such as .NET Framework, PHP, Python, Java and Ruby. It can be used with both web applications and web services. See also Azure Services Platform Claims based identity References Authentication methods Access control software
56312653
https://en.wikipedia.org/wiki/Andrew%20Thacker
Andrew Thacker
Andrew Thacker (born May 31, 1985) is an American football coach. He is the defensive coordinator and linebackers coach at the Georgia Institute of Technology. After a standout high school career at North Forsyth High School in Cumming, Georgia and Gainesville High School in Gainesville, Georgia, Thacker attended and played college football at Furman University (2004–2007), where he was a three-year starter at safety. Thacker was the Southern Conference's Freshman of the Year in 2004 and went 35–15 during his time as a Paladin. Coaching career After graduating from Furman, Thacker coached at UCF, Oklahoma State, Southern Miss, the NFL's Atlanta Falcons, Kennesaw State and back at UCF before becoming Temple's linebacker coach underneath Geoff Collins in 2017. After a year as linebackers coach, Thacker was promoted to defensive coordinator in 2018. References 1985 births Living people People from Cartersville, Georgia People from Cumming, Georgia People from Gainesville, Georgia Sportspeople from the Atlanta metropolitan area Players of American football from Georgia (U.S. state) American football defensive backs Furman Paladins football players Coaches of American football from Georgia (U.S. state) UCF Knights football coaches Oklahoma State Cowboys football coaches Southern Miss Golden Eagles football coaches Atlanta Falcons coaches Kennesaw State Owls football coaches Temple Owls football coaches Georgia Tech Yellow Jackets football coaches
17132752
https://en.wikipedia.org/wiki/GNUMail
GNUMail
GNUMail is a free and open-source, cross-platform e-mail client based on GNUstep and Cocoa. It is the official mail client of GNUstep and is also used in Étoilé. It was inspired by NeXTMail (NeXT's Mail.app), the predecessor of Apple Mail. GNUMail is based on the mail handling framework Pantomime. GNUMail demonstrated that it is possible to develop cross platform programs for GNUstep and Cocoa. Features Supported protocols: POP3 (with APOP support), IMAP4 and UNIX; SMTP Supports TLS with all protocols Mail spool file support for receiving File formats for local saving: Maildir, Berkeley mbox Filters for incoming and outgoing mail which support regular expressions Thread Arcs for email thread visualization and navigation Find Panel supporting regular expressions Ability to add custom mailheaders Native support for PGP/GPG encryption See also Comparison of email clients References External links GNUMail User Guide for Version 1.0pre1. GNUMail.app - GNUstepWiki Email client software for Linux MacOS email clients Free email software Unix Internet software Portable software Free software programmed in Objective-C Software that uses GNUstep
48510568
https://en.wikipedia.org/wiki/Nasir%20Memon
Nasir Memon
Nasir Memon is a computer scientist based in Brooklyn, New York. Memon is a professor and chair of the New York University Tandon School of Engineering computer science and engineering department and affiliate faculty at the computer science department in the Courant Institute of Mathematical Sciences at New York University. He is also the Department Head of NYU Tandon Online, the online learning unit of the school. He introduced cyber security studies to New York University Tandon School of Engineering, making it one of the first schools to implement the program at the undergraduate level. Memon holds twelve patents in image compression and security. He is the founding director of the Center for Interdisciplinary Studies in Security and Privacy (CRISSP) and CRISSP Abu Dhabi. In 2002, Memon founded Cyber Security Awareness Week (CSAW), an annual conference where tens of thousands of students compete in events and learn skills in cyber security Memon is also co-founder of Digital Assembly, a software company that develops digital forensics and data recovery and Vivic, a company that produces malware detection software. Memon has published over 250 articles in journals and conferences and has contributed to articles regarding cyber security in magazines such as Crain’s New York Business, Fortune, and USA Today. His research has been featured in NBC Nightly News, The New York Times, MIT Review, Wired.Com, and New Science Magazine. Education In 1982, Memon graduated from Birla Institute of Technology and Science, Pilani, with a Bachelor of Engineering in Chemical Engineering and a Master of Science in Mathematics. He graduated with a Doctor of Philosophy degree in Computer Science from the University of Nebraska in 1992. Research Digital forensics In the 1990s, Memon learned from law enforcement that there was a need for technology that could recover fragmented data. He and his colleagues researched the problem with files and digital photos and were able to develop a solution. Memon developed an automated software program that can retrieve and reassemble fragmented digital photographs, even when the directions for locating them have been deleted. His software is an example of file carving, which is the restoring of file contents after identifying information has been removed or lost. In 2006, Memon and two of his students, Pasha Pal and Kulesh Shanmugasundaram founded Digital Assembly, which sells a consumer version of the software, Adroit Photo Recovery, to restore deleted images. Digital Assembly has competed and won the NSF Phase I and Phase II SBIRs as well as an NYSTAR TTIP grant. Digital Assembly’s software was featured in an ABC news article regarding the use of technology in the fight against child pornography in 2010. Biometrics and human behavior In 2011, Memon led a project to develop gesture based alternatives to passwords on touch screen devices. The project demonstrated that the owners of a device can be authenticated by the unique touch of their fingers to either supplement or remove the need for a password He created iSignOn, an app sold in Apple’s App Store that uses the motion of a person’s actual written signature to authenticate him or her. The app is able to distinguish the user’s pattern from forgers after the user signs the screen with their finger five times. Network security and steganography In 2005, Memon was featured in the NBC investigative report on terror alerts raised due to bogus analysis. He discussed the art of secret writing called steganography, which allows two parties to communicate with each other without others knowing they are communicating, and how steganalysis software can be used to locate those hidden messages, but it is not always reliable. In 2009, Memon developed INFER,a network-based infection detection system to identify compromised host computers on large networks primarily for corporate and government systems. This program focuses on detecting systems inside the network infected by malware rather than detection or prevention at the point of entry. INFER was used to track the behavior of 3,000 PCs on The Polytechnic Institute of NYU network. Memon and his students started a company called Vivic to commercialize INFER, which resulted in the U.S. Army Research Laboratory becoming their first paying customer. INFER also has Westchester County, New York government, and the New York City IT Department as customers. Lossless compression In 1995, Memon co-developed the novel context based lossless compression scheme named CALIC with Xialoin Wu. CALIC ranked first in the evaluations conducted by the International Standards Organization (ISO) of the techniques submitted in response to its call for a new lossless image compression standard. The final ISO standard, JPEG-LS, was significantly influenced by the concepts utilized in CALIC. Other activities Memon created the Information Systems and Internet Security lab, a hackerspace for students to work both on cyber offense and defense. He is the editor-in-chief of the IEEE Transactions on Information Security and Forensics. Memon has also been an associate editor for IEEE Transactions on Image Processing, the Journal of Electronic Imaging, the ACM Multimedia Systems Journal, the LNCS Transaction on Data Hiding, IEEE Security and Privacy Magazine, IEEE Signal Processing Magazine, and the International Journal on Network Security. Recognition Memon has received several awards for his research and lectureship. In 2002, he received the Jacobs Excellence in Education Award from Polytechnic University. In 2010, he became an IEEE Fellow and received the IEEE Signal Processing Society Distinguished Lecturer award for 2011-2012. Memon became a SPIE Fellow in 2014 and was awarded Best Research in Advanced ID Systems: Online Authentication of Digital Signature through Mobile Phones in 2014. He has won best paper awards from IEEE and the Digital Forensics Research Conference. Memon was recognized for his research with the NSF CAREER Award and the Emirates ID Best Research in Advanced ID Systems. Bibliography Sencar, H., & Memon, N. (2013). Digital image forensics there is more to a picture than meets the eye. New York, NY: Springer. Memon, N. (2010). Media forensics and security II 18–20 January 2010, San Jose, California, United States. Bellingham, Wash.: SPIE. Memon, N. (2011). Media watermarking, security, and forensics III 24–26 January 2011, San Francisco, California, United States. Bellingham, Wash.: SPIE. Memon, N. (2012). Media watermarking, security, and forensics 2012 23–25 January 2012, Burlingame, California, United States. Bellingham, Wash.: SPIE. Alattar, A., & Memon, N. (n.d.). Media watermarking, security, and forensics 2013: 5–7 February 2013, Burlingame, California, United States. Delp, E., Wong, P., Dittmann, J., & Memon, N. (2008). Security, forensics, steganography, and watermarking of multimedia contents X 28–30 January 2008, San Jose, California, USA. Bellingham, Wash.: SPIE . References American computer scientists People from Brooklyn Courant Institute of Mathematical Sciences faculty Year of birth missing (living people) Living people Birla Institute of Technology and Science, Pilani alumni Polytechnic Institute of New York University faculty Memon people Scientists from New York (state) Indian emigrants to the United States
8836161
https://en.wikipedia.org/wiki/Service-oriented%20architecture%20implementation%20framework
Service-oriented architecture implementation framework
Service-oriented architectures (SOA) are based on the notion of software services, which are high-level software components that include web services. Implementation of an SOA requires tools as well as run-time infrastructure software. This is collectively referred to as a service-oriented architecture implementation framework or (SOAIF). The SOAIF envisions a comprehensive framework that provides all the technology that an enterprise might need to build and run an SOA. An SOAIF includes both design-time and run-time capabilities as well as all the software functionality an enterprise needs to build and operate an SOA, including service-oriented: tools, management, integration, modeling, security, processes. As vendors race to provide possible solutions, three different approaches are emerging to integrating disparate, heterogeneous information and systems in the enterprise. These implementation frameworks should meet the requirements for loosely coupled, coarse grained, asynchronous Services. Efficiency Most packaged enterprise applications perform well in streamlining processes related to standard tasks. However, the performance rapidly deteriorates while automating and streamlining customized processes that encompass multiple enterprise applications. The process is difficult, time-consuming, and expensive to implement and maintain. The SOAIF infrastructure addresses this issue by allowing the definition of any process in any network topology, spanning multiple enterprise boundaries. This is accomplished via a peer-to-peer messaging infrastructure with distributed security mechanisms that allow efficient data exchanges for easy implementation, while enabling each enterprise to enforce its own security policies. This allows an SOAIF to increase operational efficiency across the entire value chain. SOA works on standard protocols Application integration Existing packaged application integration solutions are complex and require significant implementation effort, often including extensive manual coding for deployment purposes. An SOAIF provides native support for run time deployment of services across the network and dramatically reduces the overall costs of application integration and deployment by automating these time-consuming processes. It also allows extension of integration across business boundaries. Application development and deployment In the traditional software development process, translating requirements into working distributed systems is both time-consuming and difficult, requiring several stages of manual development and deployment. This complex, error-prone task can be effectively streamlined using a higher-level, component-based SOAIF. The SOAIF incorporates tools that let processes that are developed, using standards such as Business Process Execution Language (BPEL), to be easily translated into distributed, high-level services, which are easier to develop, manipulate, and debug. These services are easily composed into implementation-level data flows without the user or developer having to track complex middleware concepts, such as topics or queues. Further, the implementation-level services can run on any machine across the network by virtue of the built-in dynamic deployment support SOAIF provides. The combination of service-oriented tools and built-in support for distributed debugging, run-time tracing and logging, and dynamic deployment allows the SOAIF to dramatically reduce the time taken to implement and deliver working processes. SOAIF requirements A SOAIF is a general-purpose infrastructure platform that lets developers and business analysts create, deploy, manage, and change processes within and across the enterprise. SOAIFs have unique requirements at both the tools and infrastructure levels that are not typically provided by any single current technology or platform. These include: distributed event-enabled architecture, flexibility via service-enabled processes, enterprise standards support (fault tolerance, reliability, and scalability), security in distributed environment, visual process composition and monitoring, rapid process changes. By addressing these requirements, an SOAIF lets users quickly respond to changes and integrate operations efficiently, regardless of platform, language, database, or application. Distributed event-enabled architecture Enterprise processes are usually distributed across multiple applications and hardware/software systems. These processes are also event-based in the sense that the subprocesses are linked by a series of events. For example, the depletion of inventory at a manufacturer may lead to an event-trigger that is automatically generated and propagated to one or more suppliers to replenish the depleted inventory items. Most current BPM solutions control the processes through a centralized hub. Changes to applications, or additions of new applications, require modifications at the centralized hub. Further, all data exchanged between applications needs to traverse the central hub. This type of topology restriction is inefficient, inflexible, and leads to bottlenecks. To overcome this limitation, a framework that tries to integrate enterprise processes needs to be fully distributed across the network within the enterprise. The framework must also be symmetric, which implies that the same event-based infrastructure software and tools need to run on all machines within the enterprise. Enterprise standards support Support for data exchange, messaging, and existing enterprise standards becomes essential in an SOAIF. Since content needs to be exchanged between partners, XML messages and documents will be the desired format. Further, since most businesses want to leverage existing infrastructures, an SOAIF needs to easily support multiple standards. Fault tolerance, reliability and scalability A SOAIF should be able to offer a very high degree of reliability. The platform should support a broad range of processes that span an increasing number of applications, corporations, and partners. To eliminate single points of failure and to maximize performance, a fully distributed architecture becomes essential. Security in a distributed environment A SOAIF needs to be fully distributed for maximum performance and scalability. In such a distributed computing environment, it becomes necessary to restrict the scope of interactions that partners can conduct with the corporate IT infrastructure. It becomes necessary to allow customization for the interactions of each partner by providing different security roles on a per-user and per-service basis. This requires a security model that incorporates users, Web services and more general enterprise services, and that’s fully distributed and fault-tolerant, such as the SOAIF infrastructure itself. This security model needs to be based on existing standards and tools and should support certificate authentication at both the user and services level. Visual process composition A SOAIF needs to provide a single dashboard with visibility into an organization’s entire distributed computing environment. The platform should incorporate visual implementation-process-composition tools, together with infrastructure-level support to instantly deploy the modeled implementation-level processes across a distributed enterprise network. The visual composition tools need to be service-oriented in the sense of being able to directly manipulate higher-level, coarse-grained implementation processes as first-class objects. They also should provide both a visual display of programming constructs and be able to map directly (and naturally) to deployable processes. A critical problem in deploying distributed systems is monitoring and debugging concurrently running processes. An SOAIF should provide native support for tracing, logging, and monitoring any process or service across the distributed environment. Process changes Another challenge is responding to changing requirements. A SOAIF should provide support for incremental on-the-fly modification of the service-based flows that implement processes. This is among the most critical features expected from an SOAIF, since it lets analysts visually change and instantly redeploy processes to address dynamic requirements. Such changes are implemented within an SOAIF by abstracting all concepts relating to lower-level middleware at the tools and applications levels. Users simply specify that a service be replaced by another running service (often on another machine); the SOAIF dynamically reroutes data to the new service by setting up new underlying middleware constructs (such as topics and queues, for example) on-the-fly. This allows the implementation to be changed without stopping the current process in much the same way as hardware is upgraded on a mainframe system without interruption of operations. SOAIF components Essential elements of an SOAIF include design-time and run-time infrastructure, together with service-oriented tools for deploying distributed processes and implementation flows. Enterprise service bus The core infrastructure of an SOAIF is typically provided by an enterprise service bus (ESB), which addresses the challenges in composing, deploying, and managing distributed, service-based enterprise applications. The ESB incorporates a standards-based, enterprise-class messaging backbone, together with enhanced systems connectivity using web services, Java EE, .NET Framework, and other standards. One approach that contributes to an optimal SOA implementation is the use of an Enterprise service bus (ESB) to provide an infrastructural element to distributed Services on the network. The ESB approach to integration considers systems as discrete, distributed Services that connect to each other via an asynchronous, message-oriented communications infrastructure. The message-oriented infrastructure allows loosely coupled, document-oriented exchanges between independent systems. ESBs provides the critical infrastructure components that simplify and scale integration approaches. ESBs do not however provide the required integration to meet high-level business requirements. ESBs also do not provide guarantees of loose coupling and coarse granularity to meet evolving Service-oriented needs. Implementing ESBs to meet SOA requirements require the addition of extra functionality to compose fine-grained atomic Services into coarse-grained business Services and provide policy-driven, managed, and secure Service interactions. An ESB links individual enterprises together for extended process efficiency across the supply chain, allowing them to become more flexible and adaptable to rapidly changing requirements. The ESB lets an enterprise leverage its previous investments by supporting the deployment of processes over existing software and hardware infrastructure. As the core, underlying infrastructure of an SOAIF, ESBs offer several unique business and technical advantages: support for enterprise standards, fault tolerance, scalability, and reliability, service-based tools, easy process deployment and changes, component-level security, run-time monitoring, tracing, and logging. Business process management Business process management (BPM) considers systems and IT assets as activities or tasks that participate in well-coordinated and centrally orchestrated Business processes. Traditionally, the challenge of BPM is that while it is possible to construct processes that achieve integration goals, enterprises typically use BPM tools only at design time, modeling processes as they used to be or processes as they should be, but rarely processes as they actually are in the IT environment. So, while BPM solutions can craft orchestrated processes that are composed of fine-grained Services, they don’t contain the runtime environment necessary for loosely coupled, asynchronous Service interactions. At the very least, a BPM solution must be used in conjunction with a loosely coupled integration approach to make the business processes runtime activities that coordinate integration. Thus, by itself, BPM solutions are not sufficient to meet SOA requirements. Service-oriented integration The service-oriented integration (SOI) approach uses the architectural guiding principles of Services orientation to construct an ecosystem of Services that business users can dynamically combine and compose into higher-level processes that meet continuously evolving and changing business requirements. SOI approaches transcend brittle, tightly coupled EAI and Business-to-business integration approaches by mandating a separation of the consumer of each Service from the producer of that Service, thus enforcing the critical aspect of loose coupling that is required to allow an integration scenario to evolve automatically to meet business requirements. SOI provides no guidance on how to build the right Services to meet current business requirements, nor does it provide a means to execute Services in the most effective, scalable manner to guarantee long-running interactions. Enterprise standards support ESBs implement standardized interfaces for communication, connectivity, transformation, security, and portability. Supported standards include: JMS for communication, web services, Java EE, and .NET for connectivity to various systems, XSLT and X-query for transformation, LDAP, TLS for security. Modern ESB implementations typically support development in multiple languages. This, combined with the inherently portable ESB infrastructure, makes the ESB a true multi-language, multiplatform enterprise backbone and an ideal foundation for an SOAIF. Fault tolerance, scalability and reliability Several modern ESBs implement a symmetric, distributed architecture in which peer-messaging servers run on multiple nodes of an enterprise network, providing a highly scalable, reliable distributed messaging platform with no single point of failure. Modern ESB architectures combine the benefits of centralized control with distributed, parallel data flow, giving application developers the ultimate flexibility in defining the network topology of choice to route data directly and optimally between services. Ensuring that data flowing between services does not always have to traverse a central point in the network optimizes peer-to-peer network performance. For instance, if one has a process that requires data exchanges between New York and Boston, as well as between San Francisco and Los Angeles, then the two flows of data don’t necessarily have to traverse a messaging hub located in Chicago (which is often the case in most enterprise or cross-enterprise deployments). Instead, efficiency dictates setting up direct data flow connections between peer nodes on a network. Service-based tools Service-oriented tools enable composition of distributed applications from one or more services (Web services and more general enterprise services), each of which typically runs in a separate process. Services may be written in any language and communicate with each other via XML messages. This allows service-oriented tools within an SOAIF to compose flexible, easy-to-modify systems. Easy process deployment and changes Service-oriented processes deployed in an SOAIF are composed of coarse-grained Web services ideally suited for easy change and replacement. By abstracting the details of message routing from service implementations, service-oriented tools decouple and enable running processes to be modified on-the-fly by simple service replacement or addition. The tools framework within an SOAIF supports the run-time deployment of services, allowing changed processes to be deployed instantly across the network. Our experience is that this significantly reduces solution deployment costs compared with traditional, broker-based solutions. Component-level security The ESB defines a comprehensive security system, giving administrators full control over which services are executed where. ESBs provide the ability to set several security attributes for each service and provide administrative tools to configure security settings on the distributed ESB infrastructure across the network. Run-time monitoring, tracing and logging ESBs include native service-level support for run-time monitoring, tracing, and logging. All services can be monitored instantly, using visual tools within the SOAIF. Trace levels can be dynamically changed within existing services running across the network and debug logs can be routed to software tools on any node. These features greatly simplify the development, deployment, and debugging of distributed applications running across the SOAIF. See also Service-oriented architecture Service-oriented modeling SOALIB Software architecture Web services Enterprise application integration Service-oriented (business computing)
505526
https://en.wikipedia.org/wiki/HAKMEM
HAKMEM
HAKMEM, alternatively known as AI Memo 239, is a February 1972 "memo" (technical report) of the MIT AI Lab containing a wide variety of hacks, including useful and clever algorithms for mathematical computation, some number theory and schematic diagrams for hardware – in Guy L. Steele's words, "a bizarre and eclectic potpourri of technical trivia". Contributors included about two dozen members and associates of the AI Lab. The title of the report is short for "hacks memo", abbreviated to six upper case characters that would fit in a single PDP-10 machine word (using a six-bit character set). History HAKMEM is notable as an early compendium of algorithmic technique, particularly for its practical bent, and as an illustration of the wide-ranging interests of AI Lab people of the time, which included almost anything other than AI research. HAKMEM contains original work in some fields, notably continued fractions. Introduction Compiled with the hope that a record of the random things people do around here can save some duplication of effort -- except for fun. Here is some little known data which may be of interest to computer hackers. The items and examples are so sketchy that to decipher them may require more sincerity and curiosity than a non-hacker can muster. Doubtless, little of this is new, but nowadays it's hard to tell. So we must be content to give you an insight, or save you some cycles, and to welcome further contributions of items, new or used. See also Hacker's Delight AI Memo References External links Its official record at the DSpace@MIT's AI Memos collection HAKMEM facsimile (PDF) (searchable version) Algorithms Computer science papers 1972 in Massachusetts Memoranda February 1972 events in the United States History of the Massachusetts Institute of Technology
22878834
https://en.wikipedia.org/wiki/LTTng
LTTng
LTTng (Linux Trace Toolkit: next generation) is a system software package for correlated tracing of the Linux kernel, applications and libraries. The project was originated by Mathieu Desnoyers with an initial release in 2005. Its predecessor is the Linux Trace Toolkit. LTTng uses the Tracepoint instrumentation of the Linux kernel, as well as various other information sources such as kprobes, and the Perf performance monitoring counters. Designed for minimal performance impact and having a near-zero impact when not tracing, it is useful for debugging a wide range of bugs that are otherwise extremely challenging. Features The challenging problems traceable with LTTng include, for example, performance problems on parallel systems and on real-time systems. Custom instrumentation is easy to add. Structure LTTng consists of kernel modules (for Linux kernel tracing) and dynamically linked libraries (for application and library tracing). It is controlled by a session daemon, which receives commands from a command line interface, lttng. The Babeltrace project allows translating traces into a human-readable log, and provides a trace reading library, libbabeltrace. Deployment LTTng is available as a set of packages. LTTng has at least basic support for all Linux-supported architectures (see the LTTng-modules README file for more details) as well as support for FreeBSD. Major users include Google, IBM, Autodesk, Siemens, Nokia, Sony and Ericsson. It is included in Wind River Workbench, Mentor Graphics Mentor Embedded Linux, ELinOS embedded Linux, MontaVista Mobilinux 5.0, STLinux and SUSE Linux Enterprise Real-Time Linux distributions. Once collected, multiple solutions exist to process and visualize LTTng trace data (kernel and userspace) such as the open-source LTTV viewer, Eclipse Trace Compass or commercial tools such as Mentor Graphics' Sourcery Analyzer and Percepio Tracealyzer. LTTng-modules, LTTng-UST, LTTng-tools and Babeltrace are actively developed by an open community. See also Kernel marker SystemTap strace DTrace Further reading LTTng, Filling the Gap Between Kernel Instrumentation and a Widely Usable Kernel Tracer LTTng: Tracing across execution layers Tracing for HardWare, Driver, and Binary Reverse Engineering in Linux References External links LTTng git repositories MontaVista Linux Platform Development Kit 5.0 datasheet On the value of static tracepoints Free software programmed in C Free system software Debuggers Beta software
446963
https://en.wikipedia.org/wiki/American%20McGee
American McGee
American James McGee (born December 13, 1972) is an American video game designer. He is best known as the designer of American McGee's Alice, its sequel Alice: Madness Returns, and his works on various video games from id Software. Early life American James McGee was born on December 13, 1972, in Dallas, Texas to an eccentric mother who was a house painter. His only interaction with his biological father was on his 13th birthday, a meeting which turned violent as McGee's father drunkenly assaulted him that night. McGee was highly creative and was gifted in mathematics and science, taking an early interest in computer programming. He was eventually accepted to a magnet school for computer science. In explaining where his name came from, McGee has said that his mother was a hippie and was inspired by a woman she knew in college that named her child "America": McGee had a number of stepfathers when growing up until his mother finally settled into a relationship with a transgender woman. When McGee was sixteen, he came home from school and found his house empty and abandoned; the only things left were his bed, his books, his clothes and his Commodore 64 computer. His mother had sold the house to pay for two plane tickets and the fee for her girlfriend's sex reassignment surgery, leaving him on his own. He packed up his computer, dropped out of high school and took a variety of odd jobs, finally settling on a Volkswagen repair shop. Career id Software At 21, McGee, an automobile and gaming enthusiast, moved to an apartment complex where he met and befriended John Carmack. Carmack offered McGee a tech support job at id Software, where he was quickly promoted to level designer and music manager. McGee, along with Kevin Cloud and Tim Willits, were part of id Software's "second generation" of developers, working on games such as The Ultimate Doom, Doom II, Quake and Quake II. In 1998, McGee was fired from id Software. Later, McGee would say that the day he got fired was very meaningful to him: According to former id staff Sandy Petersen, Tim Willits was the one responsible for McGee's firing (although he did not mention Willits by name; referring to him only by "Snake" and "X"). Allegedly, during the development of Quake II, Willits deliberately gave bad level design advice to McGee and when he presented his work to Carmack, it angered him and McGee was fired soon after. McGee has stated to this day, he still has no idea why he was fired but acknowledged the fact that it was due to "internal politics and my own failings". Electronic Arts McGee soon joined Electronic Arts and worked as creative director on American McGee's Alice (with Rogue Entertainment), which garnered favorable reviews. Discussions began soon after the game's release about making a film adaptation of the game; initially Wes Craven was attached to direct the film, and later actress Sarah Michelle Gellar bought the film rights, but the film has remained languished in development hell. After finishing Alice, McGee left EA "in frustration" when the company fired his creative partner R. J. Berg and shut down Rogue Entertainment. In 2002, McGee founded the short-lived Carbon6, which two years later became known as Mauretania Import Export Company. The Mauretania Import Export Company McGee directed the 2002 music video for the song "Same Ol' Road" by the band dredg, from their album El Cielo. Partnering with Enlight Software and its founder Trevor Chan, McGee released the games Scrapland in 2004 and Bad Day L.A. in 2006. Spicy Horse The planned American McGee's Oz, which was to be produced in conjunction with Ronin Games, was canceled over financial difficulties at Atari. American McGee's Grimm, developed by his Shanghai-based game development studio Spicy Horse for the online service GameTap, was released in 23 weekly episodic segments, starting in 2007. At the 2009 D.I.C.E. Summit, Electronic Arts CEO John Riccitiello announced that a sequel to American McGee's Alice was in development for PC, PlayStation 3 and Xbox 360 by McGee's Spicy Horse studio. In July 2010, at the EA Showcase in San Francisco, Spicy Horse and EA announced that sequel's title, Alice: Madness Returns, released less than one year after its announcement, on June 14, 2011. More recently, McGee's Spicy Horse expanded to include another brand, Spicy Pony, to produce digital mobile media games for the iPhone platform. Their first title, DexIQ, was released in early December 2009, and its follow-up, Crooked House, was released in March 2010 (both had iPad versions released in June 2010). On December 17, 2010, McGee's old company The Mauretania Import Export Company was dissolved and all intellectual property was transferred to Spicy Horse. In 2012, McGee was focusing on free-to-play games for mobile devices with BigHead Bash, Akaneiro, and Crazy Fairies. In 2013, he opened a Kickstarter for a new game, American McGee's OZombie; however, due to slow/lackluster funding the project was canceled. Another Kickstarter for a project called Alice: Otherlands, a planned series of short films leading to a theatrical film, was announced a few days later. This reached its goal on August 4, 2013, and was officially confirmed. Independent In July 2016, McGee announced the closure of Spicy Horse. Inspired by Jacques Cousteau, he is now pursuing the "life at sea": travelling, making games and doing vlogs across South East Asia on a sailboat. He created a Patreon account to seek support for this endeavor. In February 2017, McGee started his annual Pirate Jam, which is a pirate-themed Game Jam sailing around Thailand. American McGee is currently working on the third Alice game, Alice: Asylum, which had an original targeted release date of 2021. McGee is designing the game with the help of the fans in a concept he calls Crowd Design, named after crowdfunding. Pre-production is being financially supported via Patreon. Personal life McGee has stated his mission is "to create a unified production method for story telling across the interactive and film industries" and of himself, he says, "I want to be the next Walt Disney, only a little more wicked." In 2005, McGee left the United States and resided for a time in Hong Kong before moving to Shanghai, where he lived as of 2009. Once in China, he created Spicy Horse, at one point the largest independent Western game development house in the nation, and helped found Blade (formerly Vykarian), a game outsourcing company. They produced American McGee's Grimm for GameTap (now owned by Metaboli) and worked on the sequel to his original Alice game, Alice: Madness Returns. He also mentions that his inspiration for the macabre tone of Alice comes from his disturbing, dysfunctional childhood. McGee continues to live in Shanghai with his wife, Yeni Zhang. The couple co-founded Mysterious, Inc., a company that markets art, apparel, and accessories based on McGee's works. The couple have one child, Lucky Jack McGee (张吉克). One of McGee's favorite books is Stephen King's On Writing: A Memoir of the Craft. Games Released 1993 – Doom, Level Designer (Sega) 1994 – Wolfenstein 3D, Tester (Atari Corporation) 1994 – Doom II: Hell on Earth, Level Designer (id Software) 1995 – The Ultimate Doom, Level Designer (GT Interactive Software) 1995 – Doom, Tester (WMS Industries) 1996 – Quake, Level Designer, Sound Designer, Tools Programmer (id Software) 1996 – H!Zone, Co-Producer (WizardWorks) 1996 – Hexen: Beyond Heretic, Co-Producer (GT Interactive Software) 1996 – Final Doom, Level Designer (id Software and Atari, Inc.) 1997 – Quake Mission Pack 1: Scourge of Armagon, Level Designer (id Software) 1997 – Quake Mission Pack 2: Dissolution of Eternity, Level Designer (id Software) 1997 – Quake II, Level Designer, Sound Designer, Tools Programmer (Activision) 1997 – Doom 64, Level Designer (Midway Games) 1998 – Dominion: Storm Over Gift 3, Sound Designer (Eidos Interactive) 2000 – Timeline, Co-Designer, Co-Writer (Eidos Interactive) 2000 – American McGee's Alice, Creative Director, Co-Writer, Designer (Electronic Arts) 2004 – American McGee Presents: Scrapland, Producer (Enlight Software) 2006 – American McGee Presents: Bad Day L.A., Creative Director, Writer, Co-Designer (Enlight Software) 2008 – American McGee's Grimm, Project Leader, Creative Director, Co-Writer, Co-Designer (Turner Broadcasting System) 2009 – DexIQ, Project Leader, Creative Director (Spicy Horse) 2011 – Alice: Madness Returns, Creative Director, Co-Writer, Designer (Spicy Horse) (Electronic Arts) 2012 – BigHead Bash (Spicy Horse) 2012 – Crazy Fairies (Spicy Horse) 2012 – Akaneiro: Demon Hunters (Spicy Horse) 2013 – OZombie (Spicy Horse) [Cancelled] 2013 – The Gate (Spicy Horse) (Mobage) 2015 – Chains of Darkness (Spicy Pony) 2018 – Out of the Woods Board game (Mysterious Inc.) Upcoming Alice: Asylum Oz: Adventures References External links American McGee Reddit Questionnaire (January 21, 2013) American McGee's Patreon page Pirate Jam website American atheists American video game designers Id Software people Living people 1972 births American expatriates in China
16641182
https://en.wikipedia.org/wiki/Bristol%20Technology
Bristol Technology
Bristol Technology Inc. was a software development company founded in January 1991 by Keith, Ken, and Jean Blackwell. The company's original product idea, Wind/U, was an implementation of the Windows API (application programming interface) on non-Windows operating systems (such as UNIX). In March 2007, Bristol was purchased by the information technology corporation Hewlett-Packard for an undisclosed amount. History 1991–1997: Developer tool years Bristol Technology began as a software development tools company with $100,000 of seed investment from company insiders. Throughout the 1990s, Bristol developed a series of successful cross-platform developer tools which were used by over 1,000 corporate customers. From 1992 revenue base of $500,000, Bristol revenue grew by 70% annually over the next five years; reaching the Inc. 500 and being ranked #1 on Connecticut's Fast 50. 1998–2001: Microsoft litigation Windows Interface Source Environment (WISE) was a licensing program from Microsoft which allowed developers to recompile and run Windows-based applications on UNIX and Macintosh platforms. WISE Software development kits were not directly provided by Microsoft. Instead, Microsoft established partnerships to software providers such as Bristol Technology which in turn sold WISE software development kits (SDKs) to end-users. In August 1998, Bristol filed a federal antitrust suit against Microsoft Corporation, accusing Microsoft of entangling Bristol in a charade to stifle competition from other operating systems: UNIX, Compaq's OpenVMS, and IBM's OS/390. Bristol alleged that after initially approaching Bristol in 1991 and creating a dependency for Bristol and its customers on the Windows programming interfaces, Microsoft was then seeking to end access to this technology on all but Windows operating systems. In the lawsuit, Bristol sought unspecified damages for and injunctive relief from Microsoft's alleged anti competitive behavior. The injunction would have required Microsoft to provide Bristol with source code for future versions of Windows operating systems, including Microsoft Windows NT 4 and Windows NT 5. Bristol and Microsoft went to trial in the summer of 1999 in Federal Court in Bridgeport, Connecticut. Federal judge Janet Hall presided over the jury trial. Subsequently, the jury ruled that operating systems were not a definable market, thus Bristol did not have standing to sue under antitrust law. The jury did find that Microsoft violated Connecticut's Unfair Trade Practices Act; however, the jury could not quantify damages and only awarded Bristol $1. In a later ruling, Judge Hall awarded Bristol $1 million in punitive damages and $3.7 million in legal fees. In February 2001, Bristol and Microsoft reached a settlement agreement ending nearly four years of legal battles. 2001–2007: Rebuilding and purchase Following the settlement of the lawsuit with Microsoft, Bristol once again focused on building the company. As a result of the legal battle with Microsoft, beginning in 1999, Bristol had begun two new R&D efforts. One of those efforts would subsequently result in a new wholly owned subsidiary, Kenosia Corporation. Kenosia's flagship product, DataAlchemy, was used by major consumer packaged goods companies for performing analysis on consumer data. Kenosia was sold by Bristol to Halo Technology in 2005. Bristol's second R&D effort eventually yielded U.S. patent #7,003,781 and a new product, TransactionVision. TransactionVision provided organizations the ability to non-intrusively track electronic transactions throughout a heterogeneous IT infrastructure. In conjunction with its R&D efforts, Bristol raised $9.1 million in venture capital in a round that was led by Jerusalem Venture Partners (JVP) and Apax Partners for the first time in the company's history in 2003. From 2003 through 2006, Bristol established TransactionVision in the Business Transaction Management (BTM) market. The company was purchased by Hewlett-Packard in 2007 for the purpose of adding TransactionVision to HP's Business Technology Optimization (BTO) line of products. References Defunct software companies of the United States Software companies based in Connecticut Software companies established in 1991 Hewlett-Packard acquisitions Microsoft criticisms and controversies Apax Partners companies Companies based in Danbury, Connecticut 1991 establishments in Connecticut Software companies of the United States Software companies disestablished in 2007 2007 mergers and acquisitions
17238444
https://en.wikipedia.org/wiki/MindFire%2C%20Inc
MindFire, Inc
MindFire, Inc. provides personalized URLs and personalized landing page technology to the graphic arts and marketing communication industries. MindFire's main product, LookWho’sClicking, is a web-based application that simplifies the creation, management and tracking of personalized URLs, VIP landing pages, pay per click (PPC) and mass media landing pages, as well as automated follow-up email and real-time reporting. The company typically delivers LookWho’sClicking through print service providers, agencies and consultants. MindFire headquarters are in Southern California, but the company also has offices in Idaho, New Jersey, New York, Arizona and Asia-Pacific. History MindFire, Inc. was started in 1999 by Moe Farsheed (CEO) and Dave Rosendahl (EVP Operations). They partnered with companies like First American who were looking for better ways to track information about the demographics of their clients, or Cal State Fullerton's Institute for Economic and Environmental Studies who wanted to research the regional economy and environment. In 2005, MindFire changed their approach and began selling to print service providers, who were then able to offer the software to their clients. MindFire has more than 400 clients and 2,500 users worldwide who manage thousands of cross-media marketing campaigns. Some partners that integrate MindFire services into their software offerings include Hewlett Packard, Kodak, and Canon. Software LookWho’sClicking software tracks response and online activity, gathering information about the recipients’ preferences, automatically routing leads to the appropriate sales person by email and generating reports that provide real-time insight into how the campaign is doing. LookWho’sClicking has four workflows (known as campaign blueprints) — the Attract Blueprint, the Click-Capture Blueprint, the Hand Off Blueprint and the Attract Express Blueprint. The Attract Blueprint is used with personalized URLs, the Click-Capture Blueprint is used with PPC advertising, the Handoff Blueprint attracts users to the page and then transfers them to a third party website, and the Attract Express is similar to Click-Capture, but uses other types of mass media such as television or radio to reach their audience. Awards Inc. 500 - #327 - Fastest Growing Private Companies - 2009 Inc. 500 - #20 - Fastest Growing Software Companies - 2009 Print09 - Must See 'Ems Recognition for MarketFire - 2009 Inc. 500 - #152 - Fastest Growing Private Companies - 2008 Inc. 500 - #6 - Fast Growing Software Companies - 2008 Philanthropic Work In 2008, MindFire, Inc. along with Hewlett Packard, co-sponsored a Corazón Project Day after the 2008 DSCOOP annual conference in San Diego. Many attendees of the DSCOOP conference chose to stay an extra day in order to go down to Tecate, Mexico and build a house for a needy family. MindFire and Hewlett Packard both made contributions to pay for the materials needed to build the home. Notes Companies based in Irvine, California Software companies based in California Software companies of the United States
46445426
https://en.wikipedia.org/wiki/Samsung%20Electronics
Samsung Electronics
Samsung Electronics Co., Ltd. (; lit. "tristar electronics", sometimes shortened to SEC and stylized as SΛMSUNG) is a South Korean multinational electronics corporation headquartered in the Yeongtong District of Suwon. It is the pinnacle of the Samsung , accounting for 70% of the group's revenue in 2012. Samsung Electronics has played a key role in the group's corporate governance due to circular ownership. Samsung Electronics has assembly plants and sales networks in 74 countries and employs around 290,000 people. It is majority-owned by foreign investors. Samsung Electronics is the world's second-largest technology company by revenue, and its market capitalization stood at US$520.65 billion, the 12th largest in the world. Samsung is a major manufacturer of electronic components such as lithium-ion batteries, semiconductors, image sensors, camera modules, and displays for clients such as Apple, Sony, HTC, and Nokia. It is the world's largest manufacturer of mobile phones and smartphones, starting with the original Samsung Solstice and later, the popularity of its Samsung Galaxy line of devices. The company is also a major vendor of tablet computers, particularly its Android-powered Samsung Galaxy Tab collection, and is regarded for developing the phablet market with the Samsung Galaxy Note family of devices. It has also developed 5G capable smartphones including the Galaxy S22 and foldable phones including the Galaxy Z Fold 3. Samsung has been the world's largest television manufacturer since 2006, and the world's largest manufacturer of mobile phones since 2011 when it surpassed Apple up until 2021. It is also the world's largest memory chip manufacturer and, from 2017 to 2018, had been the largest semiconductor company in the world, briefly dethroning Intel, the decades-long champion. In 2012, Kwon Oh-Hyun was appointed the company's CEO. He announced in October 2017 that he would resign in March 2018, citing an "unprecedented crisis". The company had 3 CEOs (Ki Nam Kim, Hyun Suk Kim, and Dong-Jin Koh) from March 2018 until December 2021, when the business units were reorganized and they were replaced by Kyung Kye-Hyun and Han Jong-hee. It has also had a separate regional CEO, HC Hong, who led the business in Southwest Asia from 2015 and then moved to Latin America in 2020. History 1969–1987: Early years Samsung Electric Industries was established as an industrial part of Samsung Group on 19 January 1969 in Suwon, South Korea. At the time, Samsung Group was known to the South Korean public as a trading company specialized in fertilizers and sweeteners. Despite the lack of technology and resources, falling shorter even than the domestic competitors, Samsung Group improved its footing in the manufacturing industry by cooperating with the Japanese companies, a decision that instigated a significant amount of anti-Japanese public outcry and huge backlashes from the competitors fearing the outright subordination of the industry by the Japanese. The strategy was able to take off only after the government and Samsung declared that the company would exclusively focus on exports. Toshio Iue, the founder of Sanyo, played a role as an advisor to Lee Byung-Chul, Samsung's founder, who was a novice in the electronics business. December the same year, Samsung Electric established a joint venture named Samsung-Sanyo Electric with Sanyo and Sumitomo Corporation. This is the direct predecessor of today's Samsung Electronics. The joint venture's early products were electronic and electrical appliances including televisions, calculators, refrigerators, air conditioners, and washing machines. In 1970, Samsung established the joint venture Samsung-NEC with Japan's NEC Corporation and Sumitomo Corporation to manufacture home appliances and audiovisual devices. Samsung-NEC later became Samsung SDI, the group's display and battery business unit. In 1973, Samsung and Sanyo created Samsung-Sanyo Parts, the predecessor of Samsung Electro-Mechanics. By 1981, Samsung Electric had manufactured over 10 million black-and-white televisions. In 1974, Samsung Group expanded into the semiconductor business by acquiring Korea Semiconductor, which was on the verge of bankruptcy whilst building one of the first chip-making facilities in the country at the time. Soon after, Korea Telecommunications, an electronic switching system producer and a Samsung Group company, took over the semiconductor business and became Samsung Semiconductor & Communications. In February 1983, Lee, along with the board of the Samsung industry and corporation agreement and help by sponsoring the event, made an announcement later dubbed the "Tokyo declaration", in which he declared that Samsung intended to become a dynamic random-access memory (DRAM) vendor. One year later, Samsung announced that it successfully developed a 64 kb DRAM, reducing the technological gap between the companies from first-world countries and the young electronics maker from more than a decade to approximately four years. In the process, Samsung used technologies imported from Micron Technology of the U.S for the development of DRAM and Sharp Corporation of Japan for its SRAM and ROM. In 1988, Samsung Electric Industries merged with Samsung Semiconductor & Communications to form Samsung Electronics, as before that, they had not been one company and had not been a leading corporation together, but they were not rivals, as they had been in talks for a time until they finally merged. In the 1980s and early 1990s, Samsung sold personal computers under the Leading Technology brand. However, the equipment was manufactured by Samsung, and the FCC filings from this period typically refer to Samsung products. 1988–1995: Consumer struggles In 1988, Samsung Electronics launched its first mobile phone in the South Korean market. Sales were initially poor, and by the early 1990s, Motorola held a market share of over 60 percent in the country's mobile phone market compared to just 10 percent for Samsung. Samsung's mobile phone division also struggled with poor quality and inferior products until the mid-1990s, and exit from the sector was a frequent topic of discussion within the company. 1995–2008: Component manufacturing and design strategy Lee Kun-Hee decided that Samsung needed to change its strategy. The company shelved the production of many under-selling product lines and instead pursued a process of designing and manufacturing components and investing in new technologies for other companies. In addition, Samsung outlined a 10-year plan to shrug off its image as a "budget brand" and to challenge Sony as the world's largest consumer electronics manufacturer. It was hoped that, in this way, Samsung would gain an understanding of how products are made and give a technological lead sometime in the future. This patient vertical integration strategy of manufacturing components has borne fruit for Samsung in the late 2000s. A complementary brand leadership strategy was also initiated by chairman Lee when he declared 1996 to be the "Year of Design Revolution" at Samsung. His objective was to build Samsung design capabilities as a competitive asset and transform the company into a global brand-design leader. However, this effort required major changes in corporate culture, processes, and systems. By integrating a comprehensive design management system and strategy into the corporate culture, Samsung was successful in developing an award-winning product design portfolio by the late 1990s, resulting in significant brand equity growth. As Samsung shifted away from consumer markets, the company devised a plan to sponsor major sporting events. One such sponsorship was for the 1998 Winter Olympics held in Nagano, Japan. As a chaebol, Samsung Group wielded wealth that allowed the company to invest and develop new technology rather than build products at a level that would not have a detrimental impact on Samsung's finances. Samsung had a number of technological breakthroughs, particularly in the field of memory which are commonplace in most electrical products today. This includes the world's first 64MB DRAM in 1992, 256 MB DRAM in 1994, and 1GB DRAM in 1996. In 2004, Samsung developed the world's first 8GB NAND flash memory chip, and a manufacturing deal was struck with Apple in 2005. A deal to supply Apple with memory chips was sealed in 2005, and Samsung remains a key supplier of Apple components as of October 2013, manufacturing the A7 processors inside the iPhone 5S model. 2008–present: Recent developments From 2000 to 2003, Samsung posted net earnings higher than five-percent; this was at a time when 16 out of the 30 top South Korean companies ceased operating in the wake of the unprecedented crisis. In 2005, Samsung Electronics surpassed its Japanese rival Sony for the first time to become the world's twentieth-largest and most popular consumer brand, as measured by Interbrand. In 2007, Samsung Electronics became the world's second-largest mobile-phone manufacturer, overtaking Motorola for the first time. In 2009, Samsung achieved total revenues of US$117.4 billion, overtaking Hewlett-Packard to become the world's largest technology company measured by sales. In 2009 and 2010, the US and EU fined the company, along with eight other memory chip manufacturers, for its part in a price-fixing scheme that occurred between 1999 and 2002. Other companies fined included Infineon Technologies, Elpida Memory, and Micron Technology. In December 2010, the EU granted immunity to Samsung Electronics for acting as an informant during the investigation (LG Display, AU Optronics, Chimei InnoLux, Chunghwa Picture Tubes, and HannStar Display were implicated as a result of the company's intelligence). Despite its consistent expansion, Samsung, along with its chairman Lee Kun-hee, has developed a reputation for insecurity regarding its financial stability and the potential for future crises to arise. After returning from a temporary retirement period in March 2010, Kun-hee stated that "Samsung Electronics' future is not guaranteed because most of our flagship products will be obsolete in 10 years from now." The company has set an ambitious goal of reaching $400 billion in annual revenues within ten years. The company has 24 research-and-development centers around the world, and since the early 2000s and in Vision 2020, Samsung has emphasized technical research and development. However, the large number of online complaints indicate that the company is weak at listening to customer feedback regarding the design of its technology and software. In April 2011, Samsung Electronics sold its HDD commercial operations to Seagate Technology for approximately US$1.4 billion. The payment was composed of 45.2 million Seagate shares (9.6 percent of shares), worth US$687.5 million, and a cash sum for the remainder. In May 2013, Samsung announced that it had finally managed to test speed-enhanced fifth-generation (5G) technology successfully. In April 2013, Samsung Electronics' new entry into its Galaxy S series smartphone range, the Galaxy S4 was made available for retail. Released as the upgrade of the best-selling Galaxy S III, the S4 was sold in some international markets with the company's Exynos processor. In July 2013, Samsung Electronics forecasted weaker than expected profits for its April to June quarter. While analysts expected around 10.1 trillion won, Samsung Electronics estimated an operating profit of . During the same month, Samsung acquired the media streaming device manufacturer Boxee for a reported $30 million. Samsung's mobile business chief Shin Jong-Kyun stated to the Korea Times on 11 September 2013 that Samsung Electronics will further develop its presence in China to strengthen its market position in relation to Apple. The Samsung executive also confirmed that a 64-bit smartphone handset will be released to match the ARM-based A7 processor of Apple's iPhone 5s model that was released in September 2013. Due to smartphone sales—especially sales of lower-priced handsets in markets such as India and China—Samsung achieved record earnings in the third quarter of 2013. The operating profit for this period rose to about , a figure that was boosted by memory chip sales to customers such as Apple, Inc. On 14 October 2013, Samsung Electronics publicly apologized for using refurbished components from cheaper desktop computers to fix higher-end products, after the corporation's unethical business practices were exposed on the previous day by MBC TV's current affairs magazine, 2580. In February 2014, Barnes & Noble announced a new Nook color tablet would be released in 2014. In June 2014, Barnes & Noble announced it would be teaming up with Samsung – one of the leaders in Android-based tablets – to develop co-branded color tablets titled the Samsung Galaxy Tab 4 Nook; the devices will feature Samsung's hardware, including a 7-inch display, and customized Nook software from Barnes & Noble. The first Galaxy Tab 4 Nook will begin selling in the US in August 2014, with Nook focusing on the software and content, and Samsung focusing on the hardware. The product specs posted by Samsung indicate that, in contrast to the premium quality enhanced eReaders launched in 2012 (the NOOK HD and HD+, which "had screens and CPUs comparable to the best mid-level and premium tablets), the more budget-like features of the Samsung Galaxy Tab 4 Nook will be designed for a lower market tier (Android 4.4.2 KitKat on a 1.2 GHz quad-core Snapdragon CPU with 1.5GB RAM, Wifi, and Bluetooth, in addition to a 1.2MP front-facing camera and a 3MP rear camera, screen resolution of 1280 x 800, and a $199 retail price; roughly $80 more than comparable tablets that don't carry a Samsung brand)." Samsung provided sponsorship for the 86th Academy Awards ceremony (held on 4 March 2014) and, due to the use of the Samsung Galaxy Note smartphone product by host Ellen DeGeneres in a group selfie photograph that became an online viral phenomenon, the corporation donated US$3 million to two charitable organizations selected by DeGeneres. The official Samsung statement explained: "... we wanted to make a donation to Ellen's charities of choice: St Jude's and the Humane Society. Samsung will donate 1.5 million dollars to each charity." On 17 April 2014, Samsung announced it was discontinuing its ebook store effective 1 July 2014 and had partnered with Amazon to introduce the Kindle for Samsung app, that will permit Galaxy device users using Android 4.0 and up to buy and read content from Amazon's catalog of periodicals and ebooks, and free book service, Samsung Book Deals, that will allow users of the co-branded app to choose one free ebook monthly from a selection provided by Amazon. In reporting on Barnes & Noble's 5 June 2014 announcement that the bookseller would be teaming up with Samsung to develop Nook tablets, the Associated Press noted:"Barnes & Noble says it will continue to make and sell its $99 Nook Glowlight [sic] e-readers and provide customer support." "The company also says it is moving its Nook employees out of its Palo Alto, Calif., offices to save money. Employees are expected to move to a smaller space in nearby Santa Clara, Calif., by July."In Q1 2015, Samsung's profit dropped 39% to USD4.35 billion due to heavier smartphone competition from Apple's iPhone 6 and 6 Plus, as well as a slew of Android competitors. In August 2014, Samsung announced that they had reached an agreement to acquire SmartThings. The acquisition was seen as a move by Samsung to move into the internet of things space. On 27 March 2015, Samsung announced that they sold their headquarters in Roppongi T-Cube to Mitsui Fudosan with staff already relocated to Iidabashi. In May 2015, Samsung announced a partnership with IKEA, in accordance with the Wireless Power Consortium, to co-develop furniture that would allow Qi inductive charging at the Mobile World Congress. In June, Samsung established a dedicated LFD business, Samsung Display Solutions, catering to the company's SMART range of LED products. The company's SMART range of LED displays include Signage, Hospitality Display, TV, LED, Cloud Display, and Accessories. The company provides the following all-in-one customer software solutions: MagicInfo, MagicIWB, LYNK SINC, LYNK HMS, and LYNK REACH. The company caters to the following industries: Retail, Corporate, Hospitality, and Transportation. On 16 June 2016, Samsung Electronics announced that it agreed to acquire cloud-computing company Joyent. They stated that the acquisition allowed Samsung to grow its cloud-based services for its smartphones and Internet-connected devices. On 14 November 2016, Samsung Electronics announced an agreement to buy American automotive equipment manufacturer Harman International Industries for US$8 billion. On 10 March 2017, the acquisition was completed. On 6 April 2017, Samsung Electronics reported that financials were up for the company in the quarter. The year prior, "memory chips and flexible displays accounted for about 68% of Samsung's operating profit in the final quarter of 2016, a change from previous years when the smartphone business was the main contributor." On 2 May 2017, Samsung has been given permission from the Ministry of Land, Infrastructure, and Transport of Korea to start testing a self-driving car technology. According to the Korea Herald, the company will be using a customized Hyundai car for the tests. In May 2019, for the first time in Europe, 8K demonstration content was received via satellite without the need for a separate external receiver or decoder using a Samsung TV. At the 2019 SES Industry Days conference at Betzdorf, Luxembourg broadcast quality 8K content (with a resolution of 7680x4320 pixels at 50 frames/s) was encoded using a Spin Digital HEVC encoder (at a data rate of 70 Mbit/s), uplinked to a single 33 MHz transponder on SES' Astra 28.2°E satellites and the downlink received and displayed on a Samsung 82in Q950RB production model TV. Samsung proposed a $17 billion plan to build a chip-making factory in either Arizona, Texas, or New York in 2021. The plan is in part a result of the United States allocating billions of dollars to grow domestic chip manufacturing as part of the National Defence Authorization Act passed in January to reduce the country's reliance on Taiwan, China, and South Korea. The plant would employ around 1,900 people and would be in operation by October 2022. On 24 November 2021, Samsung announced that it would build a new semiconductor manufacturing facility in Taylor, Texas. The plant is estimated to be a $17 billion investment and will help boost the production of advanced logic semiconductors, reportedly as advanced as 3 nanometers. On 7 December 2021, Samsung Electronics announced the merger of the mobile and consumer electronics divisions. The company also replaced the leaders of its three business units. Kyung Kye-Hyun will become the CEO of Samsung's powerhouse components business while Han Jong-hee will become the new CEO of the combined mobile and consumer electronics business. In late January 2022, Samsung Electronics posted its highest fourth-quarter profit since before the COVID-19 pandemic, largely because of strong chip sales amid the global semiconductor shortage and a small increase in mobile phone sales. Samsung’s operating profit topped $11.5 billion, up 53% from the 2021 fourth-quarter, with the company's chip business responsible for nearly two-thirds of the total profit. Global reputation In mid-November 2021, Samsung Electronics was ranked second in the 'Best Global Brands' by YouGov a market research firm, after placing fourth in the 2020 ranking. Logo history Operations The company focuses on four areas: digital media, semiconductors, telecommunication networks, and LCD digital appliances. The digital-media business area covers computer devices such as laptop computers and laser printers; digital displays such as televisions and computer monitors; consumer entertainment devices such as DVD players, MP3 players, and digital camcorders; home appliances such as refrigerators, air conditioners, air purifiers, washing machines, microwave ovens, and vacuum cleaners. The semiconductor-business area includes semiconductor chips such as SDRAM, SRAM, NAND flash memory; smart cards; mobile application processors; mobile TV receivers; RF transceivers; CMOS Image sensors, Smart Card IC, MP3 IC, DVD/Blu-ray Disc/HD DVD Player SOC, and multi-chip package (MCP). The telecommunication-network-business area includes multi-service DSLAMs and fax machines; cellular devices such as mobile phones, PDA phones, and hybrid devices called mobile intelligent terminals (MITs); and satellite receivers. The LCD business area focuses on producing TFT-LCD and organic light-emitting diode (OLED) panels for laptops, desktop monitors, and televisions. Samsung Print was established in 2009 as a separate entity to focus on B2B sales and released a broad range of multifunctional devices, printers, and more. As of 2018, Samsung sold its printing business to HP. Products Samsung Electronics produces LCD and LED panels, mobile phones, memory chips, NAND flash, solid-state drives, televisions, digital cinemas screen, and laptops. The company previously produced hard-drives and printers. Samsung consistently invests in innovation. In 2021, the World Intellectual Property Organization (WIPO)’s annual World Intellectual Property Indicators report ranked Samsung's number of patent applications published under the PCT System as 2nd in the world, with 3,093 patent applications being published during 2020. This position is up from their previous ranking as 3rd in 2019 with 2,334 applications. LCD and OLED panels By 2004 Samsung was the world's-largest manufacturer of OLEDs, with a 40 percent market share worldwide and as of 2018 has a 98% share of the global AMOLED market. The company generated $100.2 million out of the total $475 million revenues in the global OLED market in 2006. As of 2006, it held more than 600 American patents and more than 2,800 international patents, making it the largest owner of AMOLED technology patents. Samsung's current AMOLED smartphones use its Super AMOLED trademark, with the Samsung Wave S8500 and Samsung i9000 Galaxy S being launched in June 2010. In January 2011, it announced its Super AMOLED Plus displays – which offer several advances over the older Super AMOLED displays – real stripe matrix (50 percent more sub pixels), thinner form factor, brighter image and an 18 percent reduction in energy consumption. In October 2007, Samsung introducing a ten-millimeter thick, 40-inch LCD television panel, followed in October 2008 by the world's first 7.9-mm panel. Samsung developed panels for 24-inch LCD monitors (3.5 mm) and 12.1-inch laptops (1.64 mm). In 2009, Samsung succeeded in developing a panel for forty-inch LED televisions, with a thickness of 3.9 millimeters (0.15 inch). Dubbed the "Needle Slim", the panel is as thick (or thin) as two coins put together. This is about a twelfth of the conventional LCD panel whose thickness is approximately 50 millimeters (1.97 inches). While reducing the thickness substantially, the company maintained the performance of previous models, including Full HD 1080p resolution, 120 Hz refresh rate, and 5000:1 contrast ratio. On 6 September 2013, Samsung launched its 55-inch curved OLED TV (model KE55S9C) in the United Kingdom with John Lewis. In October 2013, Samsung disseminated a press release for its curved display technology with the Galaxy Round smartphone model. The press release described the product as the "world's first commercialized full HD Super AMOLED flexible display". The manufacturer explains that users can check information such as time and battery life when the home screen is off, and can receive information from the screen by tilting the device. In 2020, Samsung Display said it was exiting the LCD business. Mobile phones Although Samsung started with Solstice lines, and has made clamshell design cell phones, Samsung's flagship mobile handset line is the Samsung Galaxy S series of smartphones, which many consider a direct competitor of the Apple iPhone. It was initially launched in Singapore, Malaysia and South Korea in June 2010, followed by the United States in July. It sold more than one million units within the first 45 days on sale in the United States. While many other handset manufacturers focused on one or two operating systems, Samsung for a time used several of them: Symbian, Windows Phone, Linux-based LiMo, and Samsung's proprietary TouchWiz, Bada and Tizen. By 2013 Samsung had dropped all operating systems except Android and Windows Phone. That year Samsung released at least 43 Android phones or tablets and two Windows Phones. At the end of the third quarter of 2010, the company had surpassed the 70 million unit mark in shipped phones, giving it a global market share of 22 percent, trailing Nokia by 12 percent. Overall, the company sold 280 million mobile phones in 2010, corresponding to a market share of 20.2 percent. The company overtook Apple in worldwide smartphone sales during the third quarter 2011, with a total market share of 23.8 percent, compared to Apple's 14.6 percent share. Samsung became the world's largest cellphone manufacturer in 2012, with the sales of 95 million in the first quarter. During the third quarter of 2013, Samsung's smartphone sales improved in emerging markets such as India and the Middle East, where cheaper handsets were popular. As of October 2013, the company offers 40 smartphone models on its US website. In 2019, Samsung announced that it has ended production of mobile phones in China, due to lack of Chinese demand. As of 2019 Samsung employs over 200,000 employees in the Hanoi-area of Vietnam to produce Smartphones, while offsourcing some manufacturing to China and manufacturing large portions of its phones in India. US variants of Samsung Galaxy smartphones do not have the option to unlock the bootloader. Semiconductors Samsung Electronics has been the world's largest memory chip manufacturer since 1993, and the largest semiconductor company since 2017. Samsung Semiconductor division manufactures various semiconductor devices, including semiconductor nodes, MOSFET transistors, integrated circuit chips, and semiconductor memory. Since the early 1990s, Samsung Electronics has commercially introduced a number of new memory technologies. They commercially introduced SDRAM (synchronous dynamic random-access memory) in 1992, and later DDR SDRAM (double data rate SDRAM) and GDDR (graphics DDR) SGRAM (synchronous graphics RAM) in 1998. In 2009, Samsung started mass-producing 30 nm-class NAND flash memory, and in 2010 succeeded in mass-producing 30 nm class DRAM and 20 nm class NAND flash, both of which were for the first time in the world. They also commercially introduced TLC (triple-level cell) NAND flash memory in 2010, V-NAND flash in 2013, LPDDR4 SDRAM in 2013, HBM2 in 2016, GDDR6 in January 2018, and LPDDR5 in June 2018. Another area where the company has had significant business in for years is the foundry segment. It had begun investment in the foundry business since 2006, and positioned it as one of the strategic pillars for semiconductor growth. Since then, Samsung has been a leader in semiconductor device fabrication. Samsung began mass-production of a 20 nm class semiconductor manufacturing process in 2010, followed by a 10 nm class FinFET process in 2013, and 7 nm FinFET nodes in 2018. They also began production of the first 5 nm nodes in late 2018, with plans to introduce 3 nm GAAFET nodes by 2021. According to market research firm Gartner, during the second quarter of 2010, Samsung Electronics took the top position in the DRAM segment due to brisk sales of the item on the world market. Gartner analysts said in their report, "Samsung cemented its leading position by taking a 35-percent market share. All the other suppliers had minimal change in their shares." The company took the top slot in the ranking, followed by Hynix, Elpida, and Micron, said Gartner. In 2010, market researcher IC Insights predicted that Samsung would become the world's-biggest semiconductor chip supplier by 2014, surpassing Intel. For the ten-year period from 1999 to 2009, Samsung's compound annual growth rate in semiconductor revenues was 13.5 percent, compared with 3.4 percent for Intel. For 2015, IC Insights and Gartner announced that Samsung was the fourth largest chip manufacturer in the world. Samsung eventually surpassed Intel to become the world's largest semiconductor company in 2017. By the second quarter of 2020 the company had planned to start mass production of 5 nm chips using Extreme ultraviolet lithography (EUV) and aimed to become a leader in EUV process use. On 30 November 2021, announced the company would be producing new auto chips for Volkswagen vehicles. The logic chips will be used in entertainment systems to provide 5G telecommunications to meet the increased demand for high-definition video while traveling. The Xi'an China facility, which has been running since 2014 and it produces approximately 40 percent of Samsung Electronics NAND flash memory chips. Solid-state drives In 2016, Samsung also launched to market a 15.36TB SSD with a price tag of US$10,000 using a SAS interface, using a 2.5-inch form factor but with the thickness of 3.5-inch drives. This was the first time a commercially available SSD had more capacity than the largest currently available HDD. In 2018, Samsung introduced to market a 30.72 TB SSD using a SAS interface. Samsung introduced an M.2 NVMe SSD with read speeds of 3500 MB/s and write speeds of 3300 MB/s in the same year. In 2019, Samsung introduced SSDs capable of 8 GB/s sequential read and write speeds and 1.5 million IOPS, capable of moving data from damaged chips to undamaged chips, to allow the SSD to continue working normally, albeit at a lower capacity. Samsung's consumer SSD lineup currently consists of the 980 PRO, 970 PRO, 970 EVO plus, 970 EVO, 960 PRO, 960 EVO, 950 PRO, 860 QVO, 860 PRO, 860 EVO, 850 PRO, 850 EVO, and the 750 EVO. The SSDs models beginning with a 9 use an NVM Express interface and the rest use a Serial ATA interface. Samsung also produces consumer portable SSDs using a USB-C USB 3.1 Gen 2 connector. The drives offer read speeds of 1,050MB/s and write speeds of 1,000MB/s and are available as 500GB, 1TB and 2TB models. Like many other SSD producers, Samsung's SSDs use NAND flash memory produced by Samsung Electronics. Hard-drives In the area of storage media, in 2009 Samsung achieved a ten percent world market share, driven by the introduction of a new hard disk drive capable of storing 250Gb per 2.5-inch disk. In 2010, the company started marketing the 320Gb-per-disk HDD, the largest in the industry. In addition, it was focusing more on selling external hard disk drives. Following financial losses, the hard disk division was sold to Seagate in 2011 in return for a 9.6% ownership stake in Seagate. Televisions In 2009, Samsung sold around 31 million flat-panel televisions, enabling to it to maintain the world's largest market share for a fourth consecutive year. Samsung launched its first full HD 3D LED television in March 2010. Samsung had showcased the product at the 2010 International Consumer Electronics Show (CES 2010) held in Las Vegas. Samsung sold more than one million 3D televisions within six months of its launch. This is the figure close to what many market researchers forecast for the year's worldwide 3D television sales (1.23 million units). It also debuted the 3D Home Theater (HT-C6950W) that allows the user to enjoy 3D image and surround sound at the same time. With the launch of 3D Home Theater, Samsung became the first company in the industry to have the full line of 3D offerings, including 3D television, 3D Blu-ray player, 3D content, and 3D glasses. In 2007, Samsung introduced the "Internet TV", enabling the viewer to receive information from the Internet while at the same time watching conventional television programming. Samsung later developed "Smart LED TV" (now renamed to "Samsung Smart TV"), which additionally supports downloaded smart television apps. In 2008, the company launched the Power Infolink service, followed in 2009 by a whole new Internet@TV. In 2010, it started marketing the 3D television while unveiling the upgraded Internet@TV 2010, which offers free (or for-fee) download of applications from its Samsung Apps Store, in addition to existing services such as news, weather, stock market, YouTube videos, and movies. Samsung Apps offers for-fee premium services in a few countries including Korea and the United States. The services will be custom-tailored for each region. Samsung plans to offer family-oriented applications such as health care programs and digital picture frames as well as games. Samsung's range of smart TVs include the apps ITV Player and motion controlled Angry Birds. Monitors The company started as a budget display monitor brand in the 1980s, producing cathode ray tube (CRT) monitors for computers, from which it then evolved. By the end of the decade, Samsung had become the world's largest monitor manufacturer, selling over monitors by 1989. During the 1990s to the 2000s, Samsung started producing LCD monitors using TFT technology to which it still emphasizes on the budget market against the competition while at the same time starting to also focus on catering to the middle and upper markets through partnership with brands such as NEC and Sony via a joint venture. As it grew and became more advanced, it later on acquired the joint venture corporations to form the current Samsung OLED and S-LCD Corporation respectively from its former joint venture partners. Tizen As of 2015, Samsung smart televisions and smart monitors run an operating system customized from the open-source Linux-based Tizen OS. Given Samsung's high market share in the smart television market, approximately 20% of smart televisions sold worldwide in 2018 run Tizen. In 2019, Samsung announced that they will be bringing the Apple TV app (formally iTunes Movies and TV Shows app) and AirPlay 2 support to its 2019 and 2018 smart TVs (via firmware update). Printers In the past, Samsung produced printers for both consumers and business use, including mono-laser printers, color laser printers, multifunction printers, and enterprise-use high-speed digital multi-function printer models. They exited the printer business and sold their printer division to HP in Fall 2017. In 2010, the company introduced the world's smallest mono-laser printer ML-1660 and color laser multifunction printer CLX-3185. Speakers In 2017, Samsung acquired Harman International. Harman makes earbuds under many brand names such as AKG, AMX, Becker, Crown, Harman Kardon, Infinity, JBL, Lexicon, dbx, DigiTech, Mark Levinson, Martin, Revel, Soundcraft, Studer, Arcam, Bang & Olufsen and BSS Audio. Cameras Samsung has introduced several models of digital cameras and camcorders including the WB550 camera, the ST550 dual-LCD-mounted camera, and the HMX-H106 (64GB SSD-mounted full HD camcorder). In 2014, the company took the second place in the mirrorless camera segment. Since then, the company has focused more on higher-priced items. In 2010, the company launched the NX10, the next-generation interchangeable lens camera. Other In 2010, the company introduced some more energy-efficient products, including the laptop R580 and the netbook N210. In the MP3 player segment, Samsung has launched products including the M1 MP3 player, and the world's-smallest DivX MP3 player R1. In 2014, the company announced that it was exiting the laptop market in Europe. In 2015, Samsung announced a proposal for a constellation of 4600 satellites orbiting Earth at altitude that could bring 200 gigabytes per month of internet data to "each of the world's 5 billion people". The proposal has not yet advanced to full development. If built, such a constellation would compete with previously-announced satellite constellations currently under development by OneWeb and SpaceX. On 13 July 2017, an LED screen for digital cinema developed by Samsung Electronics with GDC Technology Limited was publicly demonstrated on one screen at Lotte Cinema World Tower in Seoul. Samsung stores Samsung has started opening dedicated stores to showcase their goods. Korea Samsung has various service stores throughout all of South Korea, which have showcases of various Samsung products available for purchase, and also have repair centers for those items. It also has stores dedicated to the installation of large household appliances such as TVs, dishwashers, and refrigerators. It also has stores just for the sale and repair of its memory products, such as the SSDs. Canada Toronto Samsung has 4 different Samsung Experience Stores in Toronto. The main location is located within the Toronto Eaton Centre and has two levels. On the first floor there are phones, tablets, smartwatches, other electronics and accessories on display. There is also a Virtual Reality section where you can play VR games and sit in a chair to watch videos in VR, such as riding a roller coaster. On the second floor, there is a housewares section where Samsung fridges, stoves, appliances are shown. The TV section shows off their big-screen TVs. There is also a section for warranty and repairs. The other 3 locations are at: Scarborough Town Centre Sherway Gardens Yorkdale Shopping Centre Others Samsung has 3 other Samsung Experience Stores in Canada outside of Toronto. Edmonton – West Edmonton Mall Vancouver– Metropolis at Metrotown Montreal – Montreal Eaton Center India Samsung has opened its largest store in the world in Bangalore, Karnataka covering area of 33,000 sq ft. It is also known as Samsung Opera House. United States Samsung has 4 Samsung Experience Stores in the United States. Houston – The Galleria Los Angeles – Americana at Brand Garden City – Roosevelt Field Palo Alto – Stanford Shopping Center Experience shops In addition to these locations, Samsung runs a Samsung Experience Shop located inside Best Buy stores. Management and board of directors In December 2010, Samsung switched its management system from a single CEO-system under Choi Gee-sung to a two-person management team with Choi Gee-sung, CEO and vice chairman, and Lee Jae-Yong, chief operating officer and president. In June 2012, Samsung appointed Kwon Oh-Hyun as CEO of the company. Samsung also reorganized its overseas marketing bases in line with changes in the market, including a combined Britain/Continental Europe regional subsidiary, and a combined China/Taiwan regional subsidiary. In 2012, Samsung appointed director of mobile products, J. K. Shin, to president/CEO of Samsung Electronics for Mobile Consumer Products. The company added a new digital imaging business division in 2010, and consists of eight divisions, including the existing display, IT solutions, consumer electronics, wireless, networking, semiconductor, and LCD divisions. It merged consumer electronics and air conditioners in 2010 under the consumer electronics business division. The set-top boxes business was merged with the Visual Display Business division. The company's December 2010 reorganization was as follows: Among the eight divisions, the network division and the digital imaging division experienced new appointments, while the remaining divisions were maintained in accordance with their results. Chief executive officer, Vice chairman: Choi Gee-sung Chief financial officer: President Yoon Ju-hwa Chief operating officer, President: Lee Jae-yong Chief executive officer, President: J. K. Shin The following are the names of the board of directors members: Market share for major products Major clients Relationship with Apple Inc. Despite recent litigation activity, Samsung and Apple have been described as frenemies who share a love-hate relationship. Samsung is a major supplier for Apple – first providing memory for the early iPod devices in 2005, and Apple is a key customer for Samsung – in 2012 its component sales were thought to be worth in the region of $8 billion revenue to Samsung – to the point where Apple CEO Tim Cook originally opposed litigation against Samsung wary of the company's critical component supply chain for Apple. In April 2011, Apple Inc. announced that it was suing Samsung over the design of its Galaxy range of mobile phones. The lawsuit was filed on 15 April 2011 and alleges that Samsung infringed on Apple's trademarks and patents of the iPhone and iPad. Samsung issued a counterclaim against Apple of patent infringement. In August 2011, at The Regional Court of Düsseldorf, Apple was granted a preliminary injunction against the sale and marketing of the Samsung Galaxy Tab 10.1 across the whole of Europe excluding the Netherlands. The ban has been temporarily lifted in the European Union, with the exclusion of Germany, whilst it is investigated whether or not the original injunction was appropriate. On 31 August 2012, the Tokyo District Court ruled Samsung Electronics' mobile devices did not violate an Apple patent. The case only addressed Apple's patent that allows mobile devices and personal computers to synchronize or share data with each other and is not comparable with the U.S. court case ruled on 24 August. On 18 October 2012, the U.K. High Court ruled that Samsung did not infringe Apple's design patents. Apple was forced to issue a court-ordered apology to Samsung on its official U.K. website. Relationship with Best Buy Co., Inc. Best Buy and Samsung joined together to create the Samsung Experience Shop, a store that allows customers to test the company's products, and get training in mobile products they already own. In summer 2013, more than 1,400 Best Buy and Best Buy Mobile stores have established the Samsung Experience Shop. About 460 square feet of space are dedicated for the SES, with the company's placement at Best Buy's entrance, as well as its sign visible in any part of the store. The purpose of the Samsung Experience Shop is to make Samsung's products, i.e. the Galaxy, more accessible to customers. The first Samsung Experience Shops began appearing across Best Buy locations in the United States in May 2013. In May 2014, Best Buy announced its plans to add 500 new Samsung Entertainment Experience Shops. While the previous Samsung Experience locations focus primarily on showcasing and providing support for Samsung's Galaxy smartphones, cameras, and tablets, these new locations will showcase and support the company's home theater products. Unlike the Samsung Experience Shop, the Samsung Entertainment Experience will be run by Samsung trained Best Buy associates. The new centers are expected to finish being made in the US by January 2015. Design In the early 1990s, Samsung began considering the importance of physical design in its products. When chairman Lee declared 1996 'The Year of Design Revolution', a comprehensive global design program was initiated with the goal of design being a strategic asset and competitive advantage for the company. Located in the company's high-rise headquarters in Gangnam (south of Seoul) the corporate design center includes more than 900 full-time designers. In 1971 there were only a few designers in the whole company, whose number rose to 1,600 by 2015. In addition to the corporate design center in Seoul, there are design centers located in Tokyo, San Francisco and London. The company overhauls its design over a two-year cycle. For the first year, it scrutinizes design trends of the world, followed by product strategies. It then maps out new design plans during the second year. Since 2006, it has won as many as 210 awards from international design institutions. It received the iF (International Forum) and IDEA design awards. Working with partners, Samsung was the winner in eight categories in the 2009 IDEA awards, hence receiving the most awards. In the 2010 iF Material Awards, the company won the Gold Award for five of its products including the external hard disk drive. The iF Material Awards are given by the International Forum Design GmbH of Hannover, a design award for design materials and process technologies. In 2010, the German company selected a total of 42 products in the areas of home appliance, furniture, and industrial design. Samsung won the awards in five categories including external hard disk, full-touch screen phone, "side-by-side" refrigerator, compact digital camera, and laser printer toner. Criticism and controversies Environmental record All Samsung mobile phones and MP3 players introduced on the market after April 2010 are free from polyvinyl chloride (PVC) and brominated flame retardants (BFRs). The company is listed in Greenpeace's Guide to Greener Electronics, which rates electronics companies on policies and practices to reduce their impact on the climate, produce greener products, and make their operations more sustainable. In November 2011, Samsung was ranked seventh out of 15 leading electronics manufacturers with a score of 4.1/10. In the newly re-launched guide, Samsung moved down two places (occupying fifth position in October 2010), but scored maximum points for providing verified data and its greenhouse gas emissions. It also scored well for its Sustainable Operations, with the guide praising its relatively good e-waste take-back programme and information. However, the company was criticized for not setting an ambitious target to increase its use of renewable energy and for belonging to a trade association which has commented against energy efficiency standards. In June 2004, Samsung was one of the first major electronics companies to publicly commit to eliminate PVC and BFRs from new models of all their products. However, the company failed to meet its deadlines to be PVC- and BFRs-free, and published new phase out dates. In March 2010, Greenpeace activists protested at the company's Benelux headquarters for what they called Samsung's "broken promises". The company has been awarded as one of global top-ten companies in the Carbon Disclosure Leadership Index (CDLI). It was the only Asian company among top ten companies. In addition, the company is listed in Dow Jones Sustainability Index (DJSI). The company's achievement ratio of products approaching the Global Ecolabel level ("Good Eco-Products" within the company) is 11 percentage points above the 2010 goal (80 percent). In the first half of 2010, Samsung earned the Global Ecolabel for its 2,134 models, thereby becoming the world's number-one company in terms of the number of products meeting Global Ecolabel standards. The company is also improving its effort to recover and recycle electronic wastes. The amount of wastes salvaged throughout 60 countries during 2009 was as much as 240,000 tons. The "Samsung Recycling Direct" program, the company's voluntary recycling program under way in the United States, was expanded to Canada. In 2008, the company was praised for its recycling effort by the U.S. advocacy group Electronics Take Back Coalition as the "best eco-friendly recycling program". Litigation and safety issues Worker safety Many employees working in Samsung's semiconductor facilities have developed various forms of cancers. Initially, Samsung denied being responsible for the illnesses. Although Samsung is known to disfavor trade unions, these sick workers organized in the group SHARPS (Supporters for the Health And Rights of People in the Semiconductor Industry). The crowdfunded film Another Promise was produced in 2013 to depict the fight for compensation of the victims, as well as the documentary The Empire of Shame. In May 2014, Samsung offered an apology and compensation to workers who became ill. The company subsequently did not follow all the recommendations of a specially appointed mediation committee, paid several families outside of a scheme to be agreed on and required them to drop all further charges, prompting SHARPS to continue legal and public action. The quarrel was mostly resolved upon a public apology issued by Samsung in November 2018. DRAM price fixing In December 2010, the European Commission fined six LCD panel producers, including Samsung, a total of €648 million for operating as a cartel. The company received a full reduction of the potential fine for being the first firm to assist EU anti-trust authorities. On 19 October 2011, Samsung was fined €145.73 million for being part of a price cartel of ten companies for DRAMs, which lasted from 1 July 1998 to 15 June 2002. Like most of the other members of the cartel, the company received a 10% reduction for acknowledging the facts to investigators. Samsung had to pay 90% of their share of the settlement, but Micron avoided payment as a result of having initially revealed the case to investigators. Micron remains the only company that avoided all payments from reduction under the settlement notice. In Canada, the price fix was investigated in 2002. A recession started to occur that year, and the price fix ended. However, in 2014, the Canadian government reopened the case and investigated silently after the EU's success. Sufficient evidence was found and presented to Samsung and two other manufacturers during a class action lawsuit hearing. The companies agreed upon a $120 million agreement, with $40 million as a fine, and $80 million to be paid back to Canadian citizens who purchased a computer, printer, MP3 player, gaming console or camera between April 1999 and June 2002. Apple lawsuit On 15 April 2011, Apple sued Samsung in the United States District Court for the Northern District of California, alleging that several of Samsung's Android phones and tablets, including the Nexus S, Epic 4G, Galaxy S 4G, and Galaxy Tab, infringed on Apple's intellectual property: its patents, trademarks, user interface and style. Apple's complaint included specific federal claims for patent infringement, false designation of origin, unfair competition, and trademark infringement, as well as state-level claims for unfair competition, common law trademark infringement, and unjust enrichment. On 24 August 2012, the jury returned a verdict largely favorable to Apple. It found that Samsung had willfully infringed on Apple's design and utility patents, and had also diluted Apple's trade dresses related to the iPhone. The jury awarded Apple $1.049 billion in damages and Samsung zero damages in its countersuit. The jury found that Samsung infringed Apple's patents on iPhone's "Bounce-Back Effect" (US Patent No.7,469,381), "On-screen Navigation" (US Patent No.7,844,915), and "Tap To Zoom" (US Patent No.7,864,163), and design patents that cover iPhone's features such as the "home button, rounded corners and tapered edges" (US D593087) and "On-Screen Icons" (US D604305). Product safety Despite their phones' popularity, numerous explosions of them have been reported. A Swiss teenager was left with second and third degree burns in her thigh due to her Galaxy S3's explosion, followed by two more Galaxy S3 explosions in Switzerland and Ireland. A South Korean student's Galaxy S2 battery exploded in 2012. Samsung's Galaxy S4 also led to several accidents. A house in Hong Kong was allegedly set on fire by an S4 in July 2013, followed by minor S4 burn incidents in Pakistan and Russia. A minor fire was also reported in Newbury, United Kingdom in October 2013. Some users of the phone have also reported swelling batteries and overheating; Samsung has offered affected customers new batteries, free of charge. In December 2013, a Canadian uploaded a YouTube video describing his S4 combusting. Samsung then asked the uploader to sign a legal document requiring him to remove the video, remain silent about the agreement, and surrender any future claims against the company to receive a replacement. No further response from Samsung was received afterwards. There were a few more reported Galaxy S4 explosions in India and the UAE. Galaxy Note 7 On 31 August 2016, it was reported that Samsung was delaying shipments of the Galaxy Note 7 in some regions to perform "additional tests being conducted for product quality"; this came alongside user reports of batteries exploding while charging. On 2 September, Samsung suspended sales of the Note 7 and announced a worldwide "product exchange program" in which customers would be able to exchange their Note 7 for another Note 7, a Galaxy S7, or an S7 Edge (the price difference being refunded). They would also receive a gift card from a participating carrier. On 1 September, the company released a statement saying it had received 35 reports of battery failure, which, according to an unnamed Samsung official, "account for less than 0.2 percent of the entire volume sold". Although it has been referred to as a product recall by the media, it was not an official government-issued recall by an organization such as the U.S. Consumer Product Safety Commission (CPSC), and only a voluntary measure. The CPSC did issue an official recall notice on 15 September 2016, and stated that Samsung received at least 92 reports of the batteries overheating in the U.S., including 26 reports of burns and 55 reports of property damage. After some replacement Note 7 phones also caught fire, Samsung announced on 11 October 2016 that it would permanently end production of the Note 7 in the interest of customer safety. However, Samsung was hoping to recover from the lost sales from the Note 7 with the introduction of new colors such as the Blue Coral and Black Pearl color for the Galaxy S7 edge. On 14 October 2016, the U.S. Federal Aviation Administration and the Department of Transportation's Pipeline and Hazardous Materials Safety Administration banned the Note 7 from being taken aboard any airline flight, even if powered off. Qantas, Virgin Australia and Singapore Airlines also banned the carriage of Note 7s on their aircraft with effect from midnight on 15 October. Mexico's largest airlines Aeromexico, Interjet, Volaris and VivaAerobus all banned the handset. Washing machines On 4 November 2016, Samsung recalled 2.8 million top-load washing machines sold at home appliance stores between 2011 and 2016 because the machine's top could unexpectedly detach from the chassis during use due to excessive vibration. Advertisements on smart televisions In 2015, users on the website Reddit began reporting that some Samsung Smart TVs would display advertisements for Pepsi products during movies when viewed through the Plex application. Plex denied responsibility for the ads and Samsung told blog Gigaom that they were investigating the matter. In March 2016, soccer star Pelé filed a lawsuit against Samsung in the United States District Court for the Northern District of Illinois, seeking $30 million in damages, claiming violations under the Lanham Act for false endorsement and a state law claim for violation of his right of publicity. The suit alleged that, at one point, Samsung and Pelé came close to entering into a licensing agreement for Pelé to appear in a Samsung advertising campaign; Samsung abruptly pulled out of the negotiations. The October 2015 Samsung ad in question included a partial face shot of a man who allegedly "very closely resembles" Pelé, and also a superimposed ultra-high-definition television screen next to the image of the man featuring a "modified bicycle or scissors-kick", perfected and famously used by Pelé. In December 2016, Samsung forced an update to their Smart TV line, which resulted in advertisements being displayed in menus on the updated devices. Viral marketing On 1 April 2013, several documents were shown on TaiwanSamsungLeaks.org saying that the advertising company OpenTide (Taiwan) and its parent company Samsung were hiring students to attack its competitors by spreading harmful comments and biased opinions/reviews about the products of other phone manufacturers, such as Sony and HTC, in several famous forums and websites in Taiwan to improve its brand image. Hacker "0xb", the uploader of the documents, said that they were intercepted from an email between OpenTide and Samsung. Four days later, the Taiwan division of Samsung Electronics made an announcement stating it would "stop all online marketing strategies which involves publishing and replying in online forums". It was widely reported by the Taiwanese media. Taiwan later fined Samsung Electronics for the smear campaign. See also Samsung References External links Samsung Electronics Official Global Blog Samsung Community Forum Samsung subsidiaries Best Buy South Korean companies established in 1969 British Royal Warrant holders Companies based in Suwon Companies listed on the Korea Exchange Companies listed on the London Stock Exchange Companies listed on the Frankfurt Stock Exchange Computer peripheral companies Computer memory companies Computer storage companies Consumer electronics brands Display technology companies Electronics companies established in 1969 Foundry semiconductor companies Home appliance brands Home appliance manufacturers of South Korea Heating, ventilation, and air conditioning companies HSA Foundation founding members Mobile phone companies of South Korea Multinational companies headquartered in South Korea Netbook manufacturers Photography companies of South Korea Point of sale companies Portable audio player manufacturers Semiconductor companies of South Korea South Korean brands Technology companies of South Korea Vacuum cleaner manufacturers Video equipment manufacturers Videotelephony
602388
https://en.wikipedia.org/wiki/John%20McAfee
John McAfee
John David McAfee ( ; 18 September 1945 – 23 June 2021) was a British-American computer programmer, businessman, and two-time presidential candidate who unsuccessfully sought the Libertarian Party nomination for president of the United States in 2016 and 2020. In 1987, he wrote the first commercial anti-virus software, founding McAfee Associates to sell his creation. He resigned in 1994 and sold his remaining stake in the company. McAfee became the company's most vocal critic in later years, urging consumers to uninstall the company's anti-virus software, which he characterized as bloatware. He disavowed the company's continued use of his name in branding, a practice that has persisted in spite of a short-lived corporate rebrand attempt under Intel ownership. McAfee's fortunes plummeted in the financial crisis of 2007–2008. After leaving McAfee Associates, he founded the companies Tribal Voice (makers of the PowWow chat program), QuorumEx, and Future Tense Central, among others, and was involved in leadership positions in the companies Everykey, MGT Capital Investments, and Luxcore, among others. His personal and business interests included smartphone apps, cryptocurrency, yoga, light-sport aircraft and recreational drug use. He resided for a number of years in Belize, but returned to the United States in 2013 while wanted in Belize for questioning on suspicion of murder. In October 2020, McAfee was arrested in Spain over U.S. tax evasion charges. U.S. federal prosecutors brought criminal and civil charges alleging that McAfee had failed to pay income taxes over a four-year period. On 23 June 2021, he was found dead due to an apparent suicide by hanging in his prison cell near Barcelona shortly after his extradition to the U.S. was authorized by the Spanish National Court. His death generated speculation and conspiracy theories about the possibility that he was murdered. McAfee's wife, Janice McAfee, said she did not believe McAfee committed suicide, and that the suicide note was a forgery. Early life McAfee was born in Cinderford, in the Forest of Dean, Gloucestershire, England, on 18 September 1945, on a U.S. Army base (of the 596th Ordnance Ammunition Company), to an American father, Don McAfee, who was stationed there, and a British mother, Joan (Williams). His father was from Roanoke, and McAfee was himself primarily raised in Salem, Virginia, United States. He said he felt as much British as American. When he was 15, his father, whom a BBC columnist described as "an abusive alcoholic", killed himself with a gun. He had spent his childhood living in fear that a beating from his father could happen at any time, and struggled to make sense of why this was happening to him. McAfee received a bachelor's degree in mathematics in 1967 from Roanoke College in Virginia, which subsequently awarded him an honorary Doctor of Science degree in 2008. After receiving his bachelor's degree, McAfee began working towards a doctorate in mathematics at Northeast Louisiana State College but was expelled, in about 1968, because of a relationship with an undergraduate student, who became his first wife. Ventures NASA, Univac, Xerox, CSC, Booz Allen and Lockheed McAfee was employed as a programmer by NASA's Institute for Space Studies in New York City from 1968 to 1970 working on the Apollo program. From there, he went to Univac as a software designer, and later to Xerox as an operating system architect. In 1978, he joined Computer Sciences Corporation as a software consultant. He worked for consulting firm Booz Allen Hamilton from 1980 to 1982. In 1986, while employed by Lockheed, he read about the Brain computer virus made for the PC, and he found it terrifying. Sensing a business opportunity, he went about creating an antivirus software that could detect the computer virus and remove it automatically. In 1987 McAfee created McAfee Associates Inc. to sell this software, which he named VirusScan. This was the first anti-virus software brought to market, and one of the first software products to be distributed over the internet. McAfee Associates Initially McAfee did not seek a large userbase of paying users, but rather wanted to raise awareness of the need to be protected from computer viruses. However, by making people fear such malware, he managed to generate millions of sales, and by 1990 he was making five million dollars a year. The company was incorporated in Delaware in 1992, and had its initial public offering the same year. In August 1993, McAfee stepped down as chief executive and remained with the company as the chief technical officer. He was succeeded by Bill Larson. In 1994 he sold his remaining stake in the company. He had no further involvement in its operations. After various mergers and ownership changes, Intel acquired McAfee in August 2010. In January 2014, Intel announced that McAfee-related products would be marketed as Intel Security. McAfee expressed his pleasure at the name change, saying, "I am now everlastingly grateful to Intel for freeing me from this terrible association with the worst software on the planet." The business was soon de-merged from Intel, once more under the McAfee name. PowWow, QuoromEx, MGT and more Other business ventures that were founded by McAfee include Tribal Voice, which developed one of the first instant messaging programs, PowWow. In 2000, he invested in and joined the board of directors of Zone Labs, makers of firewall software, prior to its acquisition by Check Point Software in 2003. In the 2000s McAfee invested in and advertised ultra-light flights, which he marketed as aerotrekking. In August 2009 The New York Times reported that McAfee's personal fortune had declined to $4 million from a peak of $100 million due to the effect of the financial crisis of 2007–2008 on his investments. In 2009, McAfee was interviewed in Belize for the CNBC special The Bubble Decade, in which it was reported that he had invested in and/or built many mansions in the USA that went unsold when the 2007 global recession hit. The report also discussed his quest to raise plants for possible medicinal uses on his land in Belize. In February 2010, McAfee started the company QuorumEx, headquartered in Belize, which aimed to produce herbal antibiotics that disrupt quorum sensing in bacteria. In June 2013, McAfee uploaded a parody video titled How to Uninstall McAfee Antivirus onto his YouTube channel. In it, he critiques the antivirus software while snorting white powder and being stripped by scantily clad women. It received ten million views. He told Reuters the video was meant to ridicule the media's negative coverage of him. A spokesman for McAfee Inc. called the video's statements "ludicrous". Also in 2013, McAfee founded Future Tense Central, which aimed to produce a secure computer network device called the D-Central. By 2016, it was also an incubator. In February 2014, McAfee announced Cognizant, an application for smartphones, which displays information about the permissions of other installed applications. In April 2014, it was renamed DCentral 1, and an Android version was released for free on Google Play. At the DEF CON conference in Las Vegas in August 2014, McAfee warned people not to use smartphones, suggesting apps are used to spy on clueless consumers who do not read privacy user agreements. In January 2016, he became the chief evangelist for security startup Everykey. In February 2016, McAfee publicly volunteered to decrypt the iPhone used by Rizwan Farook and Tashfeen Malik in San Bernardino, avoiding the need for Apple to build a backdoor. He later admitted that his claims regarding the ease of cracking the phone were a publicity stunt, while still asserting its possibility. In May 2016, McAfee was appointed chairman and CEO of MGT Capital Investments, a technology holding company. It initially said it would rename itself John McAfee Global Technologies, although this plan was abandoned due to a dispute with Intel over rights to the "McAfee" name. He changed MGT's focus from social gaming to cybersecurity, saying "anti-virus software is dead, it no longer works", and that "the new paradigm has to stop the hacker getting in" before he or she can do damage. Soon after joining MGT, McAfee said he and his team had exploited a flaw in the Android operating system that allowed him to read encrypted messages from WhatsApp. Gizmodo investigated his claim, and reported that he had sent reporters malware-infected phones to make this hack work. He replied: "Of course the phones had malware on them. How that malware got there is the story, which we will release after speaking with Google. It involves a serious flaw in the Android architecture." McAfee moved MGT into the mining of bitcoin and other cryptocurrencies, both to make money for the company, and to increase MGT's expertise in dealing with blockchains, which he thought was important for cybersecurity. In August 2017, McAfee stepped down as CEO, instead serving as MGT's "chief cybersecurity visionary". In January 2018, he left the company altogether. Both sides said the split was amicable; he said he wanted to spend all of his time on cryptocurrencies, while the company told of pressure from potential investors to disassociate itself from him. On 13 August 2018, McAfee took a position of CEO with Luxcore, a cryptocurrency company focused on enterprise solutions. Politics Positions McAfee was a libertarian, advocating the decriminalization of cannabis, an end to the war on drugs, non-interventionism in foreign policy, a free market economy which does not redistribute wealth, and upholding free trade. He supported abolishing the Transportation Security Administration. McAfee advocated increased cyber awareness and more action against the threat of cyberwarfare. He pushed religious liberty, saying that business owners should be able to deny service in circumstances that contradict their religious beliefs, adding: "No one is forcing you to buy anything or to choose one person over another. So why should I be forced to do anything if I am not harming you? It's my choice to sell, your choice to buy." 2016 presidential campaign On 8 September 2015, McAfee announced a bid for president of the United States in the 2016 presidential election, as the candidate of a newly formed political party called the Cyber Party. On 24 December 2015, he re-announced his candidacy bid saying that he would instead seek the presidential nomination of the Libertarian Party. On the campaign trail, he consistently polled alongside the party's other top candidates, Gary Johnson and Austin Petersen. The three partook in the Libertarian Party's first nationally televised presidential debate on 29 March 2016. His running mate was photographer, commercial real estate broker and Libertarian activist Judd Weiss. McAfee came second in the primaries and third at the 2016 Libertarian National Convention. Notable endorsements Adam Kokesh, talk show host and activist John Moore, Nevada assemblyman L. Neil Smith, science fiction author and activist 2020 presidential campaign Contrary to his assertion at the 2016 convention, McAfee tweeted on 3 June 2018 that he would run for president again in 2020, either with the Libertarian Party or a separate party that he would create. He later chose to run as a Libertarian. He mainly campaigned for wider cryptocurrency use. On 22 January 2019, McAfee tweeted that he would continue his campaign "in exile", following reports that he, his wife, and four campaign staff were indicted for tax-related felonies by the IRS. He said he was in "international waters", and had previously tweeted that he was going to Venezuela. The IRS has not commented on the alleged indictments. He defended Communist revolutionary Che Guevara on Twitter, putting himself at odds with Libertarian National Committee chairman Nicholas Sarwark, who wrote, "I hear very little buzz about McAfee this time around ... making a defense of Che Guevara from Cuba may ingratiate him with the Cuban government, but it didn't resonate well with Libertarians." In a tweet on 4 March 2020, McAfee simultaneously suspended his 2020 presidential campaign, endorsed Vermin Supreme, and announced his campaign for the Libertarian Party vice presidential nomination. The next day, he returned to the presidential field, reversing the suspension of his bid, as "No one in the Libertarian Party Would consider me For Vice President." The next month, he endorsed Adam Kokesh and became Kokesh's vice-presidential candidate, while still seeking the presidency for himself. At the 2020 Libertarian National Convention, he again lost, now to Jo Jorgensen and Spike Cohen for the presidential and vice-presidential slots. Economic views McAfee contended that taxes were illegal, and claimed in 2019 that he had not filed a tax return since 2010. He referred to himself as "a prime target" of the Internal Revenue Service. In July 2017, McAfee predicted on Twitter that the price of a bitcoin would jump to $500,000 within three years, adding: "If not, I will eat my own dick on national television." In July 2019, he predicted a price of $1 million by the end of 2020. In January 2020, he tweeted that his predictions were "a ruse to onboard new users", and that bitcoin had limited potential because it is "an ancient technology." Legal issues McAfee was named a defendant in a 2008 civil court case related to his Aerotrekking light-sport aircraft venture and the death of nephew Joel Bitow and a passenger. On 30 April 2012, McAfee's property in Orange Walk Town, Belize, was raided by the Gang Suppression Unit of the Belize Police Department. A GSU press release said he was arrested for unlicensed drug manufacturing and possession of an unlicensed weapon. He was released without charge. In 2012, Belize police spokesman Raphael Martinez confirmed that McAfee was neither convicted nor charged, only suspected. In January 2014, while in Canada, he said that when the Belizean government raided his property, it seized his assets, and that his house later burned down under suspicious circumstances. On 2 August 2015, McAfee was arrested in Henderson County, Tennessee, on one count of driving under the influence and one count of possession of a firearm while intoxicated. In July 2019, McAfee and members of his entourage were arrested while his yacht was docked at Puerto Plata, Dominican Republic, on suspicion of carrying high-caliber weapons and ammunition. They were held for four days and released. Weapons were seized, according to the Public Ministry. On 11 August 2020, McAfee falsely stated that he was arrested in Norway during the COVID-19 pandemic after refusing to replace a lace thong with a more effective face mask. He later tweeted a picture of himself with a bruised eye, claiming it occurred during this arrest. The photo of the alleged arrest shows an officer with the German word for "police" on his uniform, invalidating McAfee's claim of having been arrested in Norway. The Augsburg police later said he tried to enter Germany on that day, but was not arrested. Death of Gregory Faull On 12 November 2012, Belize police began to search for McAfee as a person of interest in connection to the homicide investigation of American expatriate Gregory Viant Faull, who was found dead of a gunshot wound the day before, at his home on the island of Ambergris Caye, the largest island in Belize. Faull was a neighbor of McAfee's. In a contemporary interview with Wired, McAfee said he had been afraid police would kill him and refused their routine questions and evaded them. He buried himself in sand for several hours with a cardboard box over his head. Belize's prime minister, Dean Barrow, called him "extremely paranoid, even bonkers". He fled Belize rather than cooperate. In December, the magazine Vice accidentally gave away McAfee's location at a Guatemalan resort, when a photo taken by one of its journalists accompanying him was posted with the EXIF geolocation metadata still attached. While in Guatemala, McAfee asked Chad Essley, an American cartoonist and animator, to set up a blog so he could write about his experience while on the run. He then appeared publicly in Guatemala City, where he unsuccessfully sought political asylum. On 5 December, he was arrested for illegally entering Guatemala. Shortly afterward, the board reviewing his asylum plea denied it and he was taken to a detention center to await deportation to Belize. On 6 December, Reuters and ABC News reported that McAfee had two minor heart attacks in the detention center and was hospitalized. His lawyer said he had no heart attacks, rather high blood pressure and anxiety attacks. McAfee later said he faked the heart attacks to buy time for his attorney to file a series of appeals that ultimately prevented his deportation to Belize, thus hastening that government's decision to send him back to the United States. On 12 December, McAfee was released and deported to the United States. On 14 November 2018, the Circuit Court in Orlando, Florida, refused to dismiss a wrongful death lawsuit against him for Faull's death. U.S. tax evasion charges and planned extradition In January 2019, McAfee announced that he was on the run from U.S. authorities, and living internationally on a boat following the convening of a grand jury to indict him, his wife, and four of his 2020 Libertarian Party presidential primaries staff on tax evasion charges. At the time, the Internal Revenue Service had not independently confirmed the existence of any such indictment. On 5 October 2020, McAfee was arrested in Spain at the request of the United States Department of Justice for tax evasion. The June indictment, which was unsealed upon his arrest, alleged he earned millions of dollars from 2014 to 2018, and failed to file income tax returns. On 6 October, the U.S. Securities and Exchange Commission (SEC) filed a complaint further alleging McAfee and his bodyguard promoted certain initial coin offerings (ICOs) in a fraudulent cryptocurrency pump and dump scheme. It claims he presented himself as an impartial investor when he promoted the ICOs, despite allegedly getting paid $23 million in digital assets in return. On 5 March 2021, the U.S. Attorney's Office for the Southern District of New York formally indicted him and an executive adviser on these charges. McAfee was jailed in Spain, pending extradition to the United States. On 23 June 2021, the Spanish National Court authorized his extradition to face charges in Tennessee; McAfee is suspected to have committed suicide several hours after the authorization. The New York extradition case was still pending in a lower Spanish court. Personal life McAfee married three times. He met his first wife circa 1968 while he was working towards a doctorate at Northeast Louisiana State College and she was an undergraduate student. Their affair led to his expulsion from the college. He married his second wife, Judy, a former flight attendant at American Airlines, circa 1987; they divorced in 2002. The night after McAfee arrived in the United States after being deported from Guatemala in December 2012, he was solicited by and slept with Janice Dyson, then a sex worker 30 years his junior in South Beach, Miami Beach, Florida. They began a relationship and married in 2013. She claims that he saved her from human traffickers. The couple moved to Portland, Oregon, in 2013. In a 2012 article in Mensa Bulletin, the magazine of the American Mensa, McAfee said developing the first commercial antivirus program had made him "the most popular hacking target" and "[h]ackers see hacking me as a badge of honor". For his own cybersecurity, he said he has other people buy his computer equipment for him, uses pseudonyms for setting up computers and logins, and changes his IP address several times a day. When asked on another occasion if he personally used McAfee's antivirus software, he replied: "I take it off[...]it's too annoying." In 2015, he resided in Lexington, Tennessee. In December 2018, he tweeted that he has "47 genetic children". His third wife described him in a Father's Day message as "father of many, loved by few". Death On 23 June 2021, McAfee was found dead in his prison cell at the near Barcelona, hours after the Spanish National Court ordered his extradition to the United States on criminal charges filed in Tennessee by the United States Department of Justice Tax Division. The Catalan Justice Department said "everything indicates" he killed himself by hanging. An official autopsy confirmed his suicide. McAfee's death ignited speculation about the possibility that he was murdered. McAfee's death drew comparisons to the circumstances of the death of American financier Jeffrey Epstein, who was found dead in August 2019 while awaiting trial on sex trafficking charges. Several times, McAfee claimed if he were ever found dead by hanging, it would mean he was murdered. Minutes after the report of his death, an image of the letter Q was posted to his Instagram feed (his account was subsequently taken down), apparently in reference to QAnon conspiracy theories. The day after his death, his lawyer told reporters that while he regularly maintained contact with McAfee in prison, there were no signs of suicidal intent. McAfee's widow reaffirmed this position in her first public remarks since her husband's death, and also called for a "thorough" investigation. On 13 February 2022, Spanish court ruled McAfee died by suicide. In the media Gringo: The Dangerous Life of John McAfee is a Showtime Networks documentary about the portion of McAfee's life spent in Belize. It began airing in September 2016. It covers allegations against him of raping his former business partner, Allison Adonizio, and murdering Belizean David Middleton and American expat Gregory Faull. In an interview with Bloomberg's Pimm Fox and Kathleen Hayes on 8 September 2016, he said these incidents were fabricated, and "Belize is a third-world banana republic and you can go down there and make any story you want if you pay your interviewees, which Showtime did." In March 2017, it was reported that Glenn Ficarra and John Requa would direct a film about McAfee titled King of the Jungle, written by Scott Alexander and Larry Karaszewski. At various points, Johnny Depp, Michael Keaton, and Seth Rogen were reported to have taken roles and later to have left the project. In November 2019, Zac Efron was reported to star as journalist Ari Furman. On 12 May 2017, McAfee and his wife were interviewed on ABC News's 20/20 regarding Faull's alleged murder. Books Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System. What They Are, How They Work, and How to Defend Your PC, Mac, or Mainframe, (with Colin Haynes) St. Martin's Press, 1989 The Secret of the Yamas: Spiritual Guide to Yoga, McAfee Pub, 2001 The Fabric of Self: Meditations on Vanity and Love, Woodland Publications, 2001 Into the Heart of Truth, Woodland Publications, 2001 Beyond the Siddhis. Supernatural Powers and the Sutras of Patanjali, Woodland Publications, 2001 References Further reading External links Appearances on C-SPAN John McAfee's website 1945 births 2021 deaths 2021 suicides 21st-century American businesspeople 21st-century American politicians Activists from Virginia American computer programmers American expatriates in Belize American people of British descent American people who died in prison custody American prisoners and detainees American tax resisters British expatriates in Belize British people of American descent British people who died in prison custody British prisoners and detainees British tax resisters Businesspeople from Virginia Candidates in the 2016 United States presidential election Candidates in the 2020 United States presidential election Computer security specialists Drug policy reform activists English activists English emigrants to the United States English libertarians Fugitives wanted by the United States Lockheed people McAfee Mensans NASA people Non-interventionism People associated with Bitcoin People associated with cryptocurrency People extradited from Guatemala People from Cinderford People from Lexington, Tennessee People from Salem, Virginia People who committed suicide in prison custody Politicians from Roanoke, Virginia Prisoners who died in Spanish detention Privacy activists Roanoke College alumni Suicides by hanging in Spain Tennessee Libertarians
52595979
https://en.wikipedia.org/wiki/Fernando%20Boavida
Fernando Boavida
Fernando Boavida (Full name: Fernando Pedro Lopes Boavida Fernandes; born June 5, 1959 in Pinhal Novo, Palmela, Portugal) is a Portuguese computer scientist, informatics engineer, university professor, and writer, recognized as a pioneer of network science research and internet in the University of Coimbra and in Portugal. Life and career Fernando Boavida received his B.Sc. in Electrical Engineering in 1982, from the University of Coimbra, where he ranked first in his course. He subsequently concluded his M.Sc. in Telecommunications in 1986 and his PhD in Informatics Engineering in 1990, both from the referred university. He currently is Full Professor at the Department of Informatics Engineering (DEI) of the Faculty of Sciences and Technology of the University of Coimbra. Still as an Electrical Engineering student, he was one of the winners of the first Portuguese Mathematics Mini-Olympics, organized by the Portuguese Mathematics Society in 1980. Also as a B.Sc. student, he was involved in the design of the first Portuguese personal computer, ENER 1000, in the early 1980s, and later, during his M.Sc., developed the network interface card for this computer, which implemented a token bus medium access control protocol entirely developed by him. Due to his early involvement in computer networking and the Internet in the late 1980s, through associations such as IFIP, RARE (Réseaux Associés pour la Recherche Européenne, later named TERENA), and EWOS (European Workshop for Open Systems), he was, along with his colleague Edmundo Monteiro. In 1990 he was appointed responsible for the University of Coimbra point of presence in the national academic network, RCTS, and in the Internet. He was co-proposer and co-founder of the Department of Informatics Engineering of the University of Coimbra, created by deliberation of the University's Senate on December 13, 1994. He was the founder, in 1991, of the Laboratory of Communications and Telematics (LCT) of the Centre for Informatics and Systems of the University of Coimbra, (CISUC), the Strategic Director for Communications and Information Technology of the University of Coimbra from October 2003 to December 2015, the Director of the Department of Informatics Engineering from February 2004 to January 2008, the Chairman of the Board of the Coimbra Digital Region Association from June 2009 to October 2010, and the Director of CISUC from October 2013 to September 2015. Fernando Boavida participated in or directed 40 advanced research projects, mainly in the Framework Programmes for Research and Technological Development of the European Union ESPRIT, RACE, ACTS, IST and ICT. He was co-founder of the ACM CoNEXT conference series, and chaired prestigious international conferences such as QofIS 2001, IDMS-PROMS 2002, NETWORKING 2006, WWIC 2007, FMN 2008, EWSN 2010, FMN 2012, IWQoS 2012, ACM SIGCOMM FhMN 2013, Mobiquitous 2015, and WoWMoM 2016. He authored/co-authored more than 170 international publications (books, book chapters, refereed journal articles, and conference proceedings papers) and 50 national publications. He is the author of four textbooks in Portuguese widely used as course books in universities and polytechnic schools of Portuguese-speaking countries, in the areas of computer networks engineering, computer networks administration, TCP/IP networking, and wireless sensor networks. Collectively, these books have sold more than 25,000 copies since the year 2000. He is also co-author of a series of e-books on computer networking, written in Spanish (Redes de Ordenadores). He is a senior member of the IEEE and a licensed Professional Engineer. He is a member of the editorial advisory board of the Computer Communications Journal. since 1999. References External links Fernando Boavida's page at CISUC  EWOS RCTS Fernando Boavida's page at Google Scholar Portuguese computer scientists Living people 1959 births People from Setúbal District University of Coimbra alumni University of Coimbra faculty
24106883
https://en.wikipedia.org/wiki/TXT%20e-solutions
TXT e-solutions
TXT e-solutions is an international software development and consulting company. Founded in 1989, TXT e-solutions has been listed since July 2000 on Borsa Italiana–London Stock Exchange (TXT.MI) STAR segment. The company has headquarters in Milan and offices in Italy, France, UK, Germany, Switzerland and United States Overview TXT is an international IT Group, end-to-end provider of consultancy, software services and solutions, supporting the digital transformation of customers’ products and core processes. With a proprietary software portfolio and deep expertise in vertical domains, TXT operates across different markets, with a growing footprint in Aerospace, Aviation, Defense, Industrial, Government and Fintech. TXT is headquartered in Milan and has subsidiaries in Italy, Germany, the United Kingdom, France, Switzerland and the United States of America. The holding company TXT e-solutions S.p.A, has been listed on the Italian Stock Exchange, STAR segment (TXT.MI), since July 2000 Another focus of TXT e-solutions is Research & Development. Its Corporate Research team is involved in several national (Italian) and international research programs. History TXT e-solution was founded in the 1989. During the '90s it released software products dedicated to Production Planning & Scheduling and then its first Software Suite for (SCM) Supply Chain Management. Soon after IPO in 2000 it started international operations and started up subsidiaries in France, Spain, United Kingdom and Germany. TXT e-solutions released in 2002 the first solutions for Supply Chain Management specialized by Business Processes: Demand Management and Sales and Operations Planning and the year after new Software Products for Product Data Management (PDM). Even TXT Polymedia, (former subsidiary of TXT e-solutions) that moved its first steps in the late '90 on Multichannel Content Management software, in the same year extended its offering to Digital Terrestrial Television. In 2004, TXT PERFORM Software products for Demand & Supply Chain Management and Sales & Operation Planning was released as well as a new Polymedia Mobile Platform. In 2006 Microsoft selected TXT e-solutions for the Industry Builder Initiative to cover Supply Chain Planning needs of Consumer-driven industries. The year after competence areas and line of businesses were grouped into three divisions: TXT PERFORM, TXT POLYMEDIA, TXT NEXT 2008 was the year of two important releases: first TXTPERFORM2008 (the new Supply Chain Planning Suite combining Business Intelligence functionalities with Supply Chain Planning), and then Media in a Box (multimedia content management platform). While the world was struggling for the crisis, TXT e-solutions managed to launch a new Software product for Product Lifecycle Management by TXT PERFORM and new solution and service line for Digital Manufacturing dedicated to Aerospace sector by TXT NEXT. The 2011, was the year for TXT e-solutions to focus its development strategy on the TXT PERFORM and TXT NEXT divisions; therefore, TXT Polymedia business was sold to Kit Digital Inc. to secure additional financing and to accelerate its international growth. On 2 October 2017, TXT group finalised the sale of the TXT Retail (TXT PERFORM) division to Aptos, Inc. (formerly a division of Epicor. See also Product lifecycle management Supply Chain Management References External links TXT e-solutions homepage. TXT e-solutions at Borsa Italiana Software companies of Italy Business software companies Development software companies Supply chain software companies Companies based in Milan Software companies established in 1989 Companies listed on the Borsa Italiana